Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
1801
-
1802
Quadrotor Trajectory Planning with Tetrahedron Partitions and B-Splines in Unknown and Dynamic Environments
Published 2024-12-01“…Furthermore, our method can reduce the computational burden caused by moving obstacles during trajectory replanning.…”
Get full text
Article -
1803
Multiple‐input multiple‐output with frequency diverse array radar transmit beamforming design for low‐probability‐of‐intercept in cluttered environments
Published 2022-09-01“…To this end, a constrained multiple‐ratio fractional programming model with concerning the transmit beam matrix and the receive filter is first constructed, and then, it is transformed into two suboptimisation problems using a circular iterative approach. …”
Get full text
Article -
1804
Learning-Free Unsupervised Extractive Summarization Model
Published 2021-01-01“…To achieve this, we formulate an integer programming problem based on pre-trained sentence embedding vectors. …”
Get full text
Article -
1805
Optimal Power Procurement for Green Cellular Wireless Networks Under Uncertainty and Chance Constraints
Published 2025-03-01“…This probabilistic constraint prevents using the dynamic programming principle to solve the stochastic optimal control problem. …”
Get full text
Article -
1806
Feasibility Study of Polygeneration Turbine Plants Based on Carbon Dioxide
Published 2023-08-01Subjects: Get full text
Article -
1807
-
1808
Flow annealed importance sampling bootstrap meets differentiable particle physics
Published 2025-01-01Get full text
Article -
1809
Maritime inventory routing with an application to fish feed distribution
Published 2025-12-01“…We perform a computational study on a number of realistic test instances generated using data from one of Norway’s largest fish feed suppliers. …”
Get full text
Article -
1810
PyBrook—A Python framework for processing and visualising real-time data
Published 2025-05-01“…In this paper, we present PyBrook - an original real-time cloud computing framework for the Internet of Things. PyBrook enables users to define complex data processing models declaratively, using the Python programming language. …”
Get full text
Article -
1811
A Method of Visualizing Velocity and Acceleration Profiles of an Air Target
Published 2018-12-01Get full text
Article -
1812
Modeling the Effect of Prior Knowledge on Memory Efficiency for the Study of Transfer of Learning: A Spiking Neural Network Approach
Published 2025-06-01“…This study uses a cognitive computing approach to identify and explore brain activity patterns related to memory efficiency in the context of learning a new programming language. …”
Get full text
Article -
1813
-
1814
-
1815
Art and Language After AI
Published 2024-07-01“…Throughout I will endorse a topological view of computation, which will inform the neural turn in computer science, characterised as a shift from the notion of a stored program to that of a cognitive model. …”
Get full text
Article -
1816
TPCM-based trusted PXE boot method for servers
Published 2020-12-01“…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
Get full text
Article -
1817
Constraining Free Merge
Published 2024-12-01“…Some recent influential work in the Minimalist Program takes the position that Merge, the core language ability to recursively combine two elements together, is free. …”
Get full text
Article -
1818
APLIKASI PERANGKAT LUNAK BERBASIS MATLAB UNTUK PENGUKURAN RADIOGRAF DIGITAL
Published 2013-01-01“…<p>Telah dilakukan pengukuran densitas optis terhadap radiograf digital citra stepwedge aluminium standart menggunakan perangkat lunak berbasis Matlab pada sistem radiografi Computed Radiography. Data hasil pemotretan berupa file radiograf citra stepwedge dianalisis menggunakan perangkat ukur densitas optis (derajat kehitaman) dari film radiograf berupa densitometer optis sebagai pembanding dan menggunakan perangkat lunak hasil rekayasa berbasis program aplikasi Matlab 7.1. …”
Get full text
Article -
1819
International Cybersecurity on Railway Transport: Methodological Approaches and Normal Procedural Framework
Published 2015-12-01“…There is presented classification of the types of computer attacks and their implementation me-dia. Also discussed are organizational and routine hacking countermeasures to be taken in the railway IT infrastructure environment.…”
Get full text
Article -
1820
La LÓGICA MATEMÁTICA DESDE LAS DISCIPLINAS CIENTÍFICAS DE INFORMÁTICA
Published 2019-07-01“…For this reason, the importance of Mathematical Logic and its deep relationship with Computer Science isaddressed, specifying its link with the main disciplines: Database, Programming, Software Engineering, ComputerArchitecture and Artificial Intelligence. …”
Get full text
Article