Showing 281 - 300 results of 550 for search '"computational modeling"', query time: 0.06s Refine Results
  1. 281

    Dynamics Study of a Triangular Connecting Rod Toggle Press Mechanism with Considering the Kinematic Pair Clearance by Zhongshuang Wang, Jiuzheng Yin

    Published 2021-03-01
    “…Based on these, the computer modeling and dynamics simulation of a triangular connecting rod toggle press mechanism with kinematic pair clearance is realized by Matlab, the influences of kinematic pair clearance on the press mechanism kinematics and dynamics performance are analyzed, and the reliability and validity of the procedure proposed are illustrated.…”
    Get full text
    Article
  2. 282

    Development and Validation of Dummies and Human Models Used in Crash Test by Tao Xu, Xiaoming Sheng, Tianyi Zhang, Huan Liu, Xiao Liang, Ao Ding

    Published 2018-01-01
    “…The article mainly consists of four parts: brief introduction of injury mechanism, early experiments for obtaining biomechanical response (animal tests, cadaver tests, and volunteer tests), and development and validation of mechanical dummies and computational models. This study finds that the current crash test dummies are generally designed based on European and American, so they have limitations on the damage prediction of other regions. …”
    Get full text
    Article
  3. 283

    Job Scheduling with Efficient Resource Monitoring in Cloud Datacenter by Shyamala Loganathan, Saswati Mukherjee

    Published 2015-01-01
    “…Cloud computing is an on-demand computing model, which uses virtualization technology to provide cloud resources to users in the form of virtual machines through internet. …”
    Get full text
    Article
  4. 284

    Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey by Pearl Antil, Amita Malik

    Published 2014-01-01
    “…Coverage hole detection schemes have been classified into three categories based on the type of information used by algorithms, computation model, and network dynamics for better understanding. …”
    Get full text
    Article
  5. 285

    Development of axisymmetric shell model for creep deformation analysis of reactor pressure vessel lower head by Jang Min Park, Kukhee Lim

    Published 2025-02-01
    “…This study presents a computational model that can represent the creep deformation of the lower head through the application of shell theory. …”
    Get full text
    Article
  6. 286

    3D Dynamic Modeling of the Head-Neck Complex for Fast Eye and Head Orientation Movements Research by Daniel A. Sierra, John D. Enderle

    Published 2011-01-01
    “…A 3D dynamic computer model for the movement of the head-neck complex is presented. …”
    Get full text
    Article
  7. 287

    Modeling for realistic prediction in photothermal therapy: Validation using data from real interstitial laser therapy for breast cancer by André Maurente, Ícaro K.A. Lucena, Gabriel A.D. Paiva

    Published 2025-03-01
    “…This work focuses on the validation of a computational model developed within the broader context of research aimed at creating a general framework for simulating photothermal therapy. …”
    Get full text
    Article
  8. 288

    Comparison of Mechanical Impedance Methods for Vibration Simulation by Jeffrey A. Gatscher, Grzegorz Kawiecki

    Published 1996-01-01
    “…The establishment of validated computer models, coupled with laboratory impedance measurements, can eliminate the overtesting problems inherent with constant motion, infinite impedance testing strategies.…”
    Get full text
    Article
  9. 289

    DNA algorithm of primeness test based on finite automaton by YANG Xue-qing, LIU Zhong-kan

    Published 2006-01-01
    “…Finite automaton,a computational model of extremely limited computing ability,was proved to have the capa-bility of solving primeness test by construction.Then,a DNA algorithm of the primeness test based on finite automaton was proposed.Furthermore,the method of constructing the finite automaton was presented in detail.The state of the fi-nite automaton was encoded by single-stranded DNA.The input was encoded by double-stranded DNA.The transition rule was represented by a double strand with a ring.The state of transition was realized by enzyme-mediated chemical reactions.The innovation of the algorithm is that it can be applied not only in primeness test but also in prime factoriza-tion and further in attack of RSA cipher.The advantage of this method is that it can be easily implemented.The time re-quired is polynomial in the size of the problem instead of exponential in the size of the problem.…”
    Get full text
    Article
  10. 290

    Estimating the Basal Heave Stability of Narrow Braced Excavations by Taoli Xiao, Yanlu Yang, Hua Cai, Shaoxin Yan, Fang Cao

    Published 2021-01-01
    “…Subsequently, the corresponding computation model was presented, and an improved SCM (slip circle method) was further developed. …”
    Get full text
    Article
  11. 291

    A Hazardous Chemical-Oriented Monitoring and Tracking System Based on Sensor Network by Qiulin Tan, Yang Zhang, Xiaofei Zhang, Xiangdong Pei, Jijun Xiong, Chenyang Xue, Jun Liu, Wendong Zhang

    Published 2014-05-01
    “…In accord with the standards and regulations of transport vehicles for hazardous chemicals, an overall structure-function diagram for vehicle monitoring and a pre-warning system were proposed by integrating various technologies such as computer modeling, control theory, multisensor data fusion, communication science, space positioning, and safety management science. …”
    Get full text
    Article
  12. 292

    Brokering responsible research and innovation in in silico medicine by Elisa Elhadj, Zita Van Horenbeeck, Elisa Lievevrouw, Ine Van Hoyweghen

    Published 2024-12-01
    “…This article presents our RRI approach within the Horizon 2020 ‘In Silico World' project, which aims to accelerate the adoption of in silico medicine through computer modeling and simulation tools in healthcare. To address the shortcomings of the ‘checklist approach' for integrating ethics and the risk of becoming checkboxes ourselves, we introduce the term ‘RRI brokers.’ …”
    Get full text
    Article
  13. 293

    Spiking Neural P Systems with Polarizations and Rules on Synapses by Suxia Jiang, Jihui Fan, Yijun Liu, Yanfeng Wang, Fei Xu

    Published 2020-01-01
    “…Spiking neural P systems are a class of computation models inspired by the biological neural systems, where spikes and spiking rules are in neurons. …”
    Get full text
    Article
  14. 294

    Steel Pipe Internal Corrosion Protection Using Magnesium Anode: Impact of Protective Potential and Phase Layer Formation on Corrosion Rate by Georgii Vasyliev, Yuriy Gerasymenko

    Published 2023-01-01
    “…The cathodic current distribution along steel pipe was measured using a microammeter and compared with the computer model. The results clearly demonstrate that the reduction of metal corrosion rate is at least 2.8 times in the region where cathodic protection distributes inside the pipe. …”
    Get full text
    Article
  15. 295

    Compound event barrier coverage in wireless sensor network by Yao-ming ZHUANG, Cheng-dong WU, Yun-zhou ZHANG, Shi-guang WEN

    Published 2017-06-01
    “…In wireless sensor networks (WSN),more and more people utilize barrier coverage to monitor compound events.The data of compound event barrier coverage (CEBC) comes from different types of sensors.It will be subject to multi-constraints under complex conditions in real-world application.Aiming at the merging problem of compound event confidence,a computational model based on joint probability density was proposed.In order to solve the optimization problem of compound event barrier coverage under multiple complex constraints,an active set multiplier policy (ASMP) was proposed.The algorithm can calculate the coverage ratio efficiently and allocate the sensor resources reasonably in compound event barrier coverage.The algorithm can simplify complex problems to reduce the computational load of the network and improve the efficiency of the network.The simulation results demonstrate that the ASMP algorithm is more efficient in the allocation of sensor resources and network optimization.…”
    Get full text
    Article
  16. 296

    Shared entanglement for three-party causal order guessing game by Ryszard Kukulski, Paulina Lewandowska, Karol Życzkowski

    Published 2025-01-01
    “…Our research provides a basis for examining computational model featuring a specific gate set while examining the diverse operations achievable through permutations of its elements.…”
    Get full text
    Article
  17. 297

    Implementation of Membrane Algorithms on GPU by Xingyi Zhang, Bangju Wang, Zhuanlian Ding, Jin Tang, Juanjuan He

    Published 2014-01-01
    “…Membrane algorithms are a new class of parallel algorithms, which attempt to incorporate some components of membrane computing models for designing efficient optimization algorithms, such as the structure of the models and the way of communication between cells. …”
    Get full text
    Article
  18. 298

    On a data-driven mathematical model for prostate cancer bone metastasis by Zholaman Bektemessov, Laurence Cherfils, Cyrille Allery, Julien Berger, Elisa Serafini, Eleonora Dondossola, Stefano Casarin

    Published 2024-12-01
    “…By integrating in vivo studies with in silico models, these obstacles can be potentially overcome. Existing computational models of tumor response to $ ^{223} $Ra are often computationally intensive. …”
    Get full text
    Article
  19. 299

    Large-Scale Construction Waste Mountain-Mounding Technology Based on the Project in Meibei Lake Scenic Area by Miao Kang, Xiongbin Guo, Shoufu Li, Jincheng Fan, Yufei Xu, Weiye Gu, Teng Wang

    Published 2023-01-01
    “…A three-dimensional computational model of the site was established, and typical cross-sections were selected for the slope stability calculations and analysis. …”
    Get full text
    Article
  20. 300

    Research progress of trusted sensor-cloud based on fog computing by Tian WANG, Xuewei SHEN, Hao LUO, Baisheng CHEN, Guojun WANG, Weijia JIA

    Published 2019-03-01
    “…The sensor-cloud is combined with cloud computing and wireless sensor networks,which extends the service ability of WSN by the support of cloud computing.It is one of the hot topics among the current researches.After comparing and surveying the mainstream system adequately,the characteristics and development of sensor-Cloud were summed up.Then,the direct influence of existing trust issues in the system for data protection and application on upper layer were found.The announced reasons explained that existing schemes were difficult to provide trusted sensor-cloud services.This was because that the capabilities of the underlying WSN nodes were too weak,and cloud computing model lacked the direct management of underlying nodes and data and so on.The trusted structures based on fog computing were given,and the key technologies of trusted evaluation,trusted data collection,and trusted storage were designed.Finally,the discussion pointed out new views for the researches in trusted sensor-cloud.…”
    Get full text
    Article