Showing 1,001 - 1,020 results of 28,739 for search '"computability"', query time: 0.07s Refine Results
  1. 1001

    A Computational Model of Peripheral Photocoagulation for the Prevention of Progressive Diabetic Capillary Occlusion by Thomas J. Gast, Xiao Fu, John Scott Gens, James A. Glazier

    Published 2016-01-01
    “…We developed a computational model of the propagation of retinal ischemia in diabetic retinopathy and analyzed the consequences of various patterns and sizes of burns in peripheral retinal photocoagulation. …”
    Get full text
    Article
  2. 1002
  3. 1003

    Computational Approaches to Facilitate Epitope-Based HLA Matching in Solid Organ Transplantation by Kirsten Geneugelijk, Jeroen Wissing, Dirk Koppenaal, Matthias Niemann, Eric Spierings

    Published 2017-01-01
    “…Thus, our data suggest that our computational approach is a powerful tool to estimate PIRCHE-II/eplet values when high-resolution HLA genotype data is not available.…”
    Get full text
    Article
  4. 1004
  5. 1005

    Point spread function estimation with computed wavefronts for deconvolution of hyperspectral imaging data by Miroslav Zabic, Michel Reifenrath, Charlie Wegner, Hans Bethge, Timm Landes, Sophia Rudorf, Dag Heinemann

    Published 2025-01-01
    “…To address this challenge, we have developed a method for PSF estimation in HSI systems based on computed wavefronts. The proposed technique optimizes an image quality metric by modifying the shape of a computed wavefront using Zernike polynomials and subsequently calculating the corresponding PSFs for input into a deconvolution algorithm. …”
    Get full text
    Article
  6. 1006

    Protective and Blast Resistive Design of Posttensioned Box Girders Using Computational Geometry by Majid Aleyaasin

    Published 2018-01-01
    “…The algorithm is based on a diagonal cross point in the Magnel quadrilateral and uses computational geometry instead of graphical drawing. …”
    Get full text
    Article
  7. 1007

    In-Network Filtering Schemes for Type-Threshold Function Computation in Wireless Sensor Networks by Guillermo G. Riva, Jorge M. Finochietto

    Published 2014-08-01
    “…In particular, we consider the computation of the maximum function as case study for these schemes. …”
    Get full text
    Article
  8. 1008
  9. 1009
  10. 1010

    Investigation of Flow Through Centrifugal Pump Impellers Using Computational Fluid Dynamics by Weidong Zhou, Zhimei Zhao, T. S. Lee, S. H. Winoto

    Published 2003-01-01
    “…With the aid of computational fluid dynamics, the complex internal flows in water pump impellers can be well predicted, thus facilitating the design of pumps. …”
    Get full text
    Article
  11. 1011
  12. 1012
  13. 1013

    An edge cloud–based body data sensing architecture for artificial intelligence computation by TaeYoung Kim, JongBeom Lim

    Published 2019-04-01
    “…As various applications and workloads move to the cloud computing system, traditional approaches of processing sensor data cannot be applied. …”
    Get full text
    Article
  14. 1014

    Localized and Excimer Triplet Electronic States of Naphthalene Dimers: A Computational Study by Lara Martínez-Fernández, Roberto Improta

    Published 2025-01-01
    “…Excimer minima exhibit a very intense absorption spectrum, peaking above 500 nm. The computed absorption spectra of localized minima significantly depend on the stacking geometry and do not coincide with that of isolated naphthalene. …”
    Get full text
    Article
  15. 1015

    Scheme on user identity attribute preserving based on ring signcryption for cloud computing by Shuan-bao LI, Jian-ming FU, Huan-guo ZHANG, Jing CHEN, Jing WANG, Bi-jun REN

    Published 2014-09-01
    “…Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which discusses user key parting management with decentralization.Users can choose some seeds for generation and storage of key,then integrated user key cannot be acquired by registrar,based on this payload on certifica-tion management is reduced.In addition,access-centric blindness ring signcryption verification for identity attribute is designed,which constitutes ring of users and CSP,combined with own attribute users can accomplish ring-oriented sub-linear blindness signcryption and non-interactive public ciphertext verifiability for messages so that integrity and confidentiality of identity attribute can be protected avoiding identity attribute leakage in collusion of multi-CSP.At last,strong blindness and unforgeability of ciphertext and attribute is proved in proposed model,three private key components can be generated by users and identity forgeability of ring member can be prevented successfully on the condition of DBDH difficult assumption and adaptive chosen-ciphertex tattacking.Effectiveness of proposed mechanism is verified via performance evaluation of blindness ring signcryption algorithm based on comprehensive payload in identity attribute protection,and optimization is confirmed compared with similar algorithms.…”
    Get full text
    Article
  16. 1016
  17. 1017

    Current Practice in the Management of Pulmonary Nodules Detected on Computed Tomography Chest Scans by Clarus Leung, Tawimas Shaipanich

    Published 2019-01-01
    “…It can present as one or more pulmonary nodules identified on computed tomography (CT) chest scans. The National Lung Screening Trial has shown that the use of low-dose CT chest screening can reduce deaths due to lung cancer. …”
    Get full text
    Article
  18. 1018
  19. 1019
  20. 1020