Showing 7,121 - 7,140 results of 9,922 for search 'open computing', query time: 0.14s Refine Results
  1. 7121

    Protection of vineyards from Zonda wind: Evaluation of forest windbreaks. Mendoza, Argentina by Rodolfo Abel Dematte, Ernesto Gandolfo Raso, Josefina Huespe

    Published 2025-01-01
    “…Different configurations of forest curtains were designed, and computational fluid dynamics (CFD) simulations were conducted using OpenFOAM software to assess the protective effect of the windbreaks. …”
    Get full text
    Article
  2. 7122
  3. 7123
  4. 7124

    Development of a Numerical Prediction Method for the Strain Energy Density of Welded Joints Using Structural Stresses Derived from Nodal Forces by Simone Lucertini, Giulia Morettini, Filippo Cianetti

    Published 2025-03-01
    “…This activity demonstrates a strong correlation between the numerical values obtained from the proposed innovative approach and the results from predictions made using a standard energy-based approach, with significantly lower computational and setup costs. Data processing and calculations are performed using the open-source software Python 3.10 (Software Foundation, Wilmington, DE, USA) to demonstrate the applicability of this method as a quick and ready-to-use “post-process” tool for industrial applications.…”
    Get full text
    Article
  5. 7125
  6. 7126
  7. 7127

    The potential of artificial intelligence (AI) to improve electronic word-of-mouth's (eWOM) efficacy by Baltezarević Radoslav V., Kwiatek Piotr B.

    Published 2024-01-01
    “…Internet-mediated online communication, particularly with regard to a product, brand, or organization, is known as electronic word-of-mouth (eWOM). Analyzing this open exchange of opinions and information about a company or product among consumers can be extremely useful for businesses. …”
    Get full text
    Article
  8. 7128

    Improvements in Turbulent Jet Particle Dispersion Modeling and Its Validation with DNS by Ege Batmaz, Florian Webner, Daniel Schmeling, Claus Wagner

    Published 2025-05-01
    “…For a detailed and systematic evaluation of the new LPI model, we compare its performance with that of other commonly used models, such as the mean particle–eddy interaction time (MPI) model implemented in OpenFOAM<sup>®</sup> and the randomized particle–eddy interaction time (RPI) model from the literature. …”
    Get full text
    Article
  9. 7129
  10. 7130
  11. 7131
  12. 7132
  13. 7133
  14. 7134
  15. 7135
  16. 7136

    A Survey of Post-Quantum Cryptography Migration in Vehicles by Nils Lohmiller, Sabrina Kaniewski, Michael Menth, Tobias Heer

    Published 2025-01-01
    “…The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. …”
    Get full text
    Article
  17. 7137
  18. 7138
  19. 7139
  20. 7140

    An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs by T. Sudhakar, R. Praveen, V. Natarajan

    Published 2025-03-01
    “…Ensuring integrity and privacy of data while transmitting it from sensors to the data analytics servers is crucial in open network. Numerous mutual authentication schemes have been proposed to address this challenge. …”
    Get full text
    Article