Showing 28,441 - 28,460 results of 28,739 for search '"computability"', query time: 0.16s Refine Results
  1. 28441
  2. 28442
  3. 28443

    Perbandingan Kinerja Inception- Resnetv2, Xception, Inception-v3, dan Resnet50 pada Gambar Bentuk Wajah by Fitriana Masruroh, Bayu Surarso, Budi Warsito

    Published 2023-02-01
    “…Deep learning is becoming a trend in the field of computer vision because it gives the best results than the previous method. …”
    Get full text
    Article
  4. 28444
  5. 28445

    Intelligent prediction method of virtual network function resource capacity for polymorphic network service slicing by Julong LAN, Di ZHU, Dan LI

    Published 2022-06-01
    “…Conclusions: With the vigorous development of artificial intelligence technology, polymorphic network has given computing, storage and transmission capabilities to virtual nodes on network slices,and has been able to realize the dual improvement of network resource utilization and user experience through the adaptive flow of business demand data on the basis of autonomously sensing data throughput and autonomously predicting the resource requirements of VNFs on nodes. …”
    Get full text
    Article
  6. 28446

    Serum Pharmacochemistry and Network Pharmacology Reveal Active Compounds and Mechanisms of the Huaxian Formula in Alleviating Radiation-Induced Pulmonary Fibrosis by Gong C, Chen J, Zou P, Fang Z, Quan L, Wang J, Yin J, Lin B, Lang J, Chen M

    Published 2025-01-01
    “…The Huaxian formula (HXF), a traditional Chinese herbal remedy, shows promise in alleviating RIPF; however, its active ingredients and underlying mechanisms remain poorly understood.Methods: Through serum pharmacochemistry, network pharmacology, molecular docking, and experimental validation, we investigate the potential mechanisms of HXF in the prevention and treatment of radiation-induced pulmonary fibrosis (RIPF).Results: Histological examination and non-invasive computed tomography (CT) scans in animal experiments revealed that HXF improved extracellular matrix collagen deposition in the lung tissue of irradiated mice and reduced fibrosis manifestations on CT images. …”
    Get full text
    Article
  7. 28447
  8. 28448
  9. 28449
  10. 28450

    Temu Kembali Citra Tenun Nusa Tenggara Timur menggunakan Esktraksi Fitur yang Robust terhadap Perubahan Skala, Rotasi, dan Pencahayaan by Budiman Baso, Nanik Suciati

    Published 2020-02-01
    “…The results of the trial showed that SURF obtained higher accuracy in all conditions of tenun image data with an average value of 89.86% whereas MSER obtained an average accuracy value of 84.04%. But MSER's computation time is 1.95 seconds faster than SURF which is 9.94 seconds. …”
    Get full text
    Article
  11. 28451

    Pengkontruksian Bidirected Overlap Graph untuk Perakitan Sekuens DNA by Wisnu Ananta Kusuma, Albert Adrianus

    Published 2020-02-01
    “…DNA assembly process is computational intensive. To reduce the execution time suffix and prefix was converted into the single value so that the detection of overlap could be done by comparing the values. …”
    Get full text
    Article
  12. 28452
  13. 28453

    Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing by Ruizhong DU, Tianhe ZHANG, Pengliang SHI

    Published 2022-06-01
    “…Secondly, the proposed scheme is compared with some access control schemes with similar technologies in recent years in terms of group order,access structure,policy hiding and so on,it can be seen from the comparison results that the scheme in this paper has certain advantages in terms of functional characteristics.Afterwards,the cost of deploying contracts and executing related functions on the blockchain is evaluated.The results show that the gas cost of the scheme in this paper is within a reasonable range.The final simulation results show that the proposed scheme has high efficiency in both the access control stage and the data sharing stage.According to the design of the existing paper comparative experiments,we set the number of attributes to 0-20.In the access control stage, the initialization time, key generation time, encryption time and decryption time are compared with other schemes.The results show that although the computational overhead of the proposed scheme is relatively large in the initialization stage, the efficiency in the key generation stage, encryption stage and decryption stage is higher than that of the other three schemes, so the proposed scheme has higher efficiency in the access control stage.In the data sharing stage, the re-encryption time and re-decryption time are compared with other schemes, respectively. …”
    Get full text
    Article
  14. 28454
  15. 28455
  16. 28456
  17. 28457

    Perancangan User Experience Portal Media Interaksi Komunitas Kampus dengan Pendekatan Social Media Platform by Asyora Dewi Prabandani, Herman Tolle, Retno Indah Rokhmawati

    Published 2022-12-01
    “…Covers all activities that take place in The Faculty of Computer Science (FILKOM). Not all residents in it interact efficiently. …”
    Get full text
    Article
  18. 28458
  19. 28459
  20. 28460