Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- Information technology 9
- Moral and ethical aspects 9
- Management 8
- computer 8
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- History 4
- Human-computer interaction 4
- Language and languages 4
- Mass media 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- Hospitality industry 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- MATHEMATICS / Mathematical Analysis 3
- Mathematical analysis 3
-
54881
A Theoretical and Experimental Study on Esterification of Citric Acid with the Primary Alcohols and the Hydroxyl Groups of Cellulose Chain (n = 1-2) in Parched Condition
Published 2020-01-01“…Geometry and energy of reactants, products, and transition state (TS) structures were optimized at B3LYP/6-311g (d, p) level and ONIOM (B3LYP/6-311g (d, p):PM3MM) level. The computational results show that the esterification occurs in the two main steps: the first step is the dehydration reaction of CA to form anhydrides of 5-membered ring and 6-membered ring and the second step is the ring opening reaction with the hydroxyl –OH groups to form the ester products. …”
Get full text
Article -
54882
Are Women More Risk Averse? A Sequel
Published 2025-01-01“…The suggested refinements pertain first to an enhanced computation of wealth, which includes additional categories of assets such as 401(k)s or other thrift savings accounts, and second to the more subtle handling and consideration of specific demographic data of the SCF respondents. …”
Get full text
Article -
54883
An Approach to Fall Detection Using Statistical Distributions of Thermal Signatures Obtained by a Stand-Alone Low-Resolution IR Array Sensor Device
Published 2025-01-01“…The system was implemented using a Raspberry Pi-based stand-alone device that provides a cost-effective solution without the need for additional computational devices. This study demonstrates the effectiveness of using IR array sensors for non-invasive, real-time fall detection and activity recognition, which offer significant potential for improving healthcare monitoring and ensuring the safety of fall-prone individuals.…”
Get full text
Article -
54884
Esterification of Oleic Acid for Biodiesel Production Using a Semibatch Atomization Apparatus
Published 2023-01-01“…The size of droplets was determined by computational image processing. A mathematical model was also developed to describe the conversion of oleic acid to ethyl ester as a function of molar concentration of components and operating conditions of the reactor. …”
Get full text
Article -
54885
What Influences Low-cost Sensor Data Calibration? - A Systematic Assessment of Algorithms, Duration, and Predictor Selection
Published 2022-06-01“…While confirming that the latest research tendency is deep learning, regression is still a viable option for studies with limited effort in parameter tuning and method selection, especially considering its computational efficiency and simplicity. The sample size effect is most evident when the sample size drops below 30%, which is equivalent to six weeks of continuously collected hourly data. …”
Get full text
Article -
54886
-
54887
EFFECT OF THE SCREENS RADIANT REFLECTANCE ON THERMAL TRANSPORT PROCESS IN THE CLADDING STRUCTURES
Published 2016-02-01“…This allows reducing thickness of the heat-insulating layer (with regard of two screens) by 0.07 m. Computations illustrate the fact that account for the radiant reflectance of screening enables lowering the rated heat flux passing through the enclosure. …”
Get full text
Article -
54888
Design and Aerodynamic Analysis of a Flapping Mechanism for Foldable Biomimetic Aircraft
Published 2025-01-01“…Through precise modeling, the motion trajectories of the inner and outer wing segments were derived, providing a robust mathematical foundation for motion control and optimization. Computational simulations based on trajectory equations successfully demonstrated the characteristic figure-eight wingtip motion. …”
Get full text
Article -
54889
Machine Learning Modelling of the Relationship between Weather and Paddy Yield in Sri Lanka
Published 2021-01-01Get full text
Article -
54890
Stochastic differential equations to model influenza transmission with continuous and discrete-time Markov chains
Published 2025-01-01“…In this study, a more realistic representation of infection dynamics, intervention effects, and transmission behaviors is offered by the convergence of deterministic, CTMC, DTMC, and SDE models. Computational methods are used to validate theoretical results, improving the trustworthiness of the model. …”
Get full text
Article -
54891
-
54892
Dynamic Response Analyses of Plastic Greenhouse Structure considering Fluctuating Wind Load
Published 2021-01-01“…Finally, the dynamic response of the steel skeletons of plastic greenhouses is analyzed under the effect of the simulation wind speed, and the spatial distribution of the maximum node displacement and the section maximum stress of the steel skeleton are obtained. Computational results show that the displacement peak is near the top of the plastic greenhouse. …”
Get full text
Article -
54893
A Novel Multi-Fidelity Support Vector Classification Method for Boundary Prediction in Engineering Applications
Published 2025-01-01“…To validate our method, we applied it to three distinct engineering problems: predicting the failure boundary of a zero Poisson ratio structure, analyzing surge and choke boundaries in an axial flow compressor rotor, and tackling a 31-dimensional simulation failure boundary prediction problem within the computational fluid dynamics context of the same rotor. …”
Get full text
Article -
54894
Wafer Defect Classification Algorithm With Label Embedding Using Contrastive Learning
Published 2025-01-01“…Moreover, compared to previous methods, our approach demonstrates better classification performance and computational efficiency, even in situations with imbalanced labels. …”
Get full text
Article -
54895
Anti-Impact Performance Enhancement of Two-Way Spanning Slab through the Implementation of Steel Trussed Bars
Published 2024-01-01“…Consider the thorough investigation into the anti-impact characteristics of RC slabs, which has been rigorously pursued through both experimental and computational methodologies. A plethora of scholarly discourse on this topic is readily available, providing invaluable insights into the structural dynamics governing slabs subjected to low-velocity impacts. …”
Get full text
Article -
54896
A New Video-Based Crash Detection Method: Balancing Speed and Accuracy Using a Feature Fusion Deep Learning Framework
Published 2020-01-01“…In this paper, a feature fusion-based deep learning framework was developed for video-based urban traffic crash detection task, aiming at achieving a balance between detection speed and accuracy with limited computing resource. In this framework, a residual neural network (ResNet) combined with attention modules was proposed to extract crash-related appearance features from urban traffic videos (i.e., a crash appearance feature extractor), which were further fed to a spatiotemporal feature fusion model, Conv-LSTM (Convolutional Long Short-Term Memory), to simultaneously capture appearance (static) and motion (dynamic) crash features. …”
Get full text
Article -
54897
-
54898
Research on strong robustness watermarking algorithm based on dynamic difference expansion
Published 2023-10-01“…A surge in the amount of information comes with the rapid development of the technology industry.Across all industries, there is a need to collect and utilize vast amounts of data.While this big data holds immense value, it also poses unprecedented challenges to the field of data security.As relational databases serve as a fundamental storage medium for data, they often contain large-scale data rich in content and privacy.In the event of a data leak, significant losses may occur, highlighting the pressing need to safeguard database ownership and verify data ownership.However, existing database watermarking technologies face an inherent tradeoff between improving watermark embedding capacity and reducing data distortion.To address this issue and enhance watermark robustness, a novel robust database watermarking algorithm based on dynamic difference expansion was introduced.The QR code was employed as the watermark, the SVD decomposition of the low frequency part of the image was utilized after Haar wavelet transform.By extracting specific feature values and using residual feature values as the watermark sequence, it was ensured that the same-length watermark sequence contains more information and the embedded watermark length can be reduced.Furthermore, by combining the adaptive differential evolution algorithm and the minimum difference algorithm, the optimal embedding attribute bits were selected to alleviate the problems of low computational efficiency, high data distortion and poor robustness of traditional difference expansion techniques in embedding watermarks, and to improve the embedding capacity of watermarks while reducing the distortion of data.Experimental results demonstrate that the proposed algorithm achieves a high watermark embedding rate with low data distortion.It is resilient against multiple attacks, exhibiting excellent robustness and strong traceability.Compared to existing algorithms, it offers distinct advantages and holds great potential for broad application in the field of data security.…”
Get full text
Article -
54899
The adoption of telemedicine by healthcare practitioners in South Africa
Published 2025-01-01Get full text
Article -
54900
Time series segmentation for recognition of epileptiform patterns recorded via microelectrode arrays in vitro.
Published 2025-01-01“…In this regard, the detection and classification of events from ongoing brain activity, while achieving low power consumption through computationally inexpensive implementations, represents a major challenge in the field. …”
Get full text
Article