Showing 901 - 920 results of 28,739 for search '"computability"', query time: 0.06s Refine Results
  1. 901
  2. 902

    Low computational complexity PTS scheme for PAPR reduction in OFDM system by WANG Ling-yin, CAO Ye-wen

    Published 2009-01-01
    “…Concerning that the main drawback of conventional PTS was the large computational complexity, a new low computational complexity PTS (LCC-PTS) scheme was proposed. …”
    Get full text
    Article
  3. 903
  4. 904

    Triple-Phase Computed Tomography and Sonoelastographic Evaluation in Focal Hepatic Lesions by Satish D. Patil, H Arjun Kamat, Vishal Nimbal, Siddaroodha Sajjan, Rajshekhar Muchandi, Shivanand Patil, Suresh Kanamadi

    Published 2024-12-01
    “…This study explores the effectiveness of triple-phase computed tomography (CT) and sonoelastography in evaluating focal hepatic lesions. …”
    Get full text
    Article
  5. 905

    Computational simulation of biaxial fatigue behaviour of lotus-type porous material by J. Kramberger, M. Sori, M. Sraml, S. Glodez

    Published 2016-06-01
    “…A computational simulation of low-cycle fatigue behaviour of lotus-type porous material, subjected to biaxial in-phase loading cycles is presented in this paper. …”
    Get full text
    Article
  6. 906

    Developing novel Lin28 inhibitors by computer aided drug design by Victor M. Matias-Barrios, Mariia Radaeva, Graciella Rosellinny, Qiongqiong Jia, Ning Xie, Monica Villanueva, Hanadi Ibrahim, Jason Smith, Martin Gleave, Nada Lallous, Suzana K. Straus, Artem Cherkasov, Xuesen Dong

    Published 2025-01-01
    “…In this contribution, we applied computer-aided drug design (CADD) in combination with quantitative biochemical and biological assays. …”
    Get full text
    Article
  7. 907

    Constructing a Private Cloud Computing Platform Based on OpenStack by Xiaoning Li, Lei Li, Lianwen Jin, Desheng Li

    Published 2012-09-01
    Subjects: “…private cloud computing…”
    Get full text
    Article
  8. 908
  9. 909

    Preface to the Iberoamerican Human-Computer Interaction Conference 2024 Special Issue by Maria Amelia Eliseo, Valéria Farinazzo Martins

    Published 2025-02-01
    “… Preface to the Iberoamerican Human-Computer Interaction Conference 2024 Special Issue …”
    Get full text
    Article
  10. 910
  11. 911

    A computational deep learning investigation of animacy perception in the human brain by Stefanie Duyck, Andrea I. Costantino, Stefania Bracci, Hans Op de Beeck

    Published 2024-12-01
    “…These findings provide computational support that the Animal bias for zoomorphic objects is a unique property of human perception yet can be explained by human learning history.…”
    Get full text
    Article
  12. 912
  13. 913

    Diagnostic criteria for asthenic accommodative asthenopia in patients with computer vision syndrome by I.G. Ovechkin, I.S. Gadzhiev, Kozhukhov A.A, E.I. Belikova

    Published 2020-11-01
    “…</i> </p> <p> <i><b>Keywords</b>: asthenopia, computer vision syndrome, accommodation, objective accommodography.…”
    Get full text
    Article
  14. 914
  15. 915

    Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network by Zizhen Zhang, Huizhong Yang

    Published 2014-01-01
    “…An SEIQRS model for the transmission of malicious objects in computer network with two delays is investigated in this paper. …”
    Get full text
    Article
  16. 916

    The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures by Ajit Narayanan, Yi Chen, Shaoning Pang, Ban Tao

    Published 2013-01-01
    “…The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). …”
    Get full text
    Article
  17. 917

    Enhancing Railway Maintenance Safety Using Open-Source Computer Vision by Donghee Shin, Jangwon Jin, Jooyoung Kim

    Published 2021-01-01
    “…Images of railway signs, tracks, and maintenance workers on the tracks were recorded through image data. The Computer Vision OpenCV library was utilized to extract the image data. …”
    Get full text
    Article
  18. 918

    Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations by Hang Tu, Debiao He, Baojun Huang

    Published 2014-01-01
    “…A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first. …”
    Get full text
    Article
  19. 919

    Computational and dynamic performance of NN-based control in wind energy systems by Belkasem Imodane, Kaoutar Dahmane, Brahim Bouachrine, Abdellah El idrissi, Mohamed Benydir, Mohamed Ajaamoum

    Published 2024-01-01
    “…To achieve this, we implement both control strategies on a LAUNCHXL-F28069M DSP board using Processor-In-the-Loop (PIL) techniques, enabling a direct comparison of their dynamic and computational performance. While NNC-based control shows superior adaptability and responsiveness, it consumes more computational resources than SMC, particularly in terms of execution time and power consumption. …”
    Get full text
    Article
  20. 920