Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- Information technology 9
- Moral and ethical aspects 9
- Management 8
- computer 8
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- History 4
- Human-computer interaction 4
- Language and languages 4
- Mass media 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- Hospitality industry 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- MATHEMATICS / Mathematical Analysis 3
- Mathematical analysis 3
-
54901
Causal models and prediction in cell line perturbation experiments
Published 2025-01-01“…This has led to the development of computational models that can predict cellular responses to perturbations in silico. …”
Get full text
Article -
54902
The Short‐Time Prediction of Thermospheric Mass Density Based on Ensemble‐Transfer Learning
Published 2023-10-01Get full text
Article -
54903
Farmers’ knowledge improves identification of drought impacts: A nationwide statistical analysis in Zambia
Published 2025-04-01Get full text
Article -
54904
Non vertical ionization-dissociation model for strong IR induced dissociation dynamics of $${{D}_{2}}O^{2+}$$
Published 2025-01-01“…However, a full quantum mechanical treatment of electron-nuclear dynamics is computationally intensive. In this work, we have developed a Strong Laser Induced non-adiabatic Multi-Ionic-Multi-Electric States (SLIMIMES) approach, which contains the electron-laser and electron-nuclear couplings. …”
Get full text
Article -
54905
An algorithm of unordered wavefront propagation in terahertz phase retrieval with dense multiplane data acquisition
Published 2023-12-01“…Iterative phase retrieval algorithms from multiple diffraction patterns in the terahertz (THz) frequency range are a promising tool of computational imaging capable of providing high spatial resolution of reconstructed phase images. …”
Get full text
Article -
54906
SEMdag: Fast learning of Directed Acyclic Graphs via node or layer ordering.
Published 2025-01-01“…Besides its superior disease predictive performance compared to previous research, SEMdag() offers the user the flexibility to define distinct structure learning algorithms and can handle high dimensional issues with less computing load. SEMdag() function is implemented in the R package SEMgraph, easily available at https://CRAN.R-project.org/package=SEMgraph.…”
Get full text
Article -
54907
Design and Preparation of a Self-Inhaling Internal Cooling Grinding Wheel with a Leaf Order Arrangement Structure
Published 2024-12-01“…The internal flow field and grinding zone flow field of the grinding wheel were simulated using the computational fluid dynamics method. To ensure stable grinding performance, the effects of different cooling hole positions and sizes on fluid motion were revealed, and the influence of grinding wheel rotational speed and coolant pressure on outlet velocity were analyzed. …”
Get full text
Article -
54908
-
54909
DETERMINING THE EFFECTIVENESS OF CONCURRENT ENGINEERING THROUGH THE ANALYTICAL HIERARCHY PROCESSING OF PROJECT SUCCESS CRITERIA
Published 2013-12-01“…The results of the data computations gave a ranking of the four (4) principal project delivery methods of; Traditional sequential delivery, Programme management, Design and build and CE, with the values 0.0001, 0.1027, 0.2062 and 0.6910 respectively. …”
Get full text
Article -
54910
Monte Carlo Simulation of Gamma and Neutron Shielding with High-performance Ultra-heavy Cement Composite
Published 2024-12-01“…Materials and Methods: To extract such features, it is necessary to use a computational method. In this research, we have done all our calculations based on the Geant4 tool based on the Monte Carlo method. …”
Get full text
Article -
54911
Understanding noble gas incorporation in mantle minerals: an atomistic study
Published 2024-06-01Get full text
Article -
54912
Continuous professional development and instructors’ beliefs about and practice of active learning method in Bahir Dar university
Published 2023-06-01“…The study first employed one sample t-tests which showed that, though these instructors held significantly stronger beliefs about active learning methods than the expected level, they reportedly implemented active learning methods slightly less frequently than the expected level. Then, after computing means and standard deviations for each of the two groups of respondents (31 HDP participants and 27 non-participants), multivariate analysis of variance (MANOVA) was applied to compare the difference between HDP participants and non-participants in their beliefs and practice of active learning methods (when both dependent variables considered together). …”
Get full text
Article -
54913
-
54914
Identifying unstable CNG repeat loci in the human genome: a heuristic approach and implications for neurological disorders
Published 2024-06-01“…In this study, we aimed to identify novel unstable CNG repeat loci associated with the neurogenetic disorder spinocerebellar ataxia (SCA). Using a computational approach, 15,069 CNG repeat loci in the coding and noncoding regions of the human genome were identified. …”
Get full text
Article -
54915
Global randomized consensus algorithm resist collusion attack based on game theory
Published 2022-08-01“…As the cornerstone of blockchain technology, consensus technology has received more attention with the continuous development of blockchain technology.The development of consensus technology has become more and more rapid, but there are still related problems.Nowadays, fault-tolerant consensus algorithms, as one of the representative blockchain consensus technologies, still have many problems to be studied.The problem of node randomness and node collusion attacks in fault-tolerant consensus algorithms had been studied, and a game-theoretic-based anti-corruption algorithm was proposed.The global randomization consensus algorithm of collusion attack improved the security and throughput of the blockchain network by realizing the randomization of nodes and solving related security problems.In the process of selecting nodes participating in the fault-tolerant consensus algorithm, the global randomization of the initiator and verifier nodes was realized by using the mapping function and the weighted random function, thereby ensuring the identity anonymity of the initiator and verifier nodes and improving the blockchain network security accordingly.The reputation update model was used to realize the dynamic update of the reputation, and the game theory was used to analyze the security problems of the fault-tolerant consensus algorithm.A more correct and efficient algorithm model was constructed to improve the throughput of the algorithm and analyze the problem of collusion attack of more than one third of the nodes in this kind of algorithm, the refined Bayesian game was used to construct a collusion contract and analyze the collusion The Nash equilibrium point between the two nodes was adopted to solve the collusion attack problem of more than one third of the nodes.The security analysis and experiments show that the global randomization consensus algorithm based on the game theory anti-collusion attack is better than PoW、PoS and PBFT.The consensus algorithm is not only effective to improve throughput and reduce computing resource consumption, but also resistant to DDoS, Eclipse attacks and collusion attacks by more than one third of nodes.…”
Get full text
Article -
54916
Review of cryptographic application security evaluation techniques for new critical infrastructures
Published 2023-12-01“….), and innovation infrastructure (including big data, artificial intelligence, blockchain, etc.) to the security evaluation of cryptography applications.Furthermore, the new requirements were revealed about domestically produced cryptography algorithms and protocols deployed on high-performance computing chips, ultra-high-speed communication modules, and large-capacity storage media for cryptography application security evaluation technology.Finally, the development of automated and intelligent cryptography application security evaluation technology was explored.…”
Get full text
Article -
54917
Numerical investigation of segmental baffle design in shell and tube heat exchangers with varying inclination angles and spacing
Published 2025-02-01“…This research uses a three-dimensional computational fluid dynamics (CFD) simulation to model turbulent fluid flow and evaluate the performance of different baffle angle configurations. …”
Get full text
Article -
54918
-
54919
-
54920