Showing 301 - 320 results of 550 for search '"computational model"', query time: 0.11s Refine Results
  1. 301

    Implementation of Membrane Algorithms on GPU by Xingyi Zhang, Bangju Wang, Zhuanlian Ding, Jin Tang, Juanjuan He

    Published 2014-01-01
    “…Membrane algorithms are a new class of parallel algorithms, which attempt to incorporate some components of membrane computing models for designing efficient optimization algorithms, such as the structure of the models and the way of communication between cells. …”
    Get full text
    Article
  2. 302

    On a data-driven mathematical model for prostate cancer bone metastasis by Zholaman Bektemessov, Laurence Cherfils, Cyrille Allery, Julien Berger, Elisa Serafini, Eleonora Dondossola, Stefano Casarin

    Published 2024-12-01
    “…By integrating in vivo studies with in silico models, these obstacles can be potentially overcome. Existing computational models of tumor response to $ ^{223} $Ra are often computationally intensive. …”
    Get full text
    Article
  3. 303

    Research progress of trusted sensor-cloud based on fog computing by Tian WANG, Xuewei SHEN, Hao LUO, Baisheng CHEN, Guojun WANG, Weijia JIA

    Published 2019-03-01
    “…The sensor-cloud is combined with cloud computing and wireless sensor networks,which extends the service ability of WSN by the support of cloud computing.It is one of the hot topics among the current researches.After comparing and surveying the mainstream system adequately,the characteristics and development of sensor-Cloud were summed up.Then,the direct influence of existing trust issues in the system for data protection and application on upper layer were found.The announced reasons explained that existing schemes were difficult to provide trusted sensor-cloud services.This was because that the capabilities of the underlying WSN nodes were too weak,and cloud computing model lacked the direct management of underlying nodes and data and so on.The trusted structures based on fog computing were given,and the key technologies of trusted evaluation,trusted data collection,and trusted storage were designed.Finally,the discussion pointed out new views for the researches in trusted sensor-cloud.…”
    Get full text
    Article
  4. 304

    Simulating Systems Thinking under Bounded Rationality by Mark W. Sellers, Hiroki Sayama, Andreas D. Pape

    Published 2020-01-01
    “…Brian Arthur’s El Farol bar model of bounded rationality provides a simple computer model of decision making in a complex, dynamic, and self-organized environment. …”
    Get full text
    Article
  5. 305

    On the Relationship between Mathematical Theories and Financial Markets A Critical Review on the Book Lecturing Birds on Flying by Hojjatollah Sadeqi

    Published 2022-04-01
    “…By explaining the role of the educational system in creating a gap between theory and practice and the role of Quants in promoting and applying quantitative and computational models, the author gives a different account of the causes of financial crises. …”
    Get full text
    Article
  6. 306

    Numerical homogenization of piezoelectric textiles with electrospun fibers for energy harvesting by C. Maruccio, L. De Lorenzis

    Published 2014-07-01
    “…Due to the importance of computational modeling to understand the influence that micro-scale geometry and constitutive variables have on the macroscopic behavior, a homogenization strategy is developed. …”
    Get full text
    Article
  7. 307

    Independently Rotating Wheels with Induction Motors for High-Speed Trains by B. Liang, S. D. Iwnicki

    Published 2011-01-01
    “…This paper presents an investigation into the design of a novel induction motor configuration and controller for IRW in order to provide the stability required to satisfy the performance requirements for railway vehicles. A computer model of the mechanical and electrical parts of the system was developed. …”
    Get full text
    Article
  8. 308

    Exploring the Ruthenium-Ligands Bond and Their Relative Properties at Different Computational Methods by Adebayo A. Adeniyi, Peter A. Ajibade

    Published 2016-01-01
    “…We report some experimental bond distances and computational models of six ruthenium bonds obtained from DFT to higher computational methods like MP2 and CCSD. …”
    Get full text
    Article
  9. 309

    Research on Scenarios and Modeling of Co-Frequency Interference Between NGSO Communication Constellation Systems by Wei LI, Kang YAN, Jingru GENG, Wen WANG

    Published 2021-03-01
    “…Aiming at the serious problem of frequency overlapping among non-geostationary satellite orbit (NGSO) communication constellation systems.The potential interference scenarios under multiple NGSO communication constellation systems sharing the same spectrum band was comprehensively analyzed, with the aid of analyzing frequency plan of typical constellation systems.Then the possibility of interference risk in each scenario was qualitatively evaluated.According to the characteristics of interference scenarios, the key parameters and models for the co-frequency interference analysis between the NGSO communication constellation systems were discussed, and the computing models of co-frequency interference based on three diff erent protect criterion were presented.Finally, challenges and key research directions of co-frequency interference analysis between NGSO communication constellation systems were pointed out.The research can provide a reference for the study of compatibility and coexistence between broadband Internet constellation systems.…”
    Get full text
    Article
  10. 310

    A Semiconductor Current-Limiting Device Based on a DC Converter by Evgeniy P. Safonov, Vladimir Ya. Frolov, Anton V. Boeshko, Ruslan S. Dautov

    Published 2024-12-01
    “…In turn, the validity of the computer model used was proven experimentally. During the experiments, the current-limiting efficiency of the circuit was demonstrated, and its proposed mathematical model was also confirmed. …”
    Get full text
    Article
  11. 311

    FORMING THE BACHELOR’S RESEARCH SKILLS IN THE COURSEWORK DEVELOPMENT by Svetlana G. Afanasyeva

    Published 2015-10-01
    “…The article deals with pedagogical problem of forming the bachelor’s research skills in the coursework development on the discipline “Computer modeling and simulation”. This problem is considered as factor, on the one hand, and as insufficiently developed methods of modeling, on the other. …”
    Get full text
    Article
  12. 312

    On the design and evaluation of generative models in high energy density physics by Ankita Shukla, Yamen Mubarka, Rushil Anirudh, Eugene Kur, Derek Mariscal, Blagoje Djordjevic, Bogdan Kustowski, Kelly Swanson, Brian Spears, Peer-Timo Bremer, Tammy Ma, Pavan Turaga, Jayaraman J. Thiagarajan

    Published 2025-01-01
    “…The computational demands of the computer models used for HEDP studies have led researchers to explore deep learning methods to enhance simulation efficiency. …”
    Get full text
    Article
  13. 313

    Chars and Activated Carbons Prepared from Asturian Apple Pulp by E. Fernandez, T.A. Centeno, F. Stoeckli

    Published 2001-10-01
    “…The pore size distribution was obtained from CO 2 adsorption at 0°C, using isotherms derived from computer modelling. With the char prepared at 750°C, the initial porosity was only accessible to water and its presence was confirmed by extrapolation of W 0 for the activated carbons.…”
    Get full text
    Article
  14. 314

    Vertical two-phase flow regimes in an annulus image dataset - Texas A&M universityMendeley Data by Kaushik Manikonda, Chinemerem Obi, Aarya Abhay Brahmane, Mohammad Azizur Rahman, Abu Rashid Hasan

    Published 2025-02-01
    “…Designed to support research in fluid dynamics, machine vision, and computational modeling, the dataset offers valuable resources for developing machine vision models for accurate regime detection and differentiation, enhancing the fidelity of computational fluid dynamics simulations, and facilitating the estimation of critical flow parameters. …”
    Get full text
    Article
  15. 315
  16. 316

    To the evaluation of the carrying capacity of steel concrete beams on the basis of bent profiles by F. S. Zamaliev, A. G. Tamrazyan

    Published 2023-08-01
    “…The results of experimental studies are presented in the form of graphs, comparison of the results of a full-scale experiment and numerical studies using computer models, as well as using analytical formulas. …”
    Get full text
    Article
  17. 317
  18. 318
  19. 319
  20. 320

    A survey on edge computing offloading by Youkang ZHU, Guangxue YUE, Xiaohui YANG, Jiansheng LIU

    Published 2019-04-01
    “…Edge computing integrate the computing,storage and other resources on the edge of the network into a unified user service platform.According to the principle of nearest service,the network edge node task request is timely and correspondingly processed.Computational migration is a key issue in edge computing due to limited edge node capabilities,resources,bandwidth,and energy.The causes,evolution and development trends of mobile edge computing were reviewed from the distributed computing,pervasive computing,cloud computing to edge computing as the main line.The characteristics of computing migration at each stage were compared and analyzed,and the classical models were reviewed.The latest research progress and application fields of edge computing were focused on,mobile edge computing models based on energy optimization management were researched and compared.Finally,a time division multiple access based multi-user edge mobile terminal computing migration strategy system for LTE applications was proposed.…”
    Get full text
    Article