Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
26661
Survey on RDMA protocol applications and security protection technologies
Published 2024-04-01“…The remote direct memory access (RDMA) technology, which has been effectively utilized to enhance data transfer rates and reduce CPU utilization, has played a significant role in various domains such as cross-regional data center transfers, high-performance computing, and rapid data read/write operations. However, despite its emerging status, RDMA has been lacking in widely recognized security solutions. …”
Get full text
Article -
26662
A performance-based generative design framework based on a design grammar for high-rise office towers during early design stage
Published 2025-02-01“…Designed from the perspective of architects, the framework achieves logical, refined, and visual real-time interaction between computers and human minds during the early stages of tower design. …”
Get full text
Article -
26663
ADA-NAF: Semi-Supervised Anomaly Detection Based on the Neural Attention Forest
Published 2025-01-01“…In this study, we present a novel model called ADA-NAF (Anomaly Detection Autoencoder with the Neural Attention Forest) for semi-supervised anomaly detection that uniquely integrates the Neural Attention Forest (NAF) architecture which has been developed to combine a random forest classifier with a neural network computing attention weights to aggregate decision tree predictions. …”
Get full text
Article -
26664
The comparative influence of climate change and demography in spatially distributed degree-day projections for France in the 21st century
Published 2025-01-01“…We projected heating degree days (HDD) and cooling degree days (CDD) up to 2100 using EURO-CORDEX simulations and considering three sources of uncertainty: three different methods for computing HDD and CDD; two emission scenarios (RCP4.5 and RCP8.5); and two population projections. …”
Get full text
Article -
26665
Influence maximization under imbalanced heterogeneous networks via lightweight reinforcement learning with prior knowledge
Published 2024-11-01“…It is significant that the reduction of number of seed set selections T not only keeps the quality of solutions, but lowers the algorithm’s computational cost.…”
Get full text
Article -
26666
Numerical Study of the Aerodynamics of a Hovering Hummingbird’s Wing with Dynamic Morphing
Published 2022-01-01“…In numerical simulations, boundary-based smoothing and overset methodologies were used in combination to update the interior nodes of cells in the computational domain, allowing those nodes to accommodate the motion of the flexible wall. …”
Get full text
Article -
26667
OW-YOLO: An Improved YOLOv8s Lightweight Detection Method for Obstructed Walnuts
Published 2025-01-01“…Additionally, the model’s parameter count decreased by 49.2%, weight file size was reduced by 48.1%, and computational load dropped by 37.3%, effectively mitigating the impact of obstruction on detection accuracy. …”
Get full text
Article -
26668
Takeover Quality: Assessing the Effects of Time Budget and Traffic Density with the Help of a Trajectory-Planning Method
Published 2020-01-01“…This paper proposes a novel method of quantifying how well the driver executed an automation-to-manual takeover by comparing human behaviour to optimised behaviour as computed using a trajectory planner. A human-in-the-loop study was carried out in a high-fidelity 6-DOF driving simulator with 25 participants. …”
Get full text
Article -
26669
An intelligent spam detection framework using fusion of spammer behavior and linguistic.
Published 2025-01-01“…However, in case of a large number of features set, the selection of all features leads to overfitting the model and expensive computation. The problem statement of this research paper revolves around addressing challenges concerning feature selection and evolving spammer behavior and linguistic features, with the goal of devising an efficient model for spam detection. …”
Get full text
Article -
26670
From On-Air Rebelliousness to the Cult of Positivity: Mediated Identities and Technological Change in Pump Up the Volume (1990) and Eighth Grade (2018)
Published 2025-01-01“…Teenage films have depicted the possibilities and dangers of adolescents using technology since personal computers became commonplace in the 1980s. This paper analyses the representation of the relationship between networked virtual spaces and teenage identities in Pump Up the Volume (Allan Moyle, 1990) and Eighth Grade (Bo Burnham, 2018), two teen films in which the use of technology and virtual spaces as a means for self-expression becomes key in the protagonists’ process of identity formation. …”
Get full text
Article -
26671
Learning and Teaching Geological Field Skills in a Virtual World: Insights From an Undergraduate Virtual Fieldtrip in Kinlochleven, Scotland
Published 2024-12-01“…Key concepts in the development were: (1) usability on low-specification computers, (2) participant communication within-app, (3) multiscale visualisation of localities, (4) contextualisation of localities within terrain, and (5) a high degree of immersion to replicate the outdoor fieldwork experience. …”
Get full text
Article -
26672
Torsional vibration of a static drill-rooted nodular pile embedded in elastic media
Published 2024-12-01“…The simulation of nodes in the SDRN pile involves discretizing the pile-soil system and applying the principle of impedance function recursion to accurately compute the torsional stiffness at the top of the pile. …”
Get full text
Article -
26673
Design Optimization of Reinforced Concrete Cantilever Retaining Walls: A State-of-the-Art Review
Published 2022-01-01“…The booming growth of computational abilities in the 21st century has led to its assimilation and benefit in all horizons of engineering. …”
Get full text
Article -
26674
Long-term Follow-up of Patients Undergoing Nephrectomy for Urolithiasis
Published 2025-01-01“…Renal function was assessed using estimated glomerular filtration rate (eGFR) via the Chronic Kidney Disease Epidemiology Collaboration equation, while kidney stone events were detected using computed tomography. Results: Among 107 patients followed for an average of 83.5 months, type 2 diabetes mellitus (T2DM) significantly increased the risk of progression to stage 3 CKD by 34.79-fold (p=0.004). …”
Get full text
Article -
26675
No Apparent Workup for most new Indeterminate Pulmonary Nodules in US Commercially-Insured Patients
Published 2019-05-01“…**Background:** A recent study estimated that more than 1.5 million Americans have an indeterminate pulmonary nodule (IPN) identified on a chest computed tomography (CT) scan each year outside of lung cancer screening programs. …”
Get full text
Article -
26676
An improved U-net and attention mechanism-based model for sugar beet and weed segmentation
Published 2025-01-01“…Moreover, the model’s inference time is only 0.0559 seconds, reducing computational overhead while maintaining high accuracy. …”
Get full text
Article -
26677
Deep learning and radiomics for gastric cancer serosal invasion: automated segmentation and multi-machine learning from two centers
Published 2025-02-01“…Abstract Objective The objective of this study is to develop an automated method for segmenting spleen computed tomography (CT) images using a deep learning model. …”
Get full text
Article -
26678
In silico drug repurposing at the cytoplasmic surface of human aquaporin 1.
Published 2025-01-01“…A small set of compounds which could impede water transport through human AQP1 have been identified in this computational screening study.…”
Get full text
Article -
26679
A review of quantum communication and information networks with advanced cryptographic applications using machine learning, deep learning techniques
Published 2025-03-01“…Quantum information networks (QINs) enhance computing, sensing, and security capabilities over extended distances. …”
Get full text
Article -
26680
Nonunion of a Stress Fracture at the Base of the Second Metatarsal in a Soccer Player Treated by Osteosynthesis with the Bridging Plate Fixation Technique
Published 2020-01-01“…Radiographic examination showed an oblique fracture with small bone fragment at the proximal base of the second metatarsal and computed tomography demonstrated sclerotic change around the fracture site. …”
Get full text
Article