-
281
Dynamics Study of a Triangular Connecting Rod Toggle Press Mechanism with Considering the Kinematic Pair Clearance
Published 2021-03-01“…Based on these, the computer modeling and dynamics simulation of a triangular connecting rod toggle press mechanism with kinematic pair clearance is realized by Matlab, the influences of kinematic pair clearance on the press mechanism kinematics and dynamics performance are analyzed, and the reliability and validity of the procedure proposed are illustrated.…”
Get full text
Article -
282
Development and Validation of Dummies and Human Models Used in Crash Test
Published 2018-01-01“…The article mainly consists of four parts: brief introduction of injury mechanism, early experiments for obtaining biomechanical response (animal tests, cadaver tests, and volunteer tests), and development and validation of mechanical dummies and computational models. This study finds that the current crash test dummies are generally designed based on European and American, so they have limitations on the damage prediction of other regions. …”
Get full text
Article -
283
Job Scheduling with Efficient Resource Monitoring in Cloud Datacenter
Published 2015-01-01“…Cloud computing is an on-demand computing model, which uses virtualization technology to provide cloud resources to users in the form of virtual machines through internet. …”
Get full text
Article -
284
Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey
Published 2014-01-01“…Coverage hole detection schemes have been classified into three categories based on the type of information used by algorithms, computation model, and network dynamics for better understanding. …”
Get full text
Article -
285
Development of axisymmetric shell model for creep deformation analysis of reactor pressure vessel lower head
Published 2025-02-01“…This study presents a computational model that can represent the creep deformation of the lower head through the application of shell theory. …”
Get full text
Article -
286
3D Dynamic Modeling of the Head-Neck Complex for Fast Eye and Head Orientation Movements Research
Published 2011-01-01“…A 3D dynamic computer model for the movement of the head-neck complex is presented. …”
Get full text
Article -
287
Modeling for realistic prediction in photothermal therapy: Validation using data from real interstitial laser therapy for breast cancer
Published 2025-03-01“…This work focuses on the validation of a computational model developed within the broader context of research aimed at creating a general framework for simulating photothermal therapy. …”
Get full text
Article -
288
Comparison of Mechanical Impedance Methods for Vibration Simulation
Published 1996-01-01“…The establishment of validated computer models, coupled with laboratory impedance measurements, can eliminate the overtesting problems inherent with constant motion, infinite impedance testing strategies.…”
Get full text
Article -
289
DNA algorithm of primeness test based on finite automaton
Published 2006-01-01“…Finite automaton,a computational model of extremely limited computing ability,was proved to have the capa-bility of solving primeness test by construction.Then,a DNA algorithm of the primeness test based on finite automaton was proposed.Furthermore,the method of constructing the finite automaton was presented in detail.The state of the fi-nite automaton was encoded by single-stranded DNA.The input was encoded by double-stranded DNA.The transition rule was represented by a double strand with a ring.The state of transition was realized by enzyme-mediated chemical reactions.The innovation of the algorithm is that it can be applied not only in primeness test but also in prime factoriza-tion and further in attack of RSA cipher.The advantage of this method is that it can be easily implemented.The time re-quired is polynomial in the size of the problem instead of exponential in the size of the problem.…”
Get full text
Article -
290
Estimating the Basal Heave Stability of Narrow Braced Excavations
Published 2021-01-01“…Subsequently, the corresponding computation model was presented, and an improved SCM (slip circle method) was further developed. …”
Get full text
Article -
291
A Hazardous Chemical-Oriented Monitoring and Tracking System Based on Sensor Network
Published 2014-05-01“…In accord with the standards and regulations of transport vehicles for hazardous chemicals, an overall structure-function diagram for vehicle monitoring and a pre-warning system were proposed by integrating various technologies such as computer modeling, control theory, multisensor data fusion, communication science, space positioning, and safety management science. …”
Get full text
Article -
292
Brokering responsible research and innovation in in silico medicine
Published 2024-12-01“…This article presents our RRI approach within the Horizon 2020 ‘In Silico World' project, which aims to accelerate the adoption of in silico medicine through computer modeling and simulation tools in healthcare. To address the shortcomings of the ‘checklist approach' for integrating ethics and the risk of becoming checkboxes ourselves, we introduce the term ‘RRI brokers.’ …”
Get full text
Article -
293
Spiking Neural P Systems with Polarizations and Rules on Synapses
Published 2020-01-01“…Spiking neural P systems are a class of computation models inspired by the biological neural systems, where spikes and spiking rules are in neurons. …”
Get full text
Article -
294
Steel Pipe Internal Corrosion Protection Using Magnesium Anode: Impact of Protective Potential and Phase Layer Formation on Corrosion Rate
Published 2023-01-01“…The cathodic current distribution along steel pipe was measured using a microammeter and compared with the computer model. The results clearly demonstrate that the reduction of metal corrosion rate is at least 2.8 times in the region where cathodic protection distributes inside the pipe. …”
Get full text
Article -
295
Compound event barrier coverage in wireless sensor network
Published 2017-06-01“…In wireless sensor networks (WSN),more and more people utilize barrier coverage to monitor compound events.The data of compound event barrier coverage (CEBC) comes from different types of sensors.It will be subject to multi-constraints under complex conditions in real-world application.Aiming at the merging problem of compound event confidence,a computational model based on joint probability density was proposed.In order to solve the optimization problem of compound event barrier coverage under multiple complex constraints,an active set multiplier policy (ASMP) was proposed.The algorithm can calculate the coverage ratio efficiently and allocate the sensor resources reasonably in compound event barrier coverage.The algorithm can simplify complex problems to reduce the computational load of the network and improve the efficiency of the network.The simulation results demonstrate that the ASMP algorithm is more efficient in the allocation of sensor resources and network optimization.…”
Get full text
Article -
296
Shared entanglement for three-party causal order guessing game
Published 2025-01-01“…Our research provides a basis for examining computational model featuring a specific gate set while examining the diverse operations achievable through permutations of its elements.…”
Get full text
Article -
297
Implementation of Membrane Algorithms on GPU
Published 2014-01-01“…Membrane algorithms are a new class of parallel algorithms, which attempt to incorporate some components of membrane computing models for designing efficient optimization algorithms, such as the structure of the models and the way of communication between cells. …”
Get full text
Article -
298
On a data-driven mathematical model for prostate cancer bone metastasis
Published 2024-12-01“…By integrating in vivo studies with in silico models, these obstacles can be potentially overcome. Existing computational models of tumor response to $ ^{223} $Ra are often computationally intensive. …”
Get full text
Article -
299
Large-Scale Construction Waste Mountain-Mounding Technology Based on the Project in Meibei Lake Scenic Area
Published 2023-01-01“…A three-dimensional computational model of the site was established, and typical cross-sections were selected for the slope stability calculations and analysis. …”
Get full text
Article -
300
Research progress of trusted sensor-cloud based on fog computing
Published 2019-03-01“…The sensor-cloud is combined with cloud computing and wireless sensor networks,which extends the service ability of WSN by the support of cloud computing.It is one of the hot topics among the current researches.After comparing and surveying the mainstream system adequately,the characteristics and development of sensor-Cloud were summed up.Then,the direct influence of existing trust issues in the system for data protection and application on upper layer were found.The announced reasons explained that existing schemes were difficult to provide trusted sensor-cloud services.This was because that the capabilities of the underlying WSN nodes were too weak,and cloud computing model lacked the direct management of underlying nodes and data and so on.The trusted structures based on fog computing were given,and the key technologies of trusted evaluation,trusted data collection,and trusted storage were designed.Finally,the discussion pointed out new views for the researches in trusted sensor-cloud.…”
Get full text
Article