Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
27161
Numerical analysis of transonic flow over the FFA-W3-211 wind turbine tip airfoil
Published 2025-01-01“…The results are obtained by means of the application of numerical tools: (1) XFOIL with the Prandtl–Glauert compressible correction and (2) computational fluid dynamic (CFD) simulations, where an unsteady Reynolds-averaged Navier–Stokes (URANS) model is used. …”
Get full text
Article -
27162
Fitting and comparison of calcium-calmodulin kinetic schemes to a common data set using non-linear mixed effects modelling.
Published 2025-01-01“…Calmodulin is a calcium binding protein that is essential in calcium signalling in the brain. There are many computational models of calcium-calmodulin binding that capture various calmodulin features. …”
Get full text
Article -
27163
Cache of cryptographic key based on query popularity
Published 2023-02-01“…In the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key service.With the increase of the key resource, the occupied memory space also grows, bringing the bottleneck of memory space and key indexing.There are three challenges induced: how to organize cached data and efficiently handle queries with missed keys, how to adjust key resources in the cache, and how to accurately predict the use of keys.In order to achieve fine-grained and efficient caching and improve the efficiency of key use, key caching optimization was considered from three aspects: key index data structure, key replacement algorithm, and key prefetching strategy.An architecture of key cache replacement module was designed, and then a key replacement algorithm based on the query frequency was set.Specifically, from the perspective of heat computing and key replacement, the potential influencing factors affecting the popularity of key cache were analyzed which considered the file system and user of key management system.Besides, the basic model of key usage popularity was constructed.The hash table and minheap linked list was combined to maintain the heat of the key in use, and the elimination algorithm was set based on heat identification.The key in the cache was dynamically updated, and key usage was adjusted by the time controller, so as to realize key replacement according to the key heat.For key prefetching, key usage rules were obtained through log mining and periodical usage analyzing of key provisioning policies, which considered business processes and the time period dimension of user accessing.Experimental results show that the proposed key replacement algorithm can effectively improve the hit rate of cache queries, reduce memory usage, and ameliorate the impact of key file I/O interaction on query performance.…”
Get full text
Article -
27164
Isolated Superior Mesenteric Vein Tumor Thrombus in a Patient with Gastric Cancer
Published 2018-01-01“…A suspected tumor thrombus with contrast enhancement that completely obstructed the SMV was detected on triphasic abdominal computed tomography. Decision for surgery was made due to gastric tumor obstruction. …”
Get full text
Article -
27165
Selection of Sustainable Building Material Using Multicriteria Decision-Making Model: A Case of Masonry Work in Lideta Subcity, Addis Ababa
Published 2023-01-01“…In this method, pairwise comparisons were made among the criteria and subcriteria so that the weights of the criteria or subcriteria/or alternative on the bases of the indicated criteria were computed. Then, prioritization was made on the bases of the weight of the criteria. …”
Get full text
Article -
27166
Identification of Psychological Crisis Signals of College Students Based on the Dufferin Equation
Published 2021-01-01“…The geometric features of the phase trajectory are adopted as the basis for judging the system state, which greatly reduces the computational effort. Based on defining the conceptual connotation of college students’ psychological crisis behavior system, the vulnerability of college students’ psychological crisis behavior system is interpreted from the perspective of system self-organization theory, and the vulnerability of college students’ psychological crisis behavior is mainly expressed in latent and manifest states, and its vulnerability transformation is a self-organization process. …”
Get full text
Article -
27167
Signal Processing-Free Intelligent Model for Power Quality Disturbances Identification
Published 2025-01-01“…Traditional methods for PQD classification use complicated feature extraction techniques, which can be computationally expensive and lack scalability. This research proposes applying basic convolutional neural network (CNN) models for automated PQD detection and categorization as a prospective solution to these issues. …”
Get full text
Article -
27168
A Rare Case of Paediatric Traumatic Intraperitoneal Urinary Bladder Rupture
Published 2025-01-01“…Insertion of a Foley catheter revealed frank haematuria without urine output, and a Contrast-enhanced Computed Tomography (CECT) scan of the abdomen and pelvis showed gross haemoperitoneum. …”
Get full text
Article -
27169
THE USE OF ARTIFICIAL INTELLIGENCE IN THE THERAPEUTIC MANAGEMENT OF PAPILLARY THYROID MICROCARCINOMA: A RANDOMIZED CONTROLLED TRIAL PROTOCOL
Published 2024-12-01“…I aim to use AI models to obtain correct and favorable results for the diagnosis and prognosis of papillary thyroid cancer by conducting a clinical trial, in which we will use the diagnostic method optimized by artificial intelligence (AI) algorithms.The use of AI will avoid errors and increase performance in the interpretation of the doctor’s computed tomography (CT) scan and consequently, improve treatment planning. …”
Get full text
Article -
27170
Resistive switching mechanisms in BiFeO3 devices with YBCO and Ag as top electrodes
Published 2025-02-01“…The resistive switching (RS) effect in ferroelectric oxides continues to attract significant attention due to its potential applications in nonvolatile memory and neuromorphic computing devices. In this study, we investigate the RS properties of BiFeO3/YBa2Cu3O7−d (BFO/YBCO) bilayers grown on LSAT substrates, comparing two different top-electrode materials: YBCO and Ag. …”
Get full text
Article -
27171
Towards New Scaffolds for Antimicrobial Activity—In Silico/In Vitro Workflow Introducing New Lead Compounds
Published 2024-12-01“…<b>Background/Objectives</b>: The rapid evolution of bacterial resistance and the high cost of drug development have attributed greatly to the dearth in drug design. Computational approaches and natural product exploitation offer potential solutions to accelerate drug discovery. …”
Get full text
Article -
27172
Hybrid-Hierarchical Synchronization for Resilient Large-Scale SDN Architectures
Published 2025-01-01“…Parent controller computational resources can be dedicated to cross-domain decision making, exploiting network views provided by its children. …”
Get full text
Article -
27173
Numerical Study on Combustion Behavior of Tuyere and Raceway in Blast Furnace with Oxygen-Rich Blast and Hydrogen Injection
Published 2024-12-01“…A three-dimensional computational fluid dynamic (CFD) model is developed to investigate the effect of hydrogen injection rate and blast oxygen enrichment rate on the tuyere, raceway, and surrounding coke bed behaviors. …”
Get full text
Article -
27174
Neutrino-dominated Relativistic Viscous Accretion Flows around Rotating Black Holes with Shocks
Published 2025-01-01“…Utilizing these shock-induced NDAF solutions, we compute the neutrino luminosity ( L _ν ) and neutrino annihilation luminosity ( ${L}_{\nu \bar{\nu }}$ ) across a wide range of model parameters. …”
Get full text
Article -
27175
Oxygenation and function of endocrine bioartificial pancreatic tissue constructs under flow for preclinical optimization
Published 2025-01-01“…Oxygen concentration profiles modeled computationally were analogous to viability gradients observed experimentally through live/dead endpoint measurements and in case I, time-lapse fluorescence imaging was used to monitor the viability of GFP-expressing cells in real time. …”
Get full text
Article -
27176
Comparison of Low-Pass Filters for SPECT Imaging
Published 2020-01-01“…In single photon emission computed tomography (SPECT) imaging, the choice of a suitable filter and its parameters for noise reduction purposes is a big challenge. …”
Get full text
Article -
27177
Transcatheter mitral valve replacement to treat rheumatic mitral stenosis: a case series
Published 2024-12-01“…All patients underwent computed tomography and echocardiography before having the procedure. …”
Get full text
Article -
27178
Robust Control of Underwater Vehicle-Manipulator System Using Grey Wolf Optimizer-Based Nonlinear Disturbance Observer and H-Infinity Controller
Published 2020-01-01“…For overcoming the unmodeled uncertainties, external disturbances, and constraints of control inputs in the operation of UVMS, a modified constrained H∞ controller with a basic computed-torque controller (CTC) and a new designed nonlinear disturbance observer (NDO) are proposed. …”
Get full text
Article -
27179
Simulating record-shattering cold winters of the beginning of the 21st century in France
Published 2025-01-01“…Large ensembles of simulations allow us to better analyse the mechanisms and characteristics of such events but can require significant computational resources. Rather than simulating very large ensembles of normal climate trajectories, rare-event algorithms allow the sampling of the tail of distributions more efficiently. …”
Get full text
Article -
27180
Numerical measures of the degree of non-proportionality of multiaxial fatigue loadings
Published 2015-07-01“…Most stress-based hypotheses will compute a longer fatigue life under non-proportional loading conditions. …”
Get full text
Article