Showing 12,321 - 12,340 results of 28,739 for search '"computability"', query time: 0.13s Refine Results
  1. 12321

    Study on Key Technologies of Intelligent IoT Device by Yingqi Wei, Weiping Lin, Ying Li

    Published 2015-08-01
    “…Smart IoT devices go into product stage from hype stage.Sensors are being miniaturized,integrated,intelligent and diversified,turn the reality into digital.IoT device’s intelligent is based on power of processor and advanced operation system,and be enhanced by the cloud computing and big data.As smart phone,the smart IoT devices need to build an active ecosystem that engage developers to innovate.The several key technologies development status and future trends were explored,analyzed,and displayed.…”
    Get full text
    Article
  2. 12322

    A Case of Amyopathic Dermatomyositis with Pneumomediastinum and Subcutaneous Emphysema by Aslıhan Gürün Kaya, Aydın Çiledağ, Orhan Küçükşahin, Özlem Özdemir Kumbasar, Çetin Atasoy

    Published 2015-01-01
    “…A 34-year-old man was admitted with dyspnea, cough, and fever. Thorax computed tomography revealed ground glass opacities and pneumomediastinum. …”
    Get full text
    Article
  3. 12323

    Parallel Rank of Two Sandpile Models of Signed Integer Partitions by G. Chiaselotti, T. Gentile, G. Marino, P. A. Oliverio

    Published 2013-01-01
    “…The concept of fundamental sequence is a refinement of the concept of parallel convergence time for these models. We compute the parallel convergence time and the fundamental sequence when X is the finite lattice of all the signed integer partitions such that , where , and when X is the sublattice of all the signed integer partitions of having exactly d nonzero parts.…”
    Get full text
    Article
  4. 12324

    Improved non-Rake receiver based on two dimensional spread spectrum for WCDMA systems by TANG You-xi, SHAO Shi-hai, PAN Wen-sheng, LI Shao-qian

    Published 2005-01-01
    “…And compared with the conventional Rake receiver, the proposed receiver is presented by computer simulations to support its bit error rate (BER) performance when it is difficult for the Rake receiver to distinguish each path accurately.…”
    Get full text
    Article
  5. 12325

    Misdiagnosed Uterine Rupture of an Advanced Cornual Pregnancy by Christian Linus Hastrup Sant, Poul Erik Andersen

    Published 2012-01-01
    “…Ultrasound examination and computer tomography revealed no sign of abnormal pregnancy. …”
    Get full text
    Article
  6. 12326

    Molecular Dynamics Simulation of Nanoscale Channel Flows with Rough Wall Using the Virtual-Wall Model by Xiaohui Lin, Fu-bing Bao, Xiaoyan Gao, Jiemin Chen

    Published 2018-01-01
    “…The virtual-wall model for the rough wall is proposed and validated. The computational efficiency can be improved greatly by using this model, especially for the low-density gas flow in nanoscale channels. …”
    Get full text
    Article
  7. 12327

    Hyalinizing Granuloma: An Unusual Case of a Pulmonary Mass by Viviane Brandão, Edson Marchiori, Gláucia Zanetti, Guilherme Abdalla, Nina Ventura, Carolina Lamas Constantino, Mariana Leite Pereira, Pedro Martins, Rodrigo Canellas, Antonio Muccillo, Romulo Varella de Oliveira

    Published 2010-01-01
    “…We describe the case of pulmonary hyalinizing granuloma in a 34-year-old asymptomatic man who presented with a pulmonary nodule apparent by chest radiography and computed tomography (CT). He had a history of previous treatment for tuberculosis. …”
    Get full text
    Article
  8. 12328

    Identity-based incremental signature scheme from lattices by Miaomiao TIAN, Jing CHEN, Hong ZHONG

    Published 2021-01-01
    “…By taking ideas of identity-based cryptography into incremental signatures, the concept of identity-based incremental signature was proposed, and then a specific scheme from lattices was also constructed.The scheme was shown to be provably secure against adaptive chosen identity and chosen message attacks in the standard model, assuming the hardness of the small integer solution problem.Theoretical analysis and experimental results show that the computational overhead of the incremental signature algorithm is less than that of the standard signature algorithm.…”
    Get full text
    Article
  9. 12329

    Cryptanalysis of the Vesta-2M stream cipher by GUAN Jie

    Published 2003-01-01
    “…The author point out the mistake of attack introduced by the paper [1], and introduce a known plaintext attack method where only a small segment of known plaintext(about hundreds of bits) , the upper bound of the compute complexity is)2(372O.…”
    Get full text
    Article
  10. 12330

    Frequency offset estimator for OFDM with time-frequency training sequence by JIANG Yan-xiang, WANG Dong-ming, GAO Xi-qi, YOU Xiao-hu

    Published 2006-01-01
    “…A ratio-adjustable time-frequency training sequence was proposed.The coarse carrier frequency offset(CFO) estimation was accomplished with the aid of the training sequence in frequency domain and a predefined lookup table,while the fine one was obtained by the aid of the training sequence in time domain.Simulation results show that the per-formance of the proposed method is better than Lei’s method with almost the same overhead.However,its computational complexity is much lower than Lei’s.…”
    Get full text
    Article
  11. 12331

    On Polynomial Solutions of Pell’s Equation by Hasan Sankari, Ahmad Abdo

    Published 2021-01-01
    “…In this paper, some quadratic polynomial solutions are given for the equation x2−Dy2=±1 which are significant from computational point of view.…”
    Get full text
    Article
  12. 12332

    Asymptomatic Presentation of Aggressive Ossifying Fibroma:A Case Report by Roopashri Rajesh Kashyap, Gopakumar R. Nair, Subhas Babu Gogineni

    Published 2011-01-01
    “…This paper emphasizes the importance of computed tomography in diagnosing such unapparent aggressive tumors.…”
    Get full text
    Article
  13. 12333

    Constrained Solutions of a System of Matrix Equations by Qing-Wen Wang, Juan Yu

    Published 2012-01-01
    “…As an auxiliary, an algorithm is provided to compute the least squares symmetric orthogonal solutions, and meanwhile an example is presented to show that it is reasonable.…”
    Get full text
    Article
  14. 12334

    Absorption by an Optical Dipole Antenna in a Structured Environment by E. Castanié, R. Vincent, R. Pierrat, R. Carminati

    Published 2012-01-01
    “…We compute generalized absorption and extinction cross-sections of an optical dipole nanoantenna in a structured environment. …”
    Get full text
    Article
  15. 12335

    Digital twin assisted surgery, concept, opportunities, and challenges by Lisa Asciak, Justicia Kyeremeh, Xichun Luo, Asimina Kazakidi, Patricia Connolly, Frederic Picard, Kevin O’Neill, Sotirios A. Tsaftaris, Grant D. Stewart, Wenmiao Shu

    Published 2025-01-01
    “…Abstract Computer-assisted surgery is becoming essential in modern medicine to accurately plan, guide, and perform surgeries. …”
    Get full text
    Article
  16. 12336

    Verspera, du plan d’époque à la visite virtuelle : une fructueuse collaboration interdisciplinaire by Michel Jordan, Delphine Desbourdes, Nicolas Priniotakis, Wassim Swaileh, Benjamin Ringot, Mathieu da Vinha

    Published 2023-07-01
    “…In the Verspera project, historians, archivists, curators and computer scientists worked together on the very rich corpus of the Ancien Régime plans of the Château de Versailles. …”
    Get full text
    Article
  17. 12337

    Research on semantics of trust transitivity in cryptographic primitives by WANG Li-cheng1, PAN Yun2, GU Li-ze1, YANG Yi-xian1

    Published 2008-01-01
    “…Under the background of trustable computing and trust management, the semantics of trust transitivity in cryptographic primitives were concerned, and an embryo model was proposed. …”
    Get full text
    Article
  18. 12338

    On a Class of Self-Adjoint Compact Operators in Hilbert Spaces and Their Relations with Their Finite-Range Truncations by M. De la Sen

    Published 2013-01-01
    “…The comparisons are established in terms of worst-case norm errors of the composite operators generated from iterated computations. Some boundedness properties of the worst-case norms of the errors in their respective fixed points in which they exist are also given. …”
    Get full text
    Article
  19. 12339

    Research on professional learning margin of university information security teachers in China by Yuan MENG, Pei-qun WU

    Published 2017-07-01
    “…Analyzing the educational background features of China’s university information security teachers can provide reference for the teaching staff construction of cyberspace security discipline.Based on the result of a national survey,Web content analysis was used to approach to analyze the resumes of information security teachers from Internet.The result shows that these teachers are mainly computer,mathematics,telecommunication and electronics majors,from undergraduate to master,doctorate,postdoctoral,their professional gradually to the information security professional gathering.…”
    Get full text
    Article
  20. 12340

    On adaptive refinements in discrete probabilistic fracture models by J. Eliáš

    Published 2017-01-01
    “…It is employed to save computational time and increase solution accuracy. Recently, adaptivity has been introduced also for discrete particle models. …”
    Get full text
    Article