Showing 1,181 - 1,200 results of 28,739 for search '"computing"', query time: 0.09s Refine Results
  1. 1181

    COMPUTER MODEL OF AN AIRCRAFT TURBULENT FLOW OVER AND CALCULATION OF IT’S AERODYNAMIC CHARACTERISTICS by Yu. V. Yatskevich, Yu. V. Kozedub

    Published 2015-08-01
    “…Based on this model the computer system allowing to simulate aerodynamic processes around an aircraft and to calculate it’s aerodynamic characteristics was developed. …”
    Get full text
    Article
  2. 1182
  3. 1183

    Efficient optimisation of physical reservoir computers using only a delayed input by Enrico Picco, Lina Jaurigue, Kathy Lüdge, Serge Massar

    Published 2025-01-01
    “…Abstract Reservoir computing is a machine learning algorithm for processing time dependent data which is well suited for experimental implementation. …”
    Get full text
    Article
  4. 1184

    Application of Computer-Aided Precious Metal Materials in Electrochemistry of Ceramic Jewelry Design by Jing Li

    Published 2022-01-01
    “…In order to solve the electrochemical application of precious metal materials in ceramic jewelry design, a computer-aided design method of precious metal materials in ceramic jewelry was proposed. …”
    Get full text
    Article
  5. 1185
  6. 1186
  7. 1187

    Distinct neural computations scale the violation of expected reward and emotion in social transgressions by Ting Xu, Lei Zhang, Feng Zhou, Kun Fu, Xianyang Gan, Zhiyi Chen, Ran Zhang, Chunmei Lan, Lan Wang, Keith M. Kendrick, Dezhong Yao, Benjamin Becker

    Published 2025-01-01
    “…These findings underscore that reward and emotional violations interact to shape decisions in complex social interactions, while the underlying neurofunctional PEs computations are distinguishable.…”
    Get full text
    Article
  8. 1188

    Research of the small Qubit quantum computing attack to the RSA public key cryptography by Bao-nan WANG, Yu-hang CHEN, Bao YIN, Feng HU, Huan-guo ZHANG, Chao WANG

    Published 2017-10-01
    “…The small Qubit quantum algorithm attack to RSA was proposed,the need Qubit of the first quantum register from 2L to L1,it can be reduced to 2 Qubit,the overall space complexity denoted (L1,L),where 2L1≥r,r is the period of decomposed.Because of the reduce of the first quantum register,it reduces the algorithm’s complexity and success rates,and use the binary look-up table method to compute the modular exponentiation,it enhances the computing speed.The improved algorithm’s quantum circuit complexity is T=O(2L2).It have a significant improvement on the time complexity and space complexity.Although the success rate is reduced,the overall success solution time is still lower than the Shor algorithm and the current major improvements Shor algorithm.Completed a simulation experiment.Respectively use the 11、10、9 Qubit decomposing the quantum circuit 119.The new algorithm explore the reality of using a universal quantum computer device to decipher the public key cryptography.…”
    Get full text
    Article
  9. 1189
  10. 1190
  11. 1191

    Computer Axial Tomography and evoked potentials as predictors of clinical improvement in cranioencephalic trauma. by José Ramón Tejera del Valle, Florencio Pons Moscoso, Joaquín Aguilar Trujillo, Yarima López Puig, José Arteaga Bermúdez

    Published 2009-03-01
    “…<br /><strong>Objective: </strong>To assess the effectiveness of Computer Axial Tomography and evoked potentials to predict clinical improvement six moths after cranioencephalic trauma. …”
    Get full text
    Article
  12. 1192

    Bifid Mandibular Canal: A Proportional Meta-Analysis of Computed Tomography Studies by Nyan Min Aung, Kyaw Kyaw Myint

    Published 2023-01-01
    “…In vivo, computed tomography, and cross-sectional studies were eligible. …”
    Get full text
    Article
  13. 1193

    Research on heterogeneous radio access and resource allocation algorithm in vehicular fog computing by Kai XIONG, Supeng LENG, Ke ZHANG, Hao LIU

    Published 2019-06-01
    “…With the development of intelligent transportation and the constant emergence of new vehicular on-board applications,such as automatic driving,intelligent vehicular interaction and safety driving.It is difficult for an independent vehicle to run a wide variety of applications with a large number of computing needs and time delay needs relying on its own limited computing resources.By distributing computing tasks in devices on the edge of the network,fog computing applies virtualization technology,distributed computing technology and parallel computing technology to enable users to dynamically obtain computing power,storage space and other services on demand.Applying fog computing architecture to Internet of vehicles can effectively alleviate the contradiction between the large computing-low delay demands and limited vehicular resources.By analyzing the channel capacity of vehicle-to-vehicle communication,vehicle-infrastructure communication and vehicle-time-delay tolerant network communication,an optimization model of heterogeneous access to multi-service resources for the Internet of vehicles was established,and various vehicle-to-fog resources were jointly dispatched to realize efficient processing of intelligent transportation applications.The simulation results show that the proposed reinforcement learning algorithm can effectively deal with the resource allocation in the heterogeneous vehicular fog architecture.…”
    Get full text
    Article
  14. 1194
  15. 1195
  16. 1196

    Synthesis of Novel VO(II)-Perimidine Complexes: Spectral, Computational, and Antitumor Studies by Gamil A. Al-Hazmi, Khlood S. Abou-Melha, Nashwa M. El-Metwaly, Kamel A. Saleh

    Published 2018-01-01
    “…Essential parameters were computed based on frontier energy gaps with all compounds. …”
    Get full text
    Article
  17. 1197

    Three-Dimensional Measurement of TRISO Coated Particle Using Micro Computed Tomography by Libing Zhu, Xincheng Xiang, Yahui Peng, Xiangang Wang

    Published 2019-01-01
    “…The fuel safety and performance of high-temperature gas-cooled reactor (HTGR) are dependent on the integrity and geometric parameter of Tri-structural Isotropic (TRISO) coated particle. Micro X-ray computed tomography (CT) was used for nondestructive testing and three-dimensional measurement of the particle components which are composed of kernel, buffer layer, inner pyrolytic carbon layer (IPyC), silicon carbide (SiC) layer, and outer pyrolytic carbon (OPyC) layer. …”
    Get full text
    Article
  18. 1198
  19. 1199
  20. 1200