Showing 54,901 - 54,920 results of 56,283 for search 'Computex~', query time: 2.64s Refine Results
  1. 54901

    Causal models and prediction in cell line perturbation experiments by James P. Long, Yumeng Yang, Shohei Shimizu, Thong Pham, Kim-Anh Do

    Published 2025-01-01
    “…This has led to the development of computational models that can predict cellular responses to perturbations in silico. …”
    Get full text
    Article
  2. 54902
  3. 54903
  4. 54904

    Non vertical ionization-dissociation model for strong IR induced dissociation dynamics of $${{D}_{2}}O^{2+}$$ by Jun Wang, Shu Ning Gao, Aihua Liu, Lanhai He, Xi Zhao

    Published 2025-01-01
    “…However, a full quantum mechanical treatment of electron-nuclear dynamics is computationally intensive. In this work, we have developed a Strong Laser Induced non-adiabatic Multi-Ionic-Multi-Electric States (SLIMIMES) approach, which contains the electron-laser and electron-nuclear couplings. …”
    Get full text
    Article
  5. 54905

    An algorithm of unordered wavefront propagation in terahertz phase retrieval with dense multiplane data acquisition by E.G. Tsiplakova, A. Chopard, N.S. Balbekin, O.A. Smolyanskaya, J.-B. Perraud, J.-P. Guillet, P. Mounaix, N.V. Petrov

    Published 2023-12-01
    “…Iterative phase retrieval algorithms from multiple diffraction patterns in the terahertz (THz) frequency range are a promising tool of computational imaging capable of providing high spatial resolution of reconstructed phase images. …”
    Get full text
    Article
  6. 54906

    SEMdag: Fast learning of Directed Acyclic Graphs via node or layer ordering. by Mario Grassi, Barbara Tarantino

    Published 2025-01-01
    “…Besides its superior disease predictive performance compared to previous research, SEMdag() offers the user the flexibility to define distinct structure learning algorithms and can handle high dimensional issues with less computing load. SEMdag() function is implemented in the R package SEMgraph, easily available at https://CRAN.R-project.org/package=SEMgraph.…”
    Get full text
    Article
  7. 54907

    Design and Preparation of a Self-Inhaling Internal Cooling Grinding Wheel with a Leaf Order Arrangement Structure by Zixuan Wang, Zhengyu Sun, Yinhao Huang, Tianbiao Yu, Jun Zhao

    Published 2024-12-01
    “…The internal flow field and grinding zone flow field of the grinding wheel were simulated using the computational fluid dynamics method. To ensure stable grinding performance, the effects of different cooling hole positions and sizes on fluid motion were revealed, and the influence of grinding wheel rotational speed and coolant pressure on outlet velocity were analyzed. …”
    Get full text
    Article
  8. 54908
  9. 54909

    DETERMINING THE EFFECTIVENESS OF CONCURRENT ENGINEERING THROUGH THE ANALYTICAL HIERARCHY PROCESSING OF PROJECT SUCCESS CRITERIA by N.A Aniekwu, A.C. Igboanugo, M.K. Onifade

    Published 2013-12-01
    “…The results of the data computations gave a ranking of the four (4) principal project delivery methods of; Traditional sequential delivery, Programme management, Design and build and CE, with the values 0.0001, 0.1027, 0.2062 and 0.6910 respectively. …”
    Get full text
    Article
  10. 54910

    Monte Carlo Simulation of Gamma and Neutron Shielding with High-performance Ultra-heavy Cement Composite by Mohammadreza Alipoor, Mahdi Eshghi, Ramazan Sever

    Published 2024-12-01
    “…Materials and Methods: To extract such features, it is necessary to use a computational method. In this research, we have done all our calculations based on the Geant4 tool based on the Monte Carlo method. …”
    Get full text
    Article
  11. 54911
  12. 54912

    Continuous professional development and instructors’ beliefs about and practice of active learning method in Bahir Dar university by Mulugeta Teka Kahsay

    Published 2023-06-01
    “…The study first employed one sample t-tests which showed that, though these instructors held significantly stronger beliefs about active learning methods than the expected level, they reportedly implemented active learning methods slightly less frequently than the expected level. Then, after computing means and standard deviations for each of the two groups of respondents (31 HDP participants and 27 non-participants), multivariate analysis of variance (MANOVA) was applied to compare the difference between HDP participants and non-participants in their beliefs and practice of active learning methods (when both dependent variables considered together). …”
    Get full text
    Article
  13. 54913
  14. 54914

    Identifying unstable CNG repeat loci in the human genome: a heuristic approach and implications for neurological disorders by Varun Suroliya, Bharathram Uppili, Manish Kumar, Vineet Jha, Achal K. Srivastava, Mohammed Faruq

    Published 2024-06-01
    “…In this study, we aimed to identify novel unstable CNG repeat loci associated with the neurogenetic disorder spinocerebellar ataxia (SCA). Using a computational approach, 15,069 CNG repeat loci in the coding and noncoding regions of the human genome were identified. …”
    Get full text
    Article
  15. 54915

    Global randomized consensus algorithm resist collusion attack based on game theory by Bao ZHANG, Youliang TIAN, Sheng GAO

    Published 2022-08-01
    “…As the cornerstone of blockchain technology, consensus technology has received more attention with the continuous development of blockchain technology.The development of consensus technology has become more and more rapid, but there are still related problems.Nowadays, fault-tolerant consensus algorithms, as one of the representative blockchain consensus technologies, still have many problems to be studied.The problem of node randomness and node collusion attacks in fault-tolerant consensus algorithms had been studied, and a game-theoretic-based anti-corruption algorithm was proposed.The global randomization consensus algorithm of collusion attack improved the security and throughput of the blockchain network by realizing the randomization of nodes and solving related security problems.In the process of selecting nodes participating in the fault-tolerant consensus algorithm, the global randomization of the initiator and verifier nodes was realized by using the mapping function and the weighted random function, thereby ensuring the identity anonymity of the initiator and verifier nodes and improving the blockchain network security accordingly.The reputation update model was used to realize the dynamic update of the reputation, and the game theory was used to analyze the security problems of the fault-tolerant consensus algorithm.A more correct and efficient algorithm model was constructed to improve the throughput of the algorithm and analyze the problem of collusion attack of more than one third of the nodes in this kind of algorithm, the refined Bayesian game was used to construct a collusion contract and analyze the collusion The Nash equilibrium point between the two nodes was adopted to solve the collusion attack problem of more than one third of the nodes.The security analysis and experiments show that the global randomization consensus algorithm based on the game theory anti-collusion attack is better than PoW、PoS and PBFT.The consensus algorithm is not only effective to improve throughput and reduce computing resource consumption, but also resistant to DDoS, Eclipse attacks and collusion attacks by more than one third of nodes.…”
    Get full text
    Article
  16. 54916

    Review of cryptographic application security evaluation techniques for new critical infrastructures by Gaolei LI, Jianhua LI, Zhihong ZHOU, Hao ZHANG

    Published 2023-12-01
    “….), and innovation infrastructure (including big data, artificial intelligence, blockchain, etc.) to the security evaluation of cryptography applications.Furthermore, the new requirements were revealed about domestically produced cryptography algorithms and protocols deployed on high-performance computing chips, ultra-high-speed communication modules, and large-capacity storage media for cryptography application security evaluation technology.Finally, the development of automated and intelligent cryptography application security evaluation technology was explored.…”
    Get full text
    Article
  17. 54917

    Numerical investigation of segmental baffle design in shell and tube heat exchangers with varying inclination angles and spacing by A. M. Mohammadzadeh, Bahram Jafari, Khashayar Hosseinzadeh, E. Paikar

    Published 2025-02-01
    “…This research uses a three-dimensional computational fluid dynamics (CFD) simulation to model turbulent fluid flow and evaluate the performance of different baffle angle configurations. …”
    Get full text
    Article
  18. 54918
  19. 54919
  20. 54920