Showing 1,461 - 1,480 results of 21,428 for search '"computer"', query time: 0.08s Refine Results
  1. 1461

    Application of the Time Step Optimization Method in Seismic Liquefaction Analysis and Its Evaluation Method for Computational Efficiency Improvement by Qi Li, Bin Li, Shaorui Sun, Nan Yang

    Published 2020-01-01
    “…The results show that the computing efficiency is greatly improved after the seismic liquefaction numerical analysis program is optimized by the time step optimization method.…”
    Get full text
    Article
  2. 1462

    Visualization of Small Vessels by Micro–Computed Tomography Using Titanium Dioxide Nanoparticles as a Novel Contrast Agent by Taku Goto, Ruriko Tanabe, Hirotoshi Shibuya, Masaru Tamura, Shintaro Nomura

    Published 2025-01-01
    “…Angiography by means of micro–computed tomography (m-CT) is extensively used for the diagnosis of vasculature disorders. …”
    Get full text
    Article
  3. 1463

    A Method of Extracting Ontology Module Using Concept Relations for Sharing Knowledge in Mobile Cloud Computing Environment by Keonsoo Lee, Seungmin Rho, Seok-Won Lee

    Published 2014-01-01
    “…In mobile cloud computing environment, the cooperation of distributed computing objects is one of the most important requirements for providing successful cloud services. …”
    Get full text
    Article
  4. 1464

    Computation of the scintillation index and BER of super Lorentz Gaussian laser beam in a slant propagation at atmospheric turbulence by Hussein Thary Khamees, Sameer Algburi, Hussein E. Kotb

    Published 2025-03-01
    “…The Huygens-Fresnel Method is employed to compute the received field due to its effectiveness in accurately modeling atmospheric turbulence. …”
    Get full text
    Article
  5. 1465
  6. 1466

    Optimal dispatch of distributed renewable energy and energy storage systems via optimal configuration of mobile edge computing by He Jiang, Yan Zhao, Hang Zhou

    Published 2024-12-01
    “…An operating framework of distributed power system is presented based on offload strategy of mobile edge computing (MEC) and optimal allocation of computational quantity. …”
    Get full text
    Article
  7. 1467
  8. 1468
  9. 1469
  10. 1470

    A Soft Computing Approach to Crack Detection and Impact Source Identification with Field-Programmable Gate Array Implementation by Arati M. Dixit, Harpreet Singh

    Published 2013-01-01
    “…In this paper we suggest an automation of CDISI for metal armor plates using a soft computing approach by developing a fuzzy inference system to effectively deal with this problem. …”
    Get full text
    Article
  11. 1471

    Cone-Beam Computed Tomographic Assessment of Mandibular Condylar Position in Patients with Temporomandibular Joint Dysfunction and in Healthy Subjects by Maryam Paknahad, Shoaleh Shahidi, Shiva Iranpour, Sabah Mirhadi, Majid Paknahad

    Published 2015-01-01
    “…The purpose of the present study was to investigate the condylar position according to gender in patients with temporomandibular disorder (TMD) and healthy controls using cone-beam computed tomography. Materials and Methods. CBCT of sixty temporomandibular joints in thirty patients with TMD and sixty joints of thirty subjects without TMJ disorder was evaluated in this study. …”
    Get full text
    Article
  12. 1472

    Efficient Continuation Methods for Computing Ground States of Quasi-2D Rotating Dipolar Bose-Einstein Condensates by B.-W. Jeng, P.-H. Su, M.-I. Char

    Published 2022-01-01
    “…We study efficient continuation methods for computing the ground state solution of quasi-2D rotating dipolar Bose-Einstein condensates (BECs). …”
    Get full text
    Article
  13. 1473

    Computational and in vitro evaluation of sumac-derived ©Rutan compounds towards Sars-CoV-2 Mpro inhibition by Muzaffar Kayumov, Parthiban Marimuthu, Parthiban Marimuthu, Jamoliddin Razzokov, Jamoliddin Razzokov, Jamoliddin Razzokov, Nurkhodja Mukhamedov, Nurkhodja Mukhamedov, Akmal Asrorov, Nodir S. Berdiev, Jamolitdin F. Ziyavitdinov, Ansor Yashinov, Ansor Yashinov, Yuliya Oshchepkova, Shavkat Salikhov, Sharafitdin Mirzaakhmedov

    Published 2025-02-01
    “…Natural substances started being screened for their antiviral activity by computational and in-vitro techniques. Here, we evaluated the anti-SARS-CoV-2 main protease (Mpro) efficacy of ©Rutan, which contains five polyphenols (R5, R6, R7, R7’, and R8) extracted from sumac Rhus coriaria L. …”
    Get full text
    Article
  14. 1474

    Experimental and computational approach on the corrosion inhibition properties of two newly pyrazole derivatives on carbon steel in acid medium by Nawal Setti, Asma Barrahi, Mohamed Maatallah, Yassine Kaddouri, Taibi Ben Hadda, Halima Outada, Abhinay Thakur, Rachid Touzani, Khalid Karrouchi, Hatem A. Abuelizz, Burak Dikici, Abdelkader Zarrouk, Ali Dafali

    Published 2025-01-01
    “…The DFT calculations and Monte Carlo/Molecular dynamic (MC/MD) simulations were treated and discussed for both compounds Tetra-Pz-Ortho and Tetra-Pz-Para in order to explain their interfacial approach and compared them to experimental results. The computational results of quantum chemistry were in agreement with those acquired by experimental methods.…”
    Get full text
    Article
  15. 1475
  16. 1476

    Beneficial Effects of Combining Computed Tomography Enteroclysis/Enterography with Capsule Endoscopy for Screening Tumor Lesions in the Small Intestine by Hiroaki Shibata, Shinichi Hashimoto, Kensaku Shimizu, Ryo Kawasato, Tomohiro Shirasawa, Takayuki Yokota, Hideko Onoda, Takeshi Okamoto, Jun Nishikawa, Naofumi Matsunaga, Isao Sakaida

    Published 2015-01-01
    “…To compare the efficacy of using computed tomography enteroclysis/enterography (CTE), capsule endoscopy (CE), and CTE with CE for diagnosing tumor lesions in the small intestine. …”
    Get full text
    Article
  17. 1477

    Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks by Sharaf Aldeen Abdulkadhum Abbas, Abdullahi Abdu Ibrahim

    Published 2024-06-01
    “…This research aims to compare the key machine learning approaches, Namely Support Vector Machines (SVM), Random Forest (RF) and Decision Trees (DT), in their ability to classify Intrusion Detection Systems (IDS) via routing networks over distributed computing systems. In addition, Algorithms perform quality control to determine the optimal hyperplane for the given data, Find neighboring data points and preserve the structure of the tree. …”
    Get full text
    Article
  18. 1478

    Genomic and Computational Analysis of Novel SNPs in TNP1 Gene Promoter Region of Bos indicus Breeding Bulls by Kashif Hameed Anjum, Asif Nadeem, Maryam Javed, Hafiz Ishfaq Ahmad, Amjad Riaz, Wasim Shehzad, Jahanzaib Azhar, Muhammad Fahad Bhutta

    Published 2022-01-01
    “…Genomic analysis, by sequencing and computational approach, was used to identify the novel polymorphisms and to evaluate the molecular regulation of TNP1 gene expression in Sahiwal cattle breeding bulls. …”
    Get full text
    Article
  19. 1479

    Localizing Energy Sources and Sinks in Plates Using Power Flow Maps Computed From Laser Vibrometer Measurements by J.R.F. Arruda, P. Mas

    Published 1998-01-01
    “…From the wavenumber-frequency domain data thus obtained, the spatial derivatives that are necessary to determine the structural power flow are easily computed. Divergence plots are then obtained from the computed intensity fields. …”
    Get full text
    Article
  20. 1480

    Integrating computational thinking, game design, and design thinking: a scoping review on trends, applications, and implications for education by Chih-Hung Wu, Yu-Cheng Chien, Mei-Tzu Chou, Yueh-Min Huang

    Published 2025-02-01
    “…Abstract This study integrated the fields of computational thinking (CT), game design, and design thinking through a scoping review, exploring their research development trends, as well as their applications and implications for education. …”
    Get full text
    Article