Showing 9,881 - 9,900 results of 28,739 for search '"computing"', query time: 0.10s Refine Results
  1. 9881

    Improving Sleep Disorder Diagnosis Through Optimized Machine Learning Approaches by Md. Atiqur Rahman, Israt Jahan, Maheen Islam, Taskeed Jabid, Md Sawkat Ali, Mohammad Rifat Ahmmad Rashid, Mohammad Manzurul Islam, Md. Hasanul Ferdaus, Md Mostofa Kamal Rasel, Mahmuda Rawnak Jahan, Shayla Sharmin, Tanzina Afroz Rimi, Atia Sanjida Talukder, Md. Mafiul Hasan Matin, M. Ameer Ali

    Published 2025-01-01
    “…Thus, this research proposes Gradient Boosting as the most effective method, outperforming all state-of-the-art techniques by achieving the highest accuracy, precision, recall, F1-score, and AUC, highlighting its superior classification performance and computational efficiency.…”
    Get full text
    Article
  2. 9882
  3. 9883
  4. 9884
  5. 9885
  6. 9886
  7. 9887

    Behaviour of passage time for a queueing network model with feedback: a simulation study by Bidyut K. Medya

    Published 2004-01-01
    “…The model can be applied to a twin-processor multiprogramming computer system.…”
    Get full text
    Article
  8. 9888

    Symbolic Solution to Complete Ordinary Differential Equations with Constant Coefficients by Juan F. Navarro, Antonio Pérez-Carrió

    Published 2013-01-01
    “…The aim of this paper is to introduce a symbolic technique for the computation of the solution to a complete ordinary differential equation with constant coefficients. …”
    Get full text
    Article
  9. 9889

    Water Hammer Modelling and Simulation by GIS by K. Hariri Asli, A. K. Haghi, H. Hariri Asli, E. Sabermaash Eshghi

    Published 2012-01-01
    “…This work defined an Eulerian-based computational model compared with regression of the relationship between the dependent and independent variables for water hammer surge wave in transmission pipeline. …”
    Get full text
    Article
  10. 9890

    A Survey of Artificial Immune System Based Intrusion Detection by Hua Yang, Tao Li, Xinlei Hu, Feng Wang, Yang Zou

    Published 2014-01-01
    “…In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. …”
    Get full text
    Article
  11. 9891
  12. 9892
  13. 9893

    Optimized Liveness Detection for Fast and Accurate Fingerprint Anti-Spoofing With Optical Coherence Tomography by Yilong Zhang, Heyou Yu, Haohao Sun, Yongbo Yao, Haixia Wang, Jian Liu, Yuanjie Dang, Ronghua Liang, Peng Chen

    Published 2024-01-01
    “…However, previous methods suffer from long data acquisition and computation times as well as low recognition accuracy. …”
    Get full text
    Article
  14. 9894
  15. 9895

    Intelligent two-phase dual authentication framework for Internet of Medical Things by Muhammad Asif, Mohammad Abrar, Abdu Salam, Farhan Amin, Faizan Ullah, Sabir Shah, Hussain AlSalman

    Published 2025-01-01
    “…The results show that encryption/decryption time is reduced by over 45%, overall computational cost by 45.38%, and latency by 28.42% over existing approaches. …”
    Get full text
    Article
  16. 9896

    Multi-agent resource allocation strategy for UAV swarm-based cooperative sensing by Zhihong WANG, Supeng LENG, Kai XIONG

    Published 2023-03-01
    “…Driven by the development of intelligent internet of things (IoT) technology, unmanned aerial vehicle (UAV) swarms have been widely used for sensing and monitoring in emergency and rescue scenarios.The UAVs automatically sense and discover mission targets in the mission area, recruiting neighboring UAVs to form perception and computation task groups to collaboratively complete the perception, acquisition and processing of data.However, repetitive sensory data and imbalance in the supply and demand of computational resources between multiple tasks cause additional computational and communication overheads and increase the end-to-end processing latency.To address this challenge, a multi-task resource allocation approach combining bionics and multi-agent independent reinforcement learning was proposed, making collaborative resource allocation decisions based on local task information.The method represents the resource requirements of individual tasks as situational information concentrations and dynamically updates the heterogeneous resource requirements of each task by spreading the situational information across task groups.At the same time, it combines multi-agent independent reinforcement learning methods for intelligent decision making in order to collaboratively allocate the heterogeneous resources of each task.Simulation results show that this solution can not only effectively reduce the task execution time, but also significantly improve the computational resource utilization.…”
    Get full text
    Article
  17. 9897

    Calculation of coal cleats spacing for methane degassing by image processing by Adel Taheri, Farhang Sereshki, Fatemeh Sadat Rohani

    Published 2025-01-01
    “…Computer-based image processing technology was conducted to determine the coal cleats. …”
    Get full text
    Article
  18. 9898

    Analysis of a Reflectarray by Using an Iterative Domain Decomposition Technique by Carlos Delgado, Josefa Gómez, Abdelhamid Tayebi, Iván González, Felipe Cátedra

    Published 2012-01-01
    “…The approach is based on a domain decomposition technique that divides the geometry into several parts to minimize the vast computational resources required when applying a full wave method. …”
    Get full text
    Article
  19. 9899
  20. 9900

    Global stability analysis for SEIS models with n latent classes by Napoleon Bame, Samuel Bowong, Josepha Mbang, Gauthier Sallet, Jean-Jules Tewa

    Published 2007-12-01
    “…We compute the basic reproduction ratio of a SEIS model withn classes of latent individuals and bilinear incidence.The system exhibits thetraditional behaviour. …”
    Get full text
    Article