Showing 13,401 - 13,420 results of 28,739 for search '"computability"', query time: 0.10s Refine Results
  1. 13401
  2. 13402
  3. 13403

    Numerical Study of Plasmonic Efficiency of Gold Nanostripes for Molecule Detection by Thomas Grosges, Dominique Barchiesi

    Published 2015-01-01
    “…In plasmonics, the accurate computation of the electromagnetic field enhancement is necessary in determining the amplitude and the spatial extension of the field around nanostructures. …”
    Get full text
    Article
  4. 13404

    Multimodality Imaging Evaluation of an Uncommon Entity: Esophageal Heterotopic Pancreas by Takman Mack, Debra Lowry, Peter Carbone, Brian Barbick, Joshua Kindelan, Robert Marks

    Published 2014-01-01
    “…The patient underwent computed tomography (CT), fluoroscopic upper gastrointestinal (GI) evaluation, endoscopic ultrasound (EUS), and positron emission tomography (PET) evaluation, revealing the presence of a heterogeneous esophageal mass. …”
    Get full text
    Article
  5. 13405

    Damage modelling in concrete subject to sulfate attack by N. Cefis, C. Comi

    Published 2014-07-01
    “…The durability analysis of concrete structures in contact to external sulfate solutions requires the definition of a proper diffusion-reaction model, for the computation of the varying sulfate concentration and of the consequent ettringite formation, coupled to a mechanical model for the prediction of swelling and material degradation. …”
    Get full text
    Article
  6. 13406

    A Modified Key Generation Algorithm to Rebalanced-RSA and RPower-RSA by İsrafil Okumuş, Ercan Celık

    Published 2024-12-01
    “…A theoretical analysis of all variants, including the proposed modifications, demonstrates that these key generation algorithms improve the encryption process compared to the original variants, and since the encryption key size and one of the decryption key sizes are approximately equal in length, they achieve a more balanced computational effort between encryption and decryption.…”
    Get full text
    Article
  7. 13407

    treeducken: An R package for simulating cophylogenetic systems by Wade Dismukes, Tracy A. Heath

    Published 2021-08-01
    “…This allows easier performance testing of methods and has potential applications in machine learning (ML) and approximate Bayesian computation (ABC) approaches.…”
    Get full text
    Article
  8. 13408

    Cost of Production for Fresh Market Grapefruit Grown in Indian River, 2016/17 by Ariel Singerman

    Published 2018-03-01
    “…Typical users of the estimates include growers and consultants, who use them as a benchmark; property appraisers, who use them to compute the taxes for property owners; and researchers, who use the estimates to evaluate the economic feasibility of potential new technologies. …”
    Get full text
    Article
  9. 13409

    Direction and Stability of Hopf Bifurcation in a Delayed Solow Model with Labor Demand by Sanaa ElFadily, Abdelilah Kaddar, Khalid Najib

    Published 2019-01-01
    “…By using a second order approximation of the center manifold, we compute the first Lyapunov coefficient for Hopf bifurcation points and we show that the system under consideration can undergo a supercritical or subcritical Hopf bifurcation and the bifurcating periodic solution is stable or unstable in a neighborhood of some bifurcation points, depending on the choice of parameters.…”
    Get full text
    Article
  10. 13410

    Efficient Variational Approaches for Deformable Registration of Images by Mehmet Ali Akinlar, Muhammet Kurulay, Aydin Secer, Mustafa Bayram

    Published 2012-01-01
    “…The method is applied to the registration of brain MR images of size 65×65. Computational results indicate that the presented method is quite fast and efficient in the registration of deformable medical images.…”
    Get full text
    Article
  11. 13411

    Cryptography algorithm for wireless channel of CBTC system by WANG Chao1, LIU Li-li1, NIU Zhi-hua2, SHI Xiang-yong1, ZHANG Huan-guo3

    Published 2011-01-01
    “…As to the disadvantages of RC4 which was used for CBTC system,a new cryptography algorithm based on Montgomery-form ECC was brought forward.Compared with the traditional Montgomery elliptic curve,the improved algorithm would resume the value of y-coordinate with more security.In addition,compared with the traditional ECC,it has faster computing speed and can effectively resist the timing attack and energy attack.The new Montgomery-form ECC algorithm has accelerated current ECC encoding speed and would make great improvement to the implementation of ECC in CBTC and other wireless communication.…”
    Get full text
    Article
  12. 13412

    An Analytical and Approximate Solution for Nonlinear Volterra Partial Integro-Differential Equations with a Weakly Singular Kernel Using the Fractional Differential Transform Metho... by Rezvan Ghoochani-Shirvan, Jafar Saberi-Nadjafi, Morteza Gachpazan

    Published 2018-01-01
    “…The approximate solutions of these equations are calculated in the form of a finite series with easily computable terms. The analytic solution is represented by an infinite series. …”
    Get full text
    Article
  13. 13413

    A security authentication scheme in RFID system for smart park by Rongrong LI, Jiantao KOU, Gang DONG, Liangrui TANG

    Published 2016-02-01
    “…There exist many security vulnerabilities in device’s identity verification and the information transmition through RFID system,the computations and procedures in the classical RFID authentication protocols are so complex that will impose processing burdens on the data base or readers,leading to the problem of low effective information rate. …”
    Get full text
    Article
  14. 13414

    Nivolumab Effective for Gastric and Lung Cancers but Not for Multiple Myeloma in a Multiple Primary Cancer Patient by Tsukasa Yasuda, Junji Hiraga, Michihiko Narita, Yoshimasa Tanikawa, Tomoyuki Tsuzuki

    Published 2021-01-01
    “…He was also diagnosed with gastric cancer with liver metastasis and primary lung cancer by upper gastrointestinal endoscopy and computed tomography (CT). Nivolumab treatment was given as third-line therapy, and it was effective for gastric and lung cancers. …”
    Get full text
    Article
  15. 13415

    TWO APPROACHES TO CALCULATION OF SPLIT PHASE DANCING OF OVERHEAD ELECTRICAL TRANSMISSION LINE by I. I. Sergey, P. I. Klimkovich

    Published 2005-02-01
    “…Principle of mechanics relations has been used to set combined boundary problem of split phase dynamics. Two packets of computer programs for calculation of split phase dancing of overhead (electric) power line have been set up and tested.…”
    Get full text
    Article
  16. 13416

    Network modal innovation for distributed machine learning by Zehua GUO, Haowen ZHU, Tongwen XU

    Published 2023-06-01
    “…Distributed machine learning, as a popular computing architecture for artificial intelligence, still faces challenges of slow model training and poor data performance transmission.Traditional network modalities were un able to meet the communication needs of distributed machine learning scenarios, hindering the improvement of model training performance.New network modalities and operation logic for distributed machine learning scenarios using multimodal network technology were proposed.This approach was designed based on application characteristics and provides implications for the use of multimodal network technology in various industries.…”
    Get full text
    Article
  17. 13417

    Fairness based channel borrowing strategy for multimedia LEO satellite communications by HUANG Fei, XU Hui, WU Shi-qi

    Published 2006-01-01
    “…A LEO satellite mobility model and user multimedia traffic model was first built,then a novel channel bor-rowing strategy(CBS)was proposed and its performance was evaluated and compared with several existing channel al-location schemes through computer simulation.Simulation results show this scheme can satisfy the QoS requirement of LEO satellite multimedia service very well,at the same time,keeping resource utilization high,finally discussed the fair-ness and system performance under three different channel borrowing strategies.…”
    Get full text
    Article
  18. 13418

    Research on multi-objective grid task scheduling algorithms based on survivability and Makespan by WANG Shu-peng, YUN Xiao-chun, YU Xiang-zhan

    Published 2006-01-01
    “…In the complex and dynamic Grid system,failure of resources was very common.And the failure of Grid re-sources can halt the execution of tasks on them.To mitigate this problem,the concept of tasks survivability was pro-posed,a local objective function which can be adjusted was proposed by incorporating the makespan and survivability of tasks and maximizing the survivability of tasks was devised.The simulation results confirm that the scheduling algorithm can trade off these two objectives,and can satisfy different demand by adjusting the weight parameter in the objective function.So it can be applied in the complex Grid computing environment well.…”
    Get full text
    Article
  19. 13419

    The Effect of Geometric Configurations on the Elastic Behavior of an Edge-Cracked Bonded Strip by Xin Lan, Shaobo Ji, Nao-Aki Noda, Yong Cheng

    Published 2017-01-01
    “…The stress intensity factor, energy release rate, and mode mixity are computed and compared systematically with varying geometrical configurations and material combinations. …”
    Get full text
    Article
  20. 13420

    Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation by Kai-yue LEI, Xing-hua LI, Hai LIU, Zhuo-xiong PEI, Jian-feng MA, Hui LI

    Published 2016-12-01
    “…Furthermore, extensive experiments indicate that the presented scheme not only has the limited computation cost, but also ensures that the generated dummy trajectories are similar to the user's real trajectory.…”
    Get full text
    Article