Search Results - computational complexity theory

  1. 41
  2. 42
  3. 43

    Cyberfield: Theory, Methodology, and Practice by Svetlana Yu. Belorussova, Ksenya A. Maretina, Elizaveta A. Komova

    Published 2025-04-01
    “…The study of digital identity began in the late 1980s with the rise of computers, the Internet, video games, and online communication tools. …”
    Get full text
    Article
  4. 44

    The Role of the “Informational Turn” While Shaping a Modern IT Personality’s Scientific Worldview by Olga Korchazhkina

    Published 2024-03-01
    “…Nevertheless, Cybernetics, Information Theory and Computer Science as sources of the most powerful tools for working with information resources, organizing educational and professional activities and as fundamental disciplines in shaping the modern picture of the world, will not exhaust their potential for a long time. …”
    Get full text
    Article
  5. 45

    Optimization Model for Safeguarding Vulnerable Components in Integrated Energy Systems Based on Weighted Betweenness by ZHANG Chenwei, WANG Ying, LI Yaping, ZHANG Kaifeng

    Published 2025-07-01
    “…Utilizing the complex network theory to mitigate vulnerabilities mitigation in integrated energy systems is significant for enhancing the resilience of sustained energy supply, especially against deliberate physical attacks and natural disasters. …”
    Get full text
    Article
  6. 46
  7. 47

    Computational studies of the rotors aerodynamic characteristics of multirotor drones by K. G. Kosushkin, B. S. Kritsky, R. M. Mirgazov

    Published 2021-11-01
    “…The rotor interaction was evaluated. The computations were based on the nonlinear rotor blade vortex theory in a non-stationary arrangement. …”
    Get full text
    Article
  8. 48

    Power, Market and social system Complexity: Theoretical Model of Financial and Management Mechanism by E. V. Balatsky, N. A. Ekimova

    Published 2021-02-01
    “…The initial driving force of the model is the growing complexity of the managed system, which, by D. Zolo’s complexity theory, leads to the wide spread of authoritarian political regimes. …”
    Get full text
    Article
  9. 49

    Stochastic and Percolating Models of Blocking Computer Networks Dynamics during Distribution of Epidemics of Evolutionary Computer Viruses by S. A. Lesko, A. S. Alyoshkin, V. V. Filatov

    Published 2019-06-01
    “…The paper presents a complex model of the dynamics of virus epidemies propagation in computer networks, based on topological properties of computer networks and mechanisms of the viruses spread. …”
    Get full text
    Article
  10. 50

    Quantum Mechanics MP2 and CASSCF Study of Coordinate Quasi-Double Bonds in Cobalt(II) Complexes as Single Molecule Magnets by Yuemin Liu, Salah S. Massoud, Oleg N. Starovoytov, Tariq Altalhi, Yunxiang Gao, Boris I. Yakobson

    Published 2025-06-01
    “…Co(II) complexes have shown promising applications as single-molecule magnets (SMMs) in quantum computing and structural biology. …”
    Get full text
    Article
  11. 51
  12. 52

    A new theory of tree sap flow by András Török, Anikó Anna Hajduné Kubovje, Balázs Hardi, Ralf Bergmann, Krisztián Szigeti, Domokos Máthé, Imre Hegedüs

    Published 2025-07-01
    “…Complex physiological, biochemical, and biophysical processes may be behind the operation of the pipe system.…”
    Get full text
    Article
  13. 53

    Multi-Agent Reinforcement Learning in Games: Research and Applications by Haiyang Li, Ping Yang, Weidong Liu, Shaoqiang Yan, Xinyi Zhang, Donglin Zhu

    Published 2025-06-01
    “…Inspired by these phenomena, this study investigates how bio-inspired computing principles can bridge game-theoretic rationality and multi-agent adaptability. …”
    Get full text
    Article
  14. 54
  15. 55
  16. 56

    Formation of the measuring channel for quantum diagnostic computer by S. V. Dianov, V. M. Novichkov

    Published 2019-08-01
    “…Data transmitted over quantum communication lines cannot be copied or intercepted, which is very useful for remote control of complex technical systems. Based on the results of the probabilistic noisy data analysis quantum computer can quickly develop an assessment of the complex system technical condition. …”
    Get full text
    Article
  17. 57
  18. 58

    Non-perturbative overlaps in JT gravity: from spectral form factor to generating functions of complexity by Masamichi Miyaji, Shan-Ming Ruan, Shono Shibuya, Kazuyoshi Yano

    Published 2025-06-01
    “…In this work, we investigate non-perturbative overlaps in Jackiw-Teitelboim (JT) gravity to uncover universal signatures of quantum chaos and quantum complexity. Taking advantage of universal spectral correlators from random matrix theory, we compute the overlaps between the thermofield double (TFD) state and two distinct classes of states: fixed-length states, which encode maximal volume slices, and time-shifted TFD states. …”
    Get full text
    Article
  19. 59

    COMPUTER MODEL OF VIRTUAL SOCIAL NETWORK WITH RECOMMENDATION SYSTEM by Yelyzaveta Meleshko

    Published 2019-06-01
    “…The methods used are graph theory, theory of algorithms, statistics theory, probability theory, object-oriented programming. …”
    Get full text
    Article
  20. 60

    DEVELOPMENT OF THE METHODS FOR RESOURCE REALLOCATION IN CLOUD COMPUTING SYSTEMS by Viacheslav Davydov, Daryna Hrebeniuk

    Published 2020-10-01
    “…The following tasks were solved in the article: development of an complex approach to manage resource reallocation in cloud systems, including decomposition of the cloud computing system into zones (based on the defining features of the resources provided in each zone), initial resource allocation (based on the hierarchy analysis method) and resources reallocation within cloud computing system (based on the developed method); development of a method for computing resources reallocation in cloud computing systems; evaluation of the effectiveness of the developed method. …”
    Get full text
    Article