Showing 941 - 960 results of 28,739 for search '"computational"', query time: 0.10s Refine Results
  1. 941

    Diagnostic criteria for asthenic accommodative asthenopia in patients with computer vision syndrome by I.G. Ovechkin, I.S. Gadzhiev, Kozhukhov A.A, E.I. Belikova

    Published 2020-11-01
    “…</i> </p> <p> <i><b>Keywords</b>: asthenopia, computer vision syndrome, accommodation, objective accommodography.…”
    Get full text
    Article
  2. 942

    Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network by Zizhen Zhang, Huizhong Yang

    Published 2014-01-01
    “…An SEIQRS model for the transmission of malicious objects in computer network with two delays is investigated in this paper. …”
    Get full text
    Article
  3. 943

    The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures by Ajit Narayanan, Yi Chen, Shaoning Pang, Ban Tao

    Published 2013-01-01
    “…The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). …”
    Get full text
    Article
  4. 944

    Enhancing Railway Maintenance Safety Using Open-Source Computer Vision by Donghee Shin, Jangwon Jin, Jooyoung Kim

    Published 2021-01-01
    “…Images of railway signs, tracks, and maintenance workers on the tracks were recorded through image data. The Computer Vision OpenCV library was utilized to extract the image data. …”
    Get full text
    Article
  5. 945

    Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations by Hang Tu, Debiao He, Baojun Huang

    Published 2014-01-01
    “…A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first. …”
    Get full text
    Article
  6. 946

    Measurements and Analytical Computer-Based Study of CMOS Inverters and Schmitt Triggers by Umesh Kumar

    Published 1996-01-01
    “…Complete detailed theoretical, experimental and computer based results are derived and exhibited.…”
    Get full text
    Article
  7. 947
  8. 948

    On Computation and Analysis of Topological Index-Based Invariants for Complex Coronoid Systems by Muhammad Aamer Rashid, Sarfraz Ahmad, Muhammad Kamran Siddiqui, Mohammed K. A. Kaabar

    Published 2021-01-01
    “…Explicitly, this tremendous improvement has been outstanding in the field of soft computing, molecular biology, and information technology. …”
    Get full text
    Article
  9. 949
  10. 950
  11. 951
  12. 952
  13. 953

    Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity by Chinnaraji Annamalai

    Published 2022-09-01
    Subjects: “…algorithm, combinatorics, computation, multinomial coefficient…”
    Get full text
    Article
  14. 954

    Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment by Rongrui Yu, Chunqiong Wu, Bingwen Yan, Baoqin Yu, Xiukao Zhou, Yanliang Yu, Na Chen

    Published 2021-01-01
    “…Finally, based on the impact of cloud computing, mobile e-commerce is analyzed, including relevant theories, service mode, architecture, core technology, and the application in e-commerce, which can realize e-commerce precision marketing, find the optimal path of logistics, and take effective security measures to avoid transaction risks. …”
    Get full text
    Article
  15. 955

    Computer-Aided Modelling and Analysis of PV Systems: A Comparative Study by Charalambos Koukouvaos, Dionisis Kandris, Maria Samarakou

    Published 2014-01-01
    “…The work presented in this paper aims on a first level at the performance analysis of various configurations of photovoltaic systems through computer-aided modelling. On a second level, it provides a comparative evaluation of the credibility of two of the most advanced graphical programming environments, namely, Simulink and LabVIEW, with regard to their application in photovoltaic systems.…”
    Get full text
    Article
  16. 956
  17. 957

    Encrypted image retrieval in multi-key settings based on edge computing by Yingying LI, Jianfeng MA, Yinbin MIAO

    Published 2020-04-01
    “…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
    Get full text
    Article
  18. 958

    Similarity Learning and Generalization with Limited Data: A Reservoir Computing Approach by Sanjukta Krishnagopal, Yiannis Aloimonos, Michelle Girvan

    Published 2018-01-01
    “…We present two Reservoir Computing architectures, which loosely resemble neural dynamics, and show that a Reservoir Computer (RC) trained to identify relationships between image pairs drawn from a subset of training classes generalizes the learned relationships to substantially different classes unseen during training. …”
    Get full text
    Article
  19. 959

    Usability of Computer-Aided Translation Software Based on Deep Learning Algorithms by Junjun Liu

    Published 2022-01-01
    “…In recent years, due to the development of computer technology and information technology, web technology has changed the mode of translation at an alarming rate. …”
    Get full text
    Article
  20. 960

    Perancangan Aplikasi Computer based Test (CBT) Psikotes Berbasis Website by Sistha Putri Hemawati, Hanna Prillysca Chernovita

    Published 2022-10-01
    “…Maka, perlu dibangun aplikasi Computer Based Test (CBT) psikotes. Aplikasi ini dapat diikuti oleh peserta umum maupun pelajar. …”
    Get full text
    Article