Showing 841 - 860 results of 28,739 for search '"computability"', query time: 0.07s Refine Results
  1. 841

    Safety of electromagnetic factors for the workplace equipped with personal computers in residential premises by Yu. G. Ryabov, N. M. Legkiy, G. V. Lomaev

    Published 2022-04-01
    “…The aim of this paper is to analyze the electromagnetic safety of 50Hz industrial frequency electrical networks in residential buildings when using workplaces equipped with personal computers (PCs), as well as to develop recommendations on reducing the impact of levels of industrial frequency electromagnetic fields on human health in residential premises.Methods. …”
    Get full text
    Article
  2. 842

    Trend of next generation network architecture:computing and networking convergence evolution by Huijuan ·AO, Liang GENG

    Published 2019-09-01
    Subjects: “…computing and networking convergence…”
    Get full text
    Article
  3. 843
  4. 844
  5. 845
  6. 846

    Modeling the Hemodynamic Characteristics of the Carrotic Care Blood Based on Computer Tomography by D. A. Baliuk, N. S. Davydova, M. M. Mezhennaya, M. V. Davydov

    Published 2021-10-01
    “…The purpose of the work was to conduct modeling of hemodynamics of blood flow and study the hemodynamic characteristics of blood vessels. 3D models of the carotid artery were constructed based on images of a computer tomography in the 3D SLICER software package. …”
    Get full text
    Article
  7. 847

    Swarming Computational Procedures for the Coronavirus-Based Mathematical SEIR-NDC Model by Suthep Suantai, Zulqurnain Sabir, Muhammad Asif Zahoor Raja, Watcharaporn Cholamjiak

    Published 2022-01-01
    “…The numerical solutions of the SEIR-NDC model are presented by using the computational framework of artificial neural networks (ANNs) together with the swarming optimization procedures aided with the sequential quadratic programming. …”
    Get full text
    Article
  8. 848
  9. 849

    One Kind New Hybrid Power Mean and Its Computational Formulae by Li Wang, Xuexia Wang

    Published 2022-01-01
    “…The main purpose of this study is to use the elementary and analytic methods and the properties of the classical Gauss sums to study the calculation problems of one kind of hybrid power mean involving the quadratic character sums and the two-term exponential sums and give an exact computational formula for it.…”
    Get full text
    Article
  10. 850

    A New Model for Capturing the Spread of Computer Viruses on Complex-Networks by Chunming Zhang, Tianliang Feng, Yun Zhao, Guifeng Jiang

    Published 2013-01-01
    “…Based on complex network, this paper proposes a novel computer virus propagation model which is motivated by the traditional SEIRQ model. …”
    Get full text
    Article
  11. 851

    Computing the Fixed Points of Strictly Pseudocontractive Mappings by the Implicit and Explicit Iterations by Yeong-Cheng Liou

    Published 2012-01-01
    “…In this paper, we devote to study computing the fixed points of strictly pseudocontractive mappings by the iterations. …”
    Get full text
    Article
  12. 852
  13. 853

    Edge computing business model and key solutions for its landing and deployment by Yuan ZHAO, Bing XIN, Hongyuan MA, Lifeng CHEN

    Published 2020-09-01
    “…Edge computing is an innovation of network architecture and business model for operators.5G edge computing node is composed of 5G UPF and edge computing platform.It can be deployed at different levels of the network based on the demand for bandwidth,delay and local streaming.In the perspective of 5G application scenarios,depending on edge computing can meet the customer needs of differentiated vertical industries and seize the market opportunities,which is a sharp tool for operators to enter the vertical industry.The business model,billing scheme,landing deployment strategy and scheme of edge computing deployment were mainly studied,including business scenario,infrastructure,hardware system,site selection methodology,construction scheme,peripheral networking scheme,etc.…”
    Get full text
    Article
  14. 854

    Computing Assortative Mixing by Degree with the s-Metric in Networks Using Linear Programming by Lourens J. Waldorp, Verena D. Schmittmann

    Published 2015-01-01
    “…The s-metric is normalized with respect to the class of networks without self-loops, multiple edges, and multiple components, while degree correlation is always normalized with respect to unrestricted networks, where self-loops, multiple edges, and multiple components are allowed. The challenge in computing the normalized s-metric is in obtaining the minimum and maximum value within a specific class of networks. …”
    Get full text
    Article
  15. 855
  16. 856
  17. 857

    A Novel Cost Based Model for Energy Consumption in Cloud Computing by A. Horri, Gh. Dastghaibyfard

    Published 2015-01-01
    “…To support green cloud computing, providers also need to minimize cloud infrastructure energy consumption while conducting the QoS. …”
    Get full text
    Article
  18. 858
  19. 859

    Estimated Interval-Based Checkpointing (EIC) on Spot Instances in Cloud Computing by Daeyong Jung, JongBeom Lim, Heonchang Yu, Taeweon Suh

    Published 2014-01-01
    “…In cloud computing, users can rent computing resources from service providers according to their demand. …”
    Get full text
    Article
  20. 860