Showing 10,001 - 10,020 results of 28,739 for search '"computing"', query time: 0.13s Refine Results
  1. 10001

    Contrast Expansion Method for Elastic Incompressible Fibrous Composites by Piotr Drygaś, Vladimir Mityushev

    Published 2017-01-01
    “…Contrast parameter expansion of the elastic fields for 2D composites is developed by Schwarz’s method and by the method of functional equations for the case of circular inclusions. A computationally efficient algorithm is described and implemented in symbolic form to compute the local fields in 2D elastic composites and the effective shear modulus for macroscopically isotropic composites. …”
    Get full text
    Article
  2. 10002

    Numerical Solution of Fractional Order Anomalous Subdiffusion Problems Using Radial Kernels and Transform by Muhammad Taufiq, Marjan Uddin

    Published 2021-01-01
    “…The computation can be done in parallel and no time sensitivity is involved in approximating the time fractional operator as contrary to finite differences. …”
    Get full text
    Article
  3. 10003

    Efficient identification protocol provably secure in standard model by LI Yan-ping1, WANG Yu-min1

    Published 2009-01-01
    “…Due to its simplicity and naturalness, low-memory, low-computation costs, and better security, the proposed scheme is well suitable for using in computationally limited devices for identification such as smart cards.…”
    Get full text
    Article
  4. 10004

    Prediction Score for Cervical Spine Fracture in Patients with Traumatic Neck Injury by Natsinee Athinartrattanapong, Chaiyaporn Yuksen, Sittichok Leela-amornsin, Chetsadakon Jenpanitpong, Sirote Wongwaisayawan, Pittavat Leelapattana

    Published 2021-01-01
    “…Diagnostic imaging in developing countries has several limitations. A computed tomography scan is not available 24 hours and not cost-effective. …”
    Get full text
    Article
  5. 10005
  6. 10006
  7. 10007
  8. 10008

    An efficient PG-INLA algorithm for the Bayesian inference of logistic item response models by Xiaofan Lin, Yincai Tang

    Published 2025-01-01
    “…The proposed PG-INLA algorithm utilizes a computationally efficient data augmentation strategy via the Pólya-Gamma variables, which can avoid low computational efficiency of traditioanl Bayesian MCMC algorithms for IRT models with a logistic link function. …”
    Get full text
    Article
  9. 10009

    Efficient and privacy-preserving online face authentication scheme by Ming LI, Xiaopeng YANG, Hui ZHU, Fengwei WANG, Qi LI

    Published 2020-05-01
    “…In traditional face authentication system,the trait template and authentication request were generally matched over plaintext,which may lead to the leakage of users’ sensitive data.In order to address the above-mentioned problem,based on matrix encryption,an efficient and privacy-preserving online face authentication scheme was proposed.Specifically,the users’ face trait template for register and the authentication request were encrypted before being sent to the online authentication server,and the similarity computation between the encrypted face trait template and authentication request was computed by the online authentication server over ciphertexts,which guaranteed the security of users’ sensitive data without affecting the accuracy of face authentication.Security analysis shows that the proposed scheme can achieve multiple security levels according to different security parameters.Moreover,performance evaluation shows that the proposed scheme has low computation cost and communication overhead.Experiments results demonstrate the high efficiency of the proposed scheme,which can be implemented in the real environment effectively.…”
    Get full text
    Article
  10. 10010

    Modeling and Simulation of Wake Safety Interval for Paired Approach Based on CFD by Xin He, Yilong Ma, Hong Yang, Yaqing Chen

    Published 2021-01-01
    “…This method realized visual analysis of wake vortex through optimization modeling based on computational fluid dynamics, contributing to increasing the capacity of the runway and improving the operation efficiency of an aerodrome.…”
    Get full text
    Article
  11. 10011

    Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system by Yumei Li, Futai Zhang, Yinxia Sun

    Published 2021-01-01
    “…This scheme requires a quite low computational cost when both signing and verifying a data packet. …”
    Get full text
    Article
  12. 10012

    PEM-PCA: A Parallel Expectation-Maximization PCA Face Recognition Architecture by Kanokmon Rujirakul, Chakchai So-In, Banchar Arnonkijpanich

    Published 2014-01-01
    “…However, the covariance matrix and eigenvalue decomposition stages cause high computational complexity, especially for a large database. …”
    Get full text
    Article
  13. 10013

    Pulmonary embolism. A case report by Pedro J. Barrios Fuentes, Felix Silvino Molina Díaz, Indira Martínez Chavarría

    Published 2010-12-01
    “…The posterior to anterior chest X-ray showed opacities in the form of a veil at the base of the left hemithorax as well as increased cardiothoracic rates. A lung computed tomography angiography scan was performed using a SIEMENS SESATION 64 multislice computed tomography scanner. …”
    Get full text
    Article
  14. 10014

    Efficient and provably secure attribute-based online/offline encryption schemes by Hai-ying MA, Guo-sun ZENG, GZhan-jun WAN, Wei WANG

    Published 2014-07-01
    “…The ABOOE non-trivially splited the encryption process into two phases: the offline phase first executed most of heavy computations prior to knowing the message and the attributes' set; and then the online phase only performed light computations to produce the ciphertext once the attrib-utes' set and the message get available. …”
    Get full text
    Article
  15. 10015

    A study over the Formulation of the Parameters 5 or Less Independent Variables of Multiple Linear Regression by Mehmet Korkmaz

    Published 2019-01-01
    “…In addition to classical matrix form, these new formulas for estimation of the parameters of multiple linear regression could be proposed especially to the researchers not using computer program for calculating the complex operations. …”
    Get full text
    Article
  16. 10016

    Design of Anomaly Based Intrusion Detection System Using Support Vector Machine and Grasshopper Optimization Algorithm in IoT by Sepehr Sharifi, Soulmaz Gheisari

    Published 2024-02-01
    “…Computer networks play an important and practical role in communication and data exchange, and they also share resources with complete ease. …”
    Get full text
    Article
  17. 10017

    An Asymmetrical Mixed Higher-Order Discontinuous Galerkin Time Domain Method for Electromagnetic Scattering from the Plasma Sheath around a Hypersonic Vehicle by Jirong Guo, Yiping Han

    Published 2023-01-01
    “…The physical properties of the nonuniform plasma flow were obtained using computational fluid dynamics software with unstructured grids. …”
    Get full text
    Article
  18. 10018

    Random 2D Composites and the Generalized Method of Schwarz by Vladimir Mityushev

    Published 2015-01-01
    “…This method is related to the traditional method based on the average probabilistic values involving the n-point correlation functions. However, we avoid computation of the correlation functions and compute their weighted moments of high orders by an indirect method which does not address the correlation functions. …”
    Get full text
    Article
  19. 10019

    Three-Dimensional Human Modeling Applications in Sport Sciences by Mehmet İmamoğlu, Osman İmamoğlu

    Published 2018-08-01
    “…Virtual objects, which are transferred to virtual environments by a designer or a design team using various software, has been used many important areas such as health, security, education and sports which are using computer technology. There are a lot of computer software for three-dimensional modeling with license-paid, shareware and freeware. …”
    Get full text
    Article
  20. 10020

    Using nonlinear model predictive control to find optimal therapeutic strategies to modulate inflammation by Judy Day, Jonathan Rubin, Gilles Clermont

    Published 2010-09-01
    “…Modulation of the inflammatory response has become a key focal point in the treatment of critically ill patients. Much of the computational work in this emerging field has been carried out with the goal of unraveling the primary drivers, interconnections, and dynamics of systemic inflammation. …”
    Get full text
    Article