Showing 961 - 980 results of 21,428 for search '"computability"', query time: 0.07s Refine Results
  1. 961

    Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology by Xiaokun Zheng

    Published 2022-01-01
    “…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
    Get full text
    Article
  2. 962

    Effects of Resource Limitations and Cost Influences on Computer Virus Epidemic Dynamics and Tipping Points by Chung-Yuan Huang, Chuen-Tsai Sun

    Published 2012-01-01
    “…One of the most important assessment indicators of computer virus infections is epidemic tipping point. …”
    Get full text
    Article
  3. 963
  4. 964

    Feasibility and appropriateness of using electronic hierarchical structures in teaching computer science in primary school by Esen Y. Bidaibekov, Baglan B. Kaldanov

    Published 2024-12-01
    “…Modern requirements for teaching computer science in primary schools demonstrate the necessity of using innovative educational technologies. …”
    Get full text
    Article
  5. 965

    Computationally Inexpensive Approach for Pitch Control of Offshore Wind Turbine on Barge Floating Platform by Shan Zuo, Y. D. Song, Lei Wang, Qing-wang Song

    Published 2013-01-01
    “…In allusion to the external disturbances and uncertain system parameters of OFWT due to the proximity to load centers and strong wave coupling, this paper proposes a computationally inexpensive robust adaptive control approach with memory-based compensation for blade pitch control. …”
    Get full text
    Article
  6. 966

    Computer Vision-Based Structural Displacement Monitoring and Modal Identification with Subpixel Localization Refinement by Tao Liu, Yu Lei, Yibing Mao

    Published 2022-01-01
    “…In order to overcome these shortcomings, the computer vision- (CV-) based method has been introduced into SHM, and its practical applications are increasing. …”
    Get full text
    Article
  7. 967

    Computational Chemistry Study of pH-Responsive Fluorescent Probes and Development of Supporting Software by Ximeng Zhu, Yongchun Wei, Xiaogang Liu

    Published 2025-01-01
    “…This study employs quantum chemical computational methods to predict the spectroscopic properties of fluorescent probes 2,6-bis(2-benzimidazolyl)pyridine (BBP) and (<i>E</i>)-3-(2-(1<i>H</i>-benzo[<i>d</i>]imidazol-2-yl)vinyl)-9-(2-(2-methoxyethoxy)ethyl)-9<i>H</i>-carbazole (BIMC). …”
    Get full text
    Article
  8. 968

    Computationally expensive constrained problems via surrogate-assisted dynamic population evolutionary optimization by Zan Yang, Chen Jiang, Jiansheng Liu

    Published 2025-01-01
    “…Abstract This paper proposes a surrogate-assisted dynamic population optimization algorithm (SDPOA) for the purpose of solving computationally expensive constrained optimization problems, in which the population is dynamically updated based on the real-time iteration information to achieve targeted searches for solutions with different qualities. …”
    Get full text
    Article
  9. 969

    Computer simulation of stress-strain states in zygomatic bones after complex installation of implants by Timur Dibirov, Aleksey Drobyshev, Eduard Kharazyan, Nikolay Redko, Egor Pankov, Alexander Kozulin, Sergey Panin, Sergey Arutyunov

    Published 2024-01-01
    “…Based on the results of the FEM-based computer simulation, the algorithm was proposed for planning prosthetic treatment, which involves the iterative method for selecting both size and location of installing zygomatic implants depending on the results of the SSS calculation and the onset of a critical condition (primarily in bone tissue at the contact area with zygomatic implants).…”
    Get full text
    Article
  10. 970
  11. 971
  12. 972

    Agricultural Information Management Data Model Construction Based on Cloud Computing and Semantic Technology by Chunhang Wang, Zhe An

    Published 2022-01-01
    “…The registration rate improves than the traditional method by 12.46% and computational cost by 23.76%. This method has higher accuracy in storage data mining and retrieval for large information management systems and superior performance than the traditional method. …”
    Get full text
    Article
  13. 973

    CARPAL TUNNEL SYNDROME (CTS) FOR WORKERS USING COMPUTER IN THE FINANCE DIVISION OF PROPERTY INDUSTRY by Nevi Sulistika, Devi Angeliana Kusumaningtiar, Putri Handayani, Decy Situngkir, Taufik Rendi Anggara

    Published 2022-11-01
    “…Jobs that are at risk of CTS involve doing repetitive movements, working with awkward postures, working in a motorized vehicle production or working using computers. Purpose: To determine the factors associated with the incidence of CTS in workers that used computers in the finance division of Property Industry. …”
    Get full text
    Article
  14. 974
  15. 975
  16. 976

    Bilateral Obturator Hernia Diagnosed by Computed Tomography: A Case Report with Review of the Literature by Sanjay M. Khaladkar, Anubhav Kamal, Sahil Garg, Vigyat Kamal

    Published 2014-01-01
    “…It is mistakenly diagnosed as femoral or inguinal hernia on USG. Computed tomography is diagnostic and is a valuable tool for preoperative diagnosis. …”
    Get full text
    Article
  17. 977
  18. 978

    Parallel remote state preparation for fully device-independent verifiable blind quantum computation by Sean A. Adamson

    Published 2025-01-01
    “…We introduce a device-independent two-prover scheme in which a classical verifier can use a simple untrusted quantum measurement device (the client device) to securely delegate a quantum computation to an untrusted quantum server. To do this, we construct a parallel self-testing protocol to perform device-independent remote state preparation of n qubits and compose this with the unconditionally secure universal verifiable blind quantum computation (VBQC) scheme of Fitzsimons and Kashefi [Phys. …”
    Get full text
    Article
  19. 979

    Computational Insights in DNA Methylation: Catalytic and Mechanistic Elucidations for Forming 3-Methyl Cytosine by Mansour H. Almatarneh, Ghada G. Kayed, Mohammednoor Altarawneh, Yuming Zhao, Amita Verma

    Published 2022-01-01
    “…To gain a deeper insight into the formation of 3 mC, we have performed density functional theory (DFT) modeling studies at different levels of theory to clearly map out the mechanistic details for this new methylation approach. Our computed results are in harmony with pertinent experimental observations and shed light on a crucial off-target activity of DNMTs.…”
    Get full text
    Article
  20. 980

    Synthesis and evaluation of nitrochromene derivatives as potential antileishmanial therapeutics through biological and computational studies by Niloofar Javid, Ali Asadipour, Ehsan Salarkia, Mohammad Amin Langarizadeh, Fatemeh Sharifi, Mohammad Mahdavi, Bagher Amirheidari, Aida Iraji, Hojjat Rezaiezadeh, Gholamreza Hassanpour, Yaghoub Pourshojaei

    Published 2025-01-01
    “…The dual approach of combining experimental and computational methods aims to provide a robust understanding of the compounds’ mechanisms of action and their potential as effective anti-leishmanial agents. …”
    Get full text
    Article