Showing 13,721 - 13,740 results of 28,739 for search '"computability"', query time: 0.13s Refine Results
  1. 13721

    Digital research and implementation of cloud-network planning of telecom operators by Xiaoming XIONG, Jing ZHAO

    Published 2022-11-01
    “…Based on the perspective of digital transformation of telecom operators, a data-driven cloud-network development planning system was proposed systematically, six key digital capabilities were built, and a cloud-network planning digital platform was designed and implemented, which could be used for scenarios such as fine planning of target networks, accurate prediction of edge computing, etc., and the application prospects of digital twins in the field of future cloud-network planning were discussed.The proposed system has guiding and reference significance for operators to promote cloud-network integration strategies and promote high-quality development.…”
    Get full text
    Article
  2. 13722

    The analysis of influence of uncertainty factors on mathematical modeling of the process of reverse expansion of ammonia in low-speed reciprocating compressor stage. Part 2 by D. Kh. Sadvakasov, G. I. Chernov, V. L. Yusha

    Published 2022-06-01
    “…Based on the results of the computational and parametric analysis, the applicability of known methods for calculating the heat transfer coefficient to the object under consideration is evaluated.…”
    Get full text
    Article
  3. 13723

    Novel extended multivariate public key cryptosystem by Shuai-ting QIAO, Yi-fa LI, Wen-bao HAN

    Published 2014-04-01
    “…Analysis results demonstrate that the extended cryptosystem inherits the merit of MI, i.e. efficient computation. Meanwhile, the novel extended scheme can also resist linearization attack, differential attack and algebraic attack.…”
    Get full text
    Article
  4. 13724

    Metamodel-Based Multidisciplinary Design Optimization of a Deep-Sea Manganese Nodules Test Miner by Minuk Lee, Su-gil Cho, Jong-Su Choi, Hyung-Woo Kim, Sup Hong, Tae Hee Lee

    Published 2012-01-01
    “…Metamodels such as the kriging model and the response surface model are employed to reduce computational costs for MDO and to integrate component systems in a design framework. …”
    Get full text
    Article
  5. 13725

    SELF-SIMILARITY IN PITCH ORGANIZATION by Adrian BORZA

    Published 2011-06-01
    “…Also, we will investigate the author’s self-similar, non-octave-based, and full-chromatic mode of twenty-three notes, which led to the author’s compositions, such as Chaconne for guitar solo (1999), Fractus III for percussion and computer (2001), and Point. Line. Spot for string orchestra (2003). …”
    Get full text
    Article
  6. 13726

    One More Thing on the Subject: Generating Chaos via <i>x</i>|<i>x</i>|<sup><i>a</i>−1</sup>, Melnikov’s Approach Using Simulations by Nikolay Kyurkchiev, Anton Iliev, Vesselin Kyurkchiev, Asen Rahnev

    Published 2025-01-01
    “…A much broader Web-based application for scientific computing will incorporate this as a key component.…”
    Get full text
    Article
  7. 13727

    Power Control Algorithm Based on Normalized Utility Function Research by Xiang Yu, Xiaoyin Zhang, Lei Liu

    Published 2014-12-01
    “…Simulation results show that the algorithm is not restricted by system modulation mode, and reduces the computational complexity, and has faster convergence speed. …”
    Get full text
    Article
  8. 13728

    Topological 1D gravity, KP hierarchy, and orbifold Euler characteristics of M‾g,n by Zhiyuan Wang, Jian Zhou

    Published 2025-03-01
    “…As an application, we present two types of algorithms to compute the orbifold Euler characteristics of the moduli spaces M‾g,n of stable curves. …”
    Get full text
    Article
  9. 13729

    Method of dynamic integrity measurement for VMM based on adjacency data by Tao WU, Qiu-song YANG, Ye-ping HE

    Published 2015-09-01
    “…Due to its high privilege and complicated runtime memory,dynamic integrity measurement for VMM (virtual machine monitor) was always a great difficulty in the current study.An innovative method based on the adjacency data was proposed,which used a neighbor as the host of a measurement module.According to an integrity model in memory page granularity and a new improved measurement algorithm,dynamic integrity measurement for VMM was imple-mented.Experimental data shows it could detect the integrity broken accurately,only causing a moderate performance loss for computing intensive tasks.…”
    Get full text
    Article
  10. 13730

    A novel frequency-domain IQ imbalance estimation and compensation algorithm by Wenjie NI, Wei CAO, Kai KANG

    Published 2016-08-01
    “…To solve the problem of deterioration of system performance for the RF front-end distortion and IQ imbalance in orthogonal frequency division multiplexing(OFDM)system,a novel IQ imbalance frequency domain estimation and compensation algorithm was proposed.The effect of channel could be offset,the complexity of algorithm could be reduced and the implemention conld be achieved easily using two different pilot signals on one sub-carrier.The simulation results show that the algorithm not only greatly reduces the computational complexity,but also gets a better estimation and compensation performance,and the performance is better than traditional algorithms.…”
    Get full text
    Article
  11. 13731

    The effect of porosity on fragmentation statistics of dynamically loaded ZrO2 ceramics by Marina Davydova, Sergei Uvarov, Oleg Naimark

    Published 2018-01-01
    “…Experimental data processing showed that the shape of stress-strain curves, the fragment size distribution and distribution of time intervals between the fractoluminiscense impulses depend on the sample porosity and load intensity. The X-ray Computed Tomography (CT) study of porous material structures allowed us to link the fragmentation statistics with pronounced porosity clustering (about 97% of the total pore volume) formed due to sintering…”
    Get full text
    Article
  12. 13732

    Minimum-cost network hardening algorithm based on stochastic loose optimize strategy by Guang-sheng ZHAO, Qing-feng CHENG, Yong-lin SUN

    Published 2015-01-01
    “…To construst a minimum-cost network hardening (MCNH) scheme in large-scale network,a stochastic loose optimize strategy based algorithm (MCNHA-SLOS) was proposed,and its effectiveness was analyzed.MCNHA-SLOS was a near-optimal approximation algorithm,which could achieve iterative computations in the array of sparse spaces of the whole plan space,so that the near-optimal scheme must exist in the low cost plan space.Instantiation analysis and experimental results show that the MCNHA-SLOS algorithm to be efficient,precision controllable and asymptotically optimal,and thus very applicable for large-scale network.…”
    Get full text
    Article
  13. 13733

    Solitary Neurofibroma of the Frontal Sinus by Sudhir B. Sharma, Paul Hong

    Published 2012-01-01
    “…A 28-year-old male presented with forehead swelling and computed tomography images revealed a tumor involving the left frontal sinus. …”
    Get full text
    Article
  14. 13734

    Review of Neurobiologically Based Mobile Robot Navigation System Research Performed Since 2000 by Peter J. Zeno, Sarosh Patel, Tarek M. Sobh

    Published 2016-01-01
    “…The main focus is to explore the functionality of the cognitive maps developed in these mobile robot systems with respect to route planning, as well as a discussion/analysis of the computational complexity required to scale these systems.…”
    Get full text
    Article
  15. 13735

    A High-Performance Parallel FDTD Method Enhanced by Using SSE Instruction Set by Dau-Chyrh Chang, Lihong Zhang, Xiaoling Yang, Shao-Hsiang Yen, Wenhua Yu

    Published 2012-01-01
    “…The benchmarks of the SSE acceleration on both the multi-CPU workstation and computer cluster have demonstrated the advantages of (vector arithmetic logic unit) VALU acceleration over GPU acceleration. …”
    Get full text
    Article
  16. 13736

    Research on formal security policy model specification and its formal analysis by LI Li-ping1, QING Si-han1, ZHOU Zhou-yi1, HE Jian-bo1, WEN Hong-zi3

    Published 2006-01-01
    “…Formal method is one of the kernel technologies of developing high security level computer system.But by current formal development method,assurance of security policy model correctness cannot be provided directly using machine proof which is stricter than manual proof,correspondence between security policy model and security functional specification is also hard to achieve.To solve these problems,a new and effective method was proposed for specification constructing and proving by extending the specification technique of security functional specification into the specifica-tion of security policy model.Also,BLP model was specified and analyzed as an example.…”
    Get full text
    Article
  17. 13737

    An Unusual Presentation of Congenital Lobar Emphysema by Daniel Arnaud, Joseph Varon, Salim Surani

    Published 2017-01-01
    “…Chest radiograph findings lead to the suspicion of congenital lobar emphysema, which was then confirmed by a computed tomography (CT) scan. This condition is most commonly identified in newborns, with very few cases being reported in adults. …”
    Get full text
    Article
  18. 13738

    Caseous Necrosis of Mitral Annulus by Sinan Balci, Selcuk Akkaya, Selin Ardali, Tuncay Hazirolan

    Published 2015-01-01
    “…Echocardiography is the first choice of imaging in evaluation. Cardiac computed tomography (CT) is helpful in establishing diagnosis by showing dense calcifications while cardiac magnetic resonance imaging (MRI) is used primarily as a problem solving tool. …”
    Get full text
    Article
  19. 13739

    Explaining IT programming concepts using NSM explications: The case of ‘variable’ and ‘constant’ by Bartłomiej Biegajło

    Published 2019-12-01
    “… The paper seeks to explore a practical application of Natural Semantic Metalanguage in defining two core concepts in computer programming, i.e. the concept of a variable and the concept of a constant. …”
    Get full text
    Article
  20. 13740

    Electromagnetic Gyroscopic Motion by A. I. Ismail, T. S. Amer, S. A. El Banna, M. A. El-Ameen

    Published 2012-01-01
    “…A geometric interpretation of motion will be given in terms of Euler’s angles (θ,ψ,ϕ). Computer programs are carried out to integrate the attained quasilinear autonomous system using a fourth-order Runge-Kutta method. …”
    Get full text
    Article