بدائل البحث:
time evolution » linear evolution (توسيع البحث)
operators » operations (توسيع البحث)
يعرض 1 - 20 نتائج من 21 نتيجة بحث عن 'time evolution (operator OR operators)', وقت الاستعلام: 0.07s تنقيح النتائج
  1. 1

    A quantum algorithm for evolving open quantum dynamics on quantum computing devices حسب Zixuan Hu (13719685)

    منشور في 2020
    "…In this work we propose and demonstrate a general quantum algorithm to evolve open quantum dynamics on quantum computing devices. The Kraus operators governing the time evolution can be converted into unitary matrices with minimal dilation guaranteed by the Sz.…"
  2. 2

    Development of Machine Learning Models for Studying the Premixed Turbulent Combustion of Gas-To-Liquids (GTL) Fuel Blends حسب Abdellatif M. Sadeq (16931841)

    منشور في 2024
    "…Model 1 predicts the variations of the flame radius with time, equivalence ratio, and turbulence intensity, whereas model 2 predicts the variations of the turbulence flame speed with the operating parameters. …"
  3. 3
  4. 4

    OPN09-04: SSTF حسب Fawaz, W.

    منشور في 2017
    "…The rationale behind this proposal lies in considering the optical connection setup time requirement as a (timely increasing) priority indicator during the setup/provisioning process. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  5. 5

    Approximate XML structure validation based on document–grammar tree similarity حسب Tekli, Joe

    منشور في 2015
    "…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    Approximate XML structure validation technical report حسب Tekli, Joe

    منشور في 2014
    "…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 7

    Role of Information and Communication Technologies in the Smart Grid حسب Al-Omar, Ban Abdul Elah

    منشور في 2012
    "…In the smart grid operation and management, reliable and real-time information and communication networks play a very critical role. …"
    احصل على النص الكامل
    article
  8. 8

    Physical optimization algorithms for mapping data to distributed-memory multiprocessors حسب Mansour, Nashat

    منشور في 1992
    "…An important feature of these algorithms is that they deviate from the operation of their sequential counterparts in order to achieve reasonable speed-ups and, yet, they maintain similar solution qualities. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  9. 9

    Link between Transformational Leadership and Organizational Efficiency & Employee Performance حسب ALALI, ABDULLA HASSAN

    منشور في 2023
    "…The specific problem addressed in this study is finding inspiration among followers through the TL approach and completing all the tasks in time without losing motivation. For this purpose, the companies operating in the construction engineering sector will be presented with recommendations for improving efficiency. …"
    احصل على النص الكامل
  10. 10

    Charles Jencks and the historiography of Post-Modernism حسب Haddad, Elie

    منشور في 2009
    "…The history of Post-Modern Architecture was to a large extent tied to the name of Charles Jencks, who played an operative role in promoting the movement, much like his predecessor Sigfried Giedion had done for Modern Architecture in the 1930s. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 11

    Gaza’s Subterranean Warfare: Palestinian Resistance Tunnels vs. Israel’s Military Strategy حسب Majd Abuamer (21841715)

    منشور في 2024
    "…Over the last two decades, Israel has set the destruction of the tunnels of the Palestinian armed groups as a primary goal of its massive wars in the Gaza Strip. At the same time, Palestinian armed groups have strategically harnessed the subterranean realm, rendering it an operational tool and developing a tunnel system. …"
  12. 12

    The Digitalization of the UAE Construction Industry and its Impact on Dispute Resolution حسب RAJU, REJITHA MOHAN

    منشور في 2023
    "…These conflicts consume a significant portion of stakeholders' time, effort and resources. This is primarily due to the construction industry's dependence on conventional record-keeping and process methods. …"
    احصل على النص الكامل
  13. 13

    Systematic analysis of software development in cloud computing perceptions حسب Habib Ullah Khan (12024579)

    منشور في 2023
    "…This SLR will assist organizations, designers, and developers to develop and deploy user-friendly, efficient, effective, and real time software applications.</p> </div><p></p><h2>Other Information</h2> <p> Published in: Journal of Software: Evolution and Process<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1002/smr.2485" target="_blank">http://dx.doi.org/10.1002/smr.2485</a></p>…"
  14. 14
  15. 15

    A Modified Oppositional Chaotic Local Search Strategy Based Aquila Optimizer to Design an Effective Controller for Vehicle Cruise Control System حسب Ekinci, Serdar

    منشور في 2023
    "…In this work, we propose a real proportional-integral-derivative plus second-order derivative (PIDD2) controller as an efficient controller for vehicle cruise control systems to address the challenging issues related to efficient operation. In this regard, this paper is the first report in the literature demonstrating the implementation of a real PIDD2 controller for controlling the respective system. …"
    احصل على النص الكامل
  16. 16

    On the Optimization of Band Gaps in Periodic Waveguides حسب Jamil Renno (14070771)

    منشور في 2025
    "…In the second example, which operated under fixed runtime budgets, Kruskal–Wallis tests indicated significant differences at all time budgets: PSO consistently attained the lowest transmissibility, with GWO and IGWO close behind, GA showing modest improvement with longer runtime, and DE stagnating early. …"
  17. 17

    Integration of Smart Sensors in Buildings to achieve Energy Efficiency in Hot and Humid Climate حسب JABR, BILAL SUDQI SAEED

    منشور في 2021
    "…People tend to spend the greater part of their time in indoor spaces e.g., commercial and residential buildings. …"
    احصل على النص الكامل
  18. 18

    An overview of future sustainable nuclear power reactors حسب Poullikkas, Andreas

    منشور في 2013
    "…In contrast, generation III reactors, which are an evolution of generation II reactors, incorporate passive or inherent safety features that require no active controls or operational intervention to avoid accidents in the event of malfunction, and may rely on gravity, natural convection or resistance to high temperatures. …"
    احصل على النص الكامل
    article
  19. 19

    Using Blockchain as a Project Management Device حسب AL TEKREETI, ANAS

    منشور في 2020
    "…Some people believe that blockchain can move societies to operate digitally. It is a blend of old technologies already existing for a long time. …"
    احصل على النص الكامل
  20. 20

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review حسب Yasir Ali (799969)

    منشور في 2023
    "…<div><p>Internet of Things (IoT) driven systems have been sharply growing in the recent times but this evolution is hampered by cybersecurity threats like spoofing, denial of service (DoS), distributed denial of service (DDoS) attacks, intrusions, malwares, authentication problems or other fatal attacks. …"