We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 527 results
  1. Deep Convolutional Neural Network for Active Intrusion Detection and Protect data from Passive Intrusion by Pascal Triangle

    Active and passive intrusion are the two types of intrusion. The active intrusion attempts to modify the data and the passive intrusion observes the...

    Abdulrahman Saad Alqahtani in Wireless Personal Communications
    Article 30 January 2024
  2. Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networks

    Fifth Generation (5G) networks provide data communications through various latest technologies including Software Defined Networks (SDN), Artificial...

    S. Pradeep, S. Muthurajkumar, ... A. Kannan in Soft Computing
    Article 31 January 2024
  3. Geometric Modeling and Calculating Measure of Fractal Structures by the Method of Arithmetic Characteristic Binomial Polynomials

    This article is devoted to geometric modeling and calculating measure of fractal structures by the method of arithmetic characteristic binomial...
    Anarova Shahzoda, Bekmurodova Mukhayo, Ismoilova Maftuna in 12th World Conference “Intelligent System for Industrial Automation” (WCIS-2022)
    Conference paper 2024
  4. An approach to calculate surface effects of polyhedron nanocrystals and its application in silicon nanowires

    A stretch-release strategy is proposed to analyze the problem of surface energy-induced stress fields in nanocrystals, which is resolved into a...

    Fanwei Liu, Haijian Chu in Acta Mechanica Sinica
    Article 04 July 2022
  5. The First Principle

    The first principle of thermodynamics is considered to be one of the greatest achievements of scientific thought when heat, or the internal energy of...
    Paulo Cesar Philippi in Thermodynamics
    Chapter 2024
  6. Binary Matrices with a Recurrent Element Derivation Rule and Their Properties and Applications

    This article describes a method for constructing binary matrices with a recurrent element derivation rule. It provides a method for constructing a...
    O. V. Kuzmin, B. A. Starkov in Cybernetics Perspectives in Systems
    Conference paper 2022
  7. Salient object detection based on adaptive recalibration technique through deep network

    Object detection is most required task in computer vision to meet the requirement of autonomous processes. The key challenge in object detection is...

    A. Vijayarani, G. G. Lakshmi Priya in International Journal of Speech Technology
    Article 26 April 2021
  8. Fluid Power Properties

    The properties of the fluid are important to operate the fluid power system. The fluid can be used as compressible and incompressible. Compressible...
    Chapter 2022
  9. Basic Concepts

    Basic mathematical concepts are shortly recalled that are essential for develo** the discourse of the following chapters. Mathematical structures...
    Vincenzo Manca, Vincenzo Bonnici in Infogenomics
    Chapter 2023
  10. Experimental evaluation of alternative ceiling-based ventilation systems for long-range passenger aircraft

    Alternative ventilation technology bricks, such as ceiling-based, sidewall-based or floor-based ventilation, are of high interest in terms of...

    Tobias Dehne, Pascal Lange, ... Ingo Gores in CEAS Aeronautical Journal
    Article Open access 02 May 2024
  11. P

    Parabolic Formula A Strength of Materials term related to a column; also called J. B. Johnston Formula; a parabolic equation-based empirical formula...
    Chapter 2024
  12. A novel twin branch network based on mutual training strategy for ship detection in SAR images

    There are inconsistent tasks and insufficient training in the SAR ship detection model, which severely limit the detection performance of the model....

    Yilong Lv, Min Li, Yujie He in Complex & Intelligent Systems
    Article Open access 17 November 2023
  13. Positioned Stream Cipher Basing on Fibonacci Sequence

    Cryptography, the science of secret writings, is a century—old technique which protects the secret information from ineligible persons. In all public...
    Conference paper 2023
  14. A Study on Strain-Based Elements for Solid Mechanics: Initial Formulation

    Formulation of a strain-based triangular element with three nodes and nine degrees of freedom by modification of existing functions is presented. The...
    Conference paper 2023
  15. Numerical Analysis: Cross-Section Optimization of Printed Circuit Heat Exchanger Using Supercritical CO2 for Low Temperature Regenerator of Brayton Cycle

    Supercritical carbon dioxide (S-CO2) is considered an alternative to the working substance in the Brayton cycle because of its better thermodynamic...
    R. Gokula Krishnan, R. Prasanna, ... P. Rahul in Emerging Trends in Mechanical and Industrial Engineering
    Chapter 2023
  16. The Beginning of the Gaming Era, Parental Controls and Technical Acumen

    The 1990s was a time of discovery of digital technology by mass audiences. Russian schoolchildren of the 1990s had their first experience with...
    Daria Bylieva, Victoria Lobatyuk, ... Çağlar Demir in The World of Games: Technologies for Experimenting, Thinking, Learning
    Conference paper 2023
  17. Research on Semantic Segmentation and Object Gras** Strategy Generation Based on Deeplab Algorithm

    The Semantic segmentation is another important research direction in the field of machine vision after object recognition. And the contour...
    Conference paper 2022
  18. Tight Bounds on the Coefficients of Consecutive k-out-of-n:F Systems

    In this paper we compute the coefficients of the reliability polynomial of a consecutive-k-out-of-n:F system, in Bernstein basis, using the...
    Vlad-Florin Drăgoi, Simon Cowell, Valeriu Beiu in Intelligent Methods in Computing, Communications and Control
    Conference paper 2021
  19. DOE Laser-assisted Turntable Calibration and Workpiece Registration

    The ability to review robot programs before they are executed can be used to correct erroneous programming. In complex processes, such a review can...
    Conference paper Open access 2023
  20. 3D Cement Printing: DFMA Guideline of Patterned Load-Bearing Walls for Small Residential Units

    Cement-based materials are widely used materials in today's construction industry because of its durability and strength. However, there were...
    Wannapol Sadakorn, Santirak Prasertsuk, Lapyote Prasittisopin in Proceedings of 5th International Conference on Civil Engineering and Architecture
    Conference paper 2024
Did you find what you were looking for? Share feedback.