Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
14321
Pin Row Loading Analysis of Scraper Conveyor under Oblique Cut Condition
Published 2016-01-01“…According to the force analysis of roller,the equation set of roller in the process of cutting by three- axis force is derived.Combining the MATLAB programming,the curve of the before and after roller load changing with the rotation angle under the oblique cut condition is obtained.With shearer machine as the research object,the whole machine mechanical equation is listed,the mathematical computing model is established.Based on MATLAB programming,combining with the before and after roller load changing curve under the oblique cut condition,the before and after sliding shoe load curves under the oblique cut condition is obtained.Due the contact relation between the sliding shoe and pin row and the principle of force mutual action,the curve of load acting on the pin rows under the oblique cut condition is achieved.And through the ANSYS Workbench simulation analysis,the stress distribution and deformation of pin rows of scraper conveyor are got.A reference for the future of design and analysis of damage causes of scraper conveyor pin row is provided.…”
Get full text
Article -
14322
New provable data transfer from provable data possession and deletion for secure cloud storage
Published 2019-04-01“…With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation. …”
Get full text
Article -
14323
Geo-Statistics and Deep Learning-Based Algorithm Design for Real-Time Bus Geo-Location and Arrival Time Estimation Features with Load Resiliency Capacity
Published 2025-07-01“…By employing decentralized data processing, our system significantly reduces network traffic and computational load, enabling data sharing and sophisticated analysis. …”
Get full text
Article -
14324
Hybrid Boson Sampling
Published 2024-10-01“…We propose boson sampling from a system of coupled photons and Bose–Einstein condensed atoms placed inside a multi-mode cavity as a simulation process testing the quantum advantage of quantum systems over classical computers. …”
Get full text
Article -
14325
Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
Published 2020-05-01“…However, how to realize the attribute privacy concerns in the access policy and optimize the heavy computing overhead have been not adequately addressed. …”
Get full text
Article -
14326
Aerosol Distribution Due to Wildfire in Sumatra, Indonesia Considered from Model Simulation
Published 2025-05-01“…The results of this study show that the injection process in the model simulations has a significant impact on the aerosol distribution. …”
Get full text
Article -
14327
Low variance estimations of many observables with tensor networks and informationally-complete measurements
Published 2025-07-01“…Accurately estimating the properties of quantum systems is a central challenge in quantum computing and quantum information. We propose a method to obtain unbiased estimators of multiple observables with low statistical error by post-processing informationally complete measurements using tensor networks. …”
Get full text
Article -
14328
A Size-Perimeter Discrete Growth Model for Percolation Clusters
Published 2021-01-01“…An iterative cluster growth model is considered for computing the expected size and perimeter of the growing cluster. …”
Get full text
Article -
14329
VECT: an automatic visual Perl programming tool for nonprogrammers
Published 2005-04-01“…Modern high-throughput biological research produces enormous amount of data that must be processed by computers, but many biologists dealing with these data are not professional programmers. …”
Get full text
Article -
14330
Use of hybrid quantum-classical algorithms for enhancing biomarker classification.
Published 2025-01-01“…Quantum machine learning (QML) combines quantum computing with machine learning, offering potential for solving intricate problems. …”
Get full text
Article -
14331
Research on enterprise digital transformation: A case study of Alibaba
Published 2024-01-01“…According to the research results of this paper, it is suggested that in the future digital transformation process, enterprises should strengthen investment in digital infrastructure and talent training, which is the most fundamental step of digital transformation.…”
Get full text
Article -
14332
Multi-version consolidation method for block-level backup data
Published 2011-01-01“…Historical version backup data query efficiency was dependent on the version chain length in a multi-version backup data storage system.A novel block-level backup data multi-version consolidation method was presented for this problem.Any version of a historical full system snapshot could be generated within the incremental backup data version sequence.Theoretical analysis showed that it could increase the target snapshot version query efficiency significantly in the version chain.A variable-length block version merging algorithm was presented to decrease the computing complex-ity in the process of snapshot version merging,according to the block-level backup data distribution features.Finally,the concrete applications and performance analysis for block-level version consolidation method was also introduced.The simulated experiments results expose that the version consolidation method can eliminate redundant version of backup data with the same version chain length,and it can increase full system recovery efficiency than traditional methods sig-nificantly.…”
Get full text
Article -
14333
Model Building and Simulation of the Electric Brake Energy of Urban Rail Vehicle
Published 2011-01-01“…By analyzing conditions that urban rail vehicles in the traction power supply network occur the regenerative braking or resistor braking in electric braking process, and depending on the grouping of vehicles, lines, load, run strategy, operation plans, traction power supply and other basic conditions, based on single vehicle computing model and multi-vehicles power supply network model, electric braking energy distribution model were established and simulation were carried out. …”
Get full text
Article -
14334
TraIL: Pinpoint Trajectory for Indoor Localization
Published 2015-11-01“…Indoor localization on smartphones is an enabler for a number of ubiquitous and mobile computing applications attracting worldwide attentions. …”
Get full text
Article -
14335
DEVELOPMENT OF THE MARKET OF ELECTRONIC INSURANCE
Published 2017-10-01“…The paper is focused on cloud computing technologies, namely methods of distributed data processing, that make computer resources and capacities available to the user as an Internet service used in the insurance market, along with the description of their structure and specifics. …”
Get full text
Article -
14336
Strategies for implementing quantum error correction in molecular rotation
Published 2024-12-01“…The presented strategies and methods might enable robust sensing or even fault-tolerant quantum computing using the rotation of individual molecules.…”
Get full text
Article -
14337
Torsion point attacks on ‘SIDH‐like’ cryptosystems
Published 2023-03-01“…The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation mechanism SIKE, which was submitted to and remains in the third round of NIST's post‐quantum standardisation process as an ‘alternate’ candidate. Isogeny‐based cryptography generally relies on the conjectured hardness of computing an isogeny between two isogenous elliptic curves, and most cryptanalytic work referenced on SIKE's webpage exclusively focusses on that problem. …”
Get full text
Article -
14338
Flipping the Classroom for higher Education Learners to Improve Productive and Receptive Skills
Published 2020-01-01“…Overall, the results of the study have shown the positive impact of this method on the teaching/learning process in the EFL classes for Tourism students, contributing to their motivation and development of their professional skills.…”
Get full text
Article -
14339
Comparative analysis of audio-MAE and MAE-AST models for real-time audio classification
Published 2025-07-01“…The main challenges include processing large amounts of data, particularly for high-quality audio files, which require significant computing resources. …”
Get full text
Article -
14340
Penerapan Model Algoritma Unsupervised Learning untuk Klasterisasi Tingkat Kenyamanan Ruang Tidur berdasarkan Faktor Lingkungan
Published 2025-04-01“… Pada era revolusi industri 4.0, teknologi seperti cloud computing, robotic, internet of things(IoT), artificial intelligence (AI) dan machine learning (ML) sangat banyak dikembangkan di berbagai sektor seperti industri, pemerintahan, pendidikan hingga ke sektor rumah tangga. …”
Get full text
Article