Showing 9,861 - 9,880 results of 28,739 for search '"computing"', query time: 0.12s Refine Results
  1. 9861

    Efficient Hamiltonian encoding algorithms for extracting quantum control mechanism as interfering pathway amplitudes in the Dyson series by Erez Abrams, Michael Kasprzak, Gaurav Bhole, Tak-San Ho, Herschel Rabitz

    Published 2025-02-01
    “…The amplitudes of pathway classes are computed by modulating the Hamiltonian matrix elements and decoding the subsequent evolution of the system rather than by direct computation of the individual terms in the Dyson series. …”
    Get full text
    Article
  2. 9862

    Chaos in Inverse Parallel Schemes for Solving Nonlinear Engineering Models by Mudassir Shams, Bruno Carpentieri

    Published 2024-12-01
    “…These findings indicate broad usage potential in engineering and scientific computation.…”
    Get full text
    Article
  3. 9863

    Superconformal anomalies for string defects in six-dimensional N $$ \mathcal{N} $$ = (1, 0) SCFTs by Fabio Apruzzi, Noppadol Mekareeya, Brandon Robinson, Alessandro Tomasiello

    Published 2024-12-01
    “…We also find agreement between the holographic computation of the expectation value of a surface operator wrapping a torus and the supersymmetric localization computation for a circular Wilson loop in N $$ \mathcal{N} $$ = 1 super Yang-Mills theory on . …”
    Get full text
    Article
  4. 9864

    A Low-Complexity GA-WSF Algorithm for Narrow-Band DOA Estimation by Haihua Chen, Jialiang Hu, Hui Tian, Shibao Li, Jianhang Liu, Masakiyo Suzuki

    Published 2018-01-01
    “…However, conventional GA usually needs a big population size to cover the whole searching space and a large number of generations for convergence, which means that the computational complexity is still high. To reduce the computational complexity of WSF, this paper proposes an improved Genetic algorithm. …”
    Get full text
    Article
  5. 9865

    Efektivitas Penggunaan Aplikasi Open Source dalam Pembelajaran Matematika Komputer by I Made Dedy setiawan

    Published 2024-11-01
    “…So far, computer mathematics learning in INSTIKI classes has not utilized open source-based applications. …”
    Get full text
    Article
  6. 9866

    CSN: The Conceptually Manageable Sensor Network by Woojin Joe, Jonghyun Lee, Karpjoo Jeong

    Published 2015-03-01
    “…For the last decade, computer science and information technology have been rapidly expanding their application areas from computation and data processing inside computers to the real time monitoring and management of the real world outside computers. …”
    Get full text
    Article
  7. 9867

    Research of Simulation in Character Animation Based on Physics Engine by Yang Yu, Jucheng Yang, Xiaofei Zan, Jiangang Huang, Xiangbo Zhang

    Published 2017-01-01
    “…Computer 3D character animation essentially is a product, which is combined with computer graphics and robotics, physics, mathematics, and the arts. …”
    Get full text
    Article
  8. 9868

    Model of 2D-imaging system using correlation-based reception for image synthesis of radio light sources by Petrosyan, Manvel Mher, Ryzhov, Anton Igorevich

    Published 2025-01-01
    “…To achieve this goal, a method for constructing an image is proposed and its implementation is tested using computer modeling of an imaging system. Results. It is shown how, using correlation signal processing methods, it is possible to construct 2D images of radio light sources using the example of computer modeling. …”
    Get full text
    Article
  9. 9869

    Pemanfaatan media pembelajaran berbasis augmented reality menggunakan aplikasi Ar_Jarkom pada mata kuliah instalasi jaringan komputer by Elfi Tasrif, Akrimullah Mubai, Asrul Huda, Kasman Rukun

    Published 2020-12-01
    “…This study aims to determine the level of practicality, effectiveness, and influence of the application of learning media based on Augmented Reality (AR) in the Computer Network Installation course using a mobile application called AR_JARKOM_INFORMATIKA_UNP. …”
    Get full text
    Article
  10. 9870
  11. 9871

    The phenomenon of laziness as a risk factor of high school students' fascination with gadgets by Ranno I. Sunnatova

    Published 2021-10-01
    “…In the study presented in the paper, the term passion for computer games and viewing social networks is used as a predictor of computer addiction and, which is not legally defined as addiction, but its blocking effect on the educational activity and productivity of schoolchildren can be stated. …”
    Get full text
    Article
  12. 9872

    PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES by Maxim DOBRINOIU

    Published 2024-05-01
    “…The adoption, in 2001, in Budapest, of the Council of Europe Convention on Cybercrime brought an important step forward in the prevention and combatting cyber-related crimes, through the creation of a special indictment (art. 6) against the production, sale, procurement for use, import, distribution, import or making available of devices, computer programs, passwords or any other such data with the scope to further illegal access to a computer system, interception without right of a computer data transmission, an illegal data interference or an illegal system interference, offences comprised in the art. 2 to 5 of the Convention. …”
    Get full text
    Article
  13. 9873

    NONLINEAR PROOF-OF-WORK: IMPROVING THE ENERGY EFFICIENCY OF BITCOIN MINING by Riaan Bezuidenhout, Wynand Nel, Andries Burger

    Published 2020-09-01
    “…PoW assigns the same cryptographic puzzle to all miners, creating a linear probability of success between the miner’s computational power as a proportion of the total computational power of the network. …”
    Get full text
    Article
  14. 9874

    Medical image segmentation based on frequency domain decomposition SVD linear attention by Liu Qiong, Li Chaofan, Teng Jinnan, Chen Liping, Song Jianxiang

    Published 2025-01-01
    “…This method reduces computational complexity while preserving essential features. …”
    Get full text
    Article
  15. 9875

    Distance Education: Imbalance between Possibilities and Threats by D. А. Endovitsky, I. E. Risin, Yu. I. Treshchevsky, E. A. Rudnev

    Published 2022-02-01
    “…The threats noted actualize the need to: strengthen the practical orientation of training in both distance and face-to-face format, expanding the competence of teaching staff in the field of computer technology, developing a system to counteract the negative impact of long-term use of computers on the health of students.…”
    Get full text
    Article
  16. 9876

    Prediction of miRNA-circRNA Associations Based on k-NN Multi-Label with Random Walk Restart on a Heterogeneous Network by Zengqiang Fang, Xiujuan Lei

    Published 2019-12-01
    “…Therefore efficient computation methods are needed to explore miRNA-circRNA interactions, but only very few computational methods for predicting the associations between miRNAs and circRNAs exist. …”
    Get full text
    Article
  17. 9877

    Utilization of ICT Skills on Library Information Resources By Students At Kabale Brainstorm High School. by Twongyeirwe, Esther

    Published 2023
    “…The study findings also indicated that slow internet speed and insufficient internet access points, short duration of book loans, power outages, lack of library orientation, poor computer skills, lack of enough time, lack of adequate numbers of personal computers, and paying online services were the challenges encountered by students in library information resources utilization at Kabale Brainstorm High School. …”
    Get full text
    Thesis
  18. 9878

    Utilization of ICT Skills on Library Information Resources by Students at Kabale Brainstorm High School. by Twongyeirwe, Esther

    Published 2023
    “…The study findings also indicated that slow internet speed and insufficient internet access points, short duration of book loans, power outages, lack of library orientation, poor computer skills, lack of enough time, lack of adequate numbers of personal computers, and paying online services were the challenges encountered by students in library information resources utilization at Kabale Brainstorm High School. …”
    Get full text
    Thesis
  19. 9879

    Comparing ways of calculation efficiency of regenerative heat exchanger by A. A. Serov, A. V. Tsygankov

    Published 2021-10-01
    “…The obtained results of the computational study can give an assessment of the accuracy of computational methods to obtain the value of the efficiency of regenerative heat exchangers.…”
    Get full text
    Article
  20. 9880

    Embodied neuromorphic synergy for lighting-robust machine vision to see in extreme bright by Shijie Lin, Guangze Zheng, Ziwei Wang, Ruihua Han, Wanli Xing, Zeqing Zhang, Yifan Peng, Jia Pan

    Published 2024-12-01
    “…This system effectively alleviates the longstanding saturation problem at its core by exploiting bio-principles found in peripheral vision to compute a trilinear event double integral (TEDI). …”
    Get full text
    Article