Showing 13,521 - 13,540 results of 28,739 for search '"computability"', query time: 0.11s Refine Results
  1. 13521

    VisionMD: an open-source tool for video-based analysis of motor function in movement disorders by Gabriela Acevedo, Florian Lange, Carolina Calonge, Robert Peach, Joshua K. Wong, Diego L. Guarin

    Published 2025-02-01
    “…Leveraging deep learning, VisionMD tracks body movements to compute kinematic features that quantify symptoms severity and supports longitudinal monitoring. …”
    Get full text
    Article
  2. 13522

    Certificateless generalized signcryption scheme in the standard model by Shu-fen NIU, Ling NIU, Cai-fen WANG, Ya-hong LI

    Published 2017-04-01
    “…In 2010,Liu,et al.proposed a certificateless signcryption scheme in the standard model,but many analyses revealed that Liu's scheme was insecure in fact.To overcome the disadvantages,the scheme was improved and a certificateless generalized signcryption scheme was constructed.In addition,a formal security model for the proposed scheme against the malicious-but-passive KGC attacks was introduced.Furthermore,the proposed scheme was proven to be secure under the decisional bilinear Diffie-Hellman and the computational Diffie-Hellman intractability assumptions in the standard model.Numerical results illustrate that the proposed algorithm is efficient.…”
    Get full text
    Article
  3. 13523

    Dijet mass up to four loops with(out) $${{\varvec{k}}}_{\varvec{t}}$$ k t clustering by K. Khelifa-Kerfa

    Published 2025-02-01
    “…Abstract We compute the invariant mass of dijets produced in $$e^+ e^-$$ e + e - annihilation processes up to four loops in perturbation theory for both anti- $$k_t$$ k t and $$k_t$$ k t jet algorithms. …”
    Get full text
    Article
  4. 13524

    R-SYSTEM AND INFORMATION TECHNOLOGIES AS TOOLS FOR ECONOMIC INTELLIGENCE IN ORGANIZATIONS by A. Volchkov, N. Struzhkin

    Published 2017-03-01
    “…Significant growth of computing power, evolution of intelligent data processing algorithms and development of simulation modeling allow to use R-system methods in the most efficient way.…”
    Get full text
    Article
  5. 13525

    NUMERICAL MODELING OF THE INTENSE DEFORMED STATE AND PECULIARITIES OF STRUCTURE FORMATION OF CAST IRON AT HOT EXTRUSION MOLDING by A. I. Pokrovsky, P. E. Lushchik

    Published 2014-11-01
    “…The specific features of structure formation of high-strength cast iron subjected to direct extrusion with different strain (ε) are studied both theoretically (by computer modeling) and experimentally (by metallographic analysis using light and electron microscopes). …”
    Get full text
    Article
  6. 13526

    Structural Damage Detection Based on Modal Parameters Using Continuous Ant Colony Optimization by Aditi Majumdar, Bharadwaj Nanda, Dipak Kumar Maiti, Damodar Maity

    Published 2014-01-01
    “…An inverse problem is formulated to minimize the objective function, defined in terms of discrepancy between the vibration data identified by modal testing and those computed from analytical model, which then solved to locate and assess the structural damage using continuous ant colony optimization algorithm. …”
    Get full text
    Article
  7. 13527

    Distance Spectra of Some Double Join Operations of Graphs by B. J. Manjunatha, B. R. Rakshith, K. N. Prakasha, N. V. Sayinath Udupa

    Published 2024-01-01
    “…In this paper, we introduce a new double join operation based on H1,H2-merged subdivision graph. We compute the spectrum of a special block matrix and then use it to describe the distance spectra of some double join operations of graphs. …”
    Get full text
    Article
  8. 13528

    Colonic Interposition between the Liver and Diaphragm: “The Chilaiditi Sign” by Nita Nair, Zeina Takieddine, Hassan Tariq

    Published 2016-01-01
    “…Abdominal examination revealed tenderness in the umbilical and hypogastric area without rebound tenderness or guarding. Computed tomography (CT) of the abdomen showed a loop of colon interpositioned between the liver and the right hemidiaphragm (the Chilaiditi sign), mimicking free air. …”
    Get full text
    Article
  9. 13529

    Primary Pneumatosis Intestinalis of Small Bowel: A Case of a Rare Disease by Daniela Berritto, Raffaello Crincoli, Francesca Iacobellis, Francesca Iasiello, Nunzia Luisa Pizza, Francesco Lassandro, Lanfranco Musto, Roberto Grassi

    Published 2014-01-01
    “…The present report describes the case of an 86-year-old man with symptomatic primary PI of small bowel treated with surgical approach after periodic episodes of cysts rupture and superimposed inflammation revealed on the basis of a clinical suspicion thanks to abdominal computed tomography. Moreover, after one year of followup, there has been no recurrence of digestive symptoms.…”
    Get full text
    Article
  10. 13530

    AC Optimal Power Flow: a Conic Programming relaxation and an iterative MILP scheme for Global Optimization by Oustry, Antoine

    Published 2022-11-01
    “…We address the issue of computing a global minimizer of the AC Optimal Power Flow problem. …”
    Get full text
    Article
  11. 13531

    MQAM modulation scheme recognition using Hilbert transform by XI Jia-xi, WANG Zong-xin

    Published 2007-01-01
    “…A modulation scheme recognition algorithm for MQAM signals was proposed.The method does not require the prior information about baud rate and carrier frequency of the received signals.Baud rate is estimated first,then re-sampling,Hilbert transformation,baud rate sampling and clustering are performed.It does not need carrier frequency estimation and decreases the calculation.Computer simulations show that the correct recognition ratio is larger than 95% if SNR is greater than 12dB and using 1024 or more symbols.So it is suitable for signal detection and recognition of practical applications.…”
    Get full text
    Article
  12. 13532

    Research on Security Connotation and Response Strategies for Big Data by Kun Hu, Di Liu, Minghui Liu

    Published 2014-02-01
    “…Big data is easy to understand which has many potential application requirements and foreseeable enormous economic benefits.With the development of mobile internet,cloud computing and M2M,big data become a new focus in the information technology field.But,it brings some challenges and problems,such as data security and privacy protection.The security requirements of big data in various fields were reviewed,and the security features and problems in big data environment were analyzed.Then the security connotation of big data was summarized and some response strategies were proposed.…”
    Get full text
    Article
  13. 13533

    Sagnac Interferometer Based Generation of Controllable Cylindrical Vector Beams by Cristian Acevedo, Angela Guzmán, Yezid Torres Moreno, Aristide Dogariu

    Published 2016-01-01
    “…Continuous control of beams’ properties is obtained using an optically addressable spatial light modulator incorporated into a Sagnac interferometer. Forked computer-generated holograms allow introducing different topological charges while orthogonally polarized beams within the interferometer permit encoding the spatial distribution of polarization. …”
    Get full text
    Article
  14. 13534

    Efficient inter mode selection algorithm for H.264 by LU Lu, ZHOU Wei

    Published 2006-01-01
    “…However, this comes at the greatly increased computing complexity at the encoder. A method was proposed to eliminate some redundant coding modes that contribute very little coding gain based on analysis of macroblock detail-level and texture directions. …”
    Get full text
    Article
  15. 13535

    On the Stability of L4,5 in the Relativistic R3BP with Oblate Secondary and Radiating Primary by Nakone Bello, Jagadish Singh

    Published 2015-01-01
    “…Further, a numerical exploration computing the positions of the triangular points and the critical mass ratio of some binaries systems consisting of the Sun and its planets is given in the tables.…”
    Get full text
    Article
  16. 13536

    Scalable video coding based on db2 lifting wavelet by ZHAO Zhi-jie, LIN Mao-liu, CAO Zhi-min, LIU Zeng-yu

    Published 2009-01-01
    “…Based on the classification of the pixel, different formulation to compute high-pass frame and low-pass frame was given. …”
    Get full text
    Article
  17. 13537

    Advanced Imaging for Congenital Left Ventricular Diverticulum in a Dog: The Role of Electrocardiosynchronous CT by Miki Hirose, Lina Hamabe, Kazumi Shimada, Aki Takeuchi, Kazuyuki Terai, Aimi Yokoi, Ahmed Farag, Akari Hatanaka, Rio Hayashi, Katsuhiro Matsuura, Ryou Tanaka

    Published 2025-01-01
    “…While the diverticulum caused no clinical symptoms, a cardiac synchronous computed tomography (CT) scan was performed to accurately assess its anatomical location and size. …”
    Get full text
    Article
  18. 13538

    Hybrid surgery for imminent rupture of superior mesenteric artery aneurysms by Yuta Miyano, MD, Hiroshi Mitsuoka, PhD, Takahiro Suzuki, MD

    Published 2025-02-01
    “…The postoperative course was uneventful with no evidence of mesenteric ischemia. Postoperative computed tomography angiography confirmed complete aneurysm exclusion and sac size reduction, as well as patency of the stent graft and bypass.…”
    Get full text
    Article
  19. 13539

    NLO in the large charge sector of the critical O(N) model at large N by Nicola Andrea Dondi, Giacomo Sberveglieri

    Published 2025-02-01
    “…Abstract We compute the next-to-leading correction to the scaling dimension of large-charge operators in the 3d critical O(N) model in a double scaling limit in which both N and the operator charge Q are taken to be large. …”
    Get full text
    Article
  20. 13540

    Asynchronous Gossip-Based Gradient-Free Method for Multiagent Optimization by Deming Yuan

    Published 2014-01-01
    “…In contrast to the existing work, we do not require that agents be capable of computing the subgradients of their objective functions and coordinating their step size values as well. …”
    Get full text
    Article