Showing 26,001 - 26,020 results of 28,739 for search '"computer"', query time: 0.14s Refine Results
  1. 26001

    Digital twin-centered hybrid data-driven multi-stage deep learning framework for enhanced nuclear reactor power prediction by James Daniell, Kazuma Kobayashi, Ayodeji Alajo, Syed Bahauddin Alam

    Published 2025-01-01
    “…Traditional physics-based models, while valuable, can be computationally intensive and may not fully capture the complexities of real-world reactor behavior. …”
    Get full text
    Article
  2. 26002

    Implication of inter-joint coordination on the limb symmetry index measured during the seated single-arm horizontal push test by Y. Blache, M. Degot, T. de Sousa, I. Rogowski

    Published 2025-02-01
    “…Humerothoracic, elbow and wrist joint contributions to the horizontal medicine ball velocity were computed. The temporal occurrence of joint peak contribution was used to assess inter-joint coordination.ResultsThe temporal occurrence of joint peak contribution occurred in a proximo-to-distal sequence at the dominant side, while at the nondominant side, joint peak contribution first occurred at shoulder, then simultaneously at elbow and wrist. …”
    Get full text
    Article
  3. 26003

    Hydrodynamics of flow through living shoreline structure by Tanhaseng Kanyarat, Kositgittiwong Duangrudee, Ekkawatpanit Chaiwat, Kompor Wongnarin, Petpongpan Chanchai

    Published 2025-01-01
    “…The study also explored a zig-zag formation using 3D computational fluid dynamics (CFD) with the RNG k-ε turbulence model, offering detailed insights into the flow behavior around the structures. …”
    Get full text
    Article
  4. 26004

    Prediction method of 0day attack path based on cyber defense knowledge graph by Cheng SUN, Hao HU, Yingjie YANG, Hongqi ZHANG

    Published 2022-02-01
    “…To solve the difficulty of attack detection caused by the 0day vulnerability, a prediction method of 0day attack path based on cyber defense knowledge graph was proposed.The cyber defense knowledge graph was constructed to refine the discrete security data such as threat, vulnerability and asset into the complete and high-related knowledge format by extracting concepts and entities related to network attack from cyber security ontology research finds and databases.Based on the knowledge integrated by the knowledge graph, assumed and restricted the unknown attributes such as the existence, availability and harmfulness of 0day vulnerabilities, and model the concept of "attack" as a relationship between attacker entities and device entities in the knowledge graph to transform the attack prediction to the link prediction of knowledge graph.According to this, apply path ranking algorithm was applied to mine the potential 0day attack in the target system and construct the 0day attack graph.Predicted the 0day attack path by utilizing the scores output by classifiers as the occurrence probabilities of single step attack and computing the occurrence probabilities of different attack paths.The experimental result shows that with the help of complete knowledge system provided by knowledge graph, the proposed method can reduce the dependence of prediction analysis on expert model and overcome the bad influence of 0day vulnerability to improve the accuracy of 0day attack prediction.And utilizing the characteristic that path ranking algorithm reasons based on the structure of graph can also help to backtrack the reasons of predicting results so as to improve the explainability of predicting.…”
    Get full text
    Article
  5. 26005

    Daytime Equatorial Spread F‐Like Irregularities Detected by HF Doppler Receiver and Digisonde by B. Olugbon, E. O. Oyeyemi, A. Kascheyev, A. B. Rabiu, A. A. Obafaye, O. O. Odeyemi, A. O. Adewale

    Published 2021-04-01
    “…Close inspection of the ionograms from ILR during this interval (1500–1800 UT) showed the occurrence of small‐scale spreading in the F‐layer trace which varied in altitude as the disturbance progressed. Computation of the linear growth rate of the collisional Rayleigh‐Taylor instability showed that the plasma instability was seeded by a traveling ionospheric disturbance (TID). …”
    Get full text
    Article
  6. 26006

    4d N $$ \mathcal{N} $$ = 1 from 6d D-type N $$ \mathcal{N} $$ = (1, 0) by Jin Chen, Babak Haghighat, Shuwei Liu, Marcus Sperling

    Published 2020-01-01
    “…We start by compactifying the 6d SCFT on a Riemann surface and compute the central charges of the resulting 4d theory by integrating the 6d anomaly polynomial over the Riemann surface. …”
    Get full text
    Article
  7. 26007

    Mathematical modeling and QSPR analysis of hepatitis treatment drugs through connection indices an innovative approach by Khalil Hadi Hakami, Abdul Rauf Khan, Muhammad Ali

    Published 2025-01-01
    “…Various parameters, including solubility, metabolic stability, toxicity, permeability, and transporter effects, depending on the physical and chemical properties of the treatment, impact the efficacy of biopharmacological design.Increasingly, computational approaches have become indispensable in the discipline of pharmaceutical discoveries and development. …”
    Get full text
    Article
  8. 26008

    Synthesis, Characterization, Semiempirical and Biological Activities of Organotin(IV) Carboxylates with 4-Piperidinecarboxylic Acid by Shabbir Hussain, Saqib Ali, Saira Shahzadi, Saroj K. Sharma, Kushal Qanungo, Muhammad Shahid

    Published 2014-01-01
    “…HOMO-LUMO calculations show that chlorodiorganotin complexes are more susceptible to nucleophilic attack as compared to triorganotin complexes. Computed negative heat of formation indicates that complexes 1–4 are thermodynamically stable. …”
    Get full text
    Article
  9. 26009

    The classification of absence seizures using power-to-power cross-frequency coupling analysis with a deep learning network by A.V. Medvedev, B. Lehmann

    Published 2025-02-01
    “…Power-to-power coupling (PPC) is one form of coupling with significant research attesting to its neurobiological significance as well as its computational efficiency, yet has been hitherto unexplored within seizure classification literature. …”
    Get full text
    Article
  10. 26010

    Volumetric trans-scale imaging of massive quantity of heterogeneous cell populations in centimeter-wide tissue and embryo by Taro Ichimura, Taishi Kakizuka, Yoshitsugu Taniguchi, Satoshi Ejima, Yuki Sato, Keiko Itano, Kaoru Seiriki, Hitoshi Hashimoto, Ko Sugawara, Hiroya Itoga, Shuichi Onami, Takeharu Nagai

    Published 2025-02-01
    “…The 3D resolving capability was realized through a combination of optical and computational sectioning techniques tailored for our low-power imaging system. …”
    Get full text
    Article
  11. 26011

    Smart Home Security: An Efficient Multi-Factor Authentication Protocol by Ghazaleh Sarbishaei, Amir Masoud Aminian Modarres, Farahnaz Jowshan, Fateme Zahra Khakzad, Hasti Mokhtari

    Published 2024-01-01
    “…The results show that the proposed scheme provides essential security features and resists several well-known attacks. Evaluating the computation complexity and space complexity of the proposed protocol also verifies its superior performance compared with similar schemes.…”
    Get full text
    Article
  12. 26012

    Group-Based Authentication Methods in The OneM2M Ecosystem by Erhan Taşkın, İbrahim Uğur Aba

    Published 2022-12-01
    “…By using the group management module provided by the IoT service platform and the “auth” mechanism's together, it has been observed that the computational overhead on the devices and the signal traffic in the environment provide up to 4 times efficiency according to performance measurements. …”
    Get full text
    Article
  13. 26013

    Intussusception in the Setting of an Ulcerative Colitis Flare by Varag Abed, Alexis Faber, Cristina Jageka, Ryan Goleniak, Raef Fadel

    Published 2022-01-01
    “…This did not improve her symptoms, and she presented to the ED two weeks later. She underwent a computed tomography (CT) abdomen/pelvis which revealed intussusception in the left hemiabdomen with no definite lead point measuring 5.6 cm in the craniocaudal dimension with pneumatosis and no evidence of bowel obstruction. …”
    Get full text
    Article
  14. 26014

    Majority or Minority: Data Imbalance Learning Method for Named Entity Recognition by Sota Nemoto, Shunsuke Kitada, Hitoshi Iyatomi

    Published 2025-01-01
    “…MoM learning incorporates the loss computed only for samples whose ground truth is the majority class into the loss of the conventional ML model. …”
    Get full text
    Article
  15. 26015

    Economics of Wheat Production in Mohmand Agency, Khyber Pakhtunkhwa, Pakistan by Hina Gul, Sonia Sonia, Munir Khan, Khuram Nawaz Sadozai

    Published 2019-02-01
    “…The central theme of this research endeavour was to compute the cost and net returns of wheat crop. This study has also highlighted the significant variables contributing in wheat productivity. …”
    Get full text
    Article
  16. 26016

    Pure Laparoscopic Left Hepatectomy for Regrowth of Mucinous Cystic Neoplasm of the Liver after Laparoscopic Deroofing by Hideki Kumagai, Akira Umemura, Hiroyuki Nitta, Hirokatsu Katagiri, Shoji Kanno, Daiki Takeda, Satoshi Amano, Koji Kikuchi, Kiyoharu Takashimizu, Masao Nishiya, Noriyuki Uesugi, Tamotsu Sugai, Akira Sasaki

    Published 2022-01-01
    “…A 63-year-old woman with a large hepatic cystic lesion and abdominal pain was referred to our hospital for surgical treatment. Computed tomography (CT) showed cystic lesions with septations arising from macrolobulations in the left medial segment. …”
    Get full text
    Article
  17. 26017

    Portable astronomical observation system based on large-aperture concentric-ring metalens by Jianli Wang, Yongting Deng, Chengmiao Wang, Yu Lin, Yeming Han, Junchi Liu, Xiufeng Liu, Hongwen Li, Jan G. Korvink, Yongbo Deng

    Published 2025-01-01
    “…Compared to global structural optimization, this approach reduces computational resources and time consumption by several orders of magnitude while maintaining nearly identical focusing efficiency. …”
    Get full text
    Article
  18. 26018

    Age of detection of congenital hearing loss in South Africa: A systematic review by Mukovhe Phanguphangu, Khomotjo Kgare, Andrew J. Ross

    Published 2025-01-01
    “…Results: Ten studies, with a total of 1501 children, were included in this review. The computed Q-test of homogeneity was 5870.97 and the pooled mean age of identification was 30 months (95% confidence intervals [CI]: 19.3–41.3). …”
    Get full text
    Article
  19. 26019

    GTExome: Modeling commonly expressed missense mutations in the human genome. by Jill Hoffman, Henry Tan, Clara Sandoval-Cooper, Kaelyn de Villiers, Scott M Reed

    Published 2024-01-01
    “…The user can assess this information and then select from available experimental or computationally predicted structures of native proteins to create, visualize, and download a model of the mutated protein using Fast and Accurate Side-chain Protein Repacking (FASPR). …”
    Get full text
    Article
  20. 26020

    Imaging the Met Receptor Tyrosine Kinase (Met) and Assessing Tumor Responses to a Met Tyrosine Kinase Inhibitor in Human Xenograft Mouse Models with a [Tc] (AH-113018) or CY 5** (A... by Elaine M. Jagoda, Sibaprasad Bhattacharyya, Joseph Kalen, Lisa Riffle, Avrum Leeder, Stephanie Histed, Mark Williams, Karen J. Wong, Biying Xu, Lawrence P. Szajek, Osama Elbuluk, Fabiola Cecchi, Kristen Raffensperger, Meghana Golla, Donald P. Bottaro, Peter Choyke

    Published 2015-09-01
    “…In vivo [ 99m Tc]-Met peptide (AH-113018) was retained in Met-expressing tumors, and high-expressing Met tumors (MKN-45) were easily visualized and quantitated using singlephoton emission computed tomography or optical imaging. In further studies, MKN-45 mouse xenografts treated with PHA 665752 (Met TKI) or vehicle were monitored weekly for tumor responses by [ 99m Tc]-Met peptide imaging and measurement of tumor volumes. …”
    Get full text
    Article