-
301
Implementation of Membrane Algorithms on GPU
Published 2014-01-01“…Membrane algorithms are a new class of parallel algorithms, which attempt to incorporate some components of membrane computing models for designing efficient optimization algorithms, such as the structure of the models and the way of communication between cells. …”
Get full text
Article -
302
On a data-driven mathematical model for prostate cancer bone metastasis
Published 2024-12-01“…By integrating in vivo studies with in silico models, these obstacles can be potentially overcome. Existing computational models of tumor response to $ ^{223} $Ra are often computationally intensive. …”
Get full text
Article -
303
Research progress of trusted sensor-cloud based on fog computing
Published 2019-03-01“…The sensor-cloud is combined with cloud computing and wireless sensor networks,which extends the service ability of WSN by the support of cloud computing.It is one of the hot topics among the current researches.After comparing and surveying the mainstream system adequately,the characteristics and development of sensor-Cloud were summed up.Then,the direct influence of existing trust issues in the system for data protection and application on upper layer were found.The announced reasons explained that existing schemes were difficult to provide trusted sensor-cloud services.This was because that the capabilities of the underlying WSN nodes were too weak,and cloud computing model lacked the direct management of underlying nodes and data and so on.The trusted structures based on fog computing were given,and the key technologies of trusted evaluation,trusted data collection,and trusted storage were designed.Finally,the discussion pointed out new views for the researches in trusted sensor-cloud.…”
Get full text
Article -
304
Simulating Systems Thinking under Bounded Rationality
Published 2020-01-01“…Brian Arthur’s El Farol bar model of bounded rationality provides a simple computer model of decision making in a complex, dynamic, and self-organized environment. …”
Get full text
Article -
305
On the Relationship between Mathematical Theories and Financial Markets A Critical Review on the Book Lecturing Birds on Flying
Published 2022-04-01“…By explaining the role of the educational system in creating a gap between theory and practice and the role of Quants in promoting and applying quantitative and computational models, the author gives a different account of the causes of financial crises. …”
Get full text
Article -
306
Numerical homogenization of piezoelectric textiles with electrospun fibers for energy harvesting
Published 2014-07-01“…Due to the importance of computational modeling to understand the influence that micro-scale geometry and constitutive variables have on the macroscopic behavior, a homogenization strategy is developed. …”
Get full text
Article -
307
Independently Rotating Wheels with Induction Motors for High-Speed Trains
Published 2011-01-01“…This paper presents an investigation into the design of a novel induction motor configuration and controller for IRW in order to provide the stability required to satisfy the performance requirements for railway vehicles. A computer model of the mechanical and electrical parts of the system was developed. …”
Get full text
Article -
308
Exploring the Ruthenium-Ligands Bond and Their Relative Properties at Different Computational Methods
Published 2016-01-01“…We report some experimental bond distances and computational models of six ruthenium bonds obtained from DFT to higher computational methods like MP2 and CCSD. …”
Get full text
Article -
309
Research on Scenarios and Modeling of Co-Frequency Interference Between NGSO Communication Constellation Systems
Published 2021-03-01“…Aiming at the serious problem of frequency overlapping among non-geostationary satellite orbit (NGSO) communication constellation systems.The potential interference scenarios under multiple NGSO communication constellation systems sharing the same spectrum band was comprehensively analyzed, with the aid of analyzing frequency plan of typical constellation systems.Then the possibility of interference risk in each scenario was qualitatively evaluated.According to the characteristics of interference scenarios, the key parameters and models for the co-frequency interference analysis between the NGSO communication constellation systems were discussed, and the computing models of co-frequency interference based on three diff erent protect criterion were presented.Finally, challenges and key research directions of co-frequency interference analysis between NGSO communication constellation systems were pointed out.The research can provide a reference for the study of compatibility and coexistence between broadband Internet constellation systems.…”
Get full text
Article -
310
A Semiconductor Current-Limiting Device Based on a DC Converter
Published 2024-12-01“…In turn, the validity of the computer model used was proven experimentally. During the experiments, the current-limiting efficiency of the circuit was demonstrated, and its proposed mathematical model was also confirmed. …”
Get full text
Article -
311
FORMING THE BACHELOR’S RESEARCH SKILLS IN THE COURSEWORK DEVELOPMENT
Published 2015-10-01“…The article deals with pedagogical problem of forming the bachelor’s research skills in the coursework development on the discipline “Computer modeling and simulation”. This problem is considered as factor, on the one hand, and as insufficiently developed methods of modeling, on the other. …”
Get full text
Article -
312
On the design and evaluation of generative models in high energy density physics
Published 2025-01-01“…The computational demands of the computer models used for HEDP studies have led researchers to explore deep learning methods to enhance simulation efficiency. …”
Get full text
Article -
313
Chars and Activated Carbons Prepared from Asturian Apple Pulp
Published 2001-10-01“…The pore size distribution was obtained from CO 2 adsorption at 0°C, using isotherms derived from computer modelling. With the char prepared at 750°C, the initial porosity was only accessible to water and its presence was confirmed by extrapolation of W 0 for the activated carbons.…”
Get full text
Article -
314
Vertical two-phase flow regimes in an annulus image dataset - Texas A&M universityMendeley Data
Published 2025-02-01“…Designed to support research in fluid dynamics, machine vision, and computational modeling, the dataset offers valuable resources for developing machine vision models for accurate regime detection and differentiation, enhancing the fidelity of computational fluid dynamics simulations, and facilitating the estimation of critical flow parameters. …”
Get full text
Article -
315
-
316
To the evaluation of the carrying capacity of steel concrete beams on the basis of bent profiles
Published 2023-08-01“…The results of experimental studies are presented in the form of graphs, comparison of the results of a full-scale experiment and numerical studies using computer models, as well as using analytical formulas. …”
Get full text
Article -
317
-
318
CompSafeNano project: NanoInformatics approaches for safe-by-design nanomaterials
Published 2025-01-01“…The CompSafeNano project, a Research and Innovation Staff Exchange (RISE) project funded under the European Union's Horizon 2020 program, aims to advance the safety and innovation potential of nanomaterials (NMs) by integrating cutting-edge nanoinformatics, computational modelling, and predictive toxicology to enable design of safer NMs at the earliest stage of materials development. …”
Get full text
Article -
319
Creating a typology of parishes in England and Wales: Mining 1881 census data
Published 2015-09-01Get full text
Article -
320
A survey on edge computing offloading
Published 2019-04-01“…Edge computing integrate the computing,storage and other resources on the edge of the network into a unified user service platform.According to the principle of nearest service,the network edge node task request is timely and correspondingly processed.Computational migration is a key issue in edge computing due to limited edge node capabilities,resources,bandwidth,and energy.The causes,evolution and development trends of mobile edge computing were reviewed from the distributed computing,pervasive computing,cloud computing to edge computing as the main line.The characteristics of computing migration at each stage were compared and analyzed,and the classical models were reviewed.The latest research progress and application fields of edge computing were focused on,mobile edge computing models based on energy optimization management were researched and compared.Finally,a time division multiple access based multi-user edge mobile terminal computing migration strategy system for LTE applications was proposed.…”
Get full text
Article