Showing 9,501 - 9,520 results of 28,739 for search '"computing"', query time: 0.13s Refine Results
  1. 9501

    A Stochastic Programming Approach for Scheduling Extra Metro Trains to Serve Passengers from Uncertain Delayed High-Speed Railway Trains by Sihui Long, Lingyun Meng, Xiaojie Luan, Alessio Trivella, Jianrui Miao, Francesco Corman

    Published 2020-01-01
    “…Moreover, we show that our solutions are nearly optimal by computing a perfect information dual bound and obtaining average optimality gaps below 1%.…”
    Get full text
    Article
  2. 9502
  3. 9503
  4. 9504
  5. 9505
  6. 9506

    DIGITAL ECONOMY AND RECRUITMENT POTENTIAL: STRATEGICAL INTERCONNECTION AND PROSPECTS by G. Yu. Peshkova, А. Yu. Samarina

    Published 2018-12-01
    “…The originality of digital economy is in its optimising effect on production and consumption possible because of operativeness and consolidation of information and computing systems. There has appeared an opportunity to manage socio-economic processes systematically. …”
    Get full text
    Article
  7. 9507

    Smart surgical telementoring system with patch-to-pixel point tracking method by Yanwei Qu, Ling Li, Tongtong Li, Jieyu Zheng, Wentao Tang, Xiaojian Li

    Published 2025-03-01
    “…To mitigate these issues, this study introduces an intelligent surgical telementoring system based on edge computing. This system enables the transmission of points marked by remote doctors to grassroots doctors, updating these points’ coordinates in real-time on the local endoscopic video. …”
    Get full text
    Article
  8. 9508
  9. 9509
  10. 9510

    A novel and efficient digital image steganography technique using least significant bit substitution by Shahid Rahman, Jamal uddin, Hameed Hussain, Sabir Shah, Abdu Salam, Farhan Amin, Isabel de la Torre Díez, Debora Libertad Ramírez Vargas, Julio César Martínez Espinosa

    Published 2025-01-01
    “…However, image-based steganography is a challenging task due to transparency, security, computational efficiency, tamper protection, payload, etc. …”
    Get full text
    Article
  11. 9511

    A review on challenges and future of green charging networks for zero emission electric transportation by Ijaz Ahmed, Muhammad Maaruf, Amjad Ali, Mohammad AlMuhaini, Muhammad Khalid

    Published 2025-01-01
    “…Furthermore, this paper provides a concise summary of the main statistical frameworks that are commonly employed to tackle the complexities encountered in smart transportation computing. Using independent and interlinked mathematical models, authors examine contemporary computational approaches that manage corporate architectural challenges in novel manners. …”
    Get full text
    Article
  12. 9512

    Legal aspects of functional security standardisation of the Internet of Things by P. S. Klimushyn, V. Ye. Roh, T. P. Kolisnyk

    Published 2023-09-01
    “…To support the Internet of Things, technologies such as built-in devices, cloud and fog computing, big data processing, machine learning, and artificial intelligence are used to produce intelligent physical objects. …”
    Get full text
    Article
  13. 9513
  14. 9514

    Case study of natural convection topology optimization based on finite volume method by Honglei Liu, Shuzhe Guo, Ce Liu, Fei Du, Baotong Li, Jun Hong

    Published 2025-02-01
    “…Meanwhile, a parallel computing method is also developed to accelerate computation. …”
    Get full text
    Article
  15. 9515

    Large-Scale MIMO Transmitters for CR-NOMA in Fixed Physical Space: The Effect of Realistic System Impairments Using Stochastic Geometry by Emmanuel Ampoma Affum, Samuel Tweneboah-Koduah, Owusu Agyeman Antwi, Benjamin Asubam Weyori, Willie Ofosu

    Published 2024-01-01
    “…We consider this as a computational issue. Although considerable work has been done, there is still a significant knowledge gap about how HWI and imperfect successive interference cancellation affect far-users in CR-NOMA with the LAT system. …”
    Get full text
    Article
  16. 9516
  17. 9517

    Balancing Privacy and Utility in Split Learning: An Adversarial Channel Pruning-Based Approach by Afnan Alhindi, Saad Al-Ahmadi, Mohamed Maher Ben Ismail

    Published 2025-01-01
    “…However, the deployment of ML models on resource-constrained devices, such as edge devices, has remained challenging due to the limited computing resources. Moreover, training such models using private data is prone to serious privacy risks resulting from inadvertent disclosure of sensitive information. …”
    Get full text
    Article
  18. 9518

    Genetic analysis of scab disease resistance in common bean (Phaseolus vulgaris) varieties using GWAS and functional genomics approaches by Shadrack Odikara Oriama, Benard W. Kulohoma, Evans Nyaboga, Y. O. Masheti, Reuben Otsyula

    Published 2024-04-01
    “…Annotation of genes proteins with significant association values was conducted using a machine learning algorithm of support vector machine on prPred using python3 on Linux Ubuntu 18.04 computing platform with an accuracy of 0.935. Results Common bean accessions tested showed varying phenotypes of susceptibility to scab disease. …”
    Get full text
    Article
  19. 9519
  20. 9520