Showing 10,881 - 10,900 results of 28,739 for search '"computing"', query time: 0.10s Refine Results
  1. 10881

    Implementation Aspects in Simulation Extrapolation-Based Stocking–Lord Linking by Alexander Robitzsch

    Published 2025-01-01
    “…However, the original SIMEX approach can be computationally complex. This article evaluates two computational shortcuts to SIMEX-based SL linking through a simulation study: a quasi-Monte Carlo method that replicates items and a proposal using an approximate noniterative estimation instead of the iterative one in the SIMEX application of SL linking. …”
    Get full text
    Article
  2. 10882

    An Efficient Deterministic-Stochastic Model of the Human Body Exposed to ELF Electric Field by Anna Šušnjara, Dragan Poljak

    Published 2016-01-01
    “…The stochastic approach is based on the stochastic collocation (SC) method. Computational examples show the mean trend of both analytically and numerically computed axial current with the confidence margins for different set of input random variables. …”
    Get full text
    Article
  3. 10883

    A Vector Bond Graph Method of Dynamics Modeling for Planar Multi-body Systems with Grooved Sheave by Wang Zhongshuang, Zhao Yanwei, Xu Changshun

    Published 2017-01-01
    “…By using the corresponding algorithm,the computer automatic modeling and dynamics analysis of the planar multi-body system containing grooved sheave on a computer is realized,its validity is illustrated.…”
    Get full text
    Article
  4. 10884

    Secure contact tracing platform from simplest private set intersection cardinality by Jiahui Gao, Chetan Surana, Ni Trieu

    Published 2022-09-01
    “…SecureCT prevents linkage attacks, eliminates replay and relay attacks, and allows the phone's holder to delegate their contact tracing computation to untrusted servers while maintaining the user's privacy. …”
    Get full text
    Article
  5. 10885

    Secure Transmission Based on Antenna Selection for Network Coding System by Dan Deng, Ming Zhao, Guizhou Jian

    Published 2015-02-01
    “…Specifically, the independent channel gain maximum(ICGM)scheme holds the similar performance compared with CMCCM scheme, while ICGM scheme can release the computation burden.…”
    Get full text
    Article
  6. 10886

    The Influence of User Protection Behaviors on the Control of Internet Worm Propagation by Yihong Li, Jinxiao Pan, Lipeng Song, Zhen Jin

    Published 2013-01-01
    “…Computer users’ reactions to the outbreak of Internet worm directly determine the defense capability of the computer and play an important role in the spread of worm. …”
    Get full text
    Article
  7. 10887

    Turbo iterative acquisition algorithm for satellite high-mobility DSSS signal by Chunxiao JIANG, Jiawei WANG

    Published 2021-08-01
    “…To solve the problems of the low acquisition probability and high computational complexity in satellite high-mobility communications, a new factor graph was designed for acquisition of the high-mobility direct sequence spread spectrum (DSSS) signal, where time-varying Doppler rates were modeled by the random walk model.Based on the proposed factor graph, the turbo iterative DSSS signal acquisition algorithm was proposed.In the Doppler-estimation loop, the negative influence of Doppler frequency offsets and Doppler rates could be eliminated effectively.Then in the code-detection loop, constraints of each chip was used to recover the received signal, to achieve DSSS signal acquisition.Simulation results show that the proposed algorithm is capable of improving the acquisition performance at less 1.3 dB with low computational complexity.…”
    Get full text
    Article
  8. 10888

    On the sensitivity of feature ranked lists for large-scale biological data by Danuta Gaweł, Krzysztof Fujarewicz

    Published 2013-03-01
    “…The problem of feature selection for large-scale genomic data, for example from DNA microarray experiments, is one of the fundamental and well-investigated problems in modern computational biology.From the computational point of view, a selected gene list should be characterized by good predictive power and should be understood and well explained from the biological point of view.Recently, another feature of selected gene lists is increasingly investigated, namely their stability which measures how the content and/or the gene order change when the data are perturbed.In this paper we propose a new approach to analysis of gene list stability, termed the sensitivity index, that does not require any data perturbationand allows the gene list that is most reliable in a biological sense to be chosen.…”
    Get full text
    Article
  9. 10889

    Numerical implementation of a multiaxial cyclic plasticity model for the Local Strain Method in low cycle fatigue by C. Madrigal, V. Chaves, A. Navarro

    Published 2014-09-01
    “…Very often computations on structural elements or machine components subjected to variable loading require using an advanced finite element model. …”
    Get full text
    Article
  10. 10890

    A Novel Adaptive Probabilistic Nonlinear Denoising Approach for Enhancing PET Data Sinogram by Musa Alrefaya, Hichem Sahli

    Published 2013-01-01
    “…The edge-stopping function is computed in terms of edge probability under the assumption of contamination by Poisson noise. …”
    Get full text
    Article
  11. 10891

    Resonance Spectra of Caged Stringy Black Hole and Its Spectroscopy by I. Sakalli, G. Tokgoz

    Published 2015-01-01
    “…Instead of the ordinary QNMs, we compute the boxed QNMs (BQNMs) that are the characteristic resonance spectra of the confined scalar fields in the GHSBH geometry. …”
    Get full text
    Article
  12. 10892

    Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks by Jun-Sub Kim, Jin Kwak

    Published 2013-01-01
    “…Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'…”
    Get full text
    Article
  13. 10893

    Single-channel blind separation of co-frequency modulated signals based on Gibbs sampler by Yong YANG, Dong-ling ZHANG, Hua PENG, Shi-long TU

    Published 2015-04-01
    “…A Gibbs-sampler-based separation algorithm was proposed for single-channel co-frequency digital-modulated signals,which were received in non-cooperative ways.The probability density samples of unknown symbol sequences can be obtained by statistic method,and the computation complexity was not growing exponentially with the increase of channel order.With special emphasis on the separation algorithms of single pair of symbols,multiple pair of symbols and the tracking of channel responses.Moreover,the separation performance between Gibbs sampler and per-survivor processing(PSP) algorithm were analyzed and compared in detail.Simulation results show that,compared with PSP algorithm with L=4 for two co-frequency QPSK-modulated signals,Gibbs sampler can be nearly 17 times lower in computation complexity when the approximately performance is obtained.…”
    Get full text
    Article
  14. 10894

    PET/SPECT Molecular Probes for the Diagnosis and Staging of Nonalcoholic Fatty Liver Disease by Tuo Shao PhD, Lee Josephson PhD, Steven H. Liang PhD

    Published 2019-09-01
    “…While liver biopsy is considered as gold standard in the diagnosis and staging of liver fibrosis, noninvasive imaging technologies, including ultrasonography, computed tomography, single-photon emission computed tomography (SPECT), magnetic resonance imaging, and positron emission tomography (PET) could offer more sensitive, comprehensive, and quantitative measurement for NAFLD. …”
    Get full text
    Article
  15. 10895

    Low complexity radar signal classification based on spectrum shape by Liang YIN, Rui LIN, Xiaolei WANG, Yuliang YAO, Lin ZHOU, Yuan HE

    Published 2022-01-01
    “…In order to solve the problems of high computational complexity, low recognition accuracy of low signal to noise ratio (SNR) environment and low fidelity of simulation data in radar signal modulation recognition, a low complexity radar signal classification algorithm based on spectrum shape was proposed.Signal spectrum was normalized, feature parameters were extracted by spectrum sampling method, and then machine learning classification model was trained.The test results of the data generated by the radar signal source show that the classification accuracy of Barker code, Frank code, LFM code, BPSK, QPSK modulation and conventional radar signals is more than 90% (SNR≥3 dB).The algorithm has low computational complexity, can adapt to the change of signal parameters, and has good generalization.…”
    Get full text
    Article
  16. 10896

    Two-loop running effects in Higgs physics in Standard Model Effective Field Theory by Stefano Di Noi, Ramona Gröber, Manoj K. Mandal

    Published 2024-12-01
    “…Abstract We consider the renormalization group equations within the Standard Model Effective Field Theory and compute two-loop contributions proportional to the top quark Yukawa coupling for the operator generating an effective Higgs-gluon coupling, focusing on the Yukawa-like operator. …”
    Get full text
    Article
  17. 10897

    Impact of Thin-Walled Projectiles with Concrete Targets by Rayment E. Moxley, Mark D. Adley, Bob Rohani

    Published 1995-01-01
    “…A computational simulation of a test was conducted with an impact/penetration model created by linking a rigid-body penetration trajectory code with a general-purpose finite element code. …”
    Get full text
    Article
  18. 10898

    Phase retrieval for block sparsity based on adaptive coupled variational Bayesian learning by Di Zhang, Yimao Sun, Siqi Bai, Qun Wan

    Published 2022-12-01
    “…Simulations indicate that the proposed algorithm outperforms the existing methods in success rate, noise‐robustness, and signal detection rate in large‐scale cases with acceptable computation complexity.…”
    Get full text
    Article
  19. 10899

    Case studies in numerical simulation of crack trajectories in brittle materials by H. Jasarevic, S. Gagula

    Published 2012-04-01
    “…The “diffusion approximation” of the crack diffusion model represents crack trajectories as a one-dimensional Wiener process with advantage of well-developed mathematical formalism and simplicity of creating computer generated realizations (fractal dimension d = 1.5). …”
    Get full text
    Article
  20. 10900

    Lorentzian CFT 3-point functions in momentum space by Teresa Bautista, Hadi Godazgar

    Published 2020-01-01
    “…We explain how tensorial three-point correlators can be obtained and, in particular, compute the correlator with two identical scalars and one energy-momentum tensor. …”
    Get full text
    Article