Showing 13,461 - 13,480 results of 28,739 for search '"computability"', query time: 0.10s Refine Results
  1. 13461

    Adaptive Prediction of Channels with Sparse Features in OFDM Systems by Changwei Lv, Shujuan Hou, Wenbo Mei

    Published 2013-01-01
    “…We also compare the proposed prediction method with the classical frequency domain method realized at each OFDM subcarrier and demonstrate that our method increases the prediction accuracy and reduces the computational complexity. Simulations on the physical channel model verify the performance of the proposed method.…”
    Get full text
    Article
  2. 13462

    Minage de cryptomonnaies à Irkoutsk by Hugo Estecahandy

    Published 2021-06-01
    “…This process of creating some digital currencies, including the bitcoin, requires significant computing power and therefore special resources. In addition to concentrating large quantities of these resources at an attractive price and a suitable climate, Irkutsk has certain socio-political characteristics that have facilitated the emergence of the activity. …”
    Get full text
    Article
  3. 13463

    One-Step Family of Three Optimized Second-Derivative Hybrid Block Methods for Solving First-Order Stiff Problems by Saidu Daudu Yakubu, Precious Sibanda

    Published 2024-01-01
    “…The proposed methods were implemented using the waveform relaxation technique, and the computed results demonstrated the superiority of these schemes over certain existing methods investigated in the study.…”
    Get full text
    Article
  4. 13464

    Simplified MD-LSD demapping algorithm for BICM-ID systems with multi-dimensional mappings by GONG Feng-kui, GE Jian-hua, WANG Yong

    Published 2008-01-01
    “…Compared with the MD-MAX-LOG-MAP algo- rithm, the computational complexity of MD-LSD was decreased significantly. …”
    Get full text
    Article
  5. 13465

    Nonparametric Estimation of ATE and QTE: An Application of Fractile Graphical Analysis by Gabriel V. Montes-Rojas

    Published 2011-01-01
    “…The proposed method has two steps: first, the propensity score is estimated, and, second, a blocking estimation procedure using this estimate is used to compute treatment effects. In both cases, the estimators are proved to be consistent. …”
    Get full text
    Article
  6. 13466

    Cooperative localization algorithm based on time-ofarrival in wireless senor network by Qianqian LU, Youming LI, Shengming CHANG, Nana LI

    Published 2019-01-01
    “…In this way, a fast suboptimal solution to the original problem was obtained. Finally, computer simulations show that the proposed method has lower root mean square error (RMSE) which is closer to the Cramer-Rao lower bound (CRB).…”
    Get full text
    Article
  7. 13467

    معرفات البیانات المترابطة والمکتبات :القصة حتى الآن by محمد عبد الحمید معوض

    Published 2016-04-01
    “…Libraries around theworld appear to be embracing linked data technologies that render theircontent more accessible to both humans and computers. This paperfocuses on linked data URIs that refer to authority data. …”
    Get full text
    Article
  8. 13468

    Security Analysis in Wireless Sensor Networks by Murat Dener

    Published 2014-10-01
    “…However, security solutions in WSN differ from traditional networks due to resource limitation and computational constraints. This paper analyzes security solutions: TinySec, IEEE 802.15.4, SPINS, MiniSEC, LSec, LLSP, LISA, and LISP in WSN. …”
    Get full text
    Article
  9. 13469

    Analysis on network scheme and resolution test of SDN/NFV technology co-deployed in cloud datacenter by Rong GU, Ruixue WANG, Chen LI, Lu HUANG

    Published 2016-01-01
    “…Traditional datacenters have been heavily impacted due to the development and large-scale deployment of cloud computing technology.Co-deployment of SDN and NFV technology shows its distinct advantages of vitualizing network resources in the scenario of cloud datacenter.Resolution tests aiming at co-deployment of SDN and NFV have directive significance.According to the resolution test,SDN and NFV technology were matured already for the commercial deployment in operators' network.Further research needs to be focused on the key problems found out in scheme designing and the resolution test.…”
    Get full text
    Article
  10. 13470

    Restituer les bidonvilles de Nanterre : l’apport d’un outil de visualisation 3D à un projet de sciences sociales by Paul Lecat, Émile Blettery, Lætitia Delavoipière, Frédéric Saly-Giocanti, Sylvaine Conord, Valérie Gouet-Brunet, Alexandre Devaux, Mathieu Brédif, Frédéric Moret

    Published 2021-05-01
    “…Researchers in urban history and sociology collaborated with computer scientists from the IGN in order to use and enrich a platform for spatialisation and visualisation of heterogeneous data to document the history of these shantytowns and to understand the formation and permanence of these places in the current collective memory.…”
    Get full text
    Article
  11. 13471

    Analytical Solutions of the Balance Equation for the Scalar Variance in One-Dimensional Turbulent Flows under Stationary Conditions by Andrea Amicarelli, Annalisa Di Bernardino, Franco Catalano, Giovanni Leuzzi, Paolo Monti

    Published 2015-01-01
    “…These solutions represent both analytical tools for preliminary estimations of the concentration variance and upwind spatial reconstruction schemes for CFD (Computational Fluid Dynamics)—RANS (Reynolds-Averaged Navier-Stokes) codes, which estimate the turbulent fluctuations of reactive scalars.…”
    Get full text
    Article
  12. 13472

    Forward-secure ciphertext-policy attribute-based encryption scheme by EIJiang-hong W, IUWen-fen L, UXue-xian H

    Published 2014-07-01
    “…The results demonstrate that the proposed scheme strengthens the security of CP-ABE, without getting overmuch cost of computation and storage, and thus is more feasible for practical applications.…”
    Get full text
    Article
  13. 13473

    The pivotal image findings of progressive multifocal leukoencephalopathy: A case report by Shou-De Ma, Chih-Wei Wei, Tai-Lin Huang, Chao-Hsin Wu, Shiang-Yu Chang

    Published 2024-12-01
    “…Typically, PML appears on computed tomography scans as asymmetric focal zones of low attenuation in the periventricular and subcortical white matter, while MRI findings usually show multifocal demyelination in these areas. …”
    Get full text
    Article
  14. 13474

    Generalization and improvement of Nyberg-Rueppel message recovery blind signatures by HUANG Zhen-jie1, WANG Yu-min2, CHEN Ke-fei1

    Published 2005-01-01
    “…A generalized Nyberg-Rueppel message recovery blind signature scheme was presented,from which the scheme proposed by Camenisch et al and two new schemes could be obtained.One of these two new schemes was an efficiently improved scheme without computing any inverse while Camenisch et al’s scheme needs.Moreover,using the padding technique and hash function,a provably secure message recovery blind signature scheme,against adaptive chosen-message attack in random oracle model and generic group model,was proposed.…”
    Get full text
    Article
  15. 13475

    Reliability Analysis for the Gear Fracture based on Energy Release Rate Criterion by Song Ping, Song Feifei

    Published 2015-01-01
    “…The first- order second-moment method and stochastic finite element method are used to calculate the reliability. The computation results show that this suggested method has advantages of high accuracy and efficiency.…”
    Get full text
    Article
  16. 13476

    A Toeplitz Jacobian Matrix/Fast Fourier Transformation Method for Steady-State Analysis of Discontinuous Oscillators by T. Ge, A. Y. T. Leung

    Published 1995-01-01
    “…The TJM/FFT method substantially reduces the amount of computation and circumvents the necessary numerical differentiation for the Jacobian. …”
    Get full text
    Article
  17. 13477

    E-LEARNING IN PEDAGOGICAL STAFF TRAINING by Boris N. Kireev

    Published 2016-12-01
    “…The ability to create, edit, share with multimedia objects of different types by using modern computer technologies will produce a beneficial effect on the formation of competence in multimedia communication.…”
    Get full text
    Article
  18. 13478

    Institutions sectorielles et management environnemental : une étude sur données françaises by Anne-Valérie Hallot-Gauquié, Jean-François Sattin, Isabelle Alphonse-Tilloy

    Published 2010-05-01
    “…Using an OECD dataset, we compute sectoral values that grasp the environmental specificities of metallurgical, chemical, and mechanical industries. …”
    Get full text
    Article
  19. 13479

    Federal Income Tax Management by Vervil Mitchell, Josephine Turner, Michael S. Gutter, Nayda I. Torres, Horacio Soberon, Zeynep Copur

    Published 2009-04-01
    “…It describes the advantages of filing a federal tax return, who must file a return, itemizing deductions, computing income tax rates, credits, payments, preparing and filing your return, recordkeeping, and where to get help. …”
    Get full text
    Article
  20. 13480

    Prefixes of the Fibonacci word that end with a cube by Rampersad, Narad

    Published 2023-01-01
    “…We study the prefixes of the Fibonacci word that end with a cube. Using the computer prover Walnut, we obtain an exact description of the positions of the Fibonacci word at which a cube ends. …”
    Get full text
    Article