Showing 10,621 - 10,640 results of 28,739 for search '"computability"', query time: 0.09s Refine Results
  1. 10621

    Anonymous whistleblowers reply scheme based on secret sharing by HE Kun, HUANG Yajing, DU Ruiying, SHI Min, LI Siqin, CHEN Jing

    Published 2024-12-01
    “…The experimental results show that compared to the Express scheme, the proposed scheme reduces the computational complexity during a reply to <italic>O</italic>(1) from <italic>O</italic>(log<italic>N</italic>), resulting in a 60% reduction in computational overhead for the receiving organization and a 50% reduction for the server.…”
    Get full text
    Article
  2. 10622

    Application of New Technology of Intelligent Robot Plant Protection in Ecological Agriculture by Zhe An, Chunhang Wang, Bincy Raj, Sathyapriya Eswaran, R. Raffik, Sandip Debnath, Saima Ahmed Rahin

    Published 2022-01-01
    “…Compared with the traditional algorithm, the algorithm has higher accuracy, less computing time, and higher computing efficiency.…”
    Get full text
    Article
  3. 10623

    DBnet: A Lightweight Dual-Backbone Target Detection Model Based on Side-Scan Sonar Images by Quanhong Ma, Shaohua Jin, Gang Bian, Yang Cui, Guoqing Liu

    Published 2025-01-01
    “…Due to the large number of parameters and high computational complexity of current target detection models, it is challenging to perform fast and accurate target detection in side-scan sonar images under the existing technical conditions, especially in environments with limited computational resources. …”
    Get full text
    Article
  4. 10624

    Analysis of the Frost-Induced Damage of Building Enclosures on the Territory of the Czech Republic by Jan Kočí, Jiří Maděra, Vojtěch Pommer, Robert Černý

    Published 2018-01-01
    “…The exterior boundary conditions of the computational model are defined by a set of weather data characterizing the environmental conditions in the Czech Republic, which are acquired from 64 weather stations. …”
    Get full text
    Article
  5. 10625

    Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users by Vanga Anil, S. L. Arun

    Published 2025-01-01
    “…The swift progress of economically viable sustainable energy resources, coupled with advancements in communication and computational technologies, has facilitated the introduction of the Transactive Energy System (TES) within the smart grid. …”
    Get full text
    Article
  6. 10626

    Toward satellite-terrestrial integration: 6G cloud-fog collaborative self-organizing network by PENG Mugen, YUAN Shuo

    Published 2024-03-01
    “…However, LEO satellite networks are constrained by bottlenecks such as inadequate signal processing and computing capabilities of individual LEO satellites and constrained inter-satellite link capacity, necessitating a deep integration with terrestrial mobile communication networks that include extensive cloud-based processing and computing capabilities. …”
    Get full text
    Article
  7. 10627

    A TensorFlow implementation of Local Binary Patterns Transform by Devrim Akgün

    Published 2021-06-01
    “…Direct implementations of such layers in Python may result in long running times, and training a computer vision model may be delayed significantly. …”
    Get full text
    Article
  8. 10628

    Very large scale integration implementation of seizure detection system with on‐chip support vector machine classifier by Shalini Shanmugam, Selvathi Dharmar

    Published 2022-01-01
    “…The polyphase architecture of Daubechies fourth‐order wavelet three‐level DWT was used to minimize computational time. The systolic array architecture‐based support vector machine classifier using parallel processing helps to minimize the computational complexity of the proposed method. …”
    Get full text
    Article
  9. 10629
  10. 10630

    Radiation Impact of the Halloween GLE Events During the October–November 2003 Period by N. Larsen, A. Mishev

    Published 2025-01-01
    “…Using a conservative approach, the computed total effective dose for all three Halloween GLEs was 135 μSv in polar regions, an increase of 129% above the galactic cosmic ray background induced dose. …”
    Get full text
    Article
  11. 10631

    Interaction Design of Educational App Based on Collaborative Filtering Recommendation by Ying Xu, Tse-Kian Neo, Hin Hew Soon

    Published 2022-01-01
    “…Due to the operational characteristics of gesture interaction in the interface of a smart terminal application (app), this mode of human-computer interaction has become the mainstream mode of human-computer interaction. …”
    Get full text
    Article
  12. 10632

    Numerical Investigation of Critical Velocity in Reduced Scale Tunnel Fire with Constant Heat Release Rate by Ruben Mouangue, Philippe M. Onguene, Justin T. Zaida, Henri P. F. Ekobena

    Published 2017-01-01
    “…It is indicated that, after several computations of full-scale fires of 43.103 and 19.103 kJ/kg as heat release rate, the velocities satisfying the criterion of healthy environment in the upstream side of the tunnel are 1.34 m/s and 1.12 m/s, respectively.…”
    Get full text
    Article
  13. 10633

    Very high cycle fatigue strength and crack growth of thin steel sheets by Mohand Ouarabi, Ruben Perez Mora, Claude Bathias, Thierry Palin-Luc

    Published 2016-03-01
    “…To do that, special designs of specimens were made and computed using FEM for defining the stress amplitude for endurance tests. …”
    Get full text
    Article
  14. 10634

    Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic by Jiayin LI, Wenzhong GUO, Xiaoyan LI, Ximeng LIU

    Published 2020-07-01
    “…To alleviate the traffic pressure on roads,reduce the appearance of road congestion,and avoid the occurrence of traffic accidents,a privacy-preserving intelligent monitoring (PPIM) scheme based on intelligent traffic was proposed in combination with the safe and k-nearest neighbor (KNN) algorithm.To ensure the security of traffic data,the data content was randomly divided into independent parts via the secure multi-party computing strategy,and the data components were stored and encrypted separately by non-colluding multi-servers.To improve the accuracy of road condition monitoring,an improved KNN traffic monitoring algorithm was proposed.By virtue of the similarity calculation of data,the correlation value to measure the degree of traffic condition relationship between roads was obtained.And it was integrated with the KNN as the weight coefficient.To speed up the processing of dense data,a series of data security computing protocols were designed,and the data security processing was realized.In addition,real traffic data were used to verify the algorithm.The results show that the improved KNN algorithm is helpful to improve the accuracy of traffic monitoring.The analysis shows that the algorithm can not only guarantee the safety of data but improve the accuracy of traffic monitoring.…”
    Get full text
    Article
  15. 10635

    New Bouguer Gravity Maps of Venezuela: Representation and Analysis of Free-Air and Bouguer Anomalies with Emphasis on Spectral Analyses and Elastic Thickness by Javier Sanchez-Rojas

    Published 2012-01-01
    “…A regional gravity map was computed by removing wavelengths higher than 200 km from the Bouguer anomaly. …”
    Get full text
    Article
  16. 10636

    Time-series single-cell transcriptomic profiling of luteal-phase endometrium uncovers dynamic characteristics and its dysregulation in recurrent implantation failures by Dandan Cao, Yijun Liu, Yanfei Cheng, Jue Wang, Bolun Zhang, Yanhui Zhai, Kongfu Zhu, Ye Liu, Ye Shang, Xiao Xiao, Yi Chang, Yin Lau Lee, William Shu Biu Yeung, Yuanhua Huang, Yuanqing Yao

    Published 2025-01-01
    “…The holistic characterization of the physiological and pathophysiological window of implantation and a computational tool trained on this temporal atlas provide a platform for future therapeutic developments.…”
    Get full text
    Article
  17. 10637

    Cleaning Schedule Optimization of Heat Exchangers with Fouling on Tube and Shell Sides: A Metaheuristic Approach by João P. V. de Cesaro, Mauro A. S. S. Ravagnani, Fernando D. Mele, Caliane B. B. Costa

    Published 2024-12-01
    “…Current methods for optimizing cleaning schedules often report high computation times due to the transient nature of the fouling process and do not consider shell-side fouling, which can be significant for some oil fractions. …”
    Get full text
    Article
  18. 10638

    Dense Sandstone Material Decomposition Based on Improved Convolutional Neural Network by Ran ZHANG, Huihua KONG, Jiaxin LI, Yijiao SONG

    Published 2025-01-01
    “…Energy spectrum computed tomography can provide quantitative information of scanned objects and realize material decomposition. …”
    Get full text
    Article
  19. 10639

    Innovative IaaS Management System for Sensor Devices and IT Resources by Hitomi Takahashi, Takayuki Kushida

    Published 2014-06-01
    “…The evaluation results of SC show that the transmission delay for sensor data between the sensor devices and the users in SC was decreased by up to 81% compared to a typical cloud computing implementation.…”
    Get full text
    Article
  20. 10640

    Efficient data possession–checking protocol with deduplication in cloud by Jinxia Wei, Xinxin Niu, Ru Zhang, Jianyi Liu, Yuangang Yao

    Published 2017-08-01
    “…In fact, these operations bring a lot of computational costs. To solve this problem, we propose a data integrity verification scheme with deduplication. …”
    Get full text
    Article