Showing 24,121 - 24,140 results of 28,739 for search '"computing"', query time: 0.11s Refine Results
  1. 24121

    Quantum and Classical Dynamics with Random Permutation Circuits by Bruno Bertini, Katja Klobas, Pavel Kos, Daniel Malz

    Published 2025-01-01
    “…We show that, upon averaging over all circuit realizations, RPCs permit the analytical computation of several key quantities such as out-of-time-order correlators (OTOCs) and entanglement entropies. …”
    Get full text
    Article
  2. 24122

    A thermodynamic description of metastable c-TiAlZrN coatings with triple spinodally decomposed domains by Zhou J., Zhang L., Chen L., Du Y., Liu Z.K.

    Published 2017-01-01
    “…., c-TiN, c-AlN, and c-ZrN, was performed via the CALculation of PHAse Diagram (CALPHAD) technique based on the limited experimental data as well as the first-principles computed free energies. The metastable c-TiAlZrN coatings were modeled as a pseudo-ternary phase consisting of c-TiN, c-AlN and c-ZrN species, and described using the substitutional solution model. …”
    Get full text
    Article
  3. 24123

    Les novellisations de Bordage : expérimentations transmédiatiques du multimédia dans la science-fiction française by Aurélie Huz

    Published 2019-06-01
    “…Les fils du rayon d’or, 1998), the other adapted from a computer-generated 3D movie (Kaena, la prophétie, 2003). …”
    Get full text
    Article
  4. 24124

    What was Killing Babies in Ipswich Between 1872 and 1909? by Eilidh Garrett, Alice Reid

    Published 2022-07-01
    “…Ipswich is the only town in England for which a complete run of computer-readable, individual-level causes of death are available in the late 19th and early 20th century. …”
    Get full text
    Article
  5. 24125

    Event-Based Visual/Inertial Odometry for UAV Indoor Navigation by Ahmed Elamin, Ahmed El-Rabbany, Sunil Jacob

    Published 2024-12-01
    “…In this study, an event-based visual–inertial odometry approach is proposed, emphasizing adaptive event accumulation and selective keyframe updates to reduce computational overhead. The proposed approach fuses events, standard frames, and inertial measurements for precise indoor navigation. …”
    Get full text
    Article
  6. 24126

    Small target detection in UAV view based on improved YOLOv8 algorithm by Xiaoli Zhang, Guocai Zuo

    Published 2025-01-01
    “…This change maintains the model’s performance while significantly reducing the computational load. Lastly, the detection head adds a channel attention mechanism. …”
    Get full text
    Article
  7. 24127

    Penatalaksanaan Kista Teratoid Leher by Nadya Dwi Karsa, Sukri Rahman

    Published 2020-08-01
    “…Dilaporkan kasus seorang laki-laki usia 49 tahun dengan benjolan di leher yang membesar secara perlahan sejak 1 bulan dan hasil Computed Tomography (CT) Scan tiroid dan leher dicurigai sebagai kista tiroglosus dan didiagnosis banding dengan kista dermoid. …”
    Get full text
    Article
  8. 24128

    3D Face Modeling Algorithm for Film and Television Animation Based on Lightweight Convolutional Neural Network by Cheng Di, Jing Peng, Yihua Di, Siwei Wu

    Published 2021-01-01
    “…The algorithm uses the difference criterion instead of the entropy criterion to avoid the “small sample” problem, and the use of QR decomposition can extract more effective discriminative features for facial recognition, while also reducing the computational complexity of feature extraction. Compared with traditional feature extraction methods, GMMSD avoids the problem of “small samples” and does not require preprocessing steps on the samples; it uses QR decomposition to extract features from the original samples and retains the distribution characteristics of the original samples. …”
    Get full text
    Article
  9. 24129

    Toward Questionnaire Complexity Reduction by Decreasing the Questions by Miguel A. Molina-Cabello, José Serrano-Angulo, Jesús Benito-Picazo, Karl Thurnhofer-Hemsi

    Published 2025-01-01
    “…To evaluate the effectiveness of the proposed method, it has been used across various subjects in Computer Sciences Engineering degrees over different academic years. …”
    Get full text
    Article
  10. 24130

    PRIORITISATION OF ON-CAMPUS UNIVERSITY STUDENT HOUSING FACILITY SPACES by Fredrick Simpeh, Winston Shakantu

    Published 2019-09-01
    “…The study found that bathrooms, sleeping spaces, kitchens, study areas, libraries, sick bays, computer labs, bookshops, dry line areas and discussion rooms are ‘extremely important’ spaces that students expect in an ideal SHF. …”
    Get full text
    Article
  11. 24131

    The effect of 6-weeks competition period training on body composition of boxers by Melike Nur Akgul, Oktay Cakmakcı

    Published 2017-08-01
    “…Mean and standard deviation were computed. According to tests of normality, the Independent t-test was used to compare paired groups.  …”
    Get full text
    Article
  12. 24132

    ISLRWR: A network diffusion algorithm for drug-target interactions prediction. by Lu Sun, Zhixiang Yin, Lin Lu

    Published 2025-01-01
    “…Machine learning techniques and computer-aided methods are now widely used in the pre-discovery tasks of drug discovery, effectively improving the efficiency of drug development and reducing the workload and cost. …”
    Get full text
    Article
  13. 24133

    Anonymous trust management scheme of VANET based on attribute signature by Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO

    Published 2023-04-01
    “…Trust management mechanisms can solve the authenticity assessment problem of messages and establish trust between communication entities in the VANET.However, current trust management schemes lack an effective privacy protection mechanism, leading to privacy concerns for vehicles when binding their identity with their trust level.Based on the anonymity of attribute-based signature, an anonymous trust management scheme was proposed for VANET.The trust level of the vehicle was maintained by the trusted authority.The trust level of vehicles and the current time were taken as the attribute identity set of the vehicle, so as to realize the binding of the anonymous vehicle identity with its trust level, which could provide the privacy protection of vehicles.In addition, the timely update of attribute signature private key could resist false reputation attack and the trust level of the vehicle could be verified anonymously while the attribute signature was verified.Furthermore, the pseudonym was used to hide the real identity of the vehicle, enabling only the trusted authority could parse the real identity of vehicles from the pseudonym to update their trust level, and providing legal and secure tracking of the malicious vehicle identity vehicle.Under the general group model, the attribute-based signature scheme is proven to satisfy the security of unforgerability.The security analysis further shows that the scheme protects the identity and location privacy of vehicles, enables only the trusted authority to legally track malicious vehicles, resists false reputation attacks, ensures communication integrity, and resists replay attacks.Performance analysis confirms that the proposed scheme has better computation and communication efficiency than existing schemes.…”
    Get full text
    Article
  14. 24134

    Through-wall Human Pose Reconstruction and Action Recognition Using Four-dimensional Imaging Radar by Rui ZHANG, Hanqin GONG, Ruiyuan SONG, Yadong LI, Zhi LU, Dongheng ZHANG, Yang HU, Yan CHEN

    Published 2025-02-01
    “…Additionally, to address the influence of walls on signal quality, this paper introduces a deep echo domain compensator that leverages the powerful fitting performance and parallel output characteristics of deep learning, thereby reducing the computational overhead of traditional wall compensation methods. …”
    Get full text
    Article
  15. 24135

    Endometriosis in Postmenopausal Woman Without Previous Hormonal Therapy: A Case Report by Mine İslimye Taşkın, Meltem Çağrı Menteşe, Engin Uzgören, Ümit İnceboz

    Published 2015-12-01
    “…The patient was then submitted to a computed tomography scan that showed multiple lobated cystic masses at both adnexa. …”
    Get full text
    Article
  16. 24136

    Gorham Stout syndrome in a pediatric patient. A case report by Ariel Moya Machado, Leidelén Esquivel Sosa, Yisel González Ríos

    Published 2023-03-01
    “…The fever recurred and a marked increase in volume was observed in the dorsal lumbar region. Computed axial tomography and magnetic resonance imaging revealed osteolysis of the vertebral bodies from D8 to L2 and an increase in the adjacent soft tissues. …”
    Get full text
    Article
  17. 24137

    Correlation analysis between coiling tension and the sleeve's hoop stress by Park Yonghui

    Published 2024-01-01
    “…This analytical solution not only holds promise for predicting the behavior of various thick-walled cylinders produced through different manufacturing processes involving coiling but also facilitates integration with monitoring systems to mitigate slumping during steel rolling operations, all while minimizing computational burden.…”
    Get full text
    Article
  18. 24138

    THE IMPACT OF THE PANDEMIC PERIOD ON THE MOTOR DEVELOPMENT OF 9TH AND 12TH GRADE STUDENTS by Moga Carolina

    Published 2024-12-01
    “…Moreover, due to online lessons, the time children spent in front of computers increased considerably, leading to hypodynamia and negatively impacting the physical and mental health of children. …”
    Get full text
    Article
  19. 24139

    Neuropharmacological profile of new thiazepinone and thiazolidinone compounds designed by virtual screening by Juan Sebastian Carrero-Sandoval, Paola Andrea Cuervo-Prado, Fabian Orozco-Lopez, Christian Alonso Becerra-Rivas, Estefany Arias-Quiroz, Mario Francisco Guerrero-Pabón

    Published 2025-01-01
    “…Abstract To evaluate the neuropharmacological profile of new spiro thiazepinone and thiazolidinone compounds in CD1 mice after a computer-aided virtual screening based on a GABA-A/BZD site. …”
    Get full text
    Article
  20. 24140

    Brain tumor segmentation by deep learning transfer methods using MRI images by E.Y. Shchetinin

    Published 2024-06-01
    “…Among such models, VGG16, VGG19, Mobilenetv2, Inception, Efficientnetb7, InceptionResnetV2, DenseNet201, DenseNet121 were used. The computational experimental analysis performed in the paper on a set of MRI brain images showed that the best encoder model for the above deep models was the DenseNet121 model with the following values of segmentation metrics Mean IoU of 91.34%, Mean Dice of 94.26%, Accuracy of 94.22%. …”
    Get full text
    Article