Showing 261 - 280 results of 550 for search '"computational model"', query time: 0.10s Refine Results
  1. 261

    Impacts of noise and interference on the bit error rate of the FBMC-OQAM modulation scheme in 5G systems by A. Androon, O. V. Tikhonova

    Published 2024-05-01
    “…The graphical and numerical data obtained through computer modeling demonstrates improved BER in 5G networks using FBMC-OQAM. …”
    Get full text
    Article
  2. 262

    Advancing Alzheimer's Therapy: Computational strategies and treatment innovations by Jibon Kumar Paul, Abbeha Malik, Mahir Azmal, Tooba Gulzar, Muhammad Talal Rahim Afghan, Omar Faruk Talukder, Samar Shahzadi, Ajit Ghosh

    Published 2025-06-01
    “…Our findings underscore the critical role of computational models in elucidating disease mechanisms, identifying therapeutic targets, and expediting drug discovery. …”
    Get full text
    Article
  3. 263

    Herb-disease association prediction model based on network consistency projection by Lei Chen, Shiyi Zhang, Bo Zhou

    Published 2025-01-01
    “…Nevertheless, only a few computational models have been developed for HDA prediction. …”
    Get full text
    Article
  4. 264

    Numerical Investigation of Fracture Behavior for Glass Fiber Composite Concretes by Meryem Charef, Nabil Kazi Tani, Ahmed Soufiane Benosman, Hasan Dilbas

    Published 2024-12-01
    “…In this view, recycled waste aggregate-based concrete and its innovative design require advanced computational modeling techniques. Accordingly, this comprehensive and computational research is conducted to investigate the fracture behavior of notched glass fiber reinforced concrete beam modeled with finite element method. …”
    Get full text
    Article
  5. 265

    Maximum Independent Sets Partition of (n,k)-Star Graphs by Fu-Tao Hu

    Published 2019-01-01
    “…The (n,k)-star graph is a very important computer modelling. The independent number and chromatic number of a graph are two important parameters in graph theory. …”
    Get full text
    Article
  6. 266

    Egoistic versus Prosocial Decision Making: an Eye Movement Data Report by Anastasia Peshkovskaya

    Published 2025-01-01
    “…Data may be applicable in computational models of oculomotor activity to explain decision process and predict its outcomes.…”
    Get full text
    Article
  7. 267

    NUMERICAL MODELING OF THE INTENSE DEFORMED STATE AND PECULIARITIES OF STRUCTURE FORMATION OF CAST IRON AT HOT EXTRUSION MOLDING by A. I. Pokrovsky, P. E. Lushchik

    Published 2014-11-01
    “…The specific features of structure formation of high-strength cast iron subjected to direct extrusion with different strain (ε) are studied both theoretically (by computer modeling) and experimentally (by metallographic analysis using light and electron microscopes). …”
    Get full text
    Article
  8. 268

    Fraction Reduction in Membrane Systems by Ping Guo, Hong Zhang, Haizhu Chen, Ran Liu

    Published 2014-01-01
    “…P system is a new computing model, while the current methods for fraction reductions are not available in these systems. …”
    Get full text
    Article
  9. 269

    Test-Retest Reliability of Two Computationally-Characterised Affective Bias Tasks by Alexandra C. Pike, Katrina H. T. Tan, Hoda Tromblee, Michelle Wing, Oliver J. Robinson

    Published 2024-12-01
    “…Parameters from computational modelling of these tasks were in many cases less reliable than summary statistics. …”
    Get full text
    Article
  10. 270

    Sequential Spiking Neural P Systems with Local Scheduled Synapses without Delay by Alia Bibi, Fei Xu, Henry N. Adorna, Francis George C. Cabarle

    Published 2019-01-01
    “…Spiking neural P systems with scheduled synapses are a class of distributed and parallel computational models motivated by the structural dynamism of biological synapses by incorporating ideas from nonstatic (i.e., dynamic) graphs and networks. …”
    Get full text
    Article
  11. 271

    Universally composable secure multiparty computation protocol with fairness by You-liang TIAN, Chang-gen PENG, Jian-feng MA, Hui LIN, Kai YANG

    Published 2014-02-01
    “…A fair secure multiparty computation model with ideal functionalities was firstly formulated such as a fair secure multiparty addition computation and a fair secure multiparty multiplicative computation. …”
    Get full text
    Article
  12. 272

    Two-Dimensional Modelling and Validation of the Mass Flow in a Mixing Stirred Reactor by Daniela Kladeková, Renáta Oriňáková, Hans-Dieter Wiemhöfer, Annamária Krajníková, Andrej Oriňák

    Published 2013-08-01
    “…The present work focuses on the computational modelling of fluid flow in a mixing stirred reactor to describe the flow pattern in two‐dimensional (2D) detail, which can be useful for optimizing the parameters of electroplating for the production of a uniform film on metallic particles in a stirred electrolytic cell. …”
    Get full text
    Article
  13. 273

    Adolescent and adult mice use both incremental reinforcement learning and short term memory when learning concurrent stimulus-action associations. by Juliana Chase, Liyu Xia, Lung-Hao Tai, Wan Chen Lin, Anne G E Collins, Linda Wilbrecht

    Published 2024-12-01
    “…Using logistic regression and computational models to analyze the first 200 trials per odor, we determined that mice used both incremental RL and stimulus-insensitive, one-back strategies to solve the task. …”
    Get full text
    Article
  14. 274
  15. 275
  16. 276

    Digital Twins of Biological Systems: A Narrative Review by Ghufran A. Alsalloum, Nour M. Al Sawaftah, Kelly M. Percival, Ghaleb A. Husseini

    Published 2024-01-01
    “…DTs technology emerges as a pivotal tool in disease modeling, integrating diverse data sources to computationally model dynamic biological systems. This narrative review explores potential DT applications in medicine, from defining DTs and their history to constructing DTs, modeling biologically relevant systems, as well as discussing the benefits, risks, and challenges in their application. …”
    Get full text
    Article
  17. 277

    Federated learning based intelligent edge computing technique for video surveillance by Yu ZHAO, Jie YANG, Miao LIU, Jinlong SUN, Guan GUI

    Published 2020-10-01
    “…With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.…”
    Get full text
    Article
  18. 278

    The finding and researching algorithm for potentially oscillating enzymatic systems by T. N. Lakhova, F. V. Kazantsev, S. A. Lashin, Yu. G. Matushkin

    Published 2021-06-01
    “…Along with experimental approaches, mathematical and computer modeling is widely used to study oscillating biological systems. …”
    Get full text
    Article
  19. 279

    Secure outsource computing scheme of modular exponentiation based on single server by Weijie DING

    Published 2018-01-01
    “…At present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not be a fully trusted cloud server in the actual environment.Then a new secure method for outsourcing exponentiation modular a composite which based on a single server was proposed.The scheme used a new mathematical division method,it could ensure the privacy of the base and exponentiation.Compared with the existing schemes,the checkability of our scheme can be greatly improved.The user can detect the error result with the probability of 119/120.…”
    Get full text
    Article
  20. 280

    Overcoming dead-end situations of synthesis of motions of anthropomorphic robots on the basis of the use of motions of the clutch axis along the linear surface limiting the body an... by F. N. Pritykin

    Published 2024-09-01
    “…The results of calculations of intermediate configurations in computer modeling of motions of anthropomorphic robots in an organized environment using the developed algorithm are presented.…”
    Get full text
    Article