Showing 6,661 - 6,680 results of 21,428 for search '"computing"', query time: 0.08s Refine Results
  1. 6661

    Structural Performance of Reinforced Concrete Beams with Steel Fibres as Secondary Reinforcement: Experimental and Pre-peak Numerical Modelling by Hadjer Belkadi, Abdelkrim Bourzam, Messaoud Saidani

    Published 2024-12-01
    “…Challenges in modelling steel fibres include their discrete nature and computational demands due to intricate meshing and convergence issues. …”
    Get full text
    Article
  2. 6662

    High-power ultrasound pretreatment for enhanced protein extraction from lupin flour: Impact on yield, anti-technological and anti-nutritional factors, and techno-functional propert... by Paola Navarro-Vozmediano, Esperanza Dalmau, Jose Benedito, Jose V. Garcia-Perez

    Published 2025-03-01
    “…Ultrasonic field was characterized by computing acoustic pressure from frequency spectra analysis.In general terms, pretreatment reduced noticeably ANF and ATF in both LF and protein isolate (LPI), while also producing a protein concentrate (LPC, avg. 65 g protein/100 g) with low ANF and ATF content. …”
    Get full text
    Article
  3. 6663
  4. 6664

    A Framework for Privacy-Preserving in IoV Using Federated Learning With Differential Privacy by Muhammad Adnan, Madiha Haider Syed, Adeel Anjum, Semeen Rehman

    Published 2025-01-01
    “…To overcome these issues, we introduced a new privacy framework, which is an improvement of the existing shadowing scheme. We proposed a computationally efficient group leader selection process based on centeredness, rule obeyed, and OBU resources, reducing overhead by 20%, integrating FL with DP to preserve data privacy without sacrificing utility, and achieving a 15% improvement in location accuracy under privacy constraints, validating the scalability and robustness of the framework through extensive simulations involving up to 300 vehicles. …”
    Get full text
    Article
  5. 6665

    Fully Automated Bone Age Assessment on Large-Scale Hand X-Ray Dataset by Xiaoying Pan, Yizhe Zhao, Hao Chen, De Wei, Chen Zhao, Zhi Wei

    Published 2020-01-01
    “…Because the manual method is time-consuming and prone to observer variability, it is attractive to develop computer-aided and automated methods for BAA. In this paper, we present a fully automatic BAA method. …”
    Get full text
    Article
  6. 6666

    An Intelligent Heuristic Manta-Ray Foraging Optimization and Adaptive Extreme Learning Machine for Hand Gesture Image Recognition by Seetharam Khetavath, Navalpur Chinnappan Sendhilkumar, Pandurangan Mukunthan, Selvaganesan Jana, Lakshmanan Malliga, Subburayalu Gopalakrishnan, Sankuru Ravi Chand, Yousef Farhaoui

    Published 2023-09-01
    “…The development of hand gesture recognition systems has gained more attention in recent days, due to its support of modern human-computer interfaces. Moreover, sign language recognition is mainly developed for enabling communication between deaf and dumb people. …”
    Get full text
    Article
  7. 6667
  8. 6668

    Improving P-Doped DBRs Operation at Cryogenic Temperatures: Investigating Different Mirror Geometry by Behzad Namvar, Topi Uusitalo, Heikki Virtanen, Mircea Guina, Jukka Viheriala

    Published 2024-01-01
    “…The use of vertical-cavity-surface-emitting lasers with ability to operate at cryogenic temperatures (Cryo-VCSELs) is a promising path to implement optical data links between superconducting processors maintained in cryogenic environments (4 K range) and room temperature (RT) computing hardware. In order to achieve energy-efficient operation of a cryo-VCSEL, whether by passing current through the mirrors or utilizing intra-cavity contacts, a critical bottleneck for improving the operation is related to the p-doped distribute Bragg Reflectors (DBRs). …”
    Get full text
    Article
  9. 6669

    Sub-nanometer depth resolution and single dopant visualization achieved by tilt-coupled multislice electron ptychography by Zehao Dong, Yang Zhang, Chun-Chien Chiu, Sicheng Lu, Jianbing Zhang, Yu-Chen Liu, Suya Liu, Jan-Chi Yang, Pu Yu, Yayu Wang, Zhen Chen

    Published 2025-01-01
    “…This approach can be implemented on widely available transmission electron microscopes equipped with hybrid pixel detectors, with data processing achievable using high-performance computing systems.…”
    Get full text
    Article
  10. 6670
  11. 6671

    Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays by Nourhan Zayed, Nahed Tawfik, Mervat M. A. Mahmoud, Ahmed Fawzy, Young-Im Cho, Mohamed S. Abdallah

    Published 2025-01-01
    “…Convolutional neural networks (CNNs) are increasingly recognized as an important and potent artificial intelligence approach, widely employed in many computer vision applications, such as facial recognition. …”
    Get full text
    Article
  12. 6672

    Novel Intuitionistic Fuzzy Fault Tree Analysis for Effective Infectious Medical Waste Management by Rocky Khajuria, Komal, Morteza Yazdani

    Published 2025-04-01
    “…The paper proposes an intuitionistic fuzzy fault tree analysis (FFTA) method that quantifies data uncertainty through trapezoidal intuitionistic fuzzy numbers (TrIFN) while novel arithmetic operations are applied for computing the top incident failure possibility. To develop these novel operations, the weakest t-norm is applied to detract the accumulating circumstances of fuzziness, while Algebraic t-norm and t-conorm are used to estimate membership and non-membership degrees, respectively, of top event failure possibility in terms of trapezoidal intuitionistic fuzzy numbers (TrIFN). …”
    Get full text
    Article
  13. 6673
  14. 6674

    qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era by Hyoungsub Shim, Bongho Kang, Haejung Im, Duhyun Jeon, Seok-Min Kim

    Published 2025-01-01
    “…This PQC algorithm is designed to withstand the decryption capabilities of quantum computers, thus providing long-term security. To further bolster security, the encryption key of the PQC algorithm is protected using Physically Unclonable Function (PUF) technology. …”
    Get full text
    Article
  15. 6675

    Automatic priority analysis of emergency response systems using internet of things (IoT) and machine learning (ML) by Abu S.M. Mohsin, Shadab H. Choudhury, Munyem Ahammad Muyeed

    Published 2025-03-01
    “…The system provides dynamic visualisation and real-time tracking of emergency scenarios through the integration of geographical information systems (GIS) and the utilisation of cloud computing resources. This framework not only improves immediate response capabilities but also aids in strategic planning by providing actionable insights into potential future events. …”
    Get full text
    Article
  16. 6676
  17. 6677
  18. 6678
  19. 6679

    Real-world clinical validation of the Qatar pre-diabetes risk score: a cross-sectional study by Mohamed Ahmed Syed, Narjiss Sallahi, Abduljaleel Abdullatif Zainel, Halima None Bensmail, Abdelilah Arredouani

    Published 2024-04-01
    “…Negative predictive value, positive predictive value, sensitivity and specificity of PRISQ were computed.Results Of the 1021 participants, 797 agreed to provide blood. …”
    Get full text
    Article
  20. 6680