-
261
Impacts of noise and interference on the bit error rate of the FBMC-OQAM modulation scheme in 5G systems
Published 2024-05-01“…The graphical and numerical data obtained through computer modeling demonstrates improved BER in 5G networks using FBMC-OQAM. …”
Get full text
Article -
262
Advancing Alzheimer's Therapy: Computational strategies and treatment innovations
Published 2025-06-01“…Our findings underscore the critical role of computational models in elucidating disease mechanisms, identifying therapeutic targets, and expediting drug discovery. …”
Get full text
Article -
263
Herb-disease association prediction model based on network consistency projection
Published 2025-01-01“…Nevertheless, only a few computational models have been developed for HDA prediction. …”
Get full text
Article -
264
Numerical Investigation of Fracture Behavior for Glass Fiber Composite Concretes
Published 2024-12-01“…In this view, recycled waste aggregate-based concrete and its innovative design require advanced computational modeling techniques. Accordingly, this comprehensive and computational research is conducted to investigate the fracture behavior of notched glass fiber reinforced concrete beam modeled with finite element method. …”
Get full text
Article -
265
Maximum Independent Sets Partition of (n,k)-Star Graphs
Published 2019-01-01“…The (n,k)-star graph is a very important computer modelling. The independent number and chromatic number of a graph are two important parameters in graph theory. …”
Get full text
Article -
266
Egoistic versus Prosocial Decision Making: an Eye Movement Data Report
Published 2025-01-01“…Data may be applicable in computational models of oculomotor activity to explain decision process and predict its outcomes.…”
Get full text
Article -
267
NUMERICAL MODELING OF THE INTENSE DEFORMED STATE AND PECULIARITIES OF STRUCTURE FORMATION OF CAST IRON AT HOT EXTRUSION MOLDING
Published 2014-11-01“…The specific features of structure formation of high-strength cast iron subjected to direct extrusion with different strain (ε) are studied both theoretically (by computer modeling) and experimentally (by metallographic analysis using light and electron microscopes). …”
Get full text
Article -
268
Fraction Reduction in Membrane Systems
Published 2014-01-01“…P system is a new computing model, while the current methods for fraction reductions are not available in these systems. …”
Get full text
Article -
269
Test-Retest Reliability of Two Computationally-Characterised Affective Bias Tasks
Published 2024-12-01“…Parameters from computational modelling of these tasks were in many cases less reliable than summary statistics. …”
Get full text
Article -
270
Sequential Spiking Neural P Systems with Local Scheduled Synapses without Delay
Published 2019-01-01“…Spiking neural P systems with scheduled synapses are a class of distributed and parallel computational models motivated by the structural dynamism of biological synapses by incorporating ideas from nonstatic (i.e., dynamic) graphs and networks. …”
Get full text
Article -
271
Universally composable secure multiparty computation protocol with fairness
Published 2014-02-01“…A fair secure multiparty computation model with ideal functionalities was firstly formulated such as a fair secure multiparty addition computation and a fair secure multiparty multiplicative computation. …”
Get full text
Article -
272
Two-Dimensional Modelling and Validation of the Mass Flow in a Mixing Stirred Reactor
Published 2013-08-01“…The present work focuses on the computational modelling of fluid flow in a mixing stirred reactor to describe the flow pattern in two‐dimensional (2D) detail, which can be useful for optimizing the parameters of electroplating for the production of a uniform film on metallic particles in a stirred electrolytic cell. …”
Get full text
Article -
273
Adolescent and adult mice use both incremental reinforcement learning and short term memory when learning concurrent stimulus-action associations.
Published 2024-12-01“…Using logistic regression and computational models to analyze the first 200 trials per odor, we determined that mice used both incremental RL and stimulus-insensitive, one-back strategies to solve the task. …”
Get full text
Article -
274
-
275
-
276
Digital Twins of Biological Systems: A Narrative Review
Published 2024-01-01“…DTs technology emerges as a pivotal tool in disease modeling, integrating diverse data sources to computationally model dynamic biological systems. This narrative review explores potential DT applications in medicine, from defining DTs and their history to constructing DTs, modeling biologically relevant systems, as well as discussing the benefits, risks, and challenges in their application. …”
Get full text
Article -
277
Federated learning based intelligent edge computing technique for video surveillance
Published 2020-10-01“…With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.…”
Get full text
Article -
278
The finding and researching algorithm for potentially oscillating enzymatic systems
Published 2021-06-01“…Along with experimental approaches, mathematical and computer modeling is widely used to study oscillating biological systems. …”
Get full text
Article -
279
Secure outsource computing scheme of modular exponentiation based on single server
Published 2018-01-01“…At present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not be a fully trusted cloud server in the actual environment.Then a new secure method for outsourcing exponentiation modular a composite which based on a single server was proposed.The scheme used a new mathematical division method,it could ensure the privacy of the base and exponentiation.Compared with the existing schemes,the checkability of our scheme can be greatly improved.The user can detect the error result with the probability of 119/120.…”
Get full text
Article -
280
Overcoming dead-end situations of synthesis of motions of anthropomorphic robots on the basis of the use of motions of the clutch axis along the linear surface limiting the body an...
Published 2024-09-01“…The results of calculations of intermediate configurations in computer modeling of motions of anthropomorphic robots in an organized environment using the developed algorithm are presented.…”
Get full text
Article