Suggested Topics within your search.
Suggested Topics within your search.
-
2301
CYBER TERRORISM AND THE EFFECTS OF THE RUSSIAN ATTACKS ON DEMOCRATIC STATES IN EAST EUROPE
Published 2020-03-01Get full text
Article -
2302
Manually classified dataset of leaning and standing personnel images for construction site monitoring and neural network training(Repositorio Institucional – Universidad de Lima)
Published 2025-06-01“…The dataset is stored in a public repository, making it openly accessible for academic and industrial purposes regarding computer vision, civil engineering, and workplace safety.…”
Get full text
Article -
2303
Code dependence of calculated crystalline electron densities. Possible lessons for quantum crystallography
Published 2025-05-01“…As we demonstrate, theoretically derived ρ values depend not only on the set of computational conditions used to obtain them but also on the particular computational code selected for this task. …”
Get full text
Article -
2304
Research on the Solution of Train-trackside CooperativeShortening Movement Authority
Published 2020-01-01“…In railway operations, when an opened route needs to be closed occasionally, the approach locking function of interlocking is needed to avoid the trip risk of a train. …”
Get full text
Article -
2305
The use of three-dimensional-printed guides, static navigation, and bioactive materials to treat bilateral and double dens invaginatus
Published 2025-05-01“…The intraoral periapical radiograph of the tooth revealed a large periapical radiolucency extending up to the middle third of the root with abnormal morphology. A cone-beam computed tomography scan was advised which revealed 3 separate openings, with the invaginatus portion engulfed between the mesial and distal canals confluencing at the apex as one single exit giving the tooth a “Tooth-in-Tooth Appearance.” …”
Get full text
Article -
2306
Analytical review of visualization methods for launch and landing of spacecraft with consideration of 64-bit system boundary value issues
Published 2025-02-01“…Specialized tools like OpenRocket and Orbiter demonstrated high capabilities in modeling aerodynamic characteristics and space missions. …”
Get full text
Article -
2307
-
2308
Experimenting with a Multi-User Virtual Environment for Collaborative Online International Learning
Published 2025-04-01“…Students from University of Limerick (UL) and Oslo Metropolitan University (OsloMet), used the OpenSimulator MUVE platform for collaboration. The students were divided into four groups comprising a mix of students from both universities. …”
Get full text
Article -
2309
-
2310
-
2311
Selected Topics on Business Information Systems Research: Editorial Introduction to Issue 26 of CSIMQ
Published 2021-04-01Get full text
Article -
2312
A Neural Network Constitutive Model and Automatic Stiffness Evaluation for Multiscale Finite Elements
Published 2025-03-01“…The artificial neural network (ANN) model is constructed based on a data set of responses from representative volume elements, which was calculated by finite elements and using an open scientific software machine learning platform. …”
Get full text
Article -
2313
-
2314
-
2315
Application of High Efficiency and High Precision Network Algorithm in Thermal Capacity Design of Modular Permanent Magnet Fault-Tolerant Motor
Published 2025-07-01“…Aiming at the problems of low thermal analysis efficiency and high computational cost of traditional computational fluid dynamics (CFD) methods for modular fault-tolerant permanent magnet synchronous motors (MFT-PMSMs) under complex working conditions, this paper proposes a fast modeling and calculation method of motor temperature field based on a high-efficiency and high-precision network algorithm. …”
Get full text
Article -
2316
-
2317
-
2318
-
2319
Multimedia privacy protection: an N-round cascaded cryptosystem based on merged multi-chaotic maps under various image attacks
Published 2025-05-01“…Due to the widespread use and variety of wireless networks and their applications in open environments, security techniques need to be more robust, reliable, and flexible, incorporating multi-stage and interfered secret key (Skey) capabilities. …”
Get full text
Article -
2320
PREDICTING THE LEARNING PATH TO LEARNER’S OPTIMUM COMPREHENSION
Published 2024-04-01Get full text
Article