-
941
The Membership Problem for hypergeometric sequences with quadratic parameters
Published 2023Conference item -
942
Compact 5g hairpin bandpass filter using non-uniform transmission lines theory
Published 2021Article -
943
Interactive Simulation of Realistic Fluid Movement Based on SPH Method
Published 2023-06-01“…Physical-based fluid simulation is one of the most challenging research issues due to its complexity in theory and computations. Among numerous fluid simulation models, Smoothed Particle Hydrodynamics (SPH) based fluid simution is the most widely used meshless method to simulate the realistic fluid motion. …”
Get full text
Article -
944
Enterprise marketing strategy using big data mining technology combined with XGBoost model in the new economic era.
Published 2023-01-01“…Big data technology has strong mining ability. The relevant theories of computer data mining technology are summarized to optimize the marketing strategy of enterprises. …”
Get full text
Article -
945
Developing a computer delivered, theory based intervention for guideline implementation in general practice
Published 2010-11-01“…The purpose of this study was to develop theory-informed, computer-delivered interventions to promote the implementation of guidelines in general practice. …”
Get full text
Article -
946
Interpretation and prediction of optical properties: novel fluorescent dyes as a test case
Published 2023-08-01“…The rapid development of modern quantum mechanical theories and computational resources facilitates extended characterization of molecular systems of increasing size and complexity, including chromophores of biochemical or technological interest. …”
Get full text
Article -
947
Learning Quantum Hamiltonians at Any Temperature in Polynomial Time
Published 2024Get full text
Article -
948
-
949
Improving the Bit Complexity of Communication for Distributed Convex Optimization
Published 2024Get full text
Article -
950
Optimal stochastic modeling with unitary quantum dynamics
Published 2020Get full text
Journal Article -
951
-
952
-
953
A New Approach for Exceptional Phenomena Knowledge Detection and Analysis by Data Mining
Published 2015-08-01“…In this study, a new approach based on the abnormality theory and computing theory is presented to detect exceptional phenomena and learn their behavior. …”
Get full text
Article -
954
Task-Oriented Communication Design in Cyber-Physical Systems: A Survey on Theory and Applications
Published 2022-01-01“…This is a daunting task, since it requires a combination of principles from information, communication, control theories and computer science in order to formalize a general framework for task-oriented communication designs. …”
Get full text
Article -
955
Computational platform for doctor–artificial intelligence cooperation in pulmonary arterial hypertension prognostication: a pilot study
Published 2023-02-01“…Shapley values, borrowed from game theory, were computed to rank the input parameters based on their importance to the predicted risk score for the entire trained random forest model (global importance) and for an individual patient (local importance). …”
Get full text
Article -
956
Tuning the Site-to-Site Interaction of Heteronuclear Diatom Catalysts MoTM/C<sub>2</sub>N (TM = 3d Transition Metal) for Electrochemical Ammonia Synthesis
Published 2023-05-01“…Herein, by means of comprehensive spin-polarized density functional theory (DFT) computations, the catalytic performance of MoTM/C<sub>2</sub>N (TM = 3d transition metal) for use in eNRR was systematically evaluated. …”
Get full text
Article -
957
Lead-free novel perovskite Ba3AsI3: First-principles insights into its electrical, optical, and mechanical properties
Published 2023-11-01“…In this work, these unexplored properties have been thoroughly investigated using density functional theory-based computations. The Born-Huang criterion and phonon dispersion characteristics have revealed that the material is mechanically stable. …”
Get full text
Article -
958
Quinine Charge Transfer Complexes with 2,3-Dichloro-5,6-Dicyano-Benzoquinone and 7,7,8,8-Tetracyanoquinodimethane: Spectroscopic Characterization and Theoretical Study
Published 2022-01-01“…The transition energies of the charge transfer complexes were computed using the TD-DFT/B3LYP/6-311++G(d,p) level of theory. The computed parameters were comparable to the experimental parameters, and the computational results aided in the analysis of the data.…”
Get full text
Article -
959
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
960
Ocean Energy Systems Wave Energy Modeling Task 10.4: Numerical Modeling of a Fixed Oscillating Water Column
Published 2021-03-01“…Measurements of chamber surface elevation, air flow through the orifice, and pressure difference across the orifice are compared with numerical calculations using both weakly-nonlinear potential flow theory and computational fluid dynamics. Both compressible- and incompressible-flow models are considered, and the effects of air compressibility are found to have a significant influence on the motion of the internal chamber surface. …”
Get full text
Article