Showing 1,201 - 1,220 results of 28,739 for search '"computational"', query time: 0.09s Refine Results
  1. 1201
  2. 1202

    A note on computing the generalized inverse A T,S (2) of a matrix A by Xiezhang Li, Yimin Wei

    Published 2002-01-01
    “…Three types of iterative methods for A T,S (2) are presented if σ(GA|T) is a subset of the open right half-plane and they are extensions of existing computational procedures of A T,S (2), including special cases such as the weighted Moore-Penrose inverse A M,N † and the Drazin inverse AD. …”
    Get full text
    Article
  3. 1203
  4. 1204
  5. 1205
  6. 1206

    Training of future primary school and computer science teachers in the structure of information systems by O. Ihnatenko, V. Tolmachov, A. Ryabko

    Published 2024-06-01
    “…Computer Science)” at Oleksandr Dovzhenko Hlukhiv National Pedagogical University. …”
    Get full text
    Article
  7. 1207

    Computations of the M-Polynomials and Degree-Based Topological Indices for Dendrimers and Polyomino Chains by Young Chel Kwun, Adeel Farooq, Waqas Nazeer, Zohaib Zahid, Saba Noreen, Shin Min Kang

    Published 2018-01-01
    “…Moreover, by applying calculus, we compute nine important topological indices of under-study dendrimers and chains.…”
    Get full text
    Article
  8. 1208

    Quantum-Based Feature Selection for Multiclassification Problem in Complex Systems with Edge Computing by Wenjie Liu, Junxiu Chen, Yuxiang Wang, Peipei Gao, Zhibin Lei, Xu Ma

    Published 2020-01-01
    “…The complex systems with edge computing require a huge amount of multifeature data to extract appropriate insights for their decision making, so it is important to find a feasible feature selection method to improve the computational efficiency and save the resource consumption. …”
    Get full text
    Article
  9. 1209

    Approximating the Inverse of a Square Matrix with Application in Computation of the Moore-Penrose Inverse by F. Soleymani, M. Sharifi, S. Shateyi

    Published 2014-01-01
    “…This paper presents a computational iterative method to find approximate inverses for the inverse of matrices. …”
    Get full text
    Article
  10. 1210

    Superconducting quantum computing optimization based on multi-objective deep reinforcement learning by Yangting Liu

    Published 2025-01-01
    “…This method achieved excellent computational results on superconducting qubits. Optimum control of multi-process quantum computing can be achieved only by regulating the microwave pulse parameters of superconducting qubits, and such a set of global parameter values and control strategies are given.…”
    Get full text
    Article
  11. 1211
  12. 1212

    Anatomical Measurement of Normal Eustachian Tube on the Temporal Bone Computed Tomography Imaging by Yanti Anita Ratag, Sri Asriyani, Bachtiar Murtala, Masyita Gaffar

    Published 2020-11-01
    “…Tujuan: Menggambarkan pengukuran anatomis tuba Eustachius normal pada pencitraan Computed Tomography (CT) tulang temporal. Metode: Ini adalah penelitian deskriptif tuba Eustachius normal dengan mengukur diameter pretimpani, sudut tubotimpani dan panjang pars kartilago tuba Eustachius normal menggunakan teknik rekonstruksi multiplanar pada pencitraan CT tulang temporal dari 58 sampel di beberapa rumah sakit di Makassar. …”
    Get full text
    Article
  13. 1213

    COMPUTER MODEL OF AN AIRCRAFT TURBULENT FLOW OVER AND CALCULATION OF IT’S AERODYNAMIC CHARACTERISTICS by Yu. V. Yatskevich, Yu. V. Kozedub

    Published 2015-08-01
    “…Based on this model the computer system allowing to simulate aerodynamic processes around an aircraft and to calculate it’s aerodynamic characteristics was developed. …”
    Get full text
    Article
  14. 1214
  15. 1215

    Efficient optimisation of physical reservoir computers using only a delayed input by Enrico Picco, Lina Jaurigue, Kathy Lüdge, Serge Massar

    Published 2025-01-01
    “…Abstract Reservoir computing is a machine learning algorithm for processing time dependent data which is well suited for experimental implementation. …”
    Get full text
    Article
  16. 1216

    Application of Computer-Aided Precious Metal Materials in Electrochemistry of Ceramic Jewelry Design by Jing Li

    Published 2022-01-01
    “…In order to solve the electrochemical application of precious metal materials in ceramic jewelry design, a computer-aided design method of precious metal materials in ceramic jewelry was proposed. …”
    Get full text
    Article
  17. 1217
  18. 1218
  19. 1219

    Distinct neural computations scale the violation of expected reward and emotion in social transgressions by Ting Xu, Lei Zhang, Feng Zhou, Kun Fu, Xianyang Gan, Zhiyi Chen, Ran Zhang, Chunmei Lan, Lan Wang, Keith M. Kendrick, Dezhong Yao, Benjamin Becker

    Published 2025-01-01
    “…These findings underscore that reward and emotional violations interact to shape decisions in complex social interactions, while the underlying neurofunctional PEs computations are distinguishable.…”
    Get full text
    Article
  20. 1220

    Research of the small Qubit quantum computing attack to the RSA public key cryptography by Bao-nan WANG, Yu-hang CHEN, Bao YIN, Feng HU, Huan-guo ZHANG, Chao WANG

    Published 2017-10-01
    “…The small Qubit quantum algorithm attack to RSA was proposed,the need Qubit of the first quantum register from 2L to L1,it can be reduced to 2 Qubit,the overall space complexity denoted (L1,L),where 2L1≥r,r is the period of decomposed.Because of the reduce of the first quantum register,it reduces the algorithm’s complexity and success rates,and use the binary look-up table method to compute the modular exponentiation,it enhances the computing speed.The improved algorithm’s quantum circuit complexity is T=O(2L2).It have a significant improvement on the time complexity and space complexity.Although the success rate is reduced,the overall success solution time is still lower than the Shor algorithm and the current major improvements Shor algorithm.Completed a simulation experiment.Respectively use the 11、10、9 Qubit decomposing the quantum circuit 119.The new algorithm explore the reality of using a universal quantum computer device to decipher the public key cryptography.…”
    Get full text
    Article