Showing 11,261 - 11,280 results of 28,739 for search '"computability"', query time: 0.08s Refine Results
  1. 11261

    New services and development trend in 5G environment by Zhenjiang DONG, Hao DONG, Wei WEI, Shoufu DU, Ming LIU, Feng JI

    Published 2016-06-01
    “…5G and its related technologies have been the research focuses in the mobile telecommunication industry.The services and applications,their related technologies and development trends were studied.The requirements of mobile bandwidth,the current service limitationand the service development trends were analyzed and described in aspects of multi-media services,internet of things services cloud computing and artificial intelligence technology.…”
    Get full text
    Article
  2. 11262

    NUMERICAL MODELING OF STRESSES NEAR THE SURFACE IN THE INGOT OF CIRCULAR SECTION, CRYSTALLIZABLE AT CIRCULAR TORCH SECONDARY COOLING by A. N. Chichko, N. V. Andrianov, A. V. Demin, D. M. Kukuj, V. F. Sobolev, Ju. V. Jatskevich, O. I. Chichko

    Published 2004-11-01
    “…The results of computer calculations of the stresses, generated in outside layer of ingot of steel 20 of circular section with diameter 300 mm, in application to one of the industrial technological schemas of RUP “BMZ”, are presented. …”
    Get full text
    Article
  3. 11263

    Watermarking text document based on statistic property of part of speech string by DAI Zu-xu1, HONG Fan1, CUI Guo-hua1, FU Min2

    Published 2007-01-01
    “…An algorithm resolving nonlinear entropy equation with multivariable was described and proved firstly,then a new scheme where a text document is marked by accommodating probability distribution of certain part of speech strings to entropy constitutes the watermark was designed.Watermark function in the scheme values in a real number set domi-nated by computing precision,it is helpful to advances watermark capacity significantly.…”
    Get full text
    Article
  4. 11264

    Multi-parties key agreement protocol based on elliptic curve by Long GAO, Chun-ming TANG, Yong-qiang ZHANG

    Published 2016-05-01
    “…The key agreement protocol is a shared key mechanism between two or more participants in a public channel.A multi key agreement protocol based on elliptic curve was designed by using the secure one-way function.The protocol was based on password authentication.The protocol designed can satisfy the security characteristics of the key exchange protocol,and has high computing efficiency.…”
    Get full text
    Article
  5. 11265

    On the One Dimensional Poisson Random Geometric Graph by L. Decreusefond, E. Ferraz

    Published 2011-01-01
    “…Given a Poisson process on a bounded interval, its random geometric graph is the graph whose vertices are the points of the Poisson process, and edges exist between two points if and only if their distance is less than a fixed given threshold. We compute explicitly the distribution of the number of connected components of this graph. …”
    Get full text
    Article
  6. 11266

    Hybrid models of cell and tissue dynamics in tumor growth by Yangjin Kim, Hans G. Othmer

    Published 2015-07-01
    “…Hybrid models of tumor growth, in which some regions are described at the celllevel and others at the continuum level, provide a flexible description thatallows alterations of cell-level properties and detailed descriptions of theinteraction with the tumor environment, yet retain the computational advantagesof continuum models where appropriate. …”
    Get full text
    Article
  7. 11267

    Representation theory of finite abelian groups applied to a linear diatomic crystal by J. N. Boyd, P. N. Raychowdhury

    Published 1980-01-01
    “…After a brief review of matrix representations of finite abelian groups, projection operators are defined and used to compute symmetry coordinates for systems of coupled harmonic oscillators. …”
    Get full text
    Article
  8. 11268

    TESTING OF CYCLIC STRUCTURAL CHANGES IN SWITCHING REGIME VECTOR AUTOREGRESSIVE MODELS by V. I. Malugin

    Published 2016-11-01
    “…Accuracy of the approach is examined by means of computer simulation experiments.…”
    Get full text
    Article
  9. 11269

    A Rare Case of an Inflammatory Myofibroblastic Tumor in a Middle-Aged Female by Lamprini Kosma, Lubna Khaldi, Panagiota Galani, Dimitrios Mytas, Sofia Lafoyianni

    Published 2012-01-01
    “…We report a case of a 64-years-old woman with a fever and abdominal discomfort for 3 months; a computer tomography was performed indicating gastrointestinal stromal tumor. …”
    Get full text
    Article
  10. 11270

    Permanence and Global Attractivity of a Discrete Logistic Model with Impulses by Chunyu Gao, Qingxi Guo

    Published 2013-01-01
    “…The constructed model is more easily implemented at computer and is a better analogue of the continuous-time dynamic system. …”
    Get full text
    Article
  11. 11271

    SMARANDACHE ANTI ZERO DIVISORS by Rebin M. Hassan, Suham H. Awla

    Published 2025-01-01
    “…Some results related to the given concepts are proved in detail. Accordingly, a Computer Algebra System (GAP) is used to verify the results of this study …”
    Get full text
    Article
  12. 11272

    New Nonlinear Systems Admitting Virasoro-Type Symmetry Algebra and Group-Invariant Solutions by Lizhen Wang, Qing Huang, Yanmei Di

    Published 2014-01-01
    “…With the aid of symbolic computation by Maple, we extend the application of Virasoro-type symmetry prolongation method to coupled systems with two-component nonlinear equations. …”
    Get full text
    Article
  13. 11273

    Natural Frequencies of Shear Deformable Plates by Polyharmonic Splines by A. J. M. Ferreira, A. M. Zenkour

    Published 2013-01-01
    “…The natural frequencies of vibration are computed for various plates and compared with some available published results. …”
    Get full text
    Article
  14. 11274

    A Four-Order Linear Recurrence Formula Involving the Quartic Gauss Sums and One Kind Two-Term Exponential Sums by Lan Qi, Xingxing Lv

    Published 2021-01-01
    “…The main purpose of this paper is using the analytic method and the properties of the classical Gauss sums to study the computational problem of one kind hybrid power mean involving the quartic Gauss sums and two-term exponential sums and give an interesting four-order linear recurrence formula for it. …”
    Get full text
    Article
  15. 11275

    Distance-based target tracking algorithm in binary sensor network by SUN Xiao-yan1, LI Jian-dong1, HUANG Peng-yu1, ZHANG Wen-zhu1

    Published 2010-01-01
    “…A distance-based target tracking algorithm for binary sensor network was proposed.This algorithm can decide the output bit information and compute the weighting simultaneously.The simulation is used to validate the effectiveness of distance-based weighting scheme.This algorithm has good performance,when the target moves linearly,curvilinear,or randomly through the sensing field,and the error distribution of single target position is in .…”
    Get full text
    Article
  16. 11276

    Synchronization Measure Based on a Geometric Approach to Attractor Embedding Using Finite Observation Windows by Inga Timofejeva, Kristina Poskuviene, Maosen Cao, Minvydas Ragulskis

    Published 2018-01-01
    “…The approach is based on the comparison of optimal time delay sequences that are computed for segments of the considered time series. …”
    Get full text
    Article
  17. 11277

    Vena Cava Superior Syndrome Related to Right Heart Invasion of an Unresectable Hepatocellular Carcinoma by Geert Maleux, Werner Budts, Vincent Vandecaveye

    Published 2016-01-01
    “…The patient presented with clinical signs of a vena cava superior syndrome. Computed tomography and transthoracic echocardiography demonstrated a large tumoral mass lesion extending from the left liver lobe into the inferior vena cava right atrium and right ventricle. …”
    Get full text
    Article
  18. 11278

    Distance to Spaces of Semicontinuous and Continuous Functions by Carlos Angosto

    Published 2019-01-01
    “…Given a topological space X, we establish formulas to compute the distance from a function f∈RX to the spaces of upper semicontinuous functions and lower semicontinuous functions. …”
    Get full text
    Article
  19. 11279

    Is the Best Fitting Curve Always Unique? by N. Chernov, Q. Huang, H. Ma

    Published 2013-01-01
    “…Fitting straight lines and simple curved objects (circles, ellipses, etc.) to observed data points is a basic task in computer vision and modern statistics (errors-in-variables regression). …”
    Get full text
    Article
  20. 11280

    Deployment strategy of NFV central office in core network by Lei SHEN, Yongping SHAO, Hai WU

    Published 2017-04-01
    “…Central office is the infrastructure for the deployment of communications equipment,and NFV is a telecom cloud with service quality assurance.The needs that collaborative development between core network and computer room was introduced and the status of core network room was analyzed,and the planning of NFV room was proposed from the aspect of transformation strategy of data center and central office and layout of office and quantity planning strategy.…”
    Get full text
    Article