Showing 25,681 - 25,700 results of 28,739 for search '"computing"', query time: 0.13s Refine Results
  1. 25681

    Perceiving Excitation Characteristics from Interactions between Field Road and Vehicle via Vibration Sensing by Yuansheng Cheng, Xiaoqin Li, Xiaolan Man, Feifan Fan, Zhixiong Li

    Published 2021-01-01
    “…A camera-accelerator system can solve this issue by utilizing computer vision information; however, the relationship between the field road surface and the vehicle vibration response remains an unsolved problem. …”
    Get full text
    Article
  2. 25682

    Public Transit Loyalty Modeling Considering the Effect of Passengers’ Emotional Value: A Case Study in Xiamen, China by Shi-chao Sun

    Published 2018-01-01
    “…Besides, the index score of variables was also computed to help determine targeted approaches to better improve the level of bus service. …”
    Get full text
    Article
  3. 25683

    Research on strong robustness watermarking algorithm based on dynamic difference expansion by Tianqi WANG, Yingzhou ZHANG, Yunlong DI, Dingwen LI, Linlin ZHU

    Published 2023-10-01
    “…A surge in the amount of information comes with the rapid development of the technology industry.Across all industries, there is a need to collect and utilize vast amounts of data.While this big data holds immense value, it also poses unprecedented challenges to the field of data security.As relational databases serve as a fundamental storage medium for data, they often contain large-scale data rich in content and privacy.In the event of a data leak, significant losses may occur, highlighting the pressing need to safeguard database ownership and verify data ownership.However, existing database watermarking technologies face an inherent tradeoff between improving watermark embedding capacity and reducing data distortion.To address this issue and enhance watermark robustness, a novel robust database watermarking algorithm based on dynamic difference expansion was introduced.The QR code was employed as the watermark, the SVD decomposition of the low frequency part of the image was utilized after Haar wavelet transform.By extracting specific feature values and using residual feature values as the watermark sequence, it was ensured that the same-length watermark sequence contains more information and the embedded watermark length can be reduced.Furthermore, by combining the adaptive differential evolution algorithm and the minimum difference algorithm, the optimal embedding attribute bits were selected to alleviate the problems of low computational efficiency, high data distortion and poor robustness of traditional difference expansion techniques in embedding watermarks, and to improve the embedding capacity of watermarks while reducing the distortion of data.Experimental results demonstrate that the proposed algorithm achieves a high watermark embedding rate with low data distortion.It is resilient against multiple attacks, exhibiting excellent robustness and strong traceability.Compared to existing algorithms, it offers distinct advantages and holds great potential for broad application in the field of data security.…”
    Get full text
    Article
  4. 25684
  5. 25685

    Autonomous security analysis and penetration testing model based on attack graph and deep Q-learning network by Cheng FAN, Guoqing HU, Taojie DING, Zhanhua ZHANG

    Published 2023-12-01
    “…With the continuous development and widespread application of network technology, network security issues have become increasingly prominent.Penetration testing has emerged as an important method for assessing and enhancing network security.However, traditional manual penetration testing methods suffer from inefficiency,human error, and tester skills, leading to high uncertainty and poor evaluation results.To address these challenges, an autonomous security analysis and penetration testing framework called ASAPT was proposed, based on attack graphs and deep Q-learning networks (DQN).The ASAPT framework was consisted of two main components:training data construction and model training.In the training data construction phase, attack graphs were utilized to model the threats in the target network by representing vulnerabilities and possible attacker attack paths as nodes and edges.By integrating the common vulnerability scoring system (CVSS) vulnerability database, a “state-action”transition matrix was constructed, which depicted the attacker’s behavior and transition probabilities in different states.This matrix comprehensively captured the attacker’s capabilities and network security status.To reduce computational complexity, a depth-first search (DFS) algorithm was innovatively applied to simplify the transition matrix, identifying and preserving all attack paths that lead to the final goal for subsequent model training.In the model training phase, a deep reinforcement learning algorithm based on DQN was employed to determine the optimal attack path during penetration testing.The algorithm interacted continuously with the environment, updating the Q-value function to progressively optimize the selection of attack paths.Simulation results demonstrate that ASAPT achieves an accuracy of 84% in identifying the optimal path and exhibits fast convergence speed.Compared to traditional Q-learning, ASAPT demonstrates superior adaptability in dealing with large-scale network environments, which could provide guidance for practical penetration testing.…”
    Get full text
    Article
  6. 25686

    Oral behaviors in Chinese temporomandibular disorder patients: insights from exploratory and confirmatory factor analyses by Tiqian Liu, Tiqian Liu, Adrian Ujin Yap, Adrian Ujin Yap, Adrian Ujin Yap, Yanyu Sun, Yanyu Sun, Yunhao Zheng, Yunhao Zheng, Tianqi Wang, Tianqi Wang, Shiya Zeng, Shiya Zeng, Zhen Liu, Xin Xiong, Xin Xiong

    Published 2024-12-01
    “…Items were contrasted with those of Italian TMDs patients (I-NFA and I-FA), and subscale scores were computed, compared, and correlated using Kruskal Wallis and Post-hoc and Spearman’s rank-order correlation (α = 0.05).ResultsVariations in NFA and FA items were observed between Chinese and Italian TMDs patients. …”
    Get full text
    Article
  7. 25687

    Three-dimensional effects on cracked components under anti-plane loading by F. Berto, A. Campagnolo, L. P. Pook

    Published 2015-07-01
    “…Increasingly powerful computers made it possible to investigate three-dimensional effects numerically in detail. …”
    Get full text
    Article
  8. 25688

    Influence of breed and environment on leukocyte telomere length in cattle by N. S. Yudin, A. V. Igoshin, G. A. Romashov, A. A. Martynov, D. M. Larkin

    Published 2024-04-01
    “…The leukocyte telomere lengths were estimated computationally from whole-genome resequencing data. We leveraged data on leukocyte telomere length, sex, and age of 239 animals from 17 cattle breeds. …”
    Get full text
    Article
  9. 25689

    Exercise of Civil-Law Rights: Categories in the Context of Their Digitalization by V. L. Volfson

    Published 2021-10-01
    “…Since no proper verification of the interests of the parties to ‘smart contracts’, which are essentially a computer code, is available, and as the same refers to linguistic verification of their will, there is no way for ‘smart contracts’ to enter the domain of law. …”
    Get full text
    Article
  10. 25690

    Research on Feature Extracted Method for Flutter Test Based on EMD and CNN by Hua Zheng, Zhenglong Wu, Shiqiang Duan, Jiangtao Zhou

    Published 2021-01-01
    “…The method allows for real-time, online prediction with low computational complexity.…”
    Get full text
    Article
  11. 25691

    Non vertical ionization-dissociation model for strong IR induced dissociation dynamics of $${{D}_{2}}O^{2+}$$ by Jun Wang, Shu Ning Gao, Aihua Liu, Lanhai He, Xi Zhao

    Published 2025-01-01
    “…However, a full quantum mechanical treatment of electron-nuclear dynamics is computationally intensive. In this work, we have developed a Strong Laser Induced non-adiabatic Multi-Ionic-Multi-Electric States (SLIMIMES) approach, which contains the electron-laser and electron-nuclear couplings. …”
    Get full text
    Article
  12. 25692

    Neuroscience Literacy and Academic Outcomes: Insights from a University Student Population by Abeer F. Almarzouki, Arzan I. Alqahtani, Jumana K. Baessa, Dhuha K. Badaood, Rwdyn R. Nujoom, Raneem W. Malibari, Elaf M. Aljared, Reema S. Alghamdi

    Published 2025-01-01
    “…<b>Results:</b> Students showed significant awareness of and interest in neuroscience; this was highest among students in health science programmes and lowest among students in computer and engineering programmes. The most common sources of general neuroscience knowledge were internet articles. …”
    Get full text
    Article
  13. 25693

    Intracardiac Echocardiography as a Guide for Transcatheter Closure of Patent Ductus Arteriosus by Hironaga Yoshimoto, Maeda Yasuto, Tadashi Inoue, Yoshiyuki Kagiyama, Yozo Teramachi, Ryuta Takase, Yusuke Koteda, Yoshihiro Fukumoto, Motofumi Iemura, Kenji Suda

    Published 2020-01-01
    “…In phase 1, we compared the measurements of PDA size: pulmonary artery side diameter (PA-D), length, and aortic side diameter (Ao-D) of PDA, as measured by ICE with those measured by aortography or cardiac computed tomography (AoG/CCT) in 23 patients who underwent TC-PDA. …”
    Get full text
    Article
  14. 25694

    A novel arc detection and identification method in pantograph-catenary system based on deep learning by Yue Yan, Hu Liu, Linfeng Gan, Runtong Zhu

    Published 2025-01-01
    “…Traditional arc detection methods, while functional, often suffer from low detection accuracy and high computational complexity, especially in complex operational environments. …”
    Get full text
    Article
  15. 25695

    Electron-spin decoherence in trityl radicals in the absence and presence of microwave irradiation by G. Jeschke, N. Wili, N. Wili, Y. Wu, S. Kuzin, H. Karas, H. Hintz, A. Godt

    Published 2025-01-01
    “…We introduce partial CCE that alleviates this problem and reduces computational effort at the expense of treating only part of the correlations at a particular order. …”
    Get full text
    Article
  16. 25696

    A Case of Ileocecal IgG4-Related Sclerosing Mesenteritis Diagnosed by Endoscopic Ultrasound-Guided Fine Needle Aspiration using Forward-Viewing Linear Echoendoscope by Yuichi Takano, Fumitaka Niiya, Takahiro Kobayashi, Eiichi Yamamura, Naotaka Maruoka, Tomoko Norose, Nobuyuki Ohike, Masatsugu Nagahama

    Published 2019-01-01
    “…The patient experienced abdominal pain for 4 days with repeated vomiting episodes; therefore, she was transferred to our hospital by an ambulance. Contrast-enhanced computed tomography revealed a 3-cm tumor in the ileocecal region, which caused small bowel obstruction. …”
    Get full text
    Article
  17. 25697

    NIGWO-iCaps NN: A Method for the Fault Diagnosis of Fiber Optic Gyroscopes Based on Capsule Neural Networks by Nan Lu, Huaqiang Zhang, Chunmei Dong, Hongtao Li, Yu Chen

    Published 2025-01-01
    “…Traditional diagnostic models often encounter challenges in terms of reliability and accuracy, for example, difficulties in feature extraction, high computational cost, and long training time. To address these challenges, this paper proposes a new fault diagnostic model that performs a fault diagnosis of gyroscopes using the enhanced capsule neural network (iCaps NN) optimized by the improved gray wolf algorithm (NIGWO). …”
    Get full text
    Article
  18. 25698

    From boundary data to bound states by Gregor Kälin, Rafael A. Porto

    Published 2020-01-01
    “…These relationships allow us to compute observables for generic orbits (such as the periastron advance ∆Φ) through analytic continuation, via a radial action depending only on boundary data. …”
    Get full text
    Article
  19. 25699

    Comparison of and as Reporter Genes for Noninvasive Imaging of Bone Mesenchymal Stem Cells Transplanted into Infarcted Rat Myocardium by Shuo Hu, Wei Cao, Xiaoli Lan, Yong He, Juntao Lang, Congjiao Li, Jia Hu, Rei An, Zairong Gao, Yongxue Zhang

    Published 2011-07-01
    “…The transfected rBMSCs were transplanted into infarcted rat myocardium followed by a single-photon emission computed tomography (SPECT) study with 99m Tc-pertechnetate as the radiotracer and by autoradiography. …”
    Get full text
    Article
  20. 25700

    How Menstruation Is Perceived by Adolescent School Girls in Gedeo Zone of Ethiopia? by Zelalem Belayneh, Moges Mareg, Birhanie Mekuriaw

    Published 2020-01-01
    “…Odds ratio with 95% confidence interval was computed to determine the level of significance. Result. …”
    Get full text
    Article