Showing 12,961 - 12,980 results of 28,739 for search '"computability"', query time: 0.09s Refine Results
  1. 12961

    The effect of different fabrication techniques on porosity of cobalt-chromium cast removable partial denture farm works. by Fryad Mustafa Rasheed, Rizgar Mohammed Ameen Hasan

    Published 2022-12-01
    “…The purpose of this study was to evaluate the overall porosity of conventional versus computer-aided design/computer-aided manufactured (CAD/CAM) and 3D-Printed removable partial denture (RPD) frameworks based on tests data analysis, and to evaluate the porosity of each technique’s fabrication of the RPD frameworks. …”
    Get full text
    Article
  2. 12962

    State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks by Xiaoying ZHANG, Hui PENG, Hong CHEN

    Published 2018-10-01
    “…A state-of-the-art survey of privacy-preserving data aggregation techniques in wireless sensor networks was reviewed.Firstly,preliminaries were introduced,including network models,adversary models,and performance evaluation metrics.Secondly,existing related work was classified into several types according to privacy preservation techniques,such as homomorphic encryption,data perturbation,slicing-mixing technique,generalization,secure multiparty computation,and the key mechanisms of typical protocols were elaborated and analyzed.Finally,the promising future research directions were discussed.…”
    Get full text
    Article
  3. 12963

    Prosthetic Valve Candida Endocarditis: A Case Report with 18F-FDG-PET/CT as Part of the Diagnostic Workup by Soile Pauliina Salomäki, Antti Saraste, Päivi Jalava-Karvinen, Laura Pirilä, Ulla Hohenthal

    Published 2020-01-01
    “…We describe two patients with Candida spp. prosthetic valve endocarditis (PVE) and 18fluorodeoxyglucose positron emission tomography/computed tomography (18F-FDG-PET/CT) as a part of diagnostic workup. …”
    Get full text
    Article
  4. 12964

    On the numerical solution of two point boundary value problem for the Helmholtz type equation by finite difference method with non regular step length between nodes by Pramod Pandey

    Published 2021-03-01
    “…The numerical results obtained for these model problems with known / constructed exact solution confirm the theoretical conclusions of the proposed method. The computational results obtained for these model problems suggest that method is efficient and accurate. …”
    Get full text
    Article
  5. 12965

    Fractional time delay estimation algorithm based on the fractional lower order moment by LIU Wen-hong1, 2, QIU Tian-shuang1, HU Ting-ting1, LUAN Lian-yi3

    Published 2006-01-01
    “…It is shown by theoretical analysis and computer simulations that the proposed method is robust for both Gaussian and non-Gaussian impulsive noise environments.…”
    Get full text
    Article
  6. 12966

    Analysis of methods for ischemic stroke region recognition on CT slices by Aleksandras Krylovas, Andrius Ušinskas, Virginija Gaigalaitė

    Published 2005-12-01
    “… There are developed several computer aided methods for recognition of ischemic stroke region on CT slices at this time. …”
    Get full text
    Article
  7. 12967

    Research on deterministic networking requirements and technologies for RDMA-WAN by Junfeng ZHAO, Fang LI, Xiaofeng YE, Song JIANG

    Published 2023-11-01
    “…With the rapid development of AIGC large models and intelligent computing applications, deterministic networking technology for wide-area RDMA has become a recent research hotspot.The development path, implementation solutions and technical challenges of RDMA-WAN were analyzed, by setting up a laboratory and an outfield testing environment, with a series of testing and verifications.The deterministic demand characteristics and boundary performance indicators of RDMA-WAN were proposed.Finally, the deterministic networking technologies for RDMA-WAN were summarized and prospected.…”
    Get full text
    Article
  8. 12968

    Exact SNR and SIR analysis in Poisson wireless networks by G.P. Efthymoglou, P.S. Bithas, A.G. Kanatas

    Published 2017-03-01
    “…The analytical results are validated with computer simulation.…”
    Get full text
    Article
  9. 12969

    Simulation of Few Bifurcation Phase Diagrams of Belousov-Zhabotinsky Reaction with Eleven Variable Chaotic Model in CSTR by B. Swathi, V. R. Kulkarni

    Published 2009-01-01
    “…We have given much importance on computer simulation work but not included the experimental methods in this paper.…”
    Get full text
    Article
  10. 12970

    Volar Dislocation of the Fourth and Fifth Carpometacarpal Joint Associated with Hamate Hook Fracture: A Case Report and Literature Review by Natsumi Saka, Hirotada Matsui, Hideki Tsuji

    Published 2020-01-01
    “…Using intraoperative computed tomography, the displaced fracture of the hamate hook was reduced by open reduction and internal fixation and fixed with a screw. …”
    Get full text
    Article
  11. 12971

    Optical hausdorff quantum energy of spherical magnetic particles by Talat Körpinar, Zeliha Körpinar, Hatice özdemir, ALi Akgül, Murad Khan Hassani

    Published 2025-02-01
    “…Eventually, the Hausdorff energies of these spherical Lorentz fields according to the spherical system in $$\mathbb {S}^{2}$$ spherical space are computed.…”
    Get full text
    Article
  12. 12972

    Uniform Energy Decay Rates for the Fuzzy Viscoelastic Model with a Nonlinear Source by Fengyun Zhang

    Published 2020-01-01
    “…Under weak assumptions of the function gt, with the aid of Mathematica software, the computational technique is used to construct the auxiliary functionals and precise priori estimates. …”
    Get full text
    Article
  13. 12973

    Invariant Solutions and Conservation Laws of the Time-Fractional Telegraph Equation by Ramin Najafi, Ercan Çelik, Neslihan Uyanık

    Published 2023-01-01
    “…By applying classical and nonclassical Lie symmetry analysis for the telegraph equation with α,β time-fractional derivatives and some technical computations, new infinitesimal generators are obtained. …”
    Get full text
    Article
  14. 12974

    Hybrid Bernstein Block-Pulse Functions Method for Second Kind Integral Equations with Convergence Analysis by Mohsen Alipour, Dumitru Baleanu, Fereshteh Babaei

    Published 2014-01-01
    “…On the other hand, convergence analysis for this method is discussed. The method is computationally very simple and attractive so that numerical examples illustrate the efficiency and accuracy of this method.…”
    Get full text
    Article
  15. 12975

    Numerical Simulation of Fractional Zakharov–Kuznetsov Equation for Description of Temporal Discontinuity Using Projected Differential Transform Method by Dianchen Lu, Muhammad Suleman, Jamshaid Ul Rahman, Samad Noeiaghdam, Ghulam Murtaza

    Published 2021-01-01
    “…The core aim of this study is to propose a novel computational procedure, namely, Elzaki transform iterative method to work out two-dimensional nonlinear time-fractional Zakharov–Kuznetsov equation numerically. …”
    Get full text
    Article
  16. 12976

    Retroperitoneal Lipoma Presenting with Nutcracker-Like Phenomenon by Seiichi Saito

    Published 2013-01-01
    “…I experienced a case of a 65-year-old man presenting with left flank pain and macrohematuria intermittently for 3 years. Computed tomography revealed a lipoma at the left pedicle of the kidney, 30 mm in diameter, causing a curving of the left renal artery and dilatation of the left renal vein. …”
    Get full text
    Article
  17. 12977

    Convex separable minimization problems with a linear constraint and bounded variables by Stefan M. Stefanov

    Published 2005-01-01
    “…Some convex functions, important for problems under consideration, as well as computational results are presented.…”
    Get full text
    Article
  18. 12978

    Iterative Reproducing Kernel Method for Solving Second-Order Integrodifferential Equations of Fredholm Type by Iryna Komashynska, Mohammed AL-Smadi

    Published 2014-01-01
    “…The solution obtained by the method takes form of a convergent series with easily computable components. Furthermore, the error of the approximate solution is monotone decreasing with the increasing of nodal points. …”
    Get full text
    Article
  19. 12979

    Eavesdropping against wireless spatial scrambling secure communication: hyperplane clustering by Lu LIU, Liang JIN, Kai-zhi HUANG, Zhou ZHONG

    Published 2014-04-01
    “…Simulation results show that the HC algorithm, compared with the existing MUSIC-like algorithms, holds the advantages of better anti-noise performance and lower computing complexity.…”
    Get full text
    Article
  20. 12980

    Variational Iteration Decomposition Method for Solving Eighth-Order Boundary Value Problems by Muhammad Aslam Noor, Syed Tauseef Mohyud-Din

    Published 2007-01-01
    “…The analytical results of the equations have been obtained in terms of convergent series with easily computable components. Numerical work is given to check the efficiency of the method. …”
    Get full text
    Article