Showing 5,921 - 5,940 results of 6,608 for search '"Computer Science"', query time: 0.08s Refine Results
  1. 5921

    The Y-Index of Some Complement Graph Structures and Their Applications of Nanotubes and Nanotorus by Mohammed Alsharafi, Abdu Alameri, Yusuf Zeren, Mahioub Shubatah, Anwar Alwardi

    Published 2024-01-01
    “…These topological measures have explicit chemical uses in chemistry, medicine, biology, and computer sciences. This study calculates the Y-index of some graphs and complements graph operations such as join, tensor and Cartesian and strong products, composition, disjunction, and symmetric difference between two simple graphs. …”
    Get full text
    Article
  2. 5922
  3. 5923
  4. 5924
  5. 5925
  6. 5926
  7. 5927

    From the Guest Editors by Alberto d’Onofrio, Paola Cerrai, Alberto Gandolfi

    Published 2012-11-01
    “…Mathematics, theoretical biophysics and computer sciences are needed toqualitatively andquantitatively interpret experimental and clinical results, in order to makerealistic predictions.For more information please click the “Full Text” above.…”
    Get full text
    Article
  8. 5928

    Suggestions on cyber security talents cultivation by Hui LI, Ning ZHANG

    Published 2015-12-01
    “…Cyber security has been approved to be the first level discipline by Academic Degrees Committee of the State Council.It is important to figure out the curriculum of this new discipline and make it clear what is the differ-ence between this new discipline and existed ones.The relationship between cyber security discipline and other dis-ciplines such as information and communication engineering,computer sciences and technology,etc was analyzed.The cyber security was divided into 5 research areas,including fundamental theory,physical security,network secu-rity,system security,data and information security.Based on a given knowledge framework,the cultivation standard for master and Ph.D.students,as well as a reference curriculum of cyber security discipline was proposed.Finally,some suggestions were given for training talents of cyber security.…”
    Get full text
    Article
  9. 5929

    Two Optimal Eighth-Order Derivative-Free Classes of Iterative Methods by F. Soleymani, S. Shateyi

    Published 2012-01-01
    “…Optimization problems defined by (objective) functions for which derivatives are unavailable or available at an expensive cost are emerging in computational science. Due to this, the main aim of this paper is to attain as high as possible of local convergence order by using fixed number of (functional) evaluations to find efficient solvers for one-variable nonlinear equations, while the procedure to achieve this goal is totally free from derivative. …”
    Get full text
    Article
  10. 5930
  11. 5931
  12. 5932
  13. 5933
  14. 5934

    A posteriori Variational Multiscale Methods for the 1D convection-diffusion equations by Chacón Rebollo, Tomás, Domínguez-Delgado, Antonio, Gómez Marmol, Macarena

    Published 2023-06-01
    “…The present work is a continuation of a paper presented by the two first authors in the proceedings of the “Computational Science for the $21^{\rm st}$ century” conference held in Tours in 1997 honouring the $60^{\rm th}$ birthday of Roland Glowinski. …”
    Get full text
    Article
  15. 5935

    A Variable Neighborhood Walksat-Based Algorithm for MAX-SAT Problems by Noureddine Bouhmala

    Published 2014-01-01
    “…The simplicity of the maximum satisfiability problem (MAX-SAT) combined with its applicability in many areas of artificial intelligence and computing science made it one of the fundamental optimization problems. …”
    Get full text
    Article
  16. 5936
  17. 5937
  18. 5938
  19. 5939
  20. 5940