Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
1201
Retracted: Key Technologies of Vehicle Active Safety System Based on Computer Vision
Published 2022-01-01Get full text
Article -
1202
A note on computing the generalized inverse A T,S (2) of a matrix A
Published 2002-01-01“…Three types of iterative methods for A T,S (2) are presented if σ(GA|T) is a subset of the open right half-plane and they are extensions of existing computational procedures of A T,S (2), including special cases such as the weighted Moore-Penrose inverse A M,N † and the Drazin inverse AD. …”
Get full text
Article -
1203
The history, current state and future possibilities of the non-invasive brain computer interfaces
Published 2025-03-01Subjects: “…Brain-computer interface (BCI)…”
Get full text
Article -
1204
Novel network virtualization architecture based on the convergence of computing,storage and transport resources
Published 2020-07-01Subjects: Get full text
Article -
1205
Evolutionary Computation with Spatial Receding Horizon Control to Minimize Network Coding Resources
Published 2014-01-01Get full text
Article -
1206
Training of future primary school and computer science teachers in the structure of information systems
Published 2024-06-01“…Computer Science)” at Oleksandr Dovzhenko Hlukhiv National Pedagogical University. …”
Get full text
Article -
1207
Computations of the M-Polynomials and Degree-Based Topological Indices for Dendrimers and Polyomino Chains
Published 2018-01-01“…Moreover, by applying calculus, we compute nine important topological indices of under-study dendrimers and chains.…”
Get full text
Article -
1208
Quantum-Based Feature Selection for Multiclassification Problem in Complex Systems with Edge Computing
Published 2020-01-01“…The complex systems with edge computing require a huge amount of multifeature data to extract appropriate insights for their decision making, so it is important to find a feasible feature selection method to improve the computational efficiency and save the resource consumption. …”
Get full text
Article -
1209
Approximating the Inverse of a Square Matrix with Application in Computation of the Moore-Penrose Inverse
Published 2014-01-01“…This paper presents a computational iterative method to find approximate inverses for the inverse of matrices. …”
Get full text
Article -
1210
Superconducting quantum computing optimization based on multi-objective deep reinforcement learning
Published 2025-01-01“…This method achieved excellent computational results on superconducting qubits. Optimum control of multi-process quantum computing can be achieved only by regulating the microwave pulse parameters of superconducting qubits, and such a set of global parameter values and control strategies are given.…”
Get full text
Article -
1211
Distributed representations enable robust multi-timescale symbolic computation in neuromorphic hardware
Published 2025-01-01Subjects: Get full text
Article -
1212
Anatomical Measurement of Normal Eustachian Tube on the Temporal Bone Computed Tomography Imaging
Published 2020-11-01“…Tujuan: Menggambarkan pengukuran anatomis tuba Eustachius normal pada pencitraan Computed Tomography (CT) tulang temporal. Metode: Ini adalah penelitian deskriptif tuba Eustachius normal dengan mengukur diameter pretimpani, sudut tubotimpani dan panjang pars kartilago tuba Eustachius normal menggunakan teknik rekonstruksi multiplanar pada pencitraan CT tulang temporal dari 58 sampel di beberapa rumah sakit di Makassar. …”
Get full text
Article -
1213
COMPUTER MODEL OF AN AIRCRAFT TURBULENT FLOW OVER AND CALCULATION OF IT’S AERODYNAMIC CHARACTERISTICS
Published 2015-08-01“…Based on this model the computer system allowing to simulate aerodynamic processes around an aircraft and to calculate it’s aerodynamic characteristics was developed. …”
Get full text
Article -
1214
Apporach to the Method of Solving for Non-uniformity Factor in Computing the Aquatic Environmental Capacity
Published 2000-01-01Get full text
Article -
1215
Efficient optimisation of physical reservoir computers using only a delayed input
Published 2025-01-01“…Abstract Reservoir computing is a machine learning algorithm for processing time dependent data which is well suited for experimental implementation. …”
Get full text
Article -
1216
Application of Computer-Aided Precious Metal Materials in Electrochemistry of Ceramic Jewelry Design
Published 2022-01-01“…In order to solve the electrochemical application of precious metal materials in ceramic jewelry design, a computer-aided design method of precious metal materials in ceramic jewelry was proposed. …”
Get full text
Article -
1217
Investigation on Hydration and Deformation Characteristics of Shale Using X-ray Computed Tomography
Published 2022-01-01Get full text
Article -
1218
Personalized client-edge-cloud hierarchical federated learning in mobile edge computing
Published 2024-12-01Subjects: “…Mobile edge computing…”
Get full text
Article -
1219
Distinct neural computations scale the violation of expected reward and emotion in social transgressions
Published 2025-01-01“…These findings underscore that reward and emotional violations interact to shape decisions in complex social interactions, while the underlying neurofunctional PEs computations are distinguishable.…”
Get full text
Article -
1220
Research of the small Qubit quantum computing attack to the RSA public key cryptography
Published 2017-10-01“…The small Qubit quantum algorithm attack to RSA was proposed,the need Qubit of the first quantum register from 2L to L1,it can be reduced to 2 Qubit,the overall space complexity denoted (L1,L),where 2L1≥r,r is the period of decomposed.Because of the reduce of the first quantum register,it reduces the algorithm’s complexity and success rates,and use the binary look-up table method to compute the modular exponentiation,it enhances the computing speed.The improved algorithm’s quantum circuit complexity is T=O(2L2).It have a significant improvement on the time complexity and space complexity.Although the success rate is reduced,the overall success solution time is still lower than the Shor algorithm and the current major improvements Shor algorithm.Completed a simulation experiment.Respectively use the 11、10、9 Qubit decomposing the quantum circuit 119.The new algorithm explore the reality of using a universal quantum computer device to decipher the public key cryptography.…”
Get full text
Article