Showing 13,021 - 13,040 results of 28,739 for search '"computability"', query time: 0.10s Refine Results
  1. 13021

    Nerve root compression caused by intraspinal gas accumulation. A case report by A. Daškevičiūtė, R. Bunevičiūtė, J. Sejonienė

    Published 2019-09-01
    “…The diagnosis was confirmed only by computed tomography findings. …”
    Get full text
    Article
  2. 13022

    Le Online Dating, au cœur de la communication électronique by Pascal Lardellier

    Published 2012-05-01
    “…For fifteen years, sexual and sentimental relationships « assisted by computers » has became a kind of relationnal revolution. …”
    Get full text
    Article
  3. 13023

    S-Vivaldi:a space repairing based Internet delay space embedding algorithm by Zhan-feng WANG, Ming CHEN, Chang-you XING, Hua-li BAI, Xiang-lin WEI

    Published 2012-03-01
    “…To counteract TIV’s influence on the Internet delay space models,an Internet delay space embedding algorithm based space repairing S-Vivaldi (scaling-Vivaldi) was proposed.S-Vivaldi firstly applied an exponent transformation on the delay matrix D,retrieved a matrix D'almost without TIV,and then embedded D'by the Vivaldi algorithm.The delay between any two nodes could be computed by a series of inverse transformation.Experimental results show that S-Vivaldi could improve the prediction accuracy apparently in the most case.…”
    Get full text
    Article
  4. 13024

    Error-parameter analysis based blind identification and super-resolution restoration algorithm by YAN Hua1, LIU Ju2, SUN Jian-de2, HUANG Qing-mimg3

    Published 2009-01-01
    “…If motion estimation was inaccurate, searching algorithm could be combined with error-parameter analysis to reduce computation cost. Stimulation results demonstrate the effectiveness of the new implementation scheme and blur identification.…”
    Get full text
    Article
  5. 13025

    Protocols for Robotic Telescope Networks by Alain Klotz

    Published 2010-01-01
    “…This paper is addressed to astronomers who are not specialists in computer science. We give explanations of some basic and advanced protocols to receive events and how to implement them in a robotic observatory software. …”
    Get full text
    Article
  6. 13026

    Investigation of Patients with Apparently Inoperable Lung Cancer by Riyad Karmy-Jones, Eric Vallieres, Joseph W Lewis, George Dundas

    Published 1996-01-01
    “…These results demonstrate that chest x-ray and computed tomography of the chest may not be specific enough to rule out the possibility of surgical cure.…”
    Get full text
    Article
  7. 13027

    Two-loop amplitudes for O α s 2 $$ \mathcal{O}\left({\alpha}_s^2\right) $$ corrections to Wγγ production at the LHC by Simon Badger, Heribertus Bayu Hartanto, Zihao Wu, Yang Zhang, Simone Zoia

    Published 2024-12-01
    “…We employ a compact system of integration-by-part identities provided by the NeatIBP package, allowing for an efficient computation of the rational coefficients of the scattering amplitudes over finite fields.…”
    Get full text
    Article
  8. 13028

    Emphysematous Aortitis due to Clostridium septicum in an 89-Year-Old Female with Ileus by Susana Urgiles, Harold Matos-Casano, Kyaw Zin Win, Jeronimo Berardo, Utpal Bhatt, Jilan Shah

    Published 2019-01-01
    “…This condition was found incidentally on computed tomography of the chest during the evaluation of a patient presenting with pneumonia coincident with adynamic ileus. …”
    Get full text
    Article
  9. 13029

    Existence and Multiplicity of Solutions to Discrete Conjugate Boundary Value Problems by Bo Zheng

    Published 2010-01-01
    “…By classifying the linear systems, we define index functions and obtain some properties and the concrete computation formulae of index functions. Then, some new conditions on the existence and multiplicity of solutions are obtained by combining some nonlinear analysis methods, such as Leray-Schauder principle and Morse theory. …”
    Get full text
    Article
  10. 13030

    Efficient method of constructing parameters in R-ate paring by LI Bin, WANG Xin-mei

    Published 2010-01-01
    “…In order to accelerate the computing of Tate paring, a new technique of selection method of parameters (A,B) based on R-ate technique had been proposed. …”
    Get full text
    Article
  11. 13031

    Application of blockchain in telecom operators by Yunyong ZHANG, Gang CHENG, Gang AN, Xuehong YANG, Guixiang ZOU

    Published 2020-05-01
    “…Blockchain is another disruptive technological revolution after the IoT,cloud computing and big data.Blockchain technology and typical application cases were firstly introduced,and then the role of blockchain technology and blockchain in operators were analyzed.Secondly,combined with the characteristics of the blockchain,the application of blockchain in multiple operators were focused on,such as infrastructure,international roaming settlement,digital points issuance and trading,data storage,cross-border payment,identity verification,and credit reporting.Finally,the challenges faced by operators in the comprehensive application of blockchain were introduced.…”
    Get full text
    Article
  12. 13032

    The Noise Performance of a Multiple-Input-Port and Multiple-Output-Port Low-Noise Amplifier Connected to an Array of Coupled Antennas by Frédéric Broydé, Evelyne Clavelier

    Published 2011-01-01
    “…A definition of the noise figures and natural noise figures of a MIPMOP device is provided, and the resulting properties are detailed in the impedance and admittance representations. We compute the natural noise figures of a low-noise MIPMOP amplifier comprising a MIMO series-series feedback amplifier (MIMO-SSFA), designed for a wireless receiver front-end.…”
    Get full text
    Article
  13. 13033

    A lightweight and trusted communication protocol for IoT by Junfeng MA, Zhiruo LIU, Guanwen LI, Fei YANG, Juanna DANG

    Published 2021-11-01
    “…With the era of the internet of things (IoT), the protocol stack conversion scheme based on the application-layer’s gateway has problems such as poor performance and end to end security that can’t be guaranteed.A lightweight and trusted IoT IP communication protocol was proposed, which was the main research direction of Protocol and Interface Group in Network 5.0 Industry and Technology Innovation Alliance, the deployment costs of protocol conversion gateways was decreased, the computing and storage overhead of IoT devices was reduced, and end to end communication security was ensured.…”
    Get full text
    Article
  14. 13034

    An Algorithm to Select the Optimal Program Based on Rough Sets and Fuzzy Soft Sets by Liu Wenjun, Li Qingguo

    Published 2014-01-01
    “…In this algorithm, firstly, according to fuzzy soft sets, we build up information systems; secondly, we compute the significance of each parameter according to rough set theory; thirdly, combining subjective bias, we give an algorithm to obtain the comprehensive weight of each parameter; at last, we put forward a method to choose the optimal program. …”
    Get full text
    Article
  15. 13035

    The dangerous biology of pathogenic germs by Berche, Patrick

    Published 2024-09-01
    “…The convergence of biotechnologies with other disciplines, including computer science and Artificial Intelligence (AI), may make it possible to carry out dangerous genetic manipulations on pathogenic germs, as the gain-of-function experiments exacerbating virulence, as those carried out on myxoviruses and coronaviruses. …”
    Get full text
    Article
  16. 13036

    An interesting family of curves of genus 1 by Andrew Bremner

    Published 2000-01-01
    “…In the former case, all integral solutions are determined; in the latter case, computation in the range 1≤t≤999 shows large ranks are common, giving a particularly simple example of curves which (admittedly over a small range) apparently contradict the once held belief that the rank under specialization will tend to have minimal rank consistent with the parity predicted by the Selmer conjecture.…”
    Get full text
    Article
  17. 13037

    On Generalized Topological Indices of Silicon-Carbon by Xing-Long Wang, Jia-Bao Liu, Akbar Jahanbani, Muhammad Kamran Siddiqui, Nader Jafari Rad, Roslan Hasni

    Published 2020-01-01
    “…Let Gbe a graph with n vertices and Γu be the degree of its u-th vertex (Γx is the degree of u). In this article, we compute the generalization of Zagreb index, the generalized Zagreb index, the first and second hyper F-indices, the sum connectivity F-index, and the product connectivity F-index graphs of Si2C3−Ip,q, Si2C3−IIp,q, Si2C3−IIIp,q, and SiC3−IIIp,q.…”
    Get full text
    Article
  18. 13038

    On the Characterization of a Class of Difference Equations by Muhammed Altun

    Published 2011-01-01
    “…To examine the asymptotic behavior of solutions, we compute the spectra of operators which correspond to such type of difference equations. …”
    Get full text
    Article
  19. 13039

    Gesture recognition approach based on learning sparse representation by Ling XIAO, Ren-fa LI, Fan-zai ZENG, Wei-lan QU

    Published 2013-06-01
    “…This method operated directly on the original acceleration signals by sparse representation without feature extraction and used the class-specific dictionary learning for sparse modeling to reduce the computing cost and time of recognition. The proposed system can easily add a novel gesture category as well as remove existing ones. …”
    Get full text
    Article
  20. 13040

    Research on a Mobile Malicious Code Management and Control Method Based on Cloud-Pipeline-Terminal by Jun Li

    Published 2013-08-01
    “…In order to solve the increasingly serious security issues caused by malwares in mobile internet,a“cloud-pipeline-terminal”model was proposed to implement detection and killing of mobile internet malwares.The proposed model composes of a cloud computing platform to support the analysis and measurement of the malwares and to implement strategy distribution and management of the system,a monitoring and intercepting system on the side of mobile communication pipelines and a terminal security application to check and kill the malwares.The purpose is to build a safe and harmonious mobile internet environment.…”
    Get full text
    Article