Science topic

Computing - Science topic

Explore the latest publications in Computing, and find Computing experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Computing (10,000)
Sorted by most recent
Article
Full-text available
An efficient immersed boundary–lattice Boltzmann method (IB-LBM) is proposed for fully resolved simulations of suspended solid particles in viscoelastic flows. Stress LBM based on Giesekus and Oldroyd-B constitutive equation are used to model the viscoelastic stress tensor. A boundary thickening-based direct forcing IB method is adopted to solve th...
Article
Full-text available
Inference of population structure from genetic data plays an important role in population and medical genetics studies. With the advancement and decreasing cost of sequencing technology, the increasingly available whole genome sequencing data provide much richer information about the underlying population structure. The traditional method (Patterso...
Article
Full-text available
This article teases out the ramifications of artificial intelligence (AI) use in the credit analysis process by banks and other financing institutions. The unique features of AI models, coupled with the expansion of computing power, make new sources of information (big data) available for creditworthiness assessments. Combined, the use of AI and bi...
Article
Full-text available
The ATLAS experiment at the Large Hadron Collider has a broad physics programme ranging from precision measurements to direct searches for new particles and new interactions, requiring ever larger and ever more accurate datasets of simulated Monte Carlo events. Detector simulation with Geant4 is accurate but requires significant CPU resources. Over...
Article
Full-text available
Research on optical computing has recently attracted significant attention due to the transformative advances in machine learning. Among different approaches, diffractive optical networks composed of spatially-engineered transmissive surfaces have been demonstrated for all-optical statistical inference and performing arbitrary linear transformation...
Article
Full-text available
We show that any Algebraic Branching Program (ABP) computing the polynomial ∑i=1nxin has at least Ω(n2) vertices. This improves upon the lower bound of Ω(nlogn), which follows from the classical result of Strassen (1973a) and Baur & Strassen (1983), and extends the results in Kumar (2019), which showed a quadratic lower bound for homogeneous ABPs c...
Article
Full-text available
Spatial light modulators (SLMs) are the most relevant technology for dynamic wavefront manipulation. They find diverse applications ranging from novel displays to optical and quantum communications. Among commercial SLMs for phase modulation, Liquid Crystal on Silicon (LCoS) offers the smallest pixel size and, thus, the most precise phase mapping a...
Article
Full-text available
Background In Belgium, current research on socio-economic inequalities in the coronavirus disease 2019 (COVID-19) crisis has mainly focused on excess mortality and data from the first epidemiological wave. The current study adds onto this by examining the association between COVID-19 incidence and area deprivation during the first five wave and int...
Article
Full-text available
In this paper, we present a mesh adaptation algorithm for the unsteady compressible Navier-Stokes equations under the framework of local discontinuous Galerkin methods coupled with implicit-explicit Runge-Kutta or spectral deferred correction time discretization methods. In both of the two high order semi-implicit time integration methods, the conv...
Article
Full-text available
Force field-based classical molecular dynamics (CMD) is efficient but its potential energy surface (PES) prediction error can be very large. Density functional theory (DFT)-based ab-initio molecular dynamics (AIMD) is accurate but computational cost limits its applications to small systems. Here, we propose a molecular dynamics (MD) methodology whi...
Article
Full-text available
Optical directed logic (DL) is a novel logic operation scheme that employs electrical signals as operands to control the working states of optical switches to perform the logic functions. This review first provides an overview of the concept and working principle of DL. The developing trends of DL computing are then discussed in detail, including t...
Article
Full-text available
A common task in scientific computing is the data reduction. This workflow extracts the most important information from large input data and stores it in smaller derived data objects. The derived data objects can then be used for further analysis. Typically, these workflows use distributed storage and computing resources. A straightforward setup of...
Article
Full-text available
The p-center location problem in an area is an important yet very difficult problem in location science. The objective is to determine the location of p hubs within a service area so that the distance from any point in the area to its nearest hub is as small as possible. While effective heuristic methods exist for finding good feasible solutions, r...
Article
Full-text available
With the rapid growth of computer science and big data, the traditional von Neumann architecture suffers the aggravating data communication costs due to the separated structure of the processing units and memories. Memristive in-memory computing paradigm is considered as a prominent candidate to address these issues, and plentiful applications have...
Article
Full-text available
We investigated the potential application of quantum computing using the Kronecker kernel to pairwise classification and have devised a way to apply the Harrow-Hassidim-Lloyd (HHL)-based quantum support vector machine algorithm. Pairwise classification can be used to predict relationships among data and is used for problems such as link prediction...
Article
Full-text available
In this work, the atmospheric corrosion of carbon steels was monitored at six different sites (and hence, atmospheric conditions) using Fe/Cu-type atmospheric corrosion monitoring technology over a period of 12 months. After analyzing over 3 million data points, the sensor data were interpretable as the instantaneous corrosion rate, and the atmosph...
Article
Full-text available
We consider arithmetic circuits with arbitrary gates for computing Boolean functions that are represented by low-degree polynomials over GF(2). An adequate complexity measure for such circuits is the maximum between the arity of the gates and their number. This model and the corresponding complexity measure, called AN-complexity, were introduced by...
Article
Full-text available
With an increasing demand for artificial intelligence, the emulation of the human brain in neuromorphic computing has led to an extraordinary result in not only simulating synaptic dynamics but also reducing complex circuitry systems and algorithms. In this work, an artificial electronic synaptic device based on a synthesized MoS 2 memristor array...
Article
Full-text available
Background Genomic estimated breeding values (GEBV) by single-step genomic BLUP (ssGBLUP) are affected by the centering of marker information used. The use of a fixed effect called J factor will lead to GEBV that are unaffected by the centering used. We extended the use of a single J factor to a group of J factors. Results J factor(s) are usually...
Article
Full-text available
The circumcentered-reflection method (CRM) has been applied for solving convex feasibility problems. CRM iterates by computing a circumcenter upon a composition of reflections with respect to convex sets. Since reflections are based on exact projections, their computation might be costly. In this regard, we introduce the circumcentered approximate-...
Article
Full-text available
The discovery of two-dimensional (2D) magnetic van der Waals (vdW) materials has flourished an endeavor for fundamental problems as well as potential applications in computing, sensing and storage technologies. Of particular interest are antiferromagnets, which due to their intrinsic exchange coupling show several advantages in relation to ferromag...
Article
Full-text available
Fault detection and classification is a key challenge for the protection of High Voltage DC (HVDC) transmission lines. In this paper, the Teager–Kaiser Energy Operator (TKEO) algorithm associated with a decision tree-based fault classifier is proposed to detect and classify various DC faults. The Change Identification Filter is applied to the avera...
Article
Full-text available
Many methods have been introduced to evaluate straight-line accuracy of autopilot pilot tractor while moving across the farm field. This study presents a new alternative approach for evaluating straight-line accuracy of an autopilot tractor traversing the oil palm field terrain. A combination of mapping and spreadsheet software was utilized to deve...
Article
Full-text available
Standfirst Among the existing machine learning frameworks, reservoir computing demonstrates fast and low-cost training, and its suitability for implementation in various physical systems. This Comment reports on how aspects of reservoir computing can be applied to classical forecasting methods to accelerate the learning process, and highlights a ne...
Article
Full-text available
In this paper, we address computation of the degree $$\deg {\rm Det} A$$ deg Det A of Dieudonné determinant $${\rm Det} A$$ Det A of $$\begin{aligned} A = \sum_{k=1}^m A_k x_k t^{c_k}, \end{aligned}$$ A = ∑ k = 1 m A k x k t c k , where $$A_k$$ A k are $$n \times n$$ n × n matrices over a field $$\mathbb{K}$$ K , $$x_k$$ x k are noncommutative vari...
Article
Full-text available
Cocoa products have a remarkable chemical and sensory complexity. However, in contrast to other fermentation processes in the food industry, cocoa bean fermentation is left essentially uncontrolled and is devoid of standardization. Questions of food authenticity and food quality are hence particularly challenging for cocoa. Here we provide an illus...
Article
Full-text available
In this paper, a hardware-optimized approach to emotion recognition based on the efficient brain-inspired hyperdimensional computing (HDC) paradigm is proposed. Emotion recognition provides valuable information for human–computer interactions; however, the large number of input channels (> 200) and modalities (> 3 ) involved in emotion recognition...
Article
Full-text available
Controlling electromagnetic waves and information simultaneously by information metasurfaces is of central importance in modern society. Intelligent metasurfaces are smart platforms to manipulate the wave–information–matter interactions without manual intervention by synergizing engineered ultrathin structures with active devices and algorithms, wh...
Article
Full-text available
Recent studies of resistive switching devices with hexagonal boron nitride (h-BN) as the switching layer have shown the potential of two-dimensional (2D) materials for memory and neuromorphic computing applications. The use of 2D materials allows scaling the resistive switching layer thickness to sub-nanometer dimensions enabling devices to operate...
Article
Full-text available
Rolling bearing is an indispensable part of the contemporary industrial system, and its working conditions affect the state of the entire industrial system. Therefore, there is great engineering value to researching and improving the fault diagnosis technology of rolling bearings. However, with the involvement of the whole mechanical equipment, we...
Article
Full-text available
The accurate simulation of additional interactions at the ATLAS experiment for the analysis of proton–proton collisions delivered by the Large Hadron Collider presents a significant challenge to the computing resources. During the LHC Run 2 (2015–2018), there were up to 70 inelastic interactions per bunch crossing, which need to be accounted for in...
Article
Full-text available
A temporal graph \({\mathcal {G}}\) is a sequence of static graphs indexed by a set of integers representing time instants. Given \(\varDelta\) an integer, a \(\varDelta\)-module is a set of vertices A having the same neighbourhood outside of A for \(\varDelta\) consecutive instants. We address specific cases of \(\varDelta\)-module enumeration, wh...
Article
Full-text available
Objective The aim of this prospective longitudinal study was to compare driving pressure and absolute PaO 2 /FiO 2 ratio in determining the best positive end-expiratory pressure (PEEP) level. Patients and methods In 122 patients with acute respiratory distress syndrome, PEEP was increased until plateau pressure reached 30 cmH 2 O at constant tidal...
Article
Full-text available
A domain decomposition technique combined with an enhanced geometry mapping based on the use of NURBS is considered for solving parametrized models in complex geometries (non simply connected) within the so-called proper generalized decomposition (PGD) framework, enabling the expression of the solution in each subdomain in a fully separated form, i...
Article
Full-text available
With the development of cloud and edge computing, deep learning based on big data has been widely utilized for lithium-ion battery state of health (SoH) online estimation, where improving the accuracy, robustness, and real-time applicability are current research challenges. Focusing on these points, this paper proposes a novel health feature analys...
Article
Full-text available
Recently, Robot as a Service (RaaS) brought a major shift in the access and use of robots due to the technological advancements in computing, storage and communication. Users at the client side can manipulate their robots as an on-demand service throughout the Internet. The development of such systems is facing the fusion of the advantages of both...
Preprint
Full-text available
With the continuous appreciation of cryptocurrency, cryptojacking, the act by which computing resources are stolen to mine cryptocurrencies, is becoming more rampant. In this paper, we conduct a measurement study on cryptojacking network traffic and propose CryptoJacking-Sniffer (CJ-Sniffer), an easily deployable, privacy-aware approach to protecti...
Poster
Full-text available
Introduction: In a rapid changing world that we live nowadays, interdisciplinary studies are at crossroads between tradition and innovation. Scholarly activities are at the intersection of computing or digital technologies and the disciplines of humanities and social sciences. Studies on common practices of research and analysis in the discipline i...
Conference Paper
Full-text available
This research-to-practice work-in-progress paper describes the approach and methods for a qualitative study of early engineering students' development of professional values. The goal of the research program as a whole is to study students' understanding of professional virtues and how various virtue formation activities affect how students establi...
Conference Paper
Full-text available
This presents a descriptive analysis of the relationship of competence and virtue for engineering and computing professionals. Rooted in recent developments in competence theory, including the development of the Computing Curricula 2020 (CC2020) guidelines, this work illustrates the relationship between competency-based and virtue-oriented approach...
Conference Paper
Full-text available
Dynamic programming is a technique widely used to solve several combinatory optimization problems. A well-known example is the minimum cost parenthesizing problem (MPP), which is usually used to represent a class of non-serial polyadic dynamic-programming problems. These problems are characterized by a strong dependency between subproblems. This pa...
Article
Full-text available
Multi-access edge computing (MEC) is a key enabler to fulfill the promises of a new generation of immersive and low-latency services in 5G and Beyond networks. MEC represents a defining function of 5G, offering significant computational power at a reduced latency, allowing to augment the capabilities of user equipments while preserving their batter...
Article
Full-text available
The problem of truth discovery , i.e., of trying to find the true facts concerning a number of objects based on reports from various information sources of unknown trustworthiness, has received increased attention recently. The problem is made interesting by the fact that the relative believability of facts depends on the trustworthiness of their s...
Article
Full-text available
Two geodesically (projectively) equivalent Finsler metrics determine a set of invariant volume forms on the projective sphere bundle. Their proportionality factors are geodesically invariant functions and hence they are first integrals. Being 0-homogeneous functions, the first integrals are common for the entire projective class. In Theorem 1.1 we...
Article
Full-text available
In power systems, large-scale optimisation problems are extensively used to plan for capacity expansion at the supra-national level. However, their cost-optimal solutions are often not exploitable by decision-makers who are preferably looking for features of solutions that can accommodate their different requirements. This paper proposes a generic...
Article
Full-text available
Conjugate gradient (CG) method is well-known for its ability to solve unconstrained optimization (UO.) problems. This article presenting a new CG method with sufficient descent conditions which improves the former method developed by Rvaie, Mustafa, Ismail and Leong (RMIL). The efficacy of the proposed method has been demonstrated through simulatio...
Article
Full-text available
Mobile edge computing (MEC) is a promising technology for the Internet of Vehicles, especially in terms of application offloading and resource allocation. Most existing offloading schemes are sub-optimal, since these offloading strategies consider an application as a whole. In comparison, in this paper we propose an application-centric framework an...
Article
Full-text available
The paper concerns nilpotent diassociative algebras (also known as associative dialgebras) and their corresponding diassociative Schur multipliers. Using Lie (and group) theory as a guide, we first extend a classic five-term cohomological sequence under alternative conditions in the nilpotent setting. This main result is then applied to obtain a ne...
Article
Full-text available
To avoid the difficulties introduced by the convex, proper and lower semicontinuous functional of the variational inequalities of the second kind, in a previous paper (Badea in Adv Comput Math 45(5):2807–2832, 2019), we have proposed to replace this functional by an explicit Moreau regularization of it. In this way, we get a variational inequality...
Article
Full-text available
We study a recently discovered metric invariant - the center of distances. The center of distances of a nonempty subset A of a metric space $$(X,\,d)$$ ( X , d ) is defined by $$S(A) :=\{ \alpha \in [0,\,+\infty ):\ \forall \ x\in A\ \ \exists \ y\in A d(x,\,y)=\alpha \} $$ S ( A ) : = { α ∈ [ 0 , + ∞ ) : ∀ x ∈ A ∃ y ∈ A d ( x , y ) = α } . Given a...
Article
Full-text available
In a decision-making problem, there is often some uncertainty regarding the user preferences. We assume a parameterised utility model, where in each scenario we have a utility function over alternatives, and where each scenario represents a possible user preference model consistent with the input preference information. With a set $$A$$ A of altern...
Conference Paper
Full-text available
Diagnostic imaging produces more data than ever for clinical decision-making, while related artificial intelligence (AI) solutions impose high demands for computational platforms. These challenges do not only concern diagnostic imaging, but also the healthcare digitalization in general. Cloud computing, a prominent technology to deal with the growi...
Conference Paper
Full-text available
Reasoners can be used to derive implicit consequences from an ontology. Sometimes unwanted consequences are revealed, indicating errors or privacy-sensitive information, and the ontology needs to be appropriately repaired. The classical approach is to remove just enough axioms such that the unwanted consequences vanish. However, this is often too r...
Poster
Full-text available
III. International Enzyme and Bioprocess Days / EBDays 2022 are organized by Tokat Gaziosmanpaşa University & Gebze Technical University. The aim of this congress is to provide an overview of the discovery of new enzymes, engineering approaches to enzymes (including new assays), and new enzyme applications. In addition, this congress aims to crea...
Conference Paper
Full-text available
We propose an analysis of heart rate marathon runners implemented by computing a multifractal spectrum based on p-exponents. We draw physiological conclusions about their performance. Finally, we link this analysis with the disturbances of the heart rate autoregulation during the marathon, which had been put in evidence up to now only by scales of...
Article
Full-text available
The Cybersyn project has lately received increased attention. In this article, we study the local technical antecedents of Stafford Beer's Cybersyn project in Chile, particularly regarding Cybernetics and Systems ideas and local computing and networking developments. We show that the Cybersyn project in Chile was hosted by a rich intellectual envir...
Article
Full-text available
In the process of gradual development of power grid, the role of service support and technical support of dispatching secondary system is becoming increasingly prominent, and the operation and maintenance work is also increasing with the number and types of dispatching secondary system, which makes the limitations of traditional monitoring methods...
Article
Full-text available
The low-rank approximation of a quaternion matrix has attracted growing attention in many applications including color image processing and signal processing. In this paper, based on quaternion normal distribution random sampling, we propose a randomized quaternion QLP decomposition algorithm for computing a low-rank approximation to a quaternion d...
Article
Full-text available
Metamorphic malware modifies its code structure using a morphing engine to evade traditional signature-based detection. Previous research has shown the use of opcode instructions as feature representation with Hidden Markov Model in the context of metamorphic malware detection. However, it would be more feasible to extract a file feature at fine-gr...
Article
Full-text available
This note is devoted to the splitting algorithm proposed by Davis and Yin (Set-valued Var. Anal. 25 (4), 829–858, 2017) for computing a zero of the sum of three maximally monotone operators, with one of them being cocoercive. We provide a direct proof that guarantees its convergence when the stepsizes are smaller than four times the cocoercivity co...