Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
721
Numerical High-Order Model for the Nonlinear Elastic Computation of Helical Structures
Published 2021-01-01“…In this work, we propose a high-order algorithm based on the asymptotic numerical method (ANM) for the nonlinear elastic computation of helical structures without neglecting any nonlinear term. …”
Get full text
Article -
722
Computation of Rayleigh Damping Coefficients for the Seismic Analysis of a Hydro-Powerhouse
Published 2017-01-01Get full text
Article -
723
Interface-engineered non-volatile visible-blind photodetector for in-sensor computing
Published 2025-01-01“…In this paper, a reconfigurable UV photodetector based on CeO2/SrTiO3 heterostructures is demonstrated with in-sensor computing capabilities achieved through interface engineering. …”
Get full text
Article -
724
Application and Legal Governance of Computational Technologies in Credit Investigation: An Interdisciplinary Perspective
Published 2022-01-01“…The purpose of this interdisciplinary study is to investigate the applications of modern computational technologies in the field of credit investigation and discuss the related legal governance measurements in order to unblock the bottlenecks in the future development of credit investigation market. …”
Get full text
Article -
725
The Computational Solution of Generalized Inverse Eigenvalue Problem for Pseudo-Jacobi Matrix
Published 2024-01-01Get full text
Article -
726
Computational epitope-based vaccine design with bioinformatics approach; a review
Published 2025-01-01“…Finally, employing computational techniques, we can thoroughly evaluate the designed vaccine. …”
Get full text
Article -
727
Jewelry Art Modeling Design Method Based on Computer-Aided Technology
Published 2022-01-01“…In order to improve the effect of jewelry art modeling design, this paper applies computer-aided technology to jewelry art modeling design. …”
Get full text
Article -
728
On the Computation of Degenerate Hopf Bifurcations for n-Dimensional Multiparameter Vector Fields
Published 2016-01-01“…The restriction of an n-dimensional nonlinear parametric system on the center manifold is treated via a new proper symbolic form and analytical expressions of the involved quantities are obtained as functions of the parameters by lengthy algebraic manipulations combined with computer assisted calculations. Normal forms regarding degenerate Hopf bifurcations up to codimension 3, as well as the corresponding Lyapunov coefficients and bifurcation portraits, can be easily computed for any system under consideration.…”
Get full text
Article -
729
Evaluating the Performance of a Static Patching Strategy against Computer Viruses
Published 2020-01-01“…To cope with evolving computer viruses, antivirus programs must be periodically updated. …”
Get full text
Article -
730
Computational numerical analysis of the support structure for a rainwater storage tank
Published 2025-01-01“…This study has examined the design proposal for a support structure for a rainwater storage tank, utilizing CAD/CAE software with computational numerical analysis. These tools predict how elements will behave under specific conditions without physical construction. …”
Get full text
Article -
731
Constructing View of Uncertain Data Provenance for Scientific Workflow in Cloud Computing
Published 2013-03-01Subjects: “…c1oud computing…”
Get full text
Article -
732
A Survey of Game-Theoretic Approach for Resource Management in Cloud Computing
Published 2022-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
733
Computer 3D Scene Simulation of Ecological Landscape Layout Planning
Published 2022-01-01Get full text
Article -
734
A solution for flexible adaption of network services in mobile edge computing
Published 2019-03-01Subjects: Get full text
Article -
735
A Data Quality Control Program for Computer-Assisted Personal Interviews
Published 2012-01-01“…We utilize data collected annually for two years from computer-assisted personal interviews with 3004 healthcare aides. …”
Get full text
Article -
736
Diagnostic Potential of Multidetector Computed Tomography for Characterizing Small Renal Masses
Published 2015-01-01Get full text
Article -
737
Analysis of Hydrologic and Hydraulic Computation of Drainage Plan for Fuchong Industrial Zone
Published 2005-01-01Get full text
Article -
738
Heterogeneous resource cooperative game in space-ground computing power network
Published 2023-12-01Subjects: “…space-ground computing power network…”
Get full text
Article -
739
Application of Motor Imagery Brain-Computer Interface in Rehabilitation of Neurological Diseases
Published 2023-12-01Subjects: “…motor imagery brain-computer interface…”
Get full text
Article -
740
Data comparable encryption scheme based on cloud computing in Internet of things
Published 2018-04-01“…The previously proposed short comparable encryption (SCE) scheme can infer the plaintext relationship by comparing the ciphertexts relationship as well as ensuring data security in Internet of things.Unfortunately,it will incur high storage and computational burden during the process of comparing ciphertexts and generating tokens.To this end,an efficient short comparable encryption scheme called SCESW was proposed,which was utilizing the sliding window method with the same size window.Formal security analysis shows that the scheme can guarantee weak indistinguishability in standard model as well as data security and integrity.The experimental results demonstrate that the storage of the SCESW scheme is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mi>t</mi> </mfrac> <mo stretchy="false">(</mo><mi>t</mi><mi>></mi><mn>1</mn><mo stretchy="false">)</mo></math></inline-formula> times shorter than that of the SCE scheme and the efficiency of the SCESW scheme is superior to that of the SCE scheme.…”
Get full text
Article