Showing 12,981 - 13,000 results of 28,739 for search '"computability"', query time: 0.14s Refine Results
  1. 12981

    Solution of a Scalar Two-Dimensional Nonlinear Diffraction Problem for Objects of Arbitrary Shape by A. O. Lapich, M. Y. Medvedik

    Published 2024-01-01
    “…The problem was solved for different bodies with the use of various computational grids. Convergence graphs of the iterative processes were generated. …”
    Get full text
    Article
  2. 12982

    Wave Dispersion and Attenuation in Viscoelastic Split Hopkinson Pressure Bar by Z.Q. Cheng, J.R. Crandall, W.D. Pilkey

    Published 1998-01-01
    “…A method, based on the spectral analysis of wave motion and using measured wave signals along the split Hopkinson pressure bar, is developed for the correction of the dispersion and attenuation of viscoelastic waves. Computational simulations are performed to show the feasibility of the method.…”
    Get full text
    Article
  3. 12983

    Optimization of Gain, Impedance, and Bandwidth of Yagi-Uda Array Using Particle Swarm Optimization by Munish Rattan, Manjeet Singh Patterh, B. S. Sohi

    Published 2008-01-01
    “…It is a global optimization technique-like genetic algorithm (GA) but has less computational cost compared to GA. In this paper, PSO has been used to optimize the gain, impedance, and bandwidth of Yagi-Uda array. …”
    Get full text
    Article
  4. 12984

    The use of technical vision in flexible production systems to determine coordinates of randomly located objects by K. V. Averkov, D. S. Makashin

    Published 2023-06-01
    “…The article is devoted to the development of an object recognition algorithm using technical vision using Python and the OpenCV computer vision library. The article presents a program that allows you to set the coordinates of an object arbitrarily located in the field of view of the camera, as well as determine its orientation. …”
    Get full text
    Article
  5. 12985

    Attribute-based encryption supporting arbitrary conjunctive key word search by Yan SONG, Zhen HAN, Dong CHEN, Jin-hua ZHAO

    Published 2016-08-01
    “…A new searchable encryption scheme was proposed in prime order bilinear groups based on the attribute-based encryption and polynomial equation.The scheme,in which each conjunctive-keyword ciphertext can be searched by a number of users,may significantly reduce the overhead of network and sending nodes' computation in the application of fine-grained access control.Meanwhile,the scheme facilitates the flexibility of conjunctive search by supporting arbitrary conjunctive search of the keywords.At last,the performance was analyzed and compared with some recent conjunctive search schemes.…”
    Get full text
    Article
  6. 12986

    Evaluating and upgrading the performance of a bridge network structure with Rayleigh distribution lifetimes. by Hossam A Nabwey, Adel A El-Faheem, Mohammed Ashraf Denguir, A M Rashad

    Published 2025-01-01
    “…Finally, we analyze comprehensively a computer simulation example to distingue between the methods. …”
    Get full text
    Article
  7. 12987

    Differential resolvents of minimal order and weight by John Michael Nahay

    Published 2004-01-01
    “…We will then give an upper bound on the weight of an α-resolvent of smallest possible weight. We will then compute the indicial equation, apparent singularities, and Wronskian of the Cockle α-resolvent of a trinomial and finish with a related determinantal formula.…”
    Get full text
    Article
  8. 12988

    Credit Risk Evaluation with a Least Squares Fuzzy Support Vector Machines Classifier by Lean Yu

    Published 2014-01-01
    “…In the proposed LS-FSVM model, the purpose of incorporating the concepts of fuzzy sets is to add generalization capability and outlier insensitivity, while the least squares method is adopted to reduce the computational complexity. For illustrative purposes, a real-world credit risk dataset is used to test the effectiveness and robustness of the proposed LS-FSVM methodology.…”
    Get full text
    Article
  9. 12989

    Maximum Independent Sets Partition of (n,k)-Star Graphs by Fu-Tao Hu

    Published 2019-01-01
    “…The (n,k)-star graph is a very important computer modelling. The independent number and chromatic number of a graph are two important parameters in graph theory. …”
    Get full text
    Article
  10. 12990

    Neurocysticercosis. Case report. by Gilberto Serrano Ocaña, Luz Maria Serrano Ocaña, Leonardo Almaguer Arena

    Published 2009-05-01
    “…The physical examination showed postictal confusion, without neurological deficit, neck rigidity or peripheral edema. Computer axial tomography was definitive for neurocysticercosis disgnosis. …”
    Get full text
    Article
  11. 12991

    ∆E/∆E Measurements of Energetic Ions Using CVD Diamond Detectors by Ahmed Alghamdi, Lawrence Heilbronn, Luis A. Castellanos, Eric Lukosi

    Published 2018-01-01
    “…Experimental and computational results of a ΔE/ΔE diamond detection system are presented. …”
    Get full text
    Article
  12. 12992

    The Approximate Solution of Fredholm Integral Equations with Oscillatory Trigonometric Kernels by Qinghua Wu

    Published 2014-01-01
    “…Due to the highly oscillatory kernels of integral equation, the discretised collocation equation will give rise to the computation of oscillatory integrals. These integrals are calculated by using recursion formula derived from the fundamental recurrence relation of Chebyshev polynomial. …”
    Get full text
    Article
  13. 12993

    Fusion of IDC Operation Support System Design and Analysis by Huazhao Liu, Xuefeng Chen, Qian Yu

    Published 2013-01-01
    “…By the establishment of IDC space, network, cloud computing various levels of resource element model, fusion process, data, operation and service, a standard, and loosely coupled IT support fusion architecture was designed and built, which laid the foundation for IDC intensive operation. …”
    Get full text
    Article
  14. 12994

    Modeling of influence of cooled and uncooled rolls on temperatures and stresses of the industrial ingot surface in the area of the secondary cooling by A. N. Chichko, D. M. Kukuj, N. V. Andrianov, Ju. V. Jatskevich, O. I. Chichko

    Published 2003-08-01
    “…On the basis of the system “ProNRS-2'' there are carried out the computer calculations of tensile and compressive stresses along the length of the ingot of size 250x300 mm for the group of industrial steels. …”
    Get full text
    Article
  15. 12995

    Unravelling AdS3/CFT2 near the boundary by Bob Knighton, Vit Sriprachyakul

    Published 2025-01-01
    “…By restricting the path integral to only include worldsheets which live near the asymptotic boundary, we compute correlation functions of spectrally-flowed vertex operators and find a precise agreement with the perturbative correlators in the recently-proposed dual CFT at all orders in conformal perturbation theory. …”
    Get full text
    Article
  16. 12996

    3D Printing Errors Detection During the Process by Florin-Bogdan MARIN, Mihaela MARIN

    Published 2024-06-01
    “…A widely used solution for monitoring the printing process involves employing a webcam to observe the process in real time, either alerting the operator or halting the print if an issue is detected. In this paper, a computer vision algorithm able to detect specific errors is proposed.…”
    Get full text
    Article
  17. 12997

    Poisson Denoising for Astronomical Images by Fahad Shamshad, M. Mohsin Riaz, Abdul Ghafoor

    Published 2018-01-01
    “…The cluster centers are used for chromatic components to improve the computational efficiency. For videos, the information of both spatial and temporal correlations improves the denoising. …”
    Get full text
    Article
  18. 12998

    Fast mode selection of intra prediction algorithm based on spatial and frequency analysis by Shu-bo ZHAN, Jian-bin SONG, Li MA, Fang-chun YANG

    Published 2012-07-01
    “…By using of the features of DCT coefficients in frequency domain and the correlation of the predictive mode in spatial domain,the proposed algorithm evaluated the complexity of encoding block and selected encoding block size firstly,computed the texture direction and pre-selected most possibly prediction mode of 16×16 block secondly,and then got the neighbor block’s optimum mode and narrowed mode selection range of 4×4 block.The experiments show that,compared with existing algorithms,in the case of almost equal quality,the speed of the algorithm is significantly improved.…”
    Get full text
    Article
  19. 12999

    The difference vectors for convex sets and a resolution of the geometry conjecture by Alwadani, Salihah, Bauschke, Heinz H., Revalski, Julian P., Wang, Xianfu

    Published 2021-07-01
    “…Comments on the numerical computation of the quantities involved are also presented.…”
    Get full text
    Article
  20. 13000

    Positive Solutions for BVP of Fractional Differential Equation with Integral Boundary Conditions by Min Li, Jian-Ping Sun, Ya-Hong Zhao

    Published 2020-01-01
    “…It is worth mentioning that these iterative sequences start off with zero function or linear function, which is useful and feasible for computational purpose. An example is also included to illustrate the main result of this paper.…”
    Get full text
    Article