Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Information technology 11
- Computer networks 10
- Business 8
- Management 8
- computer 8
- Moral and ethical aspects 6
- Computer security 5
- Design and construction 5
- Internet 5
- Computers 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Language and languages 3
- Photography 3
- Prevention 3
- Social aspects 3
- Web sites 3
- Anesthetics 2
- BASIC (Computer program language) 2
-
111321
Research on efficient and scalable private set intersection cardinality schemes
Published 2025-05-01“…To address the issue of high computational overhead in existing two-party private set intersection cardinality (PSI-CA) protocols, an efficient two-party PSI-CA protocol was proposed. …”
Get full text
Article -
111322
-
111323
-
111324
Aircraft Multi-stage Altitude Prediction Under Satellite Signal Loss
Published 2024-11-01“…Compared to RNNs and their variants, the LTCA–TCN algorithm yields superior prediction results while maintaining a simpler structure and requiring fewer computational resources. In addition, compared to the baseline TCN algorithm, the proposed LTCA–TCN algorithm reduces RMSE by 1.43 m and lowers Score by 0.08. …”
Get full text
Article -
111325
A Note on Factorization and the Number of Irreducible Factors of <i>x<sup>n</sup></i> − <i>λ</i> over Finite Fields
Published 2025-01-01“…Furthermore, the number of irreducible factors of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msup><mi>x</mi><mi>n</mi></msup><mo>−</mo><mn>1</mn></mrow></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msup><mi>x</mi><mi>n</mi></msup><mo>−</mo><mi>λ</mi></mrow></semantics></math></inline-formula> is useful in many computational problems involving cyclic codes and constacyclic codes. …”
Get full text
Article -
111326
P254: Genetics of Perrault syndrome in a family with ten affected individuals
Published 2025-01-01Get full text
Article -
111327
-
111328
Economic Analysis of Strip and Pit Cultivation Methods in Desertification Projects
Published 2024-05-01“…Then, the real cost is calculated by the real analysis method, which is done by being in the field and calculating the costs based on the time of using the tools and the number of workers in the form of real wages. The real cost is computed by calculating the unit of surface and each cultivated seedling. …”
Get full text
Article -
111329
Optimal 2D Placement of Virtual Objects in Physical Space for Augmented Reality Applications
Published 2023-12-01“…The hypothesis of quadratic dependence that arose during the work was tested on a personal computer. For this purpose, a similar experiment was conducted for a range of [10-10,000] objects. …”
Get full text
Article -
111330
Coupling Remote Sensing With a Process Model for the Simulation of Rangeland Carbon Dynamics
Published 2025-03-01Get full text
Article -
111331
Adjustment terms and coefficients of nonlinear regression-based kurtosis-adjusted equivalent sound level method
Published 2025-07-01“…\begin{document}$ {{L'}}_{\text{EX,}\text{8}\text{ h}} $\end{document} was computed using multiple linear regression and nonlinear least squares optimization. …”
Get full text
Article -
111332
Providing a Framework for Assessing and Evaluating Network Data Studies in the Fight Against Social Anomalies
Published 2024-09-01“…Various methods have been introduced for crime detection, including a wide range of innovative computer techniques. Data mining is regarded as one of the most effective tools for data and information analysis in the field of crime detection. …”
Get full text
Article -
111333
Small Target Detection Algorithm for UAV Aerial Images Based on Improved YOLOv7-tiny
Published 2025-05-01“…The model’s parameter count and computational complexity require reduction. Future research will focus on further improving the detection of very small targets and optimizing the model for lightweight applications.…”
Get full text
Article -
111334
THE VIRTUAL ARTIST. VOCALOID AND AN EXPERIMENT ON ITS PERCEPTION / ВИРТУАЛЬНЫЙ АРТИСТ. VOCALOID И ЭКСПЕРИМЕНТ ПО ЕГО ВОСПРИЯТИЮ
Published 2021-03-01“…How does a Non-Japanese listener react to a musical performance done by a computer program? One of the first answers to this question can be found in a study, which was conducted at the Martin-Luther-University in Halle (Saale), Germany. …”
Get full text
Article -
111335
Discovery of Diffuse Radio Emission in a Massive z = 1.709 Cool Core Cluster: A Candidate Radio Minihalo
Published 2025-01-01Get full text
Article -
111336
<i>PI-D<sup>Æ</sup></i>: An Adaptive PID Controller Utilizing a New Adaptive Exponent (Æ) Algorithm to Solve Derivative Term Issues
Published 2025-06-01“…Unlike more-complex alternatives such as fuzzy logic, neural networks, or sliding mode control, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>P</mi><mi>I</mi></mrow></semantics></math></inline-formula>-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msup><mrow><mi>D</mi></mrow><mrow><mi>Æ</mi></mrow></msup></mrow></semantics></math></inline-formula> retains the simplicity and robustness of PID, avoiding high computational costs or intricate setups. This adaptive exponent strategy offers a practical and scalable enhancement to classical PID, improving performance and robustness without added complexity, and thus provides a promising control solution for real-world applications in which simplicity, adaptability, and reliability are essential.…”
Get full text
Article -
111337
-
111338
-
111339
A First Look at Spatially Resolved Infrared Supernova Remnants in M33 with JWST
Published 2025-01-01Get full text
Article -
111340