|
Go
Mar 25, 2025Open Access
Node renumbering is an important step in the solution of sparse systems of equations. It aims to reduce the bandwidth and profile of the matrix. This allows for the speeding up of the solution of the system or allows for the addressing of even larger systems than otherwise would be possible. Research on this topic dates to the late sixties. In most of these algorithms nodal degree is an important consideration. In the new algorithm, we consider the maximum difference in adjacent node numbers as ...
Jan 27, 2025Open Access
The rapid development of Artificial Intelligence (AI) technology has profoundly impacted all sectors of society, with education and teaching undergoing particularly significant transformations driven by AI. This study examines the influence of AI on higher education, using the Python programming course at Nanfang College Guangzhou as a case study. A series of comparative experiments were conducted, in which students were divided into five groups: one using ERNIE Bot, one using Doubao, one using ...
Jul 18, 2024Open Access
Traditional medical data collection methods are limited by equipment, space, time and other factors. Data transmission often has delay problems. We focus on wireless sensor network performance optimization OPM (Optimal routing scheme, Parallel computing, Maximum traffic and minimum overhead) algo-rithm. With CC2530 single-chip microcomputer as microcontroller and ZIGBEE as RF antenna, we build a wireless sensor network, obtain data from the serial port to transmit it to the cloud computing platf...
Jul 10, 2024Open Access
Cyber-resilience of software systems is the ability to prevent, resist, and recover from adverse incidents using IT resources. Infrastructure can be extended through cyber-resilience. In this case, the problems can be solved in a short time. In this study, some methods of ensuring the cyber-resistance of the software system are explored. The role, type, and characteristics of cyber-resilience for the software system are also examined in the work. Ways to implement Cyber-resilience measures for c...
Jan 08, 2020Open Access
This paper presents a power consumption estimation algorithm for static analysis. IR drop is being calculated for each separated node, which makes this algorithm favorable for IR drop calculation on infinite power network. The power consumption is being calculated using random walk algorithm, which includes Monte Carlo simulation method for increasing accuracy of estimation. For power mesh with 150 k power nodes, total IR drop cal ...
May 31, 2018Open Access
Wells performance is
evaluated by IPR curves that show the relationship between bottomhole pressure
and inflow rate. This curve and its outcome equation can be applied for production schedule and maintenance management
of well and reservoir. But, the measuring of bottomhole pressure to approach
these curves needs much time and high expenses and also running special tools
in wells. In these operations, the probability of catastroph ...
Jun 16, 2015Open Access
In these days, there exist some maturity & capability models,
standard methodologies and guidelines to help organizations to improve their
processes and the way they work. In software area, there are Software Process Assessment
Models like ISO/IEC 15504. This model provides guidance for assessing the organization’s
capacity about software development and his maturity on implemented processes. Software
Process Assessment models don’t provide systematic metrics for assessing the
Software Proce...
Jun 25, 2014Open Access
An interface of fluid phases is created
by unbalanced molecular attracting and repulsive force. Evaluating the
gas-liquid interfacial tension is very important and major interest in
injection processes. The interfacial tension between gas and liquid phases can
be measured by different methods in the reservoir and surface condition. VIT
(vanishing interfacial tension technique) is a laboratory method that
calculates interfacial tension for mixture of oil- ...
Go
|
|
|