Search alternatives:
commuting » competing (Expand Search)
Showing 5,861 - 5,880 results of 7,907 for search '(commuting OR computing) behavior', query time: 0.19s Refine Results
  1. 5861

    Geodesics of Finsler Hayward black hole surrounded by quintessence by B. R. Yashwanth, S. K. Narasimhamurthy, Z. Nekouee, Manjunath Malligawad

    Published 2024-12-01
    “…Our analysis delves into the effective potential, providing insights into null geodesics for various energy levels and examining the behavior of horizons by utilizing the definition of the effective potential. …”
    Get full text
    Article
  2. 5862

    Psychosemantic Peculiarities of Promotional Videos Perception by Anzhelika Shamne, Tamiliia Dotsevych, Alina Akimova

    Published 2019-04-01
    “…The modern advertising is seen as a societal and socio-psychological phenomenon that models not only the behavior but also the values, standards and mindsets of the younger generation. …”
    Get full text
    Article
  3. 5863

    Theory and simulations of few-photon Fock state pulses strongly interacting with a single qubit in a waveguide: Exact population dynamics and time-dependent spectra by Sofia Arranz Regidor, Andreas Knorr, Stephen Hughes

    Published 2025-06-01
    “…Numerically, we also present matrix product state (MPS) simulations, which allow us to compute more general photon correlation functions for arbitrary quantum pulses, and we use this approach to also show results for Gaussian quantum pulses and to confirm the accuracy of our analytical solutions. …”
    Get full text
    Article
  4. 5864

    Abordagem adaptativa aplicada ao planejamento agregado da produção sob incertezas Adaptive approach applied to aggregate production planning under uncertainties by Oscar Salviano Silva Filho, Wagner Cezarino

    Published 2010-03-01
    “…An example, where the inventory balance system is subject to weak and strong variability in actual demand, is employed to analyze the behavior of the proposed approach. Finally, the results provided by the proposed approach are compared with another suboptimal approach, the main characteristic of which is not allowing periodic reviews.…”
    Get full text
    Article
  5. 5865

    Research on the Causes of the Concave Shapes of Traditional Chinese Building Roofs from the Construction Perspective by Xiang Chen, Chenyuan Wang, Jie Sun, Weijie Xia

    Published 2025-07-01
    “…Through a systematic review of historical literature (especially Yingzao fashi (Treatise on Architectural Methods)); the empirical investigation and analysis of typical architectural examples; detailed research on the structural practices, material properties (especially the creep behavior of timber), and construction techniques of key timber components such as flying rafters, hip rafters, and rafters; and mechanical principles and computational simulation, this study found that the concave curved forms of different parts of the roof, such as the eaves (flying rafters), corners (corner upturn), and main body (Ju zhe), are not purely esthetic choices but are, to a large extent, technical responses or inevitable results stemming from objective construction constraints of the time, including limitations on timber length, component connection methods, structural load distribution, and long-term deformation. …”
    Get full text
    Article
  6. 5866

    Development of a Non-Uniform Heat Source Model for Accurate Prediction of Wheel Tread Temperature on Long Downhill Ramps by Jinyu Zhang, Jingxian Ding, Jianyong Zuo

    Published 2025-05-01
    “…Accurately simulating the thermal behavior of wheel–brake shoe friction on long downhill ramps is challenging due to the complexity of modeling appropriate heat source models. …”
    Get full text
    Article
  7. 5867

    Synthetic Biology – Friend or Foe? What Kind of Threats Should We Expect? by J. Lakota

    Published 2023-06-01
    “…Basic tools and techniques of synthetic biology are: DNA synthesis and DNA sequencing; «chassis», i.e. host system harboring the genetic toolbox for expression of the desired genes, delivered by suitable vectors, of the engineered biological pathway; engineering of transcription systems that do not deplete the resources of the cell (synthetic promotors and transcription factors); genome modification tools (CRISPR/Cas9 nuclease, zinc finger nucleases, TALE nucleases, meganucleases); computer-aided tools (involved in basic structural design and synthesis; in network design; in prediction of behavior/function/response). …”
    Get full text
    Article
  8. 5868

    Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain by Lin JIN, Youliang TIAN

    Published 2022-08-01
    “…Currently, there is no data exchanging and sharing between different hospitals, and it is easy to form data islands.At the same time, regional medical data contains a large amount of sensitive information of patients.The public acquisition, sharing and circulation of these data will lead to malicious tampering, theft, abuse and loss of ownership, thereby revealing patient privacy.In addition, the size of medical data is enormous and the data is unstructured, then it is more difficult to prevent and hold accountable some highly targeted malicious attacks, such as malicious attacks on medical data theft, tampering, and extortion.In view of the above problems, a blockchain-based on multi-authority attribute hidden electronic medical record sharing scheme was proposed to achieve fine-grained access to shared electronic medical records while ensuring patient privacy.The Multi-Authorization Attribute Encryption (MA-ABE) algorithm was introduced, which used multi-authority organizations to manage decentralized attributes.It also used hash functions to identify different users, in order to effectively resist collusion attacks between users with different authorizations.Besides, the linear secrets sharing scheme (LSSS) was used to realize partial hiding of attributes, and the attributes were divided into two parts:attribute name and attribute value.In addition, combined with the characteristics of blockchain openness, transparency and tamper-proof, the design of access policy can update the algorithm.Based on the access policy update algorithm, the policy block was added.The new access policy was uploaded to the blockchain to form a policy update traceability chain, which can realize distributed and reliable access control management under the condition of hidden policy.It can also support data privacy protection at the same time, and traceability of user behavior.The theoretical proof and experimental analysis have proved that this scheme protect attribute privacy effectively, while reduces computational overhead.…”
    Get full text
    Article
  9. 5869

    Stress distribution by parafunctional loading on tooth–implant, implant–implant, and tooth–tooth-supported prosthesis: A comparative three-dimensional finite element analysis by P Ambili Ravindran, Rohit Raghavan, Kiran Christopher, Sethu Sramadathil, Ann George, Athira Kattachirakunnel Sasi

    Published 2024-10-01
    “…Meterials and Methods: Cone-beam computed tomography data was used by Mimics software (Materialize Mimics 19) to create a three-dimensional finite element simulation of the jaw. …”
    Get full text
    Article
  10. 5870

    Features of gifted teenagers’ representations of a person in a digital society by N.B. Shumakova, G.R. Nurieva

    Published 2024-12-01
    “…Subjective representations mediate people’s perception and comprehension of the world, influencing their activity and behavior. The study analyzes the subjective representations of modern teenagers about a person in a digital society, which are of great importance for their socialization and life plans. …”
    Get full text
    Article
  11. 5871

    Structural, electronic, and optical properties of (2D)MXenes Zr₂CT₂(T = O and F) studied using the (DFT + U) method by Shahab Rahimi, Ebrahim Heidari Semiromi, Alireza Mostafaei

    Published 2025-07-01
    “…These findings provide a deeper understanding of the electronic and optical behavior of the Zr₂CO₂ and Zr₂CF₂ (2D) monolayers and pave the way for developing novel applications in electronic and optical technologies.…”
    Get full text
    Article
  12. 5872

    Simulation of direct mapped, k-way and fully associative cache on all pairs shortest paths algorithms by A. A. Prihozhy

    Published 2019-12-01
    “…When the processor accesses memory, the cache behavior depends on if the data is in cache: a cache hit occurs if it is, and, a cache miss occurs, otherwise. …”
    Get full text
    Article
  13. 5873

    Dynamics of link formation in networks structured on the basis of predictive terms by S. O. Kramarov, O. R. Popov, I. E. Dzhariev, E. A. Petrov

    Published 2023-06-01
    “…The exploratory data analysis carried out in the STATISTICA software package indicates the correlation of the behavior of the introduced MADSTA keyword integrator with basic terms including periods of extremes, confirming the correctness of the choice of the methodology for detailing the study by year.Conclusions. …”
    Get full text
    Article
  14. 5874

    Gaze Synchrony between Mothers with Mood Disorders and Their Infants: Maternal Emotion Dysregulation Matters. by Annett Lotzin, Georg Romer, Julia Schiborr, Berit Noga, Michael Schulte-Markwort, Brigitte Ramsauer

    Published 2015-01-01
    “…The mothers' and infants' gaze behaviors were coded using microanalysis with the Maternal Regulatory Scoring System and Infant Regulatory Scoring System, respectively. …”
    Get full text
    Article
  15. 5875

    MODELING THE FORMATION OF FLUORIDE NITROGEN-RICH HOT SPRINGS IN THE WATER – CRYSTALLINE ROCK SYSTEM by S. Kh. Pavlov, K. V. Chudnenko, A. V. Khromov

    Published 2020-06-01
    “…Differences are hardly noticeable in the behavior of cations, fluorine, chlorine, and sulfates, but are strongly manifested in changes in the quantities of carbon and silicon compounds and transformations of their forms. …”
    Get full text
    Article
  16. 5876

    Comparative Study of the Nonlinear Fractional Generalized Burger-Fisher Equations Using the Homotopy Perturbation Transform Method and New Iterative Transform Method by Mashael M. AlBaidani

    Published 2025-06-01
    “…Maple is used to derive the approximate series solution’s behavior, which is graphically displayed for a number of fractional orders. …”
    Get full text
    Article
  17. 5877

    Development of an imitation learning method for a neural network system of mobile robot’s movement on example of the maze solving by T. Yu. Kim, R. A. Prakapovich

    Published 2024-09-01
    “…The work uses the method of computer modeling in the MATLAB/Simulink environment.Results. …”
    Get full text
    Article
  18. 5878

    An automated approach to identify sarcasm in low-resource language. by Shumaila Khan, Iqbal Qasim, Wahab Khan, Aurangzeb Khan, Javed Ali Khan, Ayman Qahmash, Yazeed Yasin Ghadi

    Published 2024-01-01
    “…However, this task is challenging due to the influence of the user's behavior and attitude and their expression of emotions. …”
    Get full text
    Article
  19. 5879

    Modeling Porosity Distribution Strategies in PEM Water Electrolyzers: A Comparative Analytical and Numerical Study by Ali Bayat, Prodip K. Das, Suvash C. Saha

    Published 2025-06-01
    “…These functions are integrated into a three-dimensional multi-domain COMSOL simulation to assess their impact on electrochemical performance and transport behavior. The results reveal that although porosity variations have minimal effect on polarization at low voltages, they significantly influence internal pressure, species distribution, and gas evacuation at higher loads. …”
    Get full text
    Article
  20. 5880

    Determining Energy Production and Consumption Signatures Using Unsupervised Clustering by Andrzej Marciniak, Arkadiusz Małek

    Published 2025-05-01
    “…The analyses conducted were subjected to expert validation aimed at explaining the nature of the behavior of the power generation and consumption systems. …”
    Get full text
    Article