Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
11741
COOPERATIVE BLOCK-PARALLEL ALGORITHMS FOR TASK EXECUTION ON MULTI-CORE SYSTEM
Published 2015-10-01“…The problem of balancing the computational load among the cores of a multicore system and increasing the efficiency of interaction among threads in a multithread application is considered. …”
Get full text
Article -
11742
Analysis of the possible consequences of large-scale production of sand and gravel mixture in the downstream of large hydroelectric facilities based on hydrodynamic modeling (the V...
Published 2021-08-01“…The authors have presented estimation of possible hydraulic consequences of the large-scale mining of sand/gravel mixtures in the upper part of the Lower Kama Reservoir 9the Votkinsk Reservoir downstream) based on the multi-version computation experiments with the developed hydro/dynamic model of the water body under consideration. …”
Article -
11743
Three Solutions Theorem for p-Laplacian Problems with a Singular Weight and Its Application
Published 2014-01-01“…To prove this theorem, we define a strong upper and lower solutions and compute the Leray-Schauder degree on a newly established weighted solution space. …”
Get full text
Article -
11744
Investigation of fractional-order pantograph delay differential equations using Sumudu decomposition method
Published 2024-12-01“…The study introduces a powerful computational technique for solving these equations, providing results that establish its efficiency and relevance through comparisons with existing methods. …”
Get full text
Article -
11745
Structures and Low Dimensional Classifications of Hom-Poisson Superalgebras
Published 2015-01-01“…Finally, all algebra endomorphisms on 2-dimensional complex Poisson superalgebras are computed, and their associated Hom-Poisson superalgebras are described explicitly.…”
Get full text
Article -
11746
Dynamics of Vertical Axis Wind Turbines (Darrieus Type)
Published 1995-01-01“…A computing package that combines finite element methods for evaluating the resonance frequencies and modes of turbine subcomponents (blade, tower and shaft) together with the aerodynamic calculations for forces and moments taking into consideration the dynamic stall as well as the dynamic response is developed. …”
Get full text
Article -
11747
Technological and Regime Solutions of Higher Operational Efficiency of Minsk Thermal Power Station No. 3 (TPS-3)
Published 2003-10-01“…The solutions are based on the elaboration and application of corresponding computer programs.Technological solutions are firstly directed to reduction of heat losses in the cycle (turbine capacitors) and increase of power- and-heat generation.…”
Get full text
Article -
11748
Firmware vulnerability analysis based on formal verification of software and hardware
Published 2016-07-01“…In order to analyze the potential vulnerabilities in the firmware systematically and effectively,a formal verification method based on TLA,in a collaborated form of software and hardware was proposed.With this method,the interaction mechanism of software and hardware in the computer boot process was modeled and analyzed.By adjusting the attack model,a secure vulnerability in the update process of the firmware was found,and its existence by an experiment,which proved the reliability of formal verification was demonstrated.…”
Get full text
Article -
11749
Enhanced binary Spray and Wait scheme based on reputation for DTN
Published 2012-12-01“…A concept of forwarding credential was introduced,and a detection protocol of behavior was designed.A novel scheme which enhanced the prevalent binary Spray and Wait routing scheme was integrated with reputation to resist the impairment of selfishness.According to the model of bundle transferring,the determination of reputation threshold was based on probability computation.The simulation results suggest that the enhanced scheme gain an advantage over original one under selfish misbehavior.…”
Get full text
Article -
11750
THE PERSPECTIVE DIRECTIONS OF USE OF THE METHOD OF THE MELT INTRA MOULD MODIFYING FOR PRODUCTION OF CASTINGS WITH THE SPECIFIED OPERATIONAL PROPERTIES
Published 2013-11-01“…On the basis of numerous studies using the methods of physical and simulation (computer) modeling, and also on the basis of the field experiments in the production of advanced and industrial castings prospective resource-saving technological areas of the method of in-mold inoculation of molten iron for castings with a given structure and propertiesis investigated in the work. …”
Get full text
Article -
11751
Crohn’s Disease Presenting with Pyogenic Liver Abscess: A Case Report
Published 2012-01-01“…The finding of PLA was established by computed tomography and initial treatment involved percutaneous drainage and antibiotics. …”
Get full text
Article -
11752
Les publics d’une stratégie
Published 2016-01-01“…The advent of digital computing and the internet has highlighted revealed structural weaknesses in the economics of journalism and increased competition for the attention of audiences. …”
Get full text
Article -
11753
Key technologies for the development of intelligent things
Published 2017-09-01“…Intelligent things are intelligent terminals and systems based on software-hardware integrated platforms which are capable of smart sensing, smart processing, smart connection, and smart human-computer interaction. The key technologies for the development of intelligent things, including integrated circuit technology, sensor technology, software-hardware integrated platform, and security technology were discussed, together with opportunities and challenges, to promote the research and development of intelligent things.…”
Get full text
Article -
11754
Successful Management of Sequential Pulmonary Infections in a Cardiac Transplant Recipient
Published 1990-01-01“…This case illustrates the role of computed tomographic imaging in the recognition, diagnosis and monitoring of complex opportunistic pulmonary infections and the benefits of liposomal amphotericin B in the treatment of aspergillosis.…”
Get full text
Article -
11755
Stability Analysis of Complex-Valued Nonlinear Differential System
Published 2013-01-01“…Those derived stability criteria not only provide a new method to analyze complex-valued differential system, but also greatly reduce the complexity of analysis and computation.…”
Get full text
Article -
11756
Super Yang-Mills action from Hybrid Superstring Field Theory
Published 2025-01-01“…Abstract We explicitly compute the effective action from Open Superstring Field Theory in the hybrid formalism to quartic order in the α′ → 0 limit, and show that it reproduces ten-dimensional Super Yang-Mills in terms of four-dimensional superfields. …”
Get full text
Article -
11757
Numerical Solution of Sylvester Equation Based on Iterative Predictor-Corrector Method
Published 2022-01-01“…The inspiration of the study concerns an iterative predictor-corrector method with order of convergence p=45 for computing the inverse of the coefficient matrix Λ=In⊗A+BT⊗Im, which is obtained by the Sylvester equation AX+XB=C. …”
Get full text
Article -
11758
Elliptic virtual structure constants and generalizations of BCOV-Zinger formula to projective Fano hypersurfaces
Published 2024-12-01“…Abstract In this paper, we propose a method for computing genus 1 Gromov-Witten invariants of Calabi-Yau and Fano projective hypersurfaces using the B-model. …”
Get full text
Article -
11759
Effects of Virtual Reality Immersion and Audiovisual Distraction Techniques for Patients with Pruritus
Published 2009-01-01“…BACKGROUND: Virtual reality immersion (VRI), an advanced computer-generated technique, decreased subjective reports of pain in experimental and procedural medical therapies. …”
Get full text
Article -
11760
Pengukuran Tingkat Kapabilitas Sistem Pengolahan Data Survei Pada Manajamen Kinerja Dan Manajemen Data Operasi Menggunakan Dmbok Dan Cobit2019 Di BPS RI
Published 2023-07-01“…ICS merupakan sistem untuk mengumpulkan data multimetode yang terdiri dari Pen and Paper Interviewing (PAPI), Computer Assisted Personal Interviewing (CAPI), Computer Assisted Web Interviewing (CAWI), dan Acquisition of Administrative Data. …”
Get full text
Article