Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
1161
Apporach to the Method of Solving for Non-uniformity Factor in Computing the Aquatic Environmental Capacity
Published 2000-01-01Get full text
Article -
1162
Efficient optimisation of physical reservoir computers using only a delayed input
Published 2025-01-01“…Abstract Reservoir computing is a machine learning algorithm for processing time dependent data which is well suited for experimental implementation. …”
Get full text
Article -
1163
Application of Computer-Aided Precious Metal Materials in Electrochemistry of Ceramic Jewelry Design
Published 2022-01-01“…In order to solve the electrochemical application of precious metal materials in ceramic jewelry design, a computer-aided design method of precious metal materials in ceramic jewelry was proposed. …”
Get full text
Article -
1164
Investigation on Hydration and Deformation Characteristics of Shale Using X-ray Computed Tomography
Published 2022-01-01Get full text
Article -
1165
Personalized client-edge-cloud hierarchical federated learning in mobile edge computing
Published 2024-12-01Subjects: “…Mobile edge computing…”
Get full text
Article -
1166
Distinct neural computations scale the violation of expected reward and emotion in social transgressions
Published 2025-01-01“…These findings underscore that reward and emotional violations interact to shape decisions in complex social interactions, while the underlying neurofunctional PEs computations are distinguishable.…”
Get full text
Article -
1167
Research of the small Qubit quantum computing attack to the RSA public key cryptography
Published 2017-10-01“…The small Qubit quantum algorithm attack to RSA was proposed,the need Qubit of the first quantum register from 2L to L1,it can be reduced to 2 Qubit,the overall space complexity denoted (L1,L),where 2L1≥r,r is the period of decomposed.Because of the reduce of the first quantum register,it reduces the algorithm’s complexity and success rates,and use the binary look-up table method to compute the modular exponentiation,it enhances the computing speed.The improved algorithm’s quantum circuit complexity is T=O(2L2).It have a significant improvement on the time complexity and space complexity.Although the success rate is reduced,the overall success solution time is still lower than the Shor algorithm and the current major improvements Shor algorithm.Completed a simulation experiment.Respectively use the 11、10、9 Qubit decomposing the quantum circuit 119.The new algorithm explore the reality of using a universal quantum computer device to decipher the public key cryptography.…”
Get full text
Article -
1168
Predicting oxytocin binding dynamics in receptor genetic variants through computational modeling
Published 2025-02-01Get full text
Article -
1169
Reliable and robust robotic handling of microplates via computer vision and touch feedback
Published 2025-01-01Subjects: Get full text
Article -
1170
Computer Axial Tomography and evoked potentials as predictors of clinical improvement in cranioencephalic trauma.
Published 2009-03-01“…<br /><strong>Objective: </strong>To assess the effectiveness of Computer Axial Tomography and evoked potentials to predict clinical improvement six moths after cranioencephalic trauma. …”
Get full text
Article -
1171
Bifid Mandibular Canal: A Proportional Meta-Analysis of Computed Tomography Studies
Published 2023-01-01“…In vivo, computed tomography, and cross-sectional studies were eligible. …”
Get full text
Article -
1172
Research on heterogeneous radio access and resource allocation algorithm in vehicular fog computing
Published 2019-06-01“…With the development of intelligent transportation and the constant emergence of new vehicular on-board applications,such as automatic driving,intelligent vehicular interaction and safety driving.It is difficult for an independent vehicle to run a wide variety of applications with a large number of computing needs and time delay needs relying on its own limited computing resources.By distributing computing tasks in devices on the edge of the network,fog computing applies virtualization technology,distributed computing technology and parallel computing technology to enable users to dynamically obtain computing power,storage space and other services on demand.Applying fog computing architecture to Internet of vehicles can effectively alleviate the contradiction between the large computing-low delay demands and limited vehicular resources.By analyzing the channel capacity of vehicle-to-vehicle communication,vehicle-infrastructure communication and vehicle-time-delay tolerant network communication,an optimization model of heterogeneous access to multi-service resources for the Internet of vehicles was established,and various vehicle-to-fog resources were jointly dispatched to realize efficient processing of intelligent transportation applications.The simulation results show that the proposed reinforcement learning algorithm can effectively deal with the resource allocation in the heterogeneous vehicular fog architecture.…”
Get full text
Article -
1173
James E. Dobson, The Birth of Computer Vision, University of Minnesota Press, 2023
Published 2025-02-01Get full text
Article -
1174
Research on asynchronous robust federated learning method in vehicle computing power network
Published 2024-12-01Subjects: “…vehicle computing power network…”
Get full text
Article -
1175
Synthesis of Novel VO(II)-Perimidine Complexes: Spectral, Computational, and Antitumor Studies
Published 2018-01-01“…Essential parameters were computed based on frontier energy gaps with all compounds. …”
Get full text
Article -
1176
Three-Dimensional Measurement of TRISO Coated Particle Using Micro Computed Tomography
Published 2019-01-01“…The fuel safety and performance of high-temperature gas-cooled reactor (HTGR) are dependent on the integrity and geometric parameter of Tri-structural Isotropic (TRISO) coated particle. Micro X-ray computed tomography (CT) was used for nondestructive testing and three-dimensional measurement of the particle components which are composed of kernel, buffer layer, inner pyrolytic carbon layer (IPyC), silicon carbide (SiC) layer, and outer pyrolytic carbon (OPyC) layer. …”
Get full text
Article -
1177
Data outsourcing authentication model based on authenticated data structures for cloud computing
Published 2011-01-01Subjects: “…cloud computing…”
Get full text
Article -
1178
Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme
Published 2016-11-01Subjects: “…outsourcing cloud computing…”
Get full text
Article -
1179
Edge computing smart grid resource scheduling algorithm based on reinforcement learning
Published 2024-01-01Subjects: Get full text
Article -
1180
Computational Treatments of Cavitation Effects in Near-Free-Surface Underwater Shock Analysis
Published 2001-01-01“…Fluid cavitation constitutes an expensive computational nuisance in underwater-shock response calculations for structures at or just below the free surface. …”
Get full text
Article