Showing 11,741 - 11,760 results of 28,739 for search '"computability"', query time: 0.09s Refine Results
  1. 11741

    COOPERATIVE BLOCK-PARALLEL ALGORITHMS FOR TASK EXECUTION ON MULTI-CORE SYSTEM by A. A. Prihozhy, O. N. Karasik

    Published 2015-10-01
    “…The problem of balancing the computational load among the cores of a multi­core system and increasing the efficiency of interaction among threads in a multi­thread application is considered. …”
    Get full text
    Article
  2. 11742

    Analysis of the possible consequences of large-scale production of sand and gravel mixture in the downstream of large hydroelectric facilities based on hydrodynamic modeling (the V... by Anatoliy V. Lepikhin, Yuri S. Lyakhin, Alexey A. Tiunov, Anna A. Wozniak, Anton I. Luchnikov, Dmitiy V. Perepelitsa, Andrey V. Bogomolov

    Published 2021-08-01
    “…The authors have presented estimation of possible hydraulic consequences of the large-scale mining of sand/gravel mixtures in the upper part of the Lower Kama Reservoir 9the Votkinsk Reservoir downstream) based on the multi-version computation experiments with the developed hydro/dynamic model of the water body under consideration. …”
    Article
  3. 11743

    Three Solutions Theorem for p-Laplacian Problems with a Singular Weight and Its Application by Yong-Hoon Lee, Seong-Uk Kim, Eun Kyoung Lee

    Published 2014-01-01
    “…To prove this theorem, we define a strong upper and lower solutions and compute the Leray-Schauder degree on a newly established weighted solution space. …”
    Get full text
    Article
  4. 11744

    Investigation of fractional-order pantograph delay differential equations using Sumudu decomposition method by Asrar Saleh Alsulami, Mariam Al-Mazmumy, Maryam Ahmed Alyami, Mona Alsulami

    Published 2024-12-01
    “…The study introduces a powerful computational technique for solving these equations, providing results that establish its efficiency and relevance through comparisons with existing methods. …”
    Get full text
    Article
  5. 11745

    Structures and Low Dimensional Classifications of Hom-Poisson Superalgebras by Qingcheng Zhang, Chunyue Wang, Zhu Wei

    Published 2015-01-01
    “…Finally, all algebra endomorphisms on 2-dimensional complex Poisson superalgebras are computed, and their associated Hom-Poisson superalgebras are described explicitly.…”
    Get full text
    Article
  6. 11746

    Dynamics of Vertical Axis Wind Turbines (Darrieus Type) by A. F. Abdel Azim El-Sayed, C. Hirsch, R. Derdelinckx

    Published 1995-01-01
    “…A computing package that combines finite element methods for evaluating the resonance frequencies and modes of turbine subcomponents (blade, tower and shaft) together with the aerodynamic calculations for forces and moments taking into consideration the dynamic stall as well as the dynamic response is developed. …”
    Get full text
    Article
  7. 11747

    Technological and Regime Solutions of Higher Operational Efficiency of Minsk Thermal Power Station No. 3 (TPS-3) by A. D. Kachan, L. A. Baubel, Yu. M. Shnaiderman

    Published 2003-10-01
    “…The solutions are based on the elaboration and application of corresponding computer programs.Technological solutions are firstly directed to reduction of heat losses in the cycle (turbine capacitors) and increase of power- and-heat generation.…”
    Get full text
    Article
  8. 11748

    Firmware vulnerability analysis based on formal verification of software and hardware by Peng-hui ZHANG, Xi TIAN, Kang-wei LOU

    Published 2016-07-01
    “…In order to analyze the potential vulnerabilities in the firmware systematically and effectively,a formal verification method based on TLA,in a collaborated form of software and hardware was proposed.With this method,the interaction mechanism of software and hardware in the computer boot process was modeled and analyzed.By adjusting the attack model,a secure vulnerability in the update process of the firmware was found,and its existence by an experiment,which proved the reliability of formal verification was demonstrated.…”
    Get full text
    Article
  9. 11749

    Enhanced binary Spray and Wait scheme based on reputation for DTN by Xi ZHANG, Xiao-fei WANG, Quan ZHANG, Chao-jing TANG

    Published 2012-12-01
    “…A concept of forwarding credential was introduced,and a detection protocol of behavior was designed.A novel scheme which enhanced the prevalent binary Spray and Wait routing scheme was integrated with reputation to resist the impairment of selfishness.According to the model of bundle transferring,the determination of reputation threshold was based on probability computation.The simulation results suggest that the enhanced scheme gain an advantage over original one under selfish misbehavior.…”
    Get full text
    Article
  10. 11750

    THE PERSPECTIVE DIRECTIONS OF USE OF THE METHOD OF THE MELT INTRA MOULD MODIFYING FOR PRODUCTION OF CASTINGS WITH THE SPECIFIED OPERATIONAL PROPERTIES by M. A. Fesenko, A. N. Fesenko

    Published 2013-11-01
    “…On the basis of numerous studies using the methods of physical and simulation (computer) modeling, and also on the basis of the field experiments in the production of advanced and industrial castings prospective resource-saving technological areas of the method of in-mold inoculation of molten iron for castings with a given structure and propertiesis investigated in the work. …”
    Get full text
    Article
  11. 11751

    Crohn’s Disease Presenting with Pyogenic Liver Abscess: A Case Report by Sharon McGreal, Rupert Sayers, Peter Wurm, Kevin West

    Published 2012-01-01
    “…The finding of PLA was established by computed tomography and initial treatment involved percutaneous drainage and antibiotics. …”
    Get full text
    Article
  12. 11752

    Les publics d’une stratégie by Arnaud Anciaux

    Published 2016-01-01
    “…The advent of digital computing and the internet has highlighted revealed structural weaknesses in the economics of journalism and increased competition for the attention of audiences. …”
    Get full text
    Article
  13. 11753

    Key technologies for the development of intelligent things by Ling-ling SUN, Jiang-tao SU, Xi-wei HUANG, Jie JIN, Wen-jun LI, Xiao-jun WANG

    Published 2017-09-01
    “…Intelligent things are intelligent terminals and systems based on software-hardware integrated platforms which are capable of smart sensing, smart processing, smart connection, and smart human-computer interaction. The key technologies for the development of intelligent things, including integrated circuit technology, sensor technology, software-hardware integrated platform, and security technology were discussed, together with opportunities and challenges, to promote the research and development of intelligent things.…”
    Get full text
    Article
  14. 11754

    Successful Management of Sequential Pulmonary Infections in a Cardiac Transplant Recipient by John Galbraith, Jutta K Preiksaitis, Sandra Czekanski, Mark J Poznansky, Mohamed Hirji

    Published 1990-01-01
    “…This case illustrates the role of computed tomographic imaging in the recognition, diagnosis and monitoring of complex opportunistic pulmonary infections and the benefits of liposomal amphotericin B in the treatment of aspergillosis.…”
    Get full text
    Article
  15. 11755

    Stability Analysis of Complex-Valued Nonlinear Differential System by Tao Fang, Jitao Sun

    Published 2013-01-01
    “…Those derived stability criteria not only provide a new method to analyze complex-valued differential system, but also greatly reduce the complexity of analysis and computation.…”
    Get full text
    Article
  16. 11756

    Super Yang-Mills action from Hybrid Superstring Field Theory by Ulisses M. Portugal

    Published 2025-01-01
    “…Abstract We explicitly compute the effective action from Open Superstring Field Theory in the hybrid formalism to quartic order in the α′ → 0 limit, and show that it reproduces ten-dimensional Super Yang-Mills in terms of four-dimensional superfields. …”
    Get full text
    Article
  17. 11757

    Numerical Solution of Sylvester Equation Based on Iterative Predictor-Corrector Method by Ovgu Cidar Iyikal

    Published 2022-01-01
    “…The inspiration of the study concerns an iterative predictor-corrector method with order of convergence p=45 for computing the inverse of the coefficient matrix Λ=In⊗A+BT⊗Im, which is obtained by the Sylvester equation AX+XB=C. …”
    Get full text
    Article
  18. 11758

    Elliptic virtual structure constants and generalizations of BCOV-Zinger formula to projective Fano hypersurfaces by Masao Jinzenji, Ken Kuwata

    Published 2024-12-01
    “…Abstract In this paper, we propose a method for computing genus 1 Gromov-Witten invariants of Calabi-Yau and Fano projective hypersurfaces using the B-model. …”
    Get full text
    Article
  19. 11759

    Effects of Virtual Reality Immersion and Audiovisual Distraction Techniques for Patients with Pruritus by Vera Leibovici, Florella Magora, Sarale Cohen, Arieh Ingber

    Published 2009-01-01
    “…BACKGROUND: Virtual reality immersion (VRI), an advanced computer-generated technique, decreased subjective reports of pain in experimental and procedural medical therapies. …”
    Get full text
    Article
  20. 11760

    Pengukuran Tingkat Kapabilitas Sistem Pengolahan Data Survei Pada Manajamen Kinerja Dan Manajemen Data Operasi Menggunakan Dmbok Dan Cobit2019 Di BPS RI by Siti Mawar Rini Wintang, Yova Ruldeviyani, Joko Parmiyanto, Freddy Richard Putra Hulu, Azanisa Putri, Rifta Dimas Sulistiyo

    Published 2023-07-01
    “…ICS merupakan sistem untuk mengumpulkan data multimetode yang terdiri dari Pen and Paper Interviewing (PAPI), Computer Assisted Personal Interviewing (CAPI), Computer Assisted Web Interviewing (CAWI), dan Acquisition of Administrative Data. …”
    Get full text
    Article