Search

Showing total 2,100 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic applied mathematics Remove constraint Topic: applied mathematics Topic computer simulation Remove constraint Topic: computer simulation Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
2,100 results

Search Results

1. Dynamics and optimal control of a stochastic coronavirus (COVID-19) epidemic model with diffusion

2. Numerical simulation and stability analysis of a novel reaction–diffusion COVID-19 model

3. Exact solutions and equi-dosing regimen regions for multi-dose pharmacokinetics models with transit compartments

4. Stability and optimal control strategies for a novel epidemic model of COVID-19

5. Resolving degeneracy in diffusion MRI biophysical model parameter estimation using double diffusion encoding

6. Numerical Approximation of Elasticity Tensor Associated With Green-Naghdi Rate

7. Finite Element Framework for Computational Fluid Dynamics in FEBio

8. The effect of Fisher information matrix approximation methods in population optimal design calculations

9. The impact of resource dependence of the mechanisms of life on the spatial population dynamics of an in silico microbial community

10. Enumerating and indexing many-body intramolecular interactions:a graph theoretic approach

11. Using sensitivity equations for computing gradients of the FOCE and FOCEI approximations to the population likelihood

12. Radiative transfer equation modeling by streamline diffusion modified continuous Galerkin method

13. An empirical study on solving an integrated production and distribution problem with a hybrid strategy.

14. A human body physiological feature selection algorithm based on filtering and improved clustering.

15. Sequence diagram refactoring using single and hybridized algorithms.

16. Computational Analysis of the Pulmonary Arteries in Congenital Heart Disease: A Review of the Methods and Results

17. Fine-granularity inference and estimations to network traffic for SDN.

18. Design a software real-time operation platform for wave piercing catamarans motion control using linear quadratic regulator based genetic algorithm.

19. Protein subnuclear localization based on a new effective representation and intelligent kernel linear discriminant analysis by dichotomous greedy genetic algorithm.

20. Singular Arcs in Optimal Control of Continuous-Time Bimodal Switched Linear Systems.

21. Optimum Design of PIλDμ Controller for an Automatic Voltage Regulator System Using Combinatorial Test Design.

22. A Multi-Objective Compounded Local Mobile Cloud Architecture Using Priority Queues to Process Multiple Jobs.

23. Dynamic power system equivalence considering distributed energy resources using Prony analysis.

24. Orienteering Problem with Functional Profits for multi-source dynamic path construction.

25. Investment preference promotes cooperation in spatial public goods game.

26. Modeling the spreading and interaction between wild and transgenic mosquitoes with a random dispersal.

27. Bilateral Symmetry Detection on the Basis of Scale Invariant Feature Transform.

28. Identifying influential nodes based on network representation learning in complex networks.

29. Quaternion wavelet transform based full reference image quality assessment for multiply distorted images.

30. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters.

31. Numerical research on the lateral global buckling characteristics of a high temperature and pressure pipeline with two initial imperfections.

32. Reactive navigation in extremely dense and highly intricate environments.

33. Mean field analysis of algorithms for scale-free networks in molecular biology.

34. Correction of failure in linear antenna arrays with greedy sparseness constrained optimization technique.

35. Testing the event witnessing status of micro-bloggers from evidence in their micro-blogs.

36. A decoy chain deployment method based on SDN and NFV against penetration attack.

37. A novel Gravity-FREAK feature extraction and Gravity-KLT tracking registration algorithm based on iPhone MEMS mobile sensor in mobile environment.

38. Bearing-Based Formation Control of a Group of Agents With Leader-First Follower Structure.

39. Evaluation and comparison of statistical methods for early temporal detection of outbreaks: A simulation-based study.

40. A multi-domain trust management model for supporting RFID applications of IoT.

41. Implementation of real-time energy management strategy based on reinforcement learning for hybrid electric vehicles and simulation validation.

42. Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks.

43. Mining dynamic noteworthy functions in software execution sequences.

44. Comparison of two SVD-based color image compression schemes.

45. Evolutionary Algorithm for RNA Secondary Structure Prediction Based on Simulated SHAPE Data.

46. Melioration Learning in Two-Person Games.

47. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity.

48. Universal Feature Extraction for Traffic Identification of the Target Category.

49. Fast Outlier Detection Using a Grid-Based Algorithm.

50. Improvement of Source Number Estimation Method for Single Channel Signal.