Showing 13,701 - 13,720 results of 28,739 for search '"computability"', query time: 0.12s Refine Results
  1. 13701

    Entangled state testing in the quantum Byzantine agreement by Xia WU, Heng-yue JIA, Jian-ming ZHU

    Published 2016-11-01
    “…In distributed computing,Byzantine agreement is a practical method to solve its fault-tolerance problem.There is a variation of the Byzantine agreement which is called detectable Byzantine agreement.This kind of protocol is unsolvable by classical means,but can be solved using quantum resources——quantum entangled states.A typical quantum detectable Byzantine agreement is the GBKCW protocol.The part with the generation and distribution of the lists in the GBKCW protocol was dealed with.In order to keep the GBKCW protocol from the intercept-and-resend strategy,the property of the determination of entangled states were employed to test the sharing state between the parties.…”
    Get full text
    Article
  2. 13702

    A Modified Resource Distribution Fairness Measure by Zhenmin Chen

    Published 2013-01-01
    “…An important issue of resource distribution is the fairness of the distribution. For example, computer network management wishes to distribute network resource fairly to its users. …”
    Get full text
    Article
  3. 13703

    A Case of Pneumothorax after Treatment with Lenvatinib for Anaplastic Thyroid Cancer with Lung Metastasis by Haruhiko Yamazaki, Hiroyuki Iwasaki, Toshinari Yamashita, Tatsuya Yoshida, Nobuyasu Suganuma, Takashi Yamanaka, Katsuhiko Masudo, Hirotaka Nakayama, Kaori Kohagura, Yasushi Rino, Munetaka Masuda

    Published 2018-01-01
    “…A 63-year-old man was diagnosed with multiple lung metastases from anaplastic thyroid cancer and received lenvatinib. Follow-up computed tomography on day 34 of lenvatinib treatment showed pneumothorax. …”
    Get full text
    Article
  4. 13704

    Modified security model based on dynamic trusted degree by NIE Xiao-wei1, FENG Deng-guo1

    Published 2008-01-01
    “…A modified security model based on dynamic trusted degree security model MSMBDTD(modified security model based on dynamic trusted degree) was proposed.Based on the trusted authentication and measurement of trusted computing,MSMBDTD first gave definition of trusted degree rule.Then it analyzed dynamic transformation of trusted degree in the course of system running.And also it modified access privilege of subject,which made access range be in conformance with trusted degree.Finally,after formal description and safety analysis with proof are given,MSMBDTD can support access control based on trusted degree.…”
    Get full text
    Article
  5. 13705

    Path Planning for Excavator Arm: Fuzzy Logic Control Approach by Nga Thi-Thuy Vu, Nam Phuong Tran

    Published 2020-01-01
    “…The effectiveness of the algorithm is verified through computer simulation and real-time experiment. The simulation and experimental results show that the generated optimal path keeps the dug weight around the expected value regardless of the change of the environment.…”
    Get full text
    Article
  6. 13706

    Penetrating Sacral Injury with a Wooden Foreign Body by Arash Fattahi, Amin Jahanbakhshi, Ardeshir Shahivand, Alireza Dastmalchi

    Published 2018-01-01
    “…This study presents a 55-year-old male admitted in our center with a 1 × 1 centimeter laceration on the sacral area skin due to a wooden penetrating object. The computed tomography (CT) of the spine revealed a hypodense penetrating object that was introduced from the posterior aspect of the sacrum into dural space and then stopped in the S1 vertebral body. …”
    Get full text
    Article
  7. 13707

    Kinetics and Mechanism of Oxidation of Glutamic Acid by N-Bromophthalimide in Aqueous Acidic Medium by N. M. I. Alhaji, S. Sofiya Lawrence Mary

    Published 2011-01-01
    “…The thermodynamic parameters were computed from Arrhenius and Eyring plots. A suitable mechanism consistent with the kinetic results has been proposed.…”
    Get full text
    Article
  8. 13708

    Parameter-Uniform Numerical Scheme for Singularly Perturbed Delay Parabolic Reaction Diffusion Equations with Integral Boundary Condition by Wakjira Tolassa Gobena, Gemechis File Duressa

    Published 2021-01-01
    “…Numerical computation for the class of singularly perturbed delay parabolic reaction diffusion equations with integral boundary condition has been considered. …”
    Get full text
    Article
  9. 13709

    Coupled Control Algorithm for Rotation and Revolution of Omni-directional Automated Guided Vehicle based on Mecanum by Shen Aimin, Zhao Zhiling

    Published 2018-01-01
    “…The theoretical analysis,computer simulation and experiments prove the effectiveness of the proposed algorithm. …”
    Get full text
    Article
  10. 13710

    AN IMPROVED FUZZY K-MEANS CLUSTERING ALGORITHM BASED ON WEIGHT ENTROPY MEASUREMENT AND CALINSKI-HARABASZ INDEX by Nguyễn Như Đồng, Phan Thành Huấn

    Published 2018-07-01
    “…Clustering plays an important role in data mining and is applied widely in fields of pattern recognition, computer vision, and fuzzy control. In this paper, we proposed an improved clustering algorithm combined of both fuzzy k-means using weight Entropy and Calinski-Harabasz index. …”
    Get full text
    Article
  11. 13711

    Symmetry Reductions of (2 + 1)-Dimensional CDGKS Equation and Its Reduced Lax Pairs by Na Lv, Xuegang Yuan, Jinzhi Wang

    Published 2014-01-01
    “…With the aid of symbolic computation, we obtain the symmetry transformations of the (2 + 1)-dimensional Caudrey-Dodd-Gibbon-Kotera-Sawada (CDGKS) equation by Lou’s direct method which is based on Lax pairs. …”
    Get full text
    Article
  12. 13712

    Algorithm for the cloud service workflow scheduling with setup time and deadline constraints by Hong SHEN, Xiao-ping LI

    Published 2015-06-01
    “…Cost minimization with deadline constraints and setup time is a new resource allocation optimization problem in cloud computing.An integer programming model is constructed for this NP-hard problem.A novel probability model and updating mechanism is suggested for sampling the solution space.A heuristic method is investigated for generating good initial population.A hybrid estimation of distribution algorithm (HEDA) is proposed for the considered problem.The global best solution is adopted to balance the diversification and intensification of HEDA.Experimental results show that the proposed method is effective to optimize the workflow running cost within reasonable CPU time.…”
    Get full text
    Article
  13. 13713

    Application of Tchebichef moment in image watermarking techniques by ZHANG Li1, WEI Gang2, ZHANG Ji-hong1

    Published 2003-01-01
    “…The geometric distortions are produced by Strimark. The computer simulation results show that the proposed method has a good robustness to Strimark and can be used in any domain. …”
    Get full text
    Article
  14. 13714

    Reward signals in the motor cortex: from biology to neurotechnology by Gerard Derosiere, Solaiman Shokur, Pierre Vassiliadis

    Published 2025-02-01
    “…In this Perspective, we highlight the functional roles of M1 reward signals and propose how they could guide advances in neurotechnologies for movement restoration, specifically brain-computer interfaces and non-invasive brain stimulation. …”
    Get full text
    Article
  15. 13715

    Dynamics of inclined CNTRC sandwich beams under a moving mass with influence of CNT agglomeration by Tran, Thi Thom, Nguyen, Dinh Kien

    Published 2023-11-01
    “…Dynamic response is computed for a simply supported beam by Newmark method. …”
    Get full text
    Article
  16. 13716

    Borromean states in a one-dimensional three-body system by Tobias Schnurrenberger, Lucas Happ, Maxim A. Efremov

    Published 2025-01-01
    “…Within the framework of the Faddeev equations, the three-body spectrum and the corresponding wave functions are computed numerically. In addition, we identify the parameter-space region for the two-body interaction, where the Borromean states occur, evaluate their geometric properties, and investigate their dependence on the mass ratio.…”
    Get full text
    Article
  17. 13717

    Architecture design of multi-protocol controller based on software definition by Yunfei XIA, Li ZHANG, Kun YANG, Peijie LI, Liming XU

    Published 2020-10-01
    “…In order to fulfill the requirement of high-performance computing system for software definition interconnected communication,a kind of multi-protocol controller architecture was designed.The architecture supported a variety of protocol specifications and software-defining heterogeneous architecture.The interconnections of Fiber Channel,Ethernet and SRIO were realized by embedding programmable hardware circuits.The work mode of multi-protocol controllers was managed by software definition,which meet the heterogeneous requirements of system applications.The multi-protocol controller of the thesis has been realized in the 40 nm process,that the measurements show that the performance and function satisfy the standard of the three protocols.…”
    Get full text
    Article
  18. 13718

    On the Statistical Properties of Nakagami-Hoyt Vehicle-to-Vehicle Fading Channel under Nonisotropic Scattering by Muhammad Imran Akram, Asrar U. H. Sheikh

    Published 2012-01-01
    “…A simulator that uses the inverse-fast-fourier-transform- (IFFT-) based computation method is designed for this model. The simulator and analytical results are compared.…”
    Get full text
    Article
  19. 13719

    Multiplicative reduced bases for hyperelasticity by Hauret, Patrice

    Published 2024-07-01
    “…The method is naturally derived from a fully consistent variational setting and we establish an upper bound of the error in the energy norm. From a computational standpoint, the approach achieves efficient Kolmogorov $n$-width decay when very large rotations and incompressibility are involved.…”
    Get full text
    Article
  20. 13720

    Flatness-based control revisited: The HEOL setting by Join, Cédric, Delaleau, Emmanuel, Fliess, Michel

    Published 2024-11-01
    “…They are illustrated via some computer simulations.…”
    Get full text
    Article