-
81
Osmolyte-induced protein stability changes explained by graph theory
Published 2024-12-01Get full text
Article -
82
Unconditional quantum magic advantage in shallow circuit computation
Published 2024-12-01“…Abstract Quantum theory promises computational speed-ups over classical approaches. …”
Get full text
Article -
83
-
84
A low-complexity detection algorithm for quadrature spatial modulation systems
Published 2017-05-01“…To tackle the issues of the uncertainty number of the activated antennas and high computational complexity of maximum likelihood (ML) detection algorithm in quadrature spatial modulation (QSM),a low-complexity detec-tion algorithm was proposed.Firstly,the system model was reconstructed into a new model suitable for low-complexity detection algorithms in fixed active antennas systems based on compressed sensing (CS) signal re-construction theory.Then,based on the idea of orthogonal matching pursuit (OMP) algorithm and reconstructed model,a candidate set of activated antennas was obtained.Lastly,using ML algorithm to search the candidate,the index of activated antennas and the modulation symbol were selected.Simulation results show that the proposed de-tector is capable of achieving about 90% reduction in complexity with low performance loss compared with ML al-gorithm.…”
Get full text
Article -
85
Application of Computer Simulation Optimization Algorithm in Waste Treatment of Drilling Engineering
Published 2021-01-01Get full text
Article -
86
Computation of Channel Capacity Based on Self-Concordant Functions
Published 2012-01-01Get full text
Article -
87
Computer-based music production: Specifics of professional training
Published 2021-10-01“…The research methodological framework is based on the concepts of competency-based, activity-based, technological and personality-oriented approaches to education; research papers on the problems of using computer music technologies in education; theory and practice of teaching models application in higher education.The leading method was the modelling of the educational process in specialised training in the field of computer-based music production. …”
Get full text
Article -
88
Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment
Published 2021-01-01“…Finally, based on the impact of cloud computing, mobile e-commerce is analyzed, including relevant theories, service mode, architecture, core technology, and the application in e-commerce, which can realize e-commerce precision marketing, find the optimal path of logistics, and take effective security measures to avoid transaction risks. …”
Get full text
Article -
89
Computational Swarming: A Cultural Technique for Generative Architecture
Published 2014-11-01“…By taking advantage of the self-organisational capabilities of computational agent collectives whose global behaviour emerges from the local interaction of a large number of relatively simple individuals (as it does, for instance, in animal swarms), architects are able to understand buildings and urbanscapes in a novel way as complex spaces that are constituted by the movement of multiple material and informational elements. …”
Get full text
Article -
90
-
91
COMPUTATIONAL OPTIMIZATION AND COMPREHENSIVE ANALYSIS OF SUBWAY INTERIOR DESIGN AND USER PERCEPTION
Published 2024-09-01Get full text
Article -
92
COMPUTATIONAL OPTIMIZATION AND COMPREHENSIVE ANALYSIS OF SUBWAY INTERIOR DESIGN AND USER PERCEPTION
Published 2024-09-01Get full text
Article -
93
Reappraising double pendulum dynamics across multiple computational platforms
Published 2025-02-01“…This work will be useful for understanding chaos theory and efficient computational approaches in complex systems of dynamical nature. …”
Get full text
Article -
94
Modular Calabi-Yau fourfolds and connections to M-theory fluxes
Published 2024-12-01“…This, in turn, is sensitive to the complex structure of the fourfold. Focusing mainly on examples of fourfolds with a single complex structure parameter, it is demonstrated that the proposed arithmetic techniques are both applicable and consistent. …”
Get full text
Article -
95
Network Anomaly Detection System with Optimized DS Evidence Theory
Published 2014-01-01“…Network anomaly detection has been focused on by more people with the fast development of computer network. Some researchers utilized fusion method and DS evidence theory to do network anomaly detection but with low performance, and they did not consider features of network—complicated and varied. …”
Get full text
Article -
96
Correlation functions in T T ¯ $$ \textrm{T}\overline{\textrm{T}} $$ -deformed theories on the torus
Published 2024-11-01“…We focus on the two-point correlation functions in momentum space when the undeformed theory is a conformal field theory. The large momentum behavior of the correlation functions is computed and compared to that of T T ¯ $$ \textrm{T}\overline{\textrm{T}} $$ -deformed field theories defined on a plane. …”
Get full text
Article -
97
Infrared Optical Constants and Computational Studies of Neat Liquid -Butylethylether
Published 2013-01-01Get full text
Article -
98
Computational Modeling of the Interaction of Silver Nanoparticles with the Lipid Layer of the Skin
Published 2018-01-01Get full text
Article -
99
Cross media knowledge information retrieval model based on D-S evidence theory
Published 2024-12-01“…Therefore, a cross media knowledge information retrieval model using D-S evidence theory is proposed, which involves using approximate calculation methods to improve this theory for information fusion, reducing computational complexity, and using deep networks for fine-grained information retrieval to improve retrieval accuracy. …”
Get full text
Article -
100
The Asymptotic Synchronization Analysis for Two Kinds of Complex Dynamical Networks
Published 2012-01-01Get full text
Article