Showing 801 - 820 results of 28,739 for search '"computer"', query time: 0.09s Refine Results
  1. 801
  2. 802

    Computation of traveling wave fronts for a nonlinear diffusion-advection model by M. B. A. Mansour

    Published 2008-11-01
    “…One of the methods involves thetraveling wave equations and solving an initial-value problem, whichleads to accurate computations of the wave profiles and speeds. Thesecond method is to construct time-dependent solutions bysolving an initial-moving boundary-value problem for the PDE system,showing another approximation for such wave solutions.…”
    Get full text
    Article
  3. 803
  4. 804
  5. 805

    Numerical High-Order Model for the Nonlinear Elastic Computation of Helical Structures by Fatima Boussaoui, Hassane Lahmam, Bouazza Braikat

    Published 2021-01-01
    “…In this work, we propose a high-order algorithm based on the asymptotic numerical method (ANM) for the nonlinear elastic computation of helical structures without neglecting any nonlinear term. …”
    Get full text
    Article
  6. 806
  7. 807

    Interface-engineered non-volatile visible-blind photodetector for in-sensor computing by Ge Li, Donggang Xie, Qinghua Zhang, Mingzhen Zhang, Zhuohui Liu, Zheng Wang, Jiahui Xie, Erjia Guo, Meng He, Can Wang, Lin Gu, Guozhen Yang, Kuijuan Jin, Chen Ge

    Published 2025-01-01
    “…In this paper, a reconfigurable UV photodetector based on CeO2/SrTiO3 heterostructures is demonstrated with in-sensor computing capabilities achieved through interface engineering. …”
    Get full text
    Article
  8. 808

    Application and Legal Governance of Computational Technologies in Credit Investigation: An Interdisciplinary Perspective by Ying Zhang, Zhen Xie, Xiuwei Qu

    Published 2022-01-01
    “…The purpose of this interdisciplinary study is to investigate the applications of modern computational technologies in the field of credit investigation and discuss the related legal governance measurements in order to unblock the bottlenecks in the future development of credit investigation market. …”
    Get full text
    Article
  9. 809
  10. 810
  11. 811

    On the Computation of Degenerate Hopf Bifurcations for n-Dimensional Multiparameter Vector Fields by Michail P. Markakis, Panagiotis S. Douris

    Published 2016-01-01
    “…The restriction of an n-dimensional nonlinear parametric system on the center manifold is treated via a new proper symbolic form and analytical expressions of the involved quantities are obtained as functions of the parameters by lengthy algebraic manipulations combined with computer assisted calculations. Normal forms regarding degenerate Hopf bifurcations up to codimension 3, as well as the corresponding Lyapunov coefficients and bifurcation portraits, can be easily computed for any system under consideration.…”
    Get full text
    Article
  12. 812

    Computational numerical analysis of the support structure for a rainwater storage tank by Isaac Simbaña, Xavier Vaca, Christian Andrade, Wendy Sevillano

    Published 2025-01-01
    “…This study has examined the design proposal for a support structure for a rainwater storage tank, utilizing CAD/CAE software with computational numerical analysis. These tools predict how elements will behave under specific conditions without physical construction. …”
    Get full text
    Article
  13. 813
  14. 814
  15. 815
  16. 816
  17. 817
  18. 818

    Heterogeneous resource cooperative game in space-ground computing power network by Yutong ZHANG, Yuming PENG, Boya DI, Lingyang SONG

    Published 2023-12-01
    Subjects: “…space-ground computing power network…”
    Get full text
    Article
  19. 819

    Data comparable encryption scheme based on cloud computing in Internet of things by Qian MENG, Jianfeng MA, Kefei CHEN, Yinbin MIAO, Tengfei YANG

    Published 2018-04-01
    “…The previously proposed short comparable encryption (SCE) scheme can infer the plaintext relationship by comparing the ciphertexts relationship as well as ensuring data security in Internet of things.Unfortunately,it will incur high storage and computational burden during the process of comparing ciphertexts and generating tokens.To this end,an efficient short comparable encryption scheme called SCESW was proposed,which was utilizing the sliding window method with the same size window.Formal security analysis shows that the scheme can guarantee weak indistinguishability in standard model as well as data security and integrity.The experimental results demonstrate that the storage of the SCESW scheme is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mi>t</mi> </mfrac> <mo stretchy="false">(</mo><mi>t</mi><mi>></mi><mn>1</mn><mo stretchy="false">)</mo></math></inline-formula> times shorter than that of the SCE scheme and the efficiency of the SCESW scheme is superior to that of the SCE scheme.…”
    Get full text
    Article
  20. 820

    Cosmic Reionization on Computers: The Evolution of the Ionizing Background and Mean Free Path by Jiawen Fan, Huanqing Chen, Camille Avestruz, Affan Khadir

    Published 2025-01-01
    “…In this study, we utilize the Cosmic Reionization on Computers (CROC) simulations, which have both sufficient spatial resolution to resolve galaxy formation and LLSs alongside a fully coupled radiative transfer, to simulate the reionization processes. …”
    Get full text
    Article