Results 111 to 120 of about 425,347 (290)

Coarse Bifurcation Studies of Bubble Flow Microscopic Simulations

open access: yes, 2001
The parametric behavior of regular periodic arrays of rising bubbles is investigated with the aid of 2-dimensional BGK Lattice-Boltzmann (LB) simulators.
Kevrekidis, I. G.   +3 more
core  

Game‐based learning for undergraduate consolidation: A qualitative study of how game‐based learning provides much more than knowledge acquisition

open access: yesAnatomical Sciences Education, EarlyView.
Abstract Game‐based learning (GBL) is increasingly used in medical education to supplement traditional didactic learning methods. Adult learners in particular may benefit from GBL, given the autonomous and iterative nature of a well‐designed educational game.
Thomas J. Paddock, Erin P. Fillmore
wiley   +1 more source

Estimation of Weighted Extropy Under the α-Mixing Dependence Condition

open access: yesStats
Introduced as a complementary concept to Shannon entropy, extropy provides an alternative perspective for measuring uncertainty. While useful in areas such as reliability theory and scoring rules, extropy in its original form treats all outcomes equally,
Radhakumari Maya   +3 more
doaj   +1 more source

A dancing bear, a colleague, or a sharpened toolbox? The cautious adoption of generative artificial intelligence technologies in digital humanities research

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract The emergence of generative artificial intelligence (GenAI) is reshaping the research landscape and carries significant implications for Digital Humanities (DH), a field long intertwined with computational methods and technologies. This study examines how DH scholars are adopting and critically evaluating GenAI in their research. Drawing on an
Rongqian Ma, Meredith Dedema, Andrew Cox
wiley   +1 more source

Large-scale measurement and analysis on misconfigurations of DNSSEC from recursive side

open access: yes网络与信息安全学报
Domain name system security extensions (DNSSEC) was a secure extension protocol for the domain name system (DNS), which enhanced DNS security by adding signatures to DNS records.
LIU Linhui   +6 more
doaj  

A Rational Reconstruction and Extension of Recursion Analysis. [PDF]

open access: yes, 1989
The focus of this paper is the technique of recur8\on analysis. Recursion analysis is used by the Boyer-Moore Theorem Prover to choose an appropriate induction schema and variable to prove theorems by mathematical induction. A rational reconstruction of recursion analysis is outlined, using the technique of proof plans.
Bundy, Alan   +4 more
openaire   +1 more source

Developing a critical caste analysis within information science and technology: A research review: An annual review of information science and technology paper

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract Caste—an ascriptive social hierarchy in South Asia and its diaspora—is a globalized phenomenon. Recent caste‐based discrimination, particularly in technology companies and anti‐caste efforts to address it, has compelled academia, policy, and the technology industry to better understand contemporary mechanics of caste.
Nayana Kirasur, Britt Paris
wiley   +1 more source

Hardware acceleration of number theoretic transform for zk‐SNARK

open access: yesEngineering Reports, EarlyView., 2023
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao   +6 more
wiley   +1 more source

Is Quantum Mechanics needed to explain consciousness ?

open access: yes, 2007
In this short comment to a recent contribution by E. Manousakis [1] it is argued that the reported agreement between the measured time evolution of conscious states during binocular rivalry and predictions derived from quantum mechanical formalisms does ...
Thomsen, Knud
core  

Modeling and parameter estimation for fractional large‐scale interconnected Hammerstein systems

open access: yesAsian Journal of Control, EarlyView.
Abstract This paper addresses the challenge of modeling and identifying large‐scale interconnected systems exhibiting memory effects, hereditary properties, and non‐local interactions. We propose a fractional‐order extension of the Hammerstein architecture that incorporates Grünwald–Letnikov operators to capture complex dynamics through multiple ...
Mourad Elloumi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy