Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
13641
A Blockchain-Based Privacy Protection Model Under Quality Consideration in Spatial Crowdsourcing Platforms
Published 2024-01-01Get full text
Article -
13642
-
13643
Leveraging AlphaFold2 structural space exploration for generating drug target structures in structure-based virtual screening
Published 2025-09-01“…Computational virtual screening (VS) plays a vital role in early-stage drug discovery by enabling the efficient selection of candidate compounds and reducing associated costs. …”
Get full text
Article -
13644
-
13645
Impact of voids on the solder joint integrity and fatigue life of IGBT power module
Published 2025-06-01“…However, as the deployment of IGBT modules penetrates several mission-critical systems operating in harsher ambient, process voids in the solder joints challenge their reliability and fatigue life. …”
Get full text
Article -
13646
-
13647
-
13648
Low-Cost, LiDAR-Based, Dynamic, Flood Risk Communication Viewer
Published 2025-02-01“…Through decoupling physics-based predictions from the visualization, a dynamic, flood risk viewer was produced with modest processing resources involving only a single, quad-core processor with a frequency around 4.30 GHz and with no graphics card. …”
Get full text
Article -
13649
Lightweight encryption solution for train communication network
Published 2024-01-01“…This solution employs a key negotiation process based on traditional communication encryption scheme, aiming to achieve lightweight encryption in train communication networks and compliance with the authenticity, integrity, and confidentiality requirements of communication data, while greatly reducing hardware demands and computational burdens associated with key management. …”
Get full text
Article -
13650
Intelligent Analysis of Core Identification Based on Intelligent Algorithm of Core Identification
Published 2021-01-01Get full text
Article -
13651
Research and application of V2X based on MEC
Published 2020-06-01“…The large-scale construction of 5G wireless communication network enhances the development of C-V2X (cellular-vehicle to everything) towards diversified directions.Large bandwidth services,such as high-definition video and AR/VR,bring great transmission and processing pressure to the classical network architecture.Meanwhile,traffic safety services characterized by ultra-high reliability and low delay put stringent requirements on network performance.The network architecture of providing services and computing localization through setting user panel down to close to the terminals and MEC (multiple access edge computing) can meet the requirements of data short loop transmission and ultra-low delay in the internet of vehicles scenario.The combination of MEC and V2X was explored in depth,the MEC networking scenario,MEC network architecture and the key technologies and challenges of MEC were analyzed.The combination scheme of MEC and C-V2X integration of network planning was provided.The application of MEC in C-V2X was presented in several specific scenarios.…”
Get full text
Article -
13652
Lattice-based lightweight post quantum access authentication scheme for satellite network
Published 2024-10-01“…In the authentication phase, a low dimensional modular multiplication modular addition mutual authentication algorithm was designed based on the bonsai tree algorithm, which reduced the algorithm complexity from the quadratic level to the linear level, further decreasing the communication costs during the authentication process and computational costs on satellite. Theoretical proof and performance analysis show that the scheme resists quantum computing attacks and reduces authentication time by at least 150% compared to lattice authentication schemes.…”
Get full text
Article -
13653
-
13654
Breaking Digital Health Barriers Through a Large Language Model–Based Tool for Automated Observational Medical Outcomes Partnership Mapping: Development and Validation Study
Published 2025-05-01“…MethodsWe developed a 3-tiered semantic matching system using GPT-3 embeddings to transform heterogeneous clinical data to the OMOP Common Data Model. The system processes input terms by generating vector embeddings, computing cosine similarity against precomputed Observational Health Data Sciences and Informatics vocabulary embeddings, and ranking potential matches. …”
Get full text
Article -
13655
-
13656
-
13657
-
13658
Sum-Power Minimization in Multiuser Single-DF-Relay Networks with Direct Links
Published 2016-04-01Get full text
Article -
13659
Non-Gaussian quantum steering produced by quasi-phase-matching third-harmonic generation
Published 2025-01-01“…With the rapid advancements in fields such as quantum entanglement distillation and quantum metrology, the limitations of Gaussian states in certain applications within quantum computing and information processing have come to the forefront. …”
Get full text
Article -
13660
Integrated Non-Destructive Testing for Assessing Manufacturing Defects in Melt-Fusion Bonded Thermoplastic Composite Pipes
Published 2025-03-01“…The thermoplastic composite pipe (TCP) manufacturing process introduces defects that impact performance, such as voids, misalignment, and delamination. …”
Get full text
Article