Showing 12,841 - 12,860 results of 28,739 for search '"computability"', query time: 0.10s Refine Results
  1. 12841
  2. 12842
  3. 12843

    Replica wormholes and entanglement islands in the Karch-Randall braneworld by Hao Geng

    Published 2025-01-01
    “…We mainly focus on the case that the ambient space is (2+1)-dimensional for which explicit computations can be done in each description of the set-up. …”
    Get full text
    Article
  4. 12844

    Impacts of noise and interference on the bit error rate of the FBMC-OQAM modulation scheme in 5G systems by A. Androon, O. V. Tikhonova

    Published 2024-05-01
    “…The graphical and numerical data obtained through computer modeling demonstrates improved BER in 5G networks using FBMC-OQAM. …”
    Get full text
    Article
  5. 12845

    ARTIFICIAL INTELLIGENCE AS AN OBJECT OF MANAGEMENT: A BENEFIT FOR CIVILISATION OR A THREAT TO MANKIND? by Iia Chudayeva, Boris Dmitruk

    Published 2023-12-01
    “…The development of sophisticated computers and robots poses risks to the world’s people. …”
    Get full text
    Article
  6. 12846

    Dental bur detection system based on asymmetric double convolution and adaptive feature fusion by HongLing Hou, Ao Yang, Xiangyao Li, Kangkai Zhu, Yandi Zhao, Zhiqiang Wu

    Published 2024-12-01
    “…The model also achieved a 14.4% reduction in parameter volume and a 17.9% decrease in computational expenditure, while achieving a flawless counting accuracy of 100%. …”
    Get full text
    Article
  7. 12847

    Scan-to-BIM-to-Sim: Automated reconstruction of digital and simulation models from point clouds with applications on bridges by Yunping Fang, Stergios-Aristoteles Mitoulis, Daniel Boddice, Jialiang Yu, Jelena Ninic

    Published 2025-03-01
    “…The framework, validated using the Arial Aqueduct Bridge case, reduces modelling time and computational demands, thereby streamlining construction simulations with improved accuracy and cost efficiency. …”
    Get full text
    Article
  8. 12848

    Current Control and Active Damping for Single Phase LCL-Filtered Grid Connected Inverter by Mohammad Alshiekh, Alaa Marouf, Muhieddin Kubeitari

    Published 2020-01-01
    “…Other method uses active damping (AD) by adding a proportional control loop of filter capacitor current, but this method needs additional sensor to measure filter capacitor current; moreover, when the control loops are digitally implemented, the computation delay in AD control loop will lead to some difficulties in choosing control parameters and maintaining system stability. …”
    Get full text
    Article
  9. 12849

    SHASI-ML: a machine learning-based approach for immunogenicity prediction in Salmonella vaccine development by Ottavia Spiga, Ottavia Spiga, Ottavia Spiga, Anna Visibelli, Francesco Pettini, Bianca Roncaglia, Annalisa Santucci, Annalisa Santucci, Annalisa Santucci

    Published 2025-02-01
    “…The model showed superior recall and F1-scores compared to existing computational approaches.DiscussionThese findings establish SHASI-ML as an efficient computational tool for prioritizing immunogenic candidates in Salmonella vaccine development. …”
    Get full text
    Article
  10. 12850

    Robot Simulation on Agri-Field Point Cloud With Centimeter Resolution by Shintaro Noda, Masayuki Kogoshi, Wataru Iijima

    Published 2025-01-01
    “…The simulator in this study enables fast computation and accurate prediction of robot movements on centimeter-resolution agri-field point-cloud models, supporting research on agricultural robots not limited to the growing season.…”
    Get full text
    Article
  11. 12851

    Analysis of Intelligent Transportation System Application Based on Internet of Things and Big Data Technology under the Background of Information Society by Di Wang, Weijing Xu, Xuesong Jia

    Published 2022-01-01
    “…Traffic pressure promotes the massive use of Internet of Things and other technologies in the transportation system. The integration of computer, Internet of Things and transportation system forms a new intelligent transportation concept. …”
    Get full text
    Article
  12. 12852

    Development of a 3D cephalometric index to grade severity of dentofacial deformity in patients with juvenile idiopathic arthritis by Stratos Vassis, Mia Glerup, Ida Tambjerg, Annelise Küseler, Cory M. Resnick, Carlalberta Verna, Troels Herlin, Lillemor Berntson, Charlotte Myrup, Ellen Nordal, Marite Rygg, Kristiina Aalto, Sven Erik Noerholt, Thomas K. Pedersen, Peter Stoustrup

    Published 2025-01-01
    “…Data were collected from a population-based Nordic JIA cohort of 240 patients that received a cone-beam computed tomography (CBCT) scan approximately 17 years after onset of JIA. …”
    Get full text
    Article
  13. 12853

    Impact of frequent ARID1A mutations on protein stability provides insights into cancer pathogenesis by Rajen K. Goutam, Gangtong Huang, Exequiel Medina, Feng Ding, William J. Edenfield, Hugo Sanabria

    Published 2025-01-01
    “…We analyzed five frequent missense mutations R1020S, M1022K, K1047Q, G1063V, and A1089T identified in The Cancer Genome Atlas (TCGA) to assess their effects on the stability of the ARID domain using a hybrid experimental and computational approach. By combining computational stability from web server tools, the structural dynamics from replica exchange discrete molecular simulation (rexDMD), and thermal and chemical denaturation experiments, we found that the R1020S mutation severely decreases structural stability, making it the most impactful, while M1022K has minimal effect, and others lie in between. …”
    Get full text
    Article
  14. 12854

    New insights into axion freeze-in by Mudit Jain, Angelo Maggi, Wen-Yuan Ai, David J. E. Marsh

    Published 2024-11-01
    “…In this work, we revisit the computation of the freeze-in abundance and clarify important issues. …”
    Get full text
    Article
  15. 12855

    Numerical characterization of hemodynamics conditions near aortic valve after implantation of left ventricular assist device by Annalisa Quaini, Sunčica Čanić, David Paniagua

    Published 2011-05-01
    “…The use of LVADs has been associated with thrombus formation next to the aortic valve and close to the anastomosis region,especially in patients in which the native cardiac function isnegligible and the aortic valve remains closed.Stagnation points and recirculation zones have been implicated as the main fluid dynamics factors contributing to thrombus formation.The purpose of the present study was to develop and use computer simulations based on afluid-structure interaction (FSI) solver to study flow conditions corresponding to different strategies inLVAD ascending aortic anastomosis providing a scenario with the lowest likelihood of thrombus formation.A novel FSI algorithm was developed to dealwith the presence of multiple structures corresponding to different elastic properties ofthe native aorta and of the LVAD cannula.A sensitivity analysis of different variables was performed to assess their impact of flow conditionspotentially leading to thrombus formation.It was found that the location of the anastomosis closest to the aortic valve(within 4 cm away from the valve)and at the angle of 30$^\circ$ minimizes the likelihood of thrombus formation.Furthermore, it was shownthat the rigidity of the dacron anastomosis cannula plays almost no role in generating pathologicalconditions downstream from the anastomosis.Additionally, the flow analysis presented in this manuscriptindicates that compliance of the cardiovascular tissue acts as a natural inhibitor of pathological flow conditions conducive to thrombus formationand should not be neglected in computer simulations.…”
    Get full text
    Article
  16. 12856

    Primary Pleural Angiosarcoma in a 63-Year-Old Gentleman by Ahmed Abu-Zaid, Shamayel Mohammed

    Published 2013-01-01
    “…An abdominal contrast-enhanced computed tomography (CT) scan showed two right diaphragmatic pleural masses. …”
    Get full text
    Article
  17. 12857

    Successful Management in an Infant Patient of PHACE Syndrome with a Complicated Aortic Arch Anomaly by Shun Suzuki, Mitsuru Seki, Koichi Kataoka, Reina Koga, Tomoyuki Sato, Masaaki Kawada, Takanori Yamagata

    Published 2022-01-01
    “…She was born at 36 weeks of gestation (birth weight, 2,150 g) and the diagnosis was confirmed by three-dimensional computed tomography. Because her patent ductus arteriosus did not close at first, her heart failure was managed preoperatively without prostaglandin E1. …”
    Get full text
    Article
  18. 12858

    Stability analysis of cellular structures made of flat metal sheet piles by E. M. Terikhov, A. S. Anshakov

    Published 2024-07-01
    “…Analytically obtained results were compared with those computed in two- and three-dimensional settings using Midas FEA NX software package.Results. …”
    Get full text
    Article
  19. 12859

    Analysis and 3D modelling of percolated conductive networks in nanoparticle-based thin films by Stanislav Haviar, Benedikt Prifling, Tomáš Kozák, Kalyani Shaji, Tereza Košutová, Šimon Kos, Volker Schmidt, Jiří Čapek

    Published 2025-01-01
    “…Then, the electrical conductivity of the percolated networks in these virtual structures was computed using the finite element method for various partial oxygen pressures. …”
    Get full text
    Article
  20. 12860

    Defense scheme for the world state based attack in Ethereum by Zhen GAO, Dongbin ZHANG, Xiao TIAN

    Published 2022-04-01
    “…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
    Get full text
    Article