Showing 221 - 240 results of 550 for search '"computational modeling"', query time: 0.07s Refine Results
  1. 221

    Modelling of evolutions of potentials and deformations for aluminium alloy, chilling in three-dimensional space pattern by A. N. Chichko, E. A. Drozdov, O. I. Chichko

    Published 2002-02-01
    “…The method of computer modeling, synthesizing cell- automatic approach and equations of termoelasticity for the processes, proceeding at crystallization of metal invironment, is offered. …”
    Get full text
    Article
  2. 222

    INVESTIGATION OF DYNAMICS OF THE TEMPERATURES GRADIENTS CHANGING IN CASTING AND CHILL MOLD AT ITS FILLING WITH THE HELP OF THE COMPUTER SYSTEM “PROLIT-2” by A. N. Chichko, L. V. Markov, V. F. Sobolev, S. G. Lihouzov, O. I. Chichko

    Published 2006-05-01
    “…The calculations on computer modeling of the process of chill mold filling with different number of castings in mold are presented. …”
    Get full text
    Article
  3. 223

    IMPLEMENTATION OF THE PARALLEL ALGORITHM OF NONISOTHERMAL HEAT AND MOISTURE MIGRATION TASK SIMULATION IN NATURAL DISPERSE ENVIRONMENTS by P. K. Shalkevich, S. P. Kundas, I. A. Gishkeluk

    Published 2016-10-01
    “…Comparative studies of the computing model performance of contaminants transport by the proposed algorithm and use of Matlab at the standard instruction level showed a significant reduction in compu-tation time.…”
    Get full text
    Article
  4. 224

    NUMERICAL MODELING OF DYNAMICS OF THE CROSS STRESSES CHANGE ALONG THE LENGTH OF ROUND INGOT IN MNLZ-3 by A. N. Chichko, V. A. Matochkin, D. V. Kukuj, A. V. Demin, G. I. Chichko

    Published 2006-08-01
    “…The dynamics of the thermal stresses along the length of ingot of circular section with diameter 160 mm and 240 mm of low-carbon steel St20 is established by means of computer modeling.…”
    Get full text
    Article
  5. 225

    Research on Extreme Signed Graphs with Minimal Energy in Tricyclic Signed Graphs S(n, n + 2) by Yajing Wang, Yubin Gao

    Published 2020-01-01
    “…A signed graph is acquired by attaching a sign to each edge of a simple graph, and the signed graphs have been widely used as significant computer models in the study of complex systems. The energy of a signed graph S can be described as the sum of the absolute values of its eigenvalues. …”
    Get full text
    Article
  6. 226

    Computational Fluid Dynamics Study of the Effects of Drill Cuttings on the Open Channel Flow by Prasanna Welahettige, Christian Berg, Joachim Lundberg, Bernt Lie, Knut Vaagsaether

    Published 2019-01-01
    “…The flow is similar to the return flow when drilling, stream containing drilling fluid, and drill cuttings. The computational model is under the framework of the Eulerian multifluid volume of the fluid model. …”
    Get full text
    Article
  7. 227

    Calculation Model for Multi-Roller Load Distribution of Planetary Threaded Roller Bearings Considering Machining Errors by Zhijie Xie, Mingyang Li, Yicheng Hou, Zhiwei Wang, Kailiang Zhang

    Published 2025-01-01
    “…The limited literature explores the influence of machining errors on PTRB’s load-bearing performance. A computational model that considers multiple machining errors when determining the load distribution among the rollers and the threaded teeth is proposed in this paper. …”
    Get full text
    Article
  8. 228

    Effect of Receiver Holes on Flow and Heat Transfer Characteristics in A Radial Pre-swirl System: A LES Study by D. Wang, C. Song, C. Qiu, W. Wang, Y. Xu, P. I. Mihailovich

    Published 2025-01-01
    “…It is observed that the relative total pressure of computational model with receiver hole tangential angle equals to 15° is 21.88% and 18.54% larger than that of the computational model with receiver hole tangential angles equals to 0° and 7.5°as a result of the increase in swirl ratio. …”
    Get full text
    Article
  9. 229

    Choice of Measurement Locations of Nonlinear Structures Using Proper Orthogonal Modes and Effective Independence Distribution Vector by T. G. Ritto

    Published 2014-01-01
    “…The response of the computational model (or experimental data) is used to construct the proper orthogonal modes applying the proper orthogonal decomposition (POD), and the effective independence distribution vector (EIDV) procedure is employed to eliminate, iteratively, locations that contribute less for the independence of the target proper orthogonal modes.…”
    Get full text
    Article
  10. 230

    THE PERSPECTIVE DIRECTIONS OF USE OF THE METHOD OF THE MELT INTRA MOULD MODIFYING FOR PRODUCTION OF CASTINGS WITH THE SPECIFIED OPERATIONAL PROPERTIES by M. A. Fesenko, A. N. Fesenko

    Published 2013-11-01
    “…On the basis of numerous studies using the methods of physical and simulation (computer) modeling, and also on the basis of the field experiments in the production of advanced and industrial castings prospective resource-saving technological areas of the method of in-mold inoculation of molten iron for castings with a given structure and propertiesis investigated in the work. …”
    Get full text
    Article
  11. 231

    How cells align to structured collagen fibrils: a hybrid cellular Potts and molecular dynamics model with dynamic mechanosensitive focal adhesions by Koen A. E. Keijzer, Erika Tsingos, Erika Tsingos, Roeland M. H. Merks, Roeland M. H. Merks

    Published 2025-01-01
    “…The resulting computational model shows that mechanical reciprocity suffices for stiffness-dependent cell spreading, local ECM remodeling, and ECM-alignment-dependent cell elongation. …”
    Get full text
    Article
  12. 232

    Age-Dependent Small-Animal Internal Radiation Dosimetry by Tianwu Xie, Habib Zaidi

    Published 2013-09-01
    “…A series of rat models at different age periods were constructed based on the realistic four-dimensional digital rat whole-body (ROBY) computational model. Particle transport was simulated using the MCNPX Monte Carlo code. …”
    Get full text
    Article
  13. 233

    Loading monocytes with magnetic nanoparticles enables their magnetic control without toxicity by Laura Mödl, Laura Mödl, Lucas R. Carnell, Rene Stein, Andrea Kerpes, Felix Pfister, Barbara Wirthl, Wolfgang A. Wall, Christoph Alexiou, Christina Janko

    Published 2025-01-01
    “…The computational model predicted the actual magnetic accumulation of the SPION-loaded cells, enabling a more systematic and faster exploration of the design space in the future.…”
    Get full text
    Article
  14. 234

    Experimental research of technological elastic deformations of the central holes of gears by A. S. Serkov, V. V. Derkach, S. V. Mikhailenko, L. B. Serkova

    Published 2024-12-01
    “…The authors compare the results obtained by the experiment with the obtained earlier using computer modeling, the adequacy of computer models and the reliability of the experimental results. …”
    Get full text
    Article
  15. 235

    Privacy computing:concept, connotation and its research trend by Feng-hua LI, Hui LI, Yan JIA, Neng-hai YU, Jian WENG

    Published 2016-04-01
    “…Furthermore, there is no systematic computing model describing the relationship between the pro-tection level, profit and loss of privacy leaks and the complexity of integrated privacy protection methods. …”
    Get full text
    Article
  16. 236

    Summary of Large-Scale Grapb Partitioning Algoritbms by Jinfeng Xu, Yihong Dong, Shiyi Wang, Xianmang He, Huahui Chen

    Published 2014-07-01
    “…The large-scale graph partitioning algorithms were summarized and graph computing models in the distributed environment were introduced. …”
    Get full text
    Article
  17. 237
  18. 238

    Numerical Solution of Problem for Non-Stationary Heat Conduction in Multi-Layer Bodies by R. I. Esman, V. A. Ustimovich

    Published 2007-12-01
    “…Solution of the problem is realized with the help of methods of a numerical experiment and computer modeling.…”
    Get full text
    Article
  19. 239

    EFFECTIVE MECHANISMS AND A MODEL OF SEARCH, DEVELOPMENT AND SUPPORT OF TALENTED STUDENTS IN PEDAGOGICAL HIGHER EDUCATION INSTITUTION by Vladimir S. Glukhov, Robert A. Galustov

    Published 2016-12-01
    “…Robotechnics and multimedia computer modeling allow to reveal talents andendowments of future teachers.…”
    Get full text
    Article
  20. 240

    HyperSpector:VMM dynamic trusted monitor based on UEFI by Kai WANG, Zhi-hua LI, Fan, HUANG, Fei1 YAN

    Published 2016-12-01
    “…With the rapid innovation of computer technology,cloud computing model expands.VMM was intro-duced to enhance the cloud safety and enhance the cloud safety.The safety of VMM itself,however,is the prerequi-site of the safety of the cloud service.A method of VMM dynamic trusted monitor based on UEFI was proposed on the purpose of enhancing the safety of VMM.The monitor of VMM was realized by adding a monitor layer beneath it,which needed no more newly hardware cost.Experiment results show that the solution is efficient.…”
    Get full text
    Article