Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
18861
Kinematic Adaptive Frame Recognition (KAFR): A Novel Framework for Video Segmentation via Frame Similarity and Surgical Tool Tracking
Published 2025-01-01“…Specifically, we compute the similarity between consecutive frames by tracking the movement of surgical tools. …”
Get full text
Article -
18862
Multipartite entanglement distribution in a topological photonic network
Published 2025-02-01“…In the ongoing effort towards a scalable quantum computer, multiple technologies have been proposed. …”
Get full text
Article -
18863
A Design Approach for Controlled Self-Organization-Based Sensor Networks Focused on Control Timescale
Published 2013-05-01“…Through computer simulations, we show the adaptability and stability of the proposed design approach.…”
Get full text
Article -
18864
SOFTWARE SHELL FOR DEVELOPMENT AND IMPLEMENTATION OF OBJECT RATING ASSESSMENT COEFFICIENT METHODS
Published 2013-03-01“…The given shell is designed for those users who wish to develop and enrich the computer coefficient techniques by themselves (without professional programmers’ help). …”
Get full text
Article -
18865
New certificateless aggregate signature scheme with universal designated verifier
Published 2017-11-01“…Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks,because they could not only solve the problems of the certificate management and private key escrow,but also realize batch validation and the signer’s privacy protection.A security analysis for a certificateless aggregate signature scheme with universal designated verifier was firstly provided,and two attack methods to demonstrate that their scheme was forgeable was presented.To enhance security,a new certificateless aggregate signature scheme with universal designated verifier was proposed,and then the security of the scheme in the random oracle model was proved.The performance of our proposed scheme was finally evaluated.Compared with the original scheme,the pvoposed scheme fixes the security flaws and the total computational cost is greatly reduced.…”
Get full text
Article -
18866
PROFILE OF NEUROLOGICAL MANIFESTATIONS IN PRIMARY SJOGREN’S SYNDROME
Published 2002-06-01“…Electromyography, computer tomography, audiometric investigations were realised. …”
Get full text
Article -
18867
Four loop Green’s functions involving the $$n=2$$ n = 2 moment of the Wilson operator
Published 2025-02-01“…Abstract We evaluate the Green’s function for the insertion of the second moment of the twist-2 flavour nonsinglet Wilson operator in a quark 2-point function in all three different single scale external momentum configurations at four loops in the $$\overline{\text{ MS }}$$ MS ¯ scheme and the chiral limit. …”
Get full text
Article -
18868
Theoretical Analysis of the Noise Power Ratio of Nonlinear Power Amplifiers
Published 2016-01-01“…This paper presents a theoretical analysis and derives the amplifier output noise power spectral density result in a closed form when the input to the amplifier is a band limited Gaussian noise. From the computed power spectral density the NPR is evaluated by a simple subtraction. …”
Get full text
Article -
18869
Design Performance Measurement of Intelligent Garbage Sorting Cart using Neutrosophic Sets and SuperHyperSoft
Published 2025-05-01“…Two methods are used in this study, such as the CRITIC method to compute the criteria weights and the ARAS method to rank the alternatives. …”
Get full text
Article -
18870
Related-key impossible boomerang cryptanalysis on TWINE
Published 2019-09-01“…In order to evaluate the security of the lightweight block cipher TWINE,the method of related-key impossible boomerang cryptanalysis was applied and a related-key impossible boomerang distinguisher consisting of 16-round and 17-round paths was constructed.Based on this new distinguisher,an attack on 23-round TWINE was mounted successfully by concatenating 4-round to the beginning and 2-round for the 17-round path and 3-round for the 16-round path to the end respectively.The attack on 23-round TWINE required data complexity of only 2 <sup>62.05</sup>plaintexts and computational complexity of about 2 <sup>70.49</sup>23-round encryptions.Compared with published cryptanalysis results,the proposed attack has obvious advantages.…”
Get full text
Article -
18871
Address overloading-based packet forwarding verification in SDN
Published 2022-03-01“…Aiming at the problem that the most existing forwarding verification mechanisms in software-defined network (SDN) verified packets hop-by-hop by incorporating new secure communication protocols, which incurred significant computation and communication overhead, an address overloading-based forwarding verification mechanism was proposed.The flow runtime was divided into consecutive random intervals by the ingress switch via overloading address fields of packet, basing on overloading address, packets were forwarded by each subsequent switch, and the controller sampled the packets forwarded by ingress and egress switch in the interval to detect abnormal behavior on the path.Finally, the proposed mechanism and simulation network was implemented and evaluated.Experiments show that the mechanism achieves efficient forwarding and effective anomaly detection with less than 8% of additional forwarding delays.…”
Get full text
Article -
18872
Economic Waves: The Effect of the U.S. Economy on the World Economy
Published 2014-09-01“…Using this model, this paper evaluates whether and how an economic recession or financial crisis in the U.S. economy can simultaneously affect the five aforementioned economic regions. …”
Get full text
Article -
18873
Teaching Effectiveness Analysis of Educational Technology in Vocational Colleges: SuperHyperSoft Set Integrated with Decision-Making Approach for Increased Effectiveness
Published 2025-05-01“…Using a multi-criteria decision-making (MCDM) approach, this study computes the criteria weights by the LBWA and the MOORA methodology to rank the alternatives. …”
Get full text
Article -
18874
AS-level model for restraining DoS attacks
Published 2013-09-01“…Combined with the next generation security architecture,a novel AS-level defense scheme was proposed to restrain DoS attacks in the Internet.And the deficiencies of previous capability schemes were analyzed in detail,especially on requesting/withdrawing authorization of capabilities.The scheme takes account of a congestion feedback mechanism,a combination with multi-level active queue management,and the credit computation.Then a further analysis on the scheme’s effectiveness was presented.Several experiments with NS2 and CAIDA’s topology datasets were performed to evaluate the authorizing time and traffic,the average requesting time and common file transfer time of different schemes.The results show that this scheme can effectively reduce the average requesting time of capabilities,improve common file transfer efficiency,and enhance the feasibility and robustness.…”
Get full text
Article -
18875
Demagnetizer Frequency Converter
Published 2009-06-01“…Simulation modeling within the system of computer «Mathlab Simulink» modeling has been applied with the purpose to evaluate the algorithm quality. …”
Get full text
Article -
18876
Enhanced Network Traffic Classification Using Bayesian-Optimized Logistic Regression and Random Forest Algorithm
Published 2025-01-01“…Compared to other machine learning algorithms, the proposed models demonstrate superior performance in balancing accuracy, computational efficiency, and detection speed, making them ideal for real-time network security applications. …”
Get full text
Article -
18877
-
18878
User Safety and Security in the Metaverse: A Critical Review
Published 2024-01-01Get full text
Article -
18879
-
18880