Showing 10,921 - 10,940 results of 28,739 for search '"computing"', query time: 0.11s Refine Results
  1. 10921

    Applications of magnesium iodide structure via modified-polynomials by Haleemah Ghazwani, Muhammad Kamran Jamil, Ali Ahmad, Muhammad Azeem, Ali N. A. Koam

    Published 2024-06-01
    “…Randić index, and inverse Randić indices based M-polynomials are also computed in this work.…”
    Get full text
    Article
  2. 10922

    Encoding Interruptions in Parliamentary Data: From Applause to Interjections and Laughter by Tanja Wissik

    Published 2022-06-01
    “…Furthermore, I will discuss whether these encodings are suitable for computer-based quantitative analysis of parliamentary interruptions. …”
    Get full text
    Article
  3. 10923

    Trust expansion and listwise learning-to-rank based service recommendation method by Chen FANG, Hengwei ZHANG, Ming ZHANG, Jindong WANG

    Published 2018-01-01
    “…In view of the problem of trust relationship in traditional trust-based service recommendation algorithm,and the inaccuracy of service recommendation list obtained by sorting the predicted QoS,a trust expansion and listwise learning-to-rank based service recommendation method (TELSR) was proposed.The probabilistic user similarity computation method was proposed after analyzing the importance of service sorting information,in order to further improve the accuracy of similarity computation.The trust expansion model was presented to solve the sparseness of trust relationship,and then the trusted neighbor set construction algorithm was proposed by combining with the user similarity.Based on the trusted neighbor set,the listwise learning-to-rank algorithm was proposed to train an optimal ranking model.Simulation experiments show that TELSR not only has high recommendation accuracy,but also can resist attacks from malicious users.…”
    Get full text
    Article
  4. 10924

    Intelligent Fault Diagnosis of Machines Based on Adaptive Transfer Density Peaks Search Clustering by Meng Li, Yanxue Wang, Chuyuan Wei

    Published 2021-01-01
    “…Combined with the wavelet packet energy feature extraction algorithm, the proposed algorithm can enhance the computational accuracy and reduce the computational time consumption. …”
    Get full text
    Article
  5. 10925

    Physics-Informed Neural Network-Based Input Shaping for Vibration Suppression of Flexible Single-Link Robots by Tingfeng Li, Tengfei Xiao

    Published 2025-01-01
    “…With the use of powerful computational resources to handle multimode information about the vibration, the PINN-based approach outperforms traditional input-shaping methods in terms of computational efficiency and performance. …”
    Get full text
    Article
  6. 10926

    Iterative multistage adaptive Rake receiver for CDMA wireless system by YE Li-bing, ZHOU Yuan-ping, XIE Ning

    Published 2005-01-01
    “…The system parameters for each stage can be obtained through a simple iterative procedure, no complicated computation is required. The proposed system gives a reduced computational complexity compared to an AV system with similar performance. …”
    Get full text
    Article
  7. 10927

    Proxy re-signature scheme based on isomorphisms of polynomial by Hui-xian LI, Lu SHAO, Liao-jun PANG

    Published 2017-02-01
    “…Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature scheme was proposed.By employing secret affine transformations and homogeneous polynomials,the proposed scheme could implement the signature transformation with high-efficiency,and meanwhile it was secure against the attack by a quantum computer.The results of analysis showed that the proposed scheme was correct and consistent,and had the unforgeability in the random oracle model.Compared with the existing schemes,the proposed scheme not only inherits the resistance to quantum attack and high efficiency from the multivariate public key cryptosystems,but also has the properties of multi-use,transparent and private proxy.…”
    Get full text
    Article
  8. 10928

    Efficient fuzzy attribute-based signcryption scheme by Xiao-yuan YANG, Zhi-qiang LIN, Yi-liang HAN

    Published 2013-08-01
    “…Compared with other analysis, the amount of computation of signcryption and designcryption is only (n+3)e and ne+(n+4)p, far less than those of other similar schemes and this realizes the efficiency of computation.…”
    Get full text
    Article
  9. 10929

    Numerical implementation of a multiaxial cyclic plasticity model for the Local Strain Method in low cycle fatigue by C. Madrigal, V. Chaves, A. Navarro

    Published 2014-10-01
    “…Very often computations on structural elements or machine components subjected to variable loading require using an advanced finite element model. …”
    Get full text
    Article
  10. 10930

    Path assessment based network admission control algorithm by QIU Gong-an1, XU Chen1, ZHANG Guo-an1, BAO Zhi-hua1

    Published 2010-01-01
    “…The local link state metrics were measured by scheduler.At the same time,the stale path state metrics could be got from the router.The basic probability assignment functions of above metrics were described by the fuzzy state variableness.The path situation and the corresponding probability could be computed through data fusion based on Dempster rule.Then the path situation with the maximum probability would be regarded as the quasi-real-time path state.Network admission decision was made based on the estimated path state.Simulations show that the link utility of proposed policy has twice as the budget based network admission control under the similar blocking rate.And the complexity of network mechanism can be decreased by adding pre-computed at the edge to achieve coreless status in multi-hop networks.…”
    Get full text
    Article
  11. 10931

    Modular representations of Loewy length two by M. E. Charkani, S. Bouhamidi

    Published 2003-01-01
    “…We also compute the number of isomorphism classes of indecomposable K[G]-modules M such that dimK(Rad(M))=1.…”
    Get full text
    Article
  12. 10932

    Development of an Equivalent Force Method and an Application in Simulating the Radiated Noise from an Operating Diesel Engine by Nickolas Vlahopoulos, Yury Kalish, S.T. Raveendra

    Published 1999-01-01
    “…The effect of two structural design modifications on the radiated noise is computed, and conclusions are deduced.…”
    Get full text
    Article
  13. 10933

    Improving deep convolutional neural networks with mixed maxout units by Hui-zhen ZHAO, Fu-xian LIU, Long-yue LI, Chang LUO

    Published 2017-07-01
    “…The maxout units have the problem of not delivering non-max features, resulting in the insufficient of pooling operation over a subspace that is composed of several linear feature mappings,when they are applied in deep convolutional neural networks.The mixed maxout (mixout) units were proposed to deal with this constrain.Firstly,the exponential probability of the feature mappings getting from different linear transformations was computed.Then,the averaging of a subspace of different feature mappings by the exponential probability was computed.Finally,the output was randomly sampled from the max feature and the mean value by the Bernoulli distribution,leading to the better utilizing of model averaging ability of dropout.The simple models and network in network models was built to evaluate the performance of mixout units.The results show that mixout units based models have better performance.…”
    Get full text
    Article
  14. 10934

    Experimental and Numerical Simulations Predictions Comparison of Power and Efficiency in Hydraulic Turbine by Laura Castro, Gustavo Urquiza, Adam Adamkowski, Marcelo Reggio

    Published 2011-01-01
    “…Inlet boundary conditions for the runner were obtained from a previous simulation conducted in the spiral case. The computed results at the runner's outlet were used to conduct the subsequent draft tube simulation. …”
    Get full text
    Article
  15. 10935

    Related-key impossible boomerang cryptanalysis on LBlock by Min XIE, Yan-li MU

    Published 2017-05-01
    “…The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.A 15-round related-key impossible boomerang distinguisher was constructed.Based on the new distinguisher,an attack on 22-round LBlock was mounted successfully by concatenating 3-round to the beginning and 4-round to the end.The attack on 22-round LBlock required data complexity of only 2<sup>51.3</sup>plaintexts and computational complexity of about 2 <sup>71.54</sup>22-round encryptions.Compared with published cryptanalysis results on 22-round LBlock,proposed attack has great advantages on data and computational complexities.…”
    Get full text
    Article
  16. 10936

    A Study on the Efficient Method for the Solution of the Saha Equation in the Numerical Simulation of Capillary Discharge by Hengzhu Liu, Cheng Wu, Fengjiang An, Shasha Liao

    Published 2017-01-01
    “…In order to improve the computational efficiency, this coefficient is further optimized and the methods of setting the iteration initial value dynamically are introduced. …”
    Get full text
    Article
  17. 10937

    A Thermochemical Parameters and Theoretical Study of the Chlorinated Compounds of Thiophene by Ibrahim A. M. Saraireh, Mohammednoor Altarawneh, Jibril Alhawarin, Mansour H. Almatarneh

    Published 2019-01-01
    “…This contribution sets out to compute thermochemical and geometrical parameters of the complete series of chlorinated isomers of thiophene based on the accurate chemistry model of CBS-QB3. …”
    Get full text
    Article
  18. 10938

    Periprosthetic Fracture of Greater Trochanter in Total Hip Replacement Stemming from Pin Site Placement in Navigation-Assisted Surgery by Ava Brozovich, David R. Lionberger

    Published 2019-01-01
    “…Surgeons are looking to use computer computer-assisted surgery (CAS) in total hip arthroplasty (THA) in order to quantify leg length measurement, angular cup placement, and enhance stability to provide enhanced accuracy in implant placement. …”
    Get full text
    Article
  19. 10939

    Beamforming algorithm for cognitive satellite and terrestrial network based on UAV relay by Yanli LI, Zhi LIN, Zining WANG, Ba XU, Ming CHENG, Jian OUYANG

    Published 2021-08-01
    “…Two beamforming (BF) schemes to achieve spectrum sharing by suppressing inter-system interferences in cognitive satellite and terrestrial networks were proposed, where the satellite and UAV cooperative network was used as the secondary network, while the terrestrial network was used as the primary network.Specifically, considering that only the statistical channel state information was available, a constrained optimization problem was formulated to maximize the signal-to- interference-plus-noise ratio of the secondary user under the constraints of the maximum transmit power at the UAV and the interference power of the primary user.Then, an iteration-based BF scheme was proposed to solve the constrained optimization problem.To reduce the computational complexity of the iterative algorithm, a zero-forcing based BF scheme was further proposed.Finally, computer simulations verify the correctness and effectiveness of the proposed BF schemes.…”
    Get full text
    Article
  20. 10940

    Vector Bond Graph Method of Kineto-static Analysis for Planar Multi-body System with Gear Pair by Wang Zhongshuang, Zhao Yanwei, Tao Yangyang, Cao Jianguo

    Published 2015-01-01
    “…In order to increase the reliability and efficiency of the kineto-static analysis of complex planar multi-body system,the corresponding vector bond graph method is proposed.According to the kinematic constraint condition,the vector bond graph model of a gear pair with arbitrary tooth profile of tooth is built.Based on this,the theoretical method to build the planar multi-body systems model with gear pair by vector bond graph is given.For the algebraic difficulties brought by differential causality and nonlinear junction structure in modeling and kineto-static analysis of planar multi-body systems with gear pair,the effective bond graph augment method is proposed.By the corresponding algorithm,the computer aided modeling and kineto-static analysis of planar multi-body system with gear pair on a computer is realized,the validity of this method is illustrated.…”
    Get full text
    Article