Showing 941 - 960 results of 1,105 for search '"theory of computation"', query time: 0.12s Refine Results
  1. 941
  2. 942
  3. 943

    Interactive Simulation of Realistic Fluid Movement Based on SPH Method by J L Miao, L J Long, Y H Miao, Y Qin

    Published 2023-06-01
    “…Physical-based fluid simulation is one of the most challenging research issues due to its complexity in theory and computations. Among numerous fluid simulation models, Smoothed Particle Hydrodynamics (SPH) based fluid simution is the most widely used meshless method to simulate the realistic fluid motion. …”
    Get full text
    Article
  4. 944

    Enterprise marketing strategy using big data mining technology combined with XGBoost model in the new economic era. by Huijun Chen

    Published 2023-01-01
    “…Big data technology has strong mining ability. The relevant theories of computer data mining technology are summarized to optimize the marketing strategy of enterprises. …”
    Get full text
    Article
  5. 945

    Developing a computer delivered, theory based intervention for guideline implementation in general practice by Ashworth Mark, Little Paul, Yardley Lucy, McDermott Lisa, Gulliford Martin

    Published 2010-11-01
    “…The purpose of this study was to develop theory-informed, computer-delivered interventions to promote the implementation of guidelines in general practice. …”
    Get full text
    Article
  6. 946

    Interpretation and prediction of optical properties: novel fluorescent dyes as a test case by Xinxing Li, Xiuping Yin, Yue-Ling Bai, Malgorzata Biczysko

    Published 2023-08-01
    “…The rapid development of modern quantum mechanical theories and computational resources facilitates extended characterization of molecular systems of increasing size and complexity, including chromophores of biochemical or technological interest. …”
    Get full text
    Article
  7. 947
  8. 948
  9. 949
  10. 950
  11. 951
  12. 952
  13. 953

    A New Approach for Exceptional Phenomena Knowledge Detection and Analysis by Data Mining by Masoud Abessi, Elahe Hajigol Yazdi, Hassan Hoseini Nasab, Mohammad Bagher Fakhrzad

    Published 2015-08-01
    “…In this study, a new approach based on the abnormality theory and computing theory is presented to detect exceptional phenomena and learn their behavior. …”
    Get full text
    Article
  14. 954

    Task-Oriented Communication Design in Cyber-Physical Systems: A Survey on Theory and Applications by Arsham Mostaani, Thang X. Vu, Shree Krishna Sharma, Van-Dinh Nguyen, Qi Liao, Symeon Chatzinotas

    Published 2022-01-01
    “…This is a daunting task, since it requires a combination of principles from information, communication, control theories and computer science in order to formalize a general framework for task-oriented communication designs. …”
    Get full text
    Article
  15. 955

    Computational platform for doctor–artificial intelligence cooperation in pulmonary arterial hypertension prognostication: a pilot study by Vitaly O. Kheyfets, Andrew J. Sweatt, Mardi Gomberg-Maitland, Dunbar D. Ivy, Robin Condliffe, David G. Kiely, Allan Lawrie, Bradley A. Maron, Roham T. Zamanian, Kurt R. Stenmark

    Published 2023-02-01
    “…Shapley values, borrowed from game theory, were computed to rank the input parameters based on their importance to the predicted risk score for the entire trained random forest model (global importance) and for an individual patient (local importance). …”
    Get full text
    Article
  16. 956

    Tuning the Site-to-Site Interaction of Heteronuclear Diatom Catalysts MoTM/C<sub>2</sub>N (TM = 3d Transition Metal) for Electrochemical Ammonia Synthesis by Xiaoli Yang, Ping An, Ruiying Wang, Jianfeng Jia

    Published 2023-05-01
    “…Herein, by means of comprehensive spin-polarized density functional theory (DFT) computations, the catalytic performance of MoTM/C<sub>2</sub>N (TM = 3d transition metal) for use in eNRR was systematically evaluated. …”
    Get full text
    Article
  17. 957

    Lead-free novel perovskite Ba3AsI3: First-principles insights into its electrical, optical, and mechanical properties by Pobitra Barman, Md. Ferdous Rahman, Md. Rasidul Islam, Mehedi Hasan, Mithun Chowdhury, M. Khalid Hossain, Jibon Krishna Modak, Safa Ezzine, Mongi Amami

    Published 2023-11-01
    “…In this work, these unexplored properties have been thoroughly investigated using density functional theory-based computations. The Born-Huang criterion and phonon dispersion characteristics have revealed that the material is mechanically stable. …”
    Get full text
    Article
  18. 958

    Quinine Charge Transfer Complexes with 2,3-Dichloro-5,6-Dicyano-Benzoquinone and 7,7,8,8-Tetracyanoquinodimethane: Spectroscopic Characterization and Theoretical Study by Gamal A. E. Mostafa, Tarek A. Yousef, Samir T. Gaballah, Atef M. Homoda, Rashad Al-Salahi, Haya I. Aljohar, Haitham AlRabiah

    Published 2022-01-01
    “…The transition energies of the charge transfer complexes were computed using the TD-DFT/B3LYP/6-311++G(d,p) level of theory. The computed parameters were comparable to the experimental parameters, and the computational results aided in the analysis of the data.…”
    Get full text
    Article
  19. 959

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  20. 960

    Ocean Energy Systems Wave Energy Modeling Task 10.4: Numerical Modeling of a Fixed Oscillating Water Column by Harry B. Bingham, Yi-Hsiang Yu, Kim Nielsen, Thanh Toan Tran, Kyong-Hwan Kim, Sewan Park, Keyyong Hong, Hafiz Ahsan Said, Thomas Kelly, John V. Ringwood, Robert W. Read, Edward Ransley, Scott Brown, Deborah Greaves

    Published 2021-03-01
    “…Measurements of chamber surface elevation, air flow through the orifice, and pressure difference across the orifice are compared with numerical calculations using both weakly-nonlinear potential flow theory and computational fluid dynamics. Both compressible- and incompressible-flow models are considered, and the effects of air compressibility are found to have a significant influence on the motion of the internal chamber surface. …”
    Get full text
    Article