Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- Information technology 9
- Moral and ethical aspects 9
- Management 8
- computer 8
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- History 4
- Human-computer interaction 4
- Language and languages 4
- Mass media 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- Hospitality industry 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- MATHEMATICS / Mathematical Analysis 3
- Mathematical analysis 3
-
55001
Fitting and comparison of calcium-calmodulin kinetic schemes to a common data set using non-linear mixed effects modelling.
Published 2025-01-01“…Calmodulin is a calcium binding protein that is essential in calcium signalling in the brain. There are many computational models of calcium-calmodulin binding that capture various calmodulin features. …”
Get full text
Article -
55002
Sorption cable sensor with large sensing range and fields of its application
Published 2020-06-01“…The areas of application considered in the article, examples of the implementation of a sorption cable sensor in a system for monitoring leaks and air humidity of computing nodes with liquid cooling of Russian supercomputers testify to the high efficiency and development potential. …”
Get full text
Article -
55003
Tensile Fracture Behavior of Corroded Pipelines: Part 2—Numerical Simulation Based on Monte Carlo Method
Published 2020-01-01“…Inspired by the surface topology by scanning electronic microscopy (SEM) and the scattered distribution of test data, a computational procedure based on the Monte Carlo simulation method was developed in this paper to understand the randomness of the crack propagation process and the performance degradation mechanism of the corroded pipelines. …”
Get full text
Article -
55004
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2025-01-01Get full text
Article -
55005
Cache of cryptographic key based on query popularity
Published 2023-02-01“…In the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key service.With the increase of the key resource, the occupied memory space also grows, bringing the bottleneck of memory space and key indexing.There are three challenges induced: how to organize cached data and efficiently handle queries with missed keys, how to adjust key resources in the cache, and how to accurately predict the use of keys.In order to achieve fine-grained and efficient caching and improve the efficiency of key use, key caching optimization was considered from three aspects: key index data structure, key replacement algorithm, and key prefetching strategy.An architecture of key cache replacement module was designed, and then a key replacement algorithm based on the query frequency was set.Specifically, from the perspective of heat computing and key replacement, the potential influencing factors affecting the popularity of key cache were analyzed which considered the file system and user of key management system.Besides, the basic model of key usage popularity was constructed.The hash table and minheap linked list was combined to maintain the heat of the key in use, and the elimination algorithm was set based on heat identification.The key in the cache was dynamically updated, and key usage was adjusted by the time controller, so as to realize key replacement according to the key heat.For key prefetching, key usage rules were obtained through log mining and periodical usage analyzing of key provisioning policies, which considered business processes and the time period dimension of user accessing.Experimental results show that the proposed key replacement algorithm can effectively improve the hit rate of cache queries, reduce memory usage, and ameliorate the impact of key file I/O interaction on query performance.…”
Get full text
Article -
55006
Identification of Psychological Crisis Signals of College Students Based on the Dufferin Equation
Published 2021-01-01“…The geometric features of the phase trajectory are adopted as the basis for judging the system state, which greatly reduces the computational effort. Based on defining the conceptual connotation of college students’ psychological crisis behavior system, the vulnerability of college students’ psychological crisis behavior system is interpreted from the perspective of system self-organization theory, and the vulnerability of college students’ psychological crisis behavior is mainly expressed in latent and manifest states, and its vulnerability transformation is a self-organization process. …”
Get full text
Article -
55007
Mathematical Modeling of Wax Deposition in Field-Scale Crude Oil Pipeline Systems
Published 2022-01-01“…The coupled nonlinear partial differential equations governing the flow are discretized in time by a second-order semi-implicit time discretization scheme based on the Adams-Bashforth and Crank-Nicolson methods, which completely decouples the computation of the governing equations. The resulting temporal schemes are discretized in space by the bivariate spectral collocation method based on Chebyshev-Gauss-Lobatto grid points and simulated in MATLAB software to obtain the profiles of the flow variables. …”
Get full text
Article -
55008
-
55009
Efficient ZrO(NO3)2.2H2O Catalyzed Synthesis of 1H-Indazolo[1,2-b] phthalazine-1,6,11(13H)-triones and Electronic Properties Analyses, Vibrational Frequencies, NMR Chemical Shift A...
Published 2020-01-01“…The IR spectra data and 1H NMR and 13C NMR chemical shift computations of the 1H-indazolo[1,2-b]phthalazine-1,6,11(13H)-trione derivatives in the ground state were calculated. …”
Get full text
Article -
55010
A Review of the Self-Adaptive Traffic Signal Control System Based on Future Traffic Environment
Published 2018-01-01“…The development of information technologies on computing science, autonomous driving, vehicle-to-vehicle, and mobile Internet has created a sufficient abundance of acquisition means for traffic data. …”
Get full text
Article -
55011
-
55012
-
55013
Reconstructing the Dynamics of the Outer Electron Radiation Belt by Means of the Standard and Ensemble Kalman Filter With the VERB‐3D Code
Published 2021-10-01“…We show how the use of the split‐operator technique allows us to include more physical processes in our simulations and is a computationally efficient data assimilation tool that delivers an accurate approximation of the optimal KF solution, and is suitable for real‐time forecasting. …”
Get full text
Article -
55014
Decoding the physics of observed actions in the human brain
Published 2025-02-01“…Recognizing goal-directed actions is a computationally challenging task, requiring not only the visual analysis of body movements, but also analysis of how these movements causally impact, and thereby induce a change in, those objects targeted by an action. …”
Get full text
Article -
55015
-
55016
Improving Solar Wind Forecasting Using Data Assimilation
Published 2021-07-01“…In this study, we use a variational DA scheme with a computationally efficient solar wind model and in situ observations from STEREO‐A, STEREO‐B and ACE. …”
Get full text
Article -
55017
A Multimodal Convolutional Neural Network Based Approach for DICOM Files Classification. , 2025(1), e70107.
Published 2025“…Despite the promising results, the study acknowledges limitations in dataset diversity and computational efficiency, with future work focusing on addressing these challenges and further optimising the model for deployment in resource-limited environments.…”
Get full text
Article -
55018
GFA-Net: Geometry-Focused Attention Network for Six Degrees of Freedom Object Pose Estimation
Published 2024-12-01“…Then, the resulting dense 2D–3D correspondences are passed to a Perspective-n-Point (PnP) module for 6-DoF pose computation. Experimental results on the LINEMOD and Occlusion LINEMOD datasets indicate that our proposed method is highly competitive with state-of-the-art approaches, achieving 96.54% and 49.35% accuracy, respectively, utilizing the ADD-S metric with a 0.10d threshold.…”
Get full text
Article -
55019
Dynamic control of a 10 MW solar-autothermal hybrid biomass gasifier for round-the-clock processing with stable syngas production
Published 2025-04-01“…The feasibility of dynamic control of a solar-autothermal biomass gasifier was successfully demonstrated for the determination of annual process performance with reasonable computational costs, paving the way to stable and controllable solar gasification process operation.…”
Get full text
Article -
55020
Investigation of metabolic features of glioblastoma tissue and the peritumoral environment using targeted metabolomics screening by LC-MS/MS and gene network analysis
Published 2025-01-01“…Pathway analysis using the KEGG database, conducted with MetaboAnalyst 6.0, revealed a statistically significant overrepresentation of sphingolipid metabolism, suggesting a critical role of these lipid molecules in glioblastoma pathogenesis. Using computational systems biology and artificial intelligence methods implemented in a cognitive platform, ANDSystem, molecular genetic regulatory pathways were reconstructed to describe potential mechanisms underlying the dysfunction of sphingolipid metabolism enzymes. …”
Get full text
Article