Search results for "Computer Science Application"
showing 10 items of 3998 documents
Systematic derivation of partial differential equations for second order boundary value problems
2022
Software systems designed to solve second order boundary value problems are typically restricted to hardwired lists of partial differential equations. In order to come up with more flexible systems, we introduce a systematic approach to find partial differential equations that result in eligible boundary value problems. This enables one to construct and combine one's own partial differential equations instead of choosing those from a pre-given list. This expands significantly end users possibilities to employ boundary value problems in modeling. To introduce the main ideas we employ differential geometry to examine the mathematical structure involved in second order boundary value problems …
An Overview on the Performance of 1,2,3-Triazole Derivatives as Corrosion Inhibitors for Metal Surfaces
2021
This review accounts for the most recent and significant research results from the literature on the design and synthesis of 1,2,3-triazole compounds and their usefulness as molecular well-defined corrosion inhibitors for steels, copper, iron, aluminum, and their alloys in several aggressive media. Of particular interest are the 1,4-disubstituted 1,2,3-triazole derivatives prepared in a regioselective manner under copper-catalyzed azide-alkyne cycloaddition (CuAAC) click reactions. They are easily and straightforwardly prepared compounds, non-toxic, environmentally friendly, and stable products to the hydrolysis under acidic conditions. Moreover, they have shown a good efficiency as corrosi…
Students evaluating Internet sources – From versatile evaluators to uncritical readers
2008
The Internet is a significant information resource for students due to the ease of access it allows to a vast amount of information. As the quality of the information on the Internet varies, it is important that students are able to evaluate such information critically. The aim of the study was to investigate how students evaluate Internet sources in an authentic learning task. Upper secondary school students ( n = 25) were asked to look for source material on the Internet in order to write an essay. They were asked to verbalize their thoughts during the material gathering process. Their verbalizations and actions on the Internet were recorded and analyzed. The five evaluation profiles eme…
A Gadolinium(III) Complex Based on the Thymine Nucleobase with Properties Suitable for Magnetic Resonance Imaging
2021
The paramagnetic gadolinium(III) ion is used as contrast agent in magnetic resonance (MR) imaging to improve the lesion detection and characterization. It generates a signal by changing the relaxivity of protons from associated water molecules and creates a clearer physical distinction between the molecule and the surrounding tissues. New gadolinium-based contrast agents displaying larger relaxivity values and specifically targeted might provide higher resolution and better functional images. We have synthesized the gadolinium(III) complex of formula [Gd(thy)2(H2O)6](ClO4)3·2H2O (1) [thy = 5-methyl-1H-pyrimidine-2,4-dione or thymine], which is the first reported compound based on gadolinium…
A Low Dose of Pure Cannabidiol Is Sufficient to Stimulate the Cytotoxic Function of CIK Cells without Exerting the Downstream Mediators in Pancreatic…
2022
Despite numerous studies conducted over the past decade, the exact role of the cannabinoid system in cancer development remains unclear. Though research has focused on two cannabinoid receptors (CB1, CB2) activated by most cannabinoids, CB2 holds greater attention due to its expression in cells of the immune system. In particular, cytokine-induced killer cells (CIKs), which are pivotal cytotoxic immunological effector cells, express a high-level of CB2 receptors. Herein, we sought to investigate whether inducing CIK cells with cannabidiol can enhance their cytotoxicity and if there are any possible counter effects in its downstream cascade of phosphorylated p38 and CREB using a pancreatic d…
LPV model identification for gain scheduling control: An application to rotating stall and surge control problem
2006
Abstract We approach the problem of identifying a nonlinear plant by parameterizing its dynamics as a linear parameter varying (LPV) model. The system under consideration is the Moore–Greitzer model which captures surge and stall phenomena in compressors. The control task is formulated as a problem of output regulation at various set points (stable and unstable) of the system under inputs and states constraints. We assume that inputs, outputs and scheduling parameters are measurable. It is worth pointing out that the adopted technique allows for identification of an LPV model's coefficients without the requirements of slow variations amongst set points. An example of combined identification…
Predicting the availability of users' devices in Decentralized Online Social Networks
2018
The understanding of the user temporal behavior is a crucial aspect for all those systems that rely on user resources for daily operations, such as decentralized online social networks (DOSNs). Indeed, DOSNs exploit the devices of their users to take on and share the tasks needed to provide services such as storing the published data. In the last years, the increasing popularity of DOSN services has changed the way of how people interact with each other by enabling users to connect to these services at any time by using their personal devices (such as notebooks or smartphones). As a result, the availability of data in these systems is strongly affected (or reflected) by the temporal behavio…
A decomposition approach for multidimensional knapsacks with family-split penalties
2022
The optimization of Multidimensional Knapsacks with Family-Split Penalties has been introduced in the literature as a variant of the more classical Multidimensional Knapsack and Multi-Knapsack problems. This problem deals with a set of items partitioned in families, and when a single item is picked to maximize the utility, then all items in its family must be picked. Items from the same family can be assigned to different knapsacks, and in this situation split penalties are paid. This problem arises in real applications in various fields. This paper proposes a new exact and fast algorithm based on a specific Combinatorial Benders Cuts scheme. An extensive experimental campaign computational…
Dialogicality in making sense of online collaborative interaction : a conceptual perspective
2021
In higher education, learning activities increasingly take place in online collaborative groups. In this conceptual paper, we explore online collaborative interaction from the perspective of dialogicality. We aim to reconceptualize the notion of “productive interaction” and the typical focus of its research by turning attention to the dialogic features of collaborative interaction, especially the notions of alterity, dialogic attitude, and dialogic orientation. In relation to this, we offer a contextual perspective on collaborative interaction. Relying on data from an online university course, we conceptually analyze specified components of dialogicality. This article illustrates and explor…
An analysis of model predictive control with integral action applied to digital displacement cylinders
2020
This article aims to analyze Model Predictive Control (MPC) for the control of multi-chamber cylinders. MPC with and without integral action has been introduced. Three different algorithms have been used to solve the optimization problem in the MPC. The different algorithms have been compared with an industrial solver. The influence of changing mass, choosing a different middle line pressure, system delays, signal noise, velocity estimation, and changing pressure levels has been investigated. It is concluded that for the small prediction horizon used in the paper a simple algorithm such as A can produce results as good as the previously used Differential Evolution algorithm in less than hal…