Showing 9,461 - 9,480 results of 28,739 for search '"computing"', query time: 0.11s Refine Results
  1. 9461

    Sub-nanometer depth resolution and single dopant visualization achieved by tilt-coupled multislice electron ptychography by Zehao Dong, Yang Zhang, Chun-Chien Chiu, Sicheng Lu, Jianbing Zhang, Yu-Chen Liu, Suya Liu, Jan-Chi Yang, Pu Yu, Yayu Wang, Zhen Chen

    Published 2025-01-01
    “…This approach can be implemented on widely available transmission electron microscopes equipped with hybrid pixel detectors, with data processing achievable using high-performance computing systems.…”
    Get full text
    Article
  2. 9462
  3. 9463

    Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays by Nourhan Zayed, Nahed Tawfik, Mervat M. A. Mahmoud, Ahmed Fawzy, Young-Im Cho, Mohamed S. Abdallah

    Published 2025-01-01
    “…Convolutional neural networks (CNNs) are increasingly recognized as an important and potent artificial intelligence approach, widely employed in many computer vision applications, such as facial recognition. …”
    Get full text
    Article
  4. 9464

    Novel Intuitionistic Fuzzy Fault Tree Analysis for Effective Infectious Medical Waste Management by Rocky Khajuria, Komal, Morteza Yazdani

    Published 2025-04-01
    “…The paper proposes an intuitionistic fuzzy fault tree analysis (FFTA) method that quantifies data uncertainty through trapezoidal intuitionistic fuzzy numbers (TrIFN) while novel arithmetic operations are applied for computing the top incident failure possibility. To develop these novel operations, the weakest t-norm is applied to detract the accumulating circumstances of fuzziness, while Algebraic t-norm and t-conorm are used to estimate membership and non-membership degrees, respectively, of top event failure possibility in terms of trapezoidal intuitionistic fuzzy numbers (TrIFN). …”
    Get full text
    Article
  5. 9465
  6. 9466
  7. 9467

    qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era by Hyoungsub Shim, Bongho Kang, Haejung Im, Duhyun Jeon, Seok-Min Kim

    Published 2025-01-01
    “…This PQC algorithm is designed to withstand the decryption capabilities of quantum computers, thus providing long-term security. To further bolster security, the encryption key of the PQC algorithm is protected using Physically Unclonable Function (PUF) technology. …”
    Get full text
    Article
  8. 9468
  9. 9469

    PGMweb: an online tool for visualizing the X-ray beam path through plane grating monochromators by Patrick Yuheng Wang, Murilo Bazan da Silva, Matthew Hand, Hongchang Wang, Peter Chang, Victoria Beilsten-Edmands, Timur K. Kim, Tien-Lin Lee, Kawal Sawhney, Andrew C. Walters

    Published 2025-01-01
    “…We present here a newly developed software tool (called PGMweb) for computing and simulating the X-ray beam path through a plane grating monochromator (PGM), a key component in soft X-ray beamlines at modern synchrotron and free-electron laser facilities. …”
    Get full text
    Article
  10. 9470

    Automatic priority analysis of emergency response systems using internet of things (IoT) and machine learning (ML) by Abu S.M. Mohsin, Shadab H. Choudhury, Munyem Ahammad Muyeed

    Published 2025-03-01
    “…The system provides dynamic visualisation and real-time tracking of emergency scenarios through the integration of geographical information systems (GIS) and the utilisation of cloud computing resources. This framework not only improves immediate response capabilities but also aids in strategic planning by providing actionable insights into potential future events. …”
    Get full text
    Article
  11. 9471
  12. 9472
  13. 9473
  14. 9474
  15. 9475

    Real-world clinical validation of the Qatar pre-diabetes risk score: a cross-sectional study by Mohamed Ahmed Syed, Narjiss Sallahi, Abduljaleel Abdullatif Zainel, Halima None Bensmail, Abdelilah Arredouani

    Published 2024-04-01
    “…Negative predictive value, positive predictive value, sensitivity and specificity of PRISQ were computed.Results Of the 1021 participants, 797 agreed to provide blood. …”
    Get full text
    Article
  16. 9476
  17. 9477

    Visual impairment prevention by early detection of diabetic retinopathy based on stacked auto-encoder by Shagufta Almas, Fazli Wahid, Sikandar Ali, Ahmed Alkhyyat, Kamran Ullah, Jawad Khan, Youngmoon Lee

    Published 2025-01-01
    “…Traditional diagnosis methods are prone to human error, necessitating accurate alternatives. While various computer-aided systems have been developed to assist in DR detection, there remains a need for accurate and efficient methods to classify its stages. …”
    Get full text
    Article
  18. 9478

    Male involvement in prevention of mother-to-child transmission of HIV, and its association with knowledge and residence in Ethiopia: a systematic review and meta-analysis by Mastewal Arefaynie, Yitayish Damtie, Bereket Kefale, Melaku Yalew, Bezawit Adane, Habtamu Shiferaw, Yesuf Ahemed, Abel Shiferaw, Tenaw Yimer, Hasab Tibebu

    Published 2024-09-01
    “…Heterogeneity among the reported prevalence was assessed by computing values for c2, I2, and p-values. Random effects-model was applied to estimate the pooled effect. …”
    Get full text
    Article
  19. 9479

    Assembly-free reads accurate identification (AFRAID) approach outperforms other methods of DNA barcoding in the walnut family (Juglandaceae) by Yanlei Liu, Kai Chen, Lihu Wang, Xinqiang Yu, Chao Xu, Zhili Suo, Shiliang Zhou, Shuo Shi, Wenpan Dong

    Published 2025-01-01
    “…AFRAID accurately identified species for all samples tested after 500,000 clean reads, with far less computing time than common approaches. These results provide a new approach to accurately identify species, overcoming limitations of traditional DNA barcodes. …”
    Get full text
    Article
  20. 9480