Suggested Topics within your search.
Suggested Topics within your search.
-
1621
Explaining the undecidability of first-order logic
Published 2024-12-01“…Turing proved the unsolvability of the decision problem for first-order logic (Entscheidungsproblem) in his famous paper On Computable Numbers, with an Application to the Entscheidungsproblem. …”
Get full text
Article -
1622
La correspondance de motifs, un outil pour l’analyse du discours ?
Published 2020-01-01“…To do so, our study is based on a computational method, using extraction and correspondence analysis (CA) for syntactic patterns. …”
Get full text
Article -
1623
The role of feedback in the formation of morphogen territories
Published 2008-02-01Get full text
Article -
1624
ARMC-RL: Adaptive Caching With Reinforcement Learning for Efficient 360° Video Streaming in Edge Networks
Published 2025-01-01“…The growing demand for high-capacity content such as 3D and 360° videos highlights the need for efficient data delivery in B5G/6G networks. Multi-access edge computing (MEC) has emerged as a promising solution, but its limited memory capacity makes cache replacement strategies essential. …”
Get full text
Article -
1625
-
1626
Comparative tribological and drainage performance of additively manufactured outsoles tread designs
Published 2025-05-01“…The research involves analyzing frictional performance and deformation characteristics through dry and wet friction testing. Computer-aided design (CAD) software was used to create digital models of various tread patterns, and two different additive manufacturing (AM) techniques, fused filament fabrication (FFF) and stereolithography (SLA) printing, were used for three-dimensional (3D) print block samples with tread patterns, and the materials used were thermoplastic rubber (TPR) filament and photocurable elastomeric resin. …”
Get full text
Article -
1627
STID-Net: Optimizing Intrusion Detection in IoT with Gradient Descent
Published 2025-03-01Get full text
Article -
1628
-
1629
-
1630
Investigation of the dependences of the Vivaldi antenna with two curve radii in the electrodynamic modeling software package
Published 2022-05-01“…The aim of the study is to build and optimize a computer model of the antenna using software packages for electrodynamic modeling.Method. …”
Get full text
Article -
1631
Leveraging time-based spectral data from UAV imagery for enhanced detection of broomrape in sunflower
Published 2025-03-01“…This study investigates the use of unmanned aerial vehicle (UAV)-based multispectral imaging to detect broomrape-infected sunflowers by analyzing temporal patterns in spectral vegetation indices (VIs). Over four imaging campaigns conducted during early subsoil parasitic stages, multispectral data were collected and processed to compute ten VIs. …”
Get full text
Article -
1632
-
1633
Fracture of Wedge-Shaped Body Under Compression
Published 2025-12-01“…The differences between the obtained fracture patterns and the classical results known from the theory of elasticity obtained for infinite wedge-shaped bodies are shown. …”
Get full text
Article -
1634
Species-independent analysis and identification of emotional animal vocalizations
Published 2025-08-01Get full text
Article -
1635
Non-parametric correlation structures and their respective embeddings in predictive analysis
Published 2025-05-01Get full text
Article -
1636
-
1637
Plant Stress Detection Using a Three-Dimensional Analysis from a Single RGB Image
Published 2024-12-01Get full text
Article -
1638
An efficient method for predicting the morphology of proppant packs based on a surrogate model
Published 2025-03-01“…Currently, experimental and numerical methods are the main approaches for reproducing the proppant accumulation process and placement patterns in fractures. These methods are still confined by limited simulation scales, time-consuming computations, and high-cost operations. …”
Get full text
Article -
1639
ADDAEIL: Anomaly Detection with Drift-Aware Ensemble-Based Incremental Learning
Published 2025-06-01Get full text
Article -
1640
Cloud Telescope: An Ephemeral, Distributed, and Cloud-Native Architecture for Collecting Internet Background Radiation
Published 2025-01-01“…In addition, what malicious traffic patterns would emerge if we could sample the unsolicited traffic - termed Internet Background Radiation (IBR) - arriving at devices directly connected to the Internet? …”
Get full text
Article