Showing 7,561 - 7,580 results of 21,428 for search '"computing"', query time: 0.10s Refine Results
  1. 7561

    New Stability Analysis Results for Linear System with Two Additive Time-Varying Delay Components by Haitao Liu, Fang Liu

    Published 2020-01-01
    “…Lastly, a numerical example is presented to illustrate the less conservatism and lower computational complexity of the derived results.…”
    Get full text
    Article
  2. 7562

    Topological Indices of Derived Networks of Benzene Ring Embedded in P-Type Surface on 2 D by Feng Yin, Muhammad Numan, Saad Ihsan Butt, Adnan Aslam, Andleeb Kausar

    Published 2021-01-01
    “…Also, the exact expressions of ABC4 and GA5 indices of these structures are computed.…”
    Get full text
    Article
  3. 7563

    Guest Editorial Introduction to the Special Section on Image-Guided Therapies by Dieter Haemmerich, Punit Prakash

    Published 2024-01-01
    “…Imaging data are also increasingly being used for constructing patient-specific computational models to inform design and evaluation of devices, and for personalized planning of interventions. …”
    Get full text
    Article
  4. 7564

    Design of therapeutic siRNAs for potential application to infection with chikungunya virus by Ahmed Ahsan Adib, Muhammad Manjurul Karim

    Published 2025-01-01
    “…The development of a siRNA-based drug using multiple computational tools could be a way out as one of its therapeutics. …”
    Get full text
    Article
  5. 7565

    Research on the Simulation Method for Equivalent Stiffness of Bolted Connection Thin Plate Structures by Zhe Chen, Qi-jun Zhao, Guo-chen Zhou

    Published 2024-01-01
    “…In order to solve the problems of low computational efficiency of fine modeling and large computational error of linearized equivalent modeling of bolted structures, this paper proposes a dynamic characteristic parameter identification method for bolted structures based on the multiscale method and considering the influence of nonlinear factors. …”
    Get full text
    Article
  6. 7566

    Implementation Aspects in Simulation Extrapolation-Based Stocking–Lord Linking by Alexander Robitzsch

    Published 2025-01-01
    “…However, the original SIMEX approach can be computationally complex. This article evaluates two computational shortcuts to SIMEX-based SL linking through a simulation study: a quasi-Monte Carlo method that replicates items and a proposal using an approximate noniterative estimation instead of the iterative one in the SIMEX application of SL linking. …”
    Get full text
    Article
  7. 7567

    An Efficient Deterministic-Stochastic Model of the Human Body Exposed to ELF Electric Field by Anna Šušnjara, Dragan Poljak

    Published 2016-01-01
    “…The stochastic approach is based on the stochastic collocation (SC) method. Computational examples show the mean trend of both analytically and numerically computed axial current with the confidence margins for different set of input random variables. …”
    Get full text
    Article
  8. 7568

    Secure contact tracing platform from simplest private set intersection cardinality by Jiahui Gao, Chetan Surana, Ni Trieu

    Published 2022-09-01
    “…SecureCT prevents linkage attacks, eliminates replay and relay attacks, and allows the phone's holder to delegate their contact tracing computation to untrusted servers while maintaining the user's privacy. …”
    Get full text
    Article
  9. 7569

    The Influence of User Protection Behaviors on the Control of Internet Worm Propagation by Yihong Li, Jinxiao Pan, Lipeng Song, Zhen Jin

    Published 2013-01-01
    “…Computer users’ reactions to the outbreak of Internet worm directly determine the defense capability of the computer and play an important role in the spread of worm. …”
    Get full text
    Article
  10. 7570

    On the sensitivity of feature ranked lists for large-scale biological data by Danuta Gaweł, Krzysztof Fujarewicz

    Published 2013-03-01
    “…The problem of feature selection for large-scale genomic data, for example from DNA microarray experiments, is one of the fundamental and well-investigated problems in modern computational biology.From the computational point of view, a selected gene list should be characterized by good predictive power and should be understood and well explained from the biological point of view.Recently, another feature of selected gene lists is increasingly investigated, namely their stability which measures how the content and/or the gene order change when the data are perturbed.In this paper we propose a new approach to analysis of gene list stability, termed the sensitivity index, that does not require any data perturbationand allows the gene list that is most reliable in a biological sense to be chosen.…”
    Get full text
    Article
  11. 7571

    A Novel Adaptive Probabilistic Nonlinear Denoising Approach for Enhancing PET Data Sinogram by Musa Alrefaya, Hichem Sahli

    Published 2013-01-01
    “…The edge-stopping function is computed in terms of edge probability under the assumption of contamination by Poisson noise. …”
    Get full text
    Article
  12. 7572

    Resonance Spectra of Caged Stringy Black Hole and Its Spectroscopy by I. Sakalli, G. Tokgoz

    Published 2015-01-01
    “…Instead of the ordinary QNMs, we compute the boxed QNMs (BQNMs) that are the characteristic resonance spectra of the confined scalar fields in the GHSBH geometry. …”
    Get full text
    Article
  13. 7573

    Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks by Jun-Sub Kim, Jin Kwak

    Published 2013-01-01
    “…Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'…”
    Get full text
    Article
  14. 7574

    Impact of Thin-Walled Projectiles with Concrete Targets by Rayment E. Moxley, Mark D. Adley, Bob Rohani

    Published 1995-01-01
    “…A computational simulation of a test was conducted with an impact/penetration model created by linking a rigid-body penetration trajectory code with a general-purpose finite element code. …”
    Get full text
    Article
  15. 7575

    Phase retrieval for block sparsity based on adaptive coupled variational Bayesian learning by Di Zhang, Yimao Sun, Siqi Bai, Qun Wan

    Published 2022-12-01
    “…Simulations indicate that the proposed algorithm outperforms the existing methods in success rate, noise‐robustness, and signal detection rate in large‐scale cases with acceptable computation complexity.…”
    Get full text
    Article
  16. 7576

    Lorentzian CFT 3-point functions in momentum space by Teresa Bautista, Hadi Godazgar

    Published 2020-01-01
    “…We explain how tensorial three-point correlators can be obtained and, in particular, compute the correlator with two identical scalars and one energy-momentum tensor. …”
    Get full text
    Article
  17. 7577

    On Ruijsenaars-Schneider spectrum from superconformal indices and ramified instantons by Hee-Cheol Kim, Anton Nedelin, Shlomo S. Razamat

    Published 2025-02-01
    “…Second approach uses computations of Nekrasov-Shatashvili limit of 5d N $$ \mathcal{N} $$ = 1* instanton partition functions in the presence of co-dimension two defect. …”
    Get full text
    Article
  18. 7578

    RETRACTED: Bone Age Assessment Based on Deep Convolutional Features and Fast Extreme Learning Machine Algorithm by Longjun Guo, Juan Wang, Jiaqi Teng, Yukun Chen

    Published 2022-02-01
    “…However, it also faces the issue of huge computation overhead in deep features learning. Aiming at this problem, this paper proposes a new DL-based bone age assessment method based on the Tanner-Whitehouse method. …”
    Get full text
    Article
  19. 7579

    An Unusual Cause of Spontaneous Pneumomediastinum: The Mounier-Kuhn Syndrome by Salim Naciri, Rachida Zahraoui, Mouna Soualhi, Jamal-Eddine Bourkadi

    Published 2019-01-01
    “…Diagnosis is made by computed tomography and bronchoscopy. An 81-year-old man presenting with an acute chest pain was referred to the pulmonology department. …”
    Get full text
    Article
  20. 7580

    The Application of the Homotopy Perturbation Method and the Homotopy Analysis Method to the Generalized Zakharov Equations by Hassan A. Zedan, Eman El Adrous

    Published 2012-01-01
    “…HAM is a strong and easy-to-use analytic tool for nonlinear problems. Computation of the absolute errors between the exact solutions of the GZE equations and the approximate solutions, comparison of the HPM results with those of Adomian’s decomposition method and the HAM results, and computation the absolute errors between the exact solutions of the GZE equations with the HPM solutions and HAM solutions are presented.…”
    Get full text
    Article