Showing 11,161 - 11,180 results of 28,739 for search '"computing"', query time: 0.11s Refine Results
  1. 11161
  2. 11162

    Non-Invasive Cancer Detection Using Blood Test and Predictive Modeling Approach by Tarawneh AS, Al Omari AK, Al-khlifeh EM, Tarawneh FS, Alghamdi M, Alrowaily MA, Alkhazi IS, Hassanat AB

    Published 2025-01-01
    “…Ahmad S Tarawneh,1 Ahmad K Al Omari,2,3 Enas M Al-khlifeh,4 Fatimah S Tarawneh,5 Mansoor Alghamdi,6 Majed Abdullah Alrowaily,7 Ibrahim S Alkhazi,8 Ahmad B Hassanat1 1Department of Information Technology, Mutah University, Al-Karak, Jordan; 2Department of Nursing, Jordanian Royal Medical Services, Amman, Jordan; 3Department of Nursing, The University of Jordan, Amman, Jordan; 4Department of Applied Biology, Al-Balqa Applied University, Salt, Jordan; 5Department of Nursing, Princess Muna College of Nursing, Mutah University, Al-Karak, Jordan; 6Department of Computer Science, Applied College, University of Tabuk, Tabuk, Saudi Arabia; 7Department of Computer Science, College of Computer and Information Sciences, Jouf University, Sakaka, Saudi Arabia; 8Department of Computer Science, College of Computers and Information Technology, University of Tabuk, Tabuk, Saudi ArabiaCorrespondence: Enas M Al-khlifeh, Department of Applied Biology, Al-Balqa Applied University, Salt, Jordan, Tel +962792007289, Email Al-khlifeh.en@bau.edu.joPurpose: The incidence of cancer, which is a serious public health concern, is increasing. …”
    Get full text
    Article
  3. 11163

    Evaluation of Flexural Strength and Vickers Micro Hardness of Three Different Denture Base Resin Materials by Mohammed Ibrahim Mathar, Manish Chadha, AlMoataz Mohamed Amin Soliman, Saif H. Alharbi, R. Murali Karthik, Mohammed Ziauddeen Mustafa

    Published 2024-12-01
    “…Objectives: To evaluate the Vickers hardness and flexural strength of computer-aided design/computer-aided manufacture (CAD/CAM) milled, 3D-printed, and traditional heat-polymerized denture base resins used in computer-aided design and manufacture. …”
    Get full text
    Article
  4. 11164

    Robust Schnorr-based subgroup multi-signature scheme by ZHANG Zhenqi, ZHU Qiuchi, WANG Zhiwei

    Published 2024-08-01
    “…This scheme retained the advantage of low computational complexity inherent in the Schnorr digital signature cryptosystem while incorporating the benefits of subgroup multi-signature. …”
    Get full text
    Article
  5. 11165

    MEAT-SAM: More Efficient Automated Tongue Segmentation Model by Fudong Zhong, Chuanbo Qin, Yue Feng, Junying Zeng, Xudong Jia, Fuguang Zhong, Jun Luo, Min Yang

    Published 2025-01-01
    “…Furthermore, MEAT-SAM can run effectively on the computationally limited Jetson Nano single-board computer, achieving similar segmentation effects as in experimental testing.…”
    Get full text
    Article
  6. 11166

    LazyAct: Lazy actor with dynamic state skip based on constrained MDP. by Hongjie Zhang, Zhenyu Chen, Hourui Deng, Chaosheng Feng

    Published 2025-01-01
    “…Specifically, each decision made by an agent requires a complete neural network computation, leading to a linear increase in computational cost with the number of interactions and agents. …”
    Get full text
    Article
  7. 11167

    Generation of an optimal triangulated irregular network for topographic surface via optimal transport theory by Feng Li, Haihong Zhu, Wei Li, Chengcheng Liu, Jianfang Ma, Lin Li

    Published 2025-01-01
    “…Extensive efforts have been devoted to exploring methods for generating high-fidelity DEM datasets that are computationally efficient for diverse applications. However, the existing methods do not guarantee the optimal digital representation of the Earth’s surface. …”
    Get full text
    Article
  8. 11168

    Triple (and quadruple) soft-gluon radiation in QCD hard scattering by Stefano Catani, Dimitri Colferai, Alessandro Torrini

    Published 2020-01-01
    “…The three-gluon current is expressed in terms of maximally non-abelian irreducible correlations. We compute the soft behaviour of squared amplitudes and the colour correlations produced by the squared current. …”
    Get full text
    Article
  9. 11169

    Personal data privacy protection method based onvertical partitioning by RUAN Huafeng, LI Rui, LUO Kailun

    Published 2024-10-01
    “…The experiments also compared the MLVP scheme with two other schemes that did not consider collusion among CSP, Oriol’s and Ciriani’s schemes, in terms of computation and query speeds. The results showed that the MLVP scheme was slightly slower in computation speed to ensure security against partial CSP collusion. …”
    Get full text
    Article
  10. 11170

    Inverse kinematics solution and control method of 6-degree-of-freedom manipulator based on deep reinforcement learning by Chengyi Zhao, Yimin Wei, Junfeng Xiao, Yong Sun, Dongxing Zhang, Qiuquan Guo, Jun Yang

    Published 2024-05-01
    “…Through experimental comparative analysis, the feasibility, computational efficiency, and superiority of this reinforcement learning algorithm are verified. …”
    Get full text
    Article
  11. 11171

    The main methodological approaches to the formation of universal competencies of students of technical universities by Anna S. Tuchkova

    Published 2022-12-01
    “…The paper highlights the theoretical provisions describing the main methodological approaches to the formation of competencies, which are provided for by modern federal state educational standards of higher education, taking into account professional standards (FGOS HE (3++)) bachelors degree in the areas of training of the enlarged group 090000 Computer Science and Computer engineering: competence, system-activity and information approaches in education and pedagogical science. …”
    Get full text
    Article
  12. 11172

    Toward More Accurate GIC Estimations in the Portuguese Power Network by Joana Alves Ribeiro, Fernando J. G. Pinheiro, Maria Alexandra Pais, Rute Santos, João Cardoso, Pedro Baltazar‐Soares, Fernando A. Monteiro Santos

    Published 2023-06-01
    “…In order to validate our GIC model, recent measurements are compared with simulations. GIC computation is prone to uncertainties from various sources, possibly contributing with different weights to the final error in computed values. …”
    Get full text
    Article
  13. 11173

    A lightweight weed detection model for cotton fields based on an improved YOLOv8n by Jun Wang, Zhengyuan Qi, Yanlong Wang, Yanyang Liu

    Published 2025-01-01
    “…However, existing deep learning models, despite their high accuracy, often have complex computations and high resource consumption, making them difficult to apply in practical scenarios. …”
    Get full text
    Article
  14. 11174

    An Efficient Estimation Method for Reducing the Axial Intensity Drop in Circular Cone-Beam CT by Lei Zhu, Jared Starman, Rebecca Fahrig

    Published 2008-01-01
    “…The algorithm performance is evaluated using computer simulations on analytical phantoms. The reconstruction comparison with results using other existing algorithms shows that the proposed algorithm achieves a superior performance on the reduction of axial intensity drop artifacts with a high computation efficiency.…”
    Get full text
    Article
  15. 11175

    Numerical Approximations and Fractional Calculus: Extending Boole’s Rule with Riemann–LiouvilleFractional Integral Inequalities by Abdul Mateen, Wali Haider, Asia Shehzadi, Hüseyin Budak, Bandar Bin-Mohsin

    Published 2025-01-01
    “…These newly established inequalities offer sharper error bounds for various numerical quadrature formulas in classical calculus, marking a significant advancement in computational mathematics. Numerical examples, computational analysis, applications to quadrature formulas and graphical illustrations substantiate the efficacy of the proposed inequalities in improving the accuracy of integral approximations, particularly within the context of fractional calculus. …”
    Get full text
    Article
  16. 11176

    LCFF-Net: A lightweight cross-scale feature fusion network for tiny target detection in UAV aerial imagery. by Daoze Tang, Shuyun Tang, Zhipeng Fan

    Published 2024-01-01
    “…Current UAV aerial image target detection algorithms face challenges such as low computational demands, high accuracy, and fast detection speeds. …”
    Get full text
    Article
  17. 11177

    Forward model emulator for atmospheric radiative transfer using Gaussian processes and cross validation by O. Lamminpää, J. Susiluoto, J. Hobbs, J. McDuffie, A. Braverman, H. Owhadi

    Published 2025-02-01
    “…The retrieval, or solving an inverse problem, requires substantial computational resources. In this work, we propose and implement a statistical emulator to speed up the computations in the OCO-2 physics model. …”
    Get full text
    Article
  18. 11178
  19. 11179

    Stability Assessment of Concrete Gravity Dams via Multifidelity Surrogate Models by Rodrigo José de Almeida Torres Filho, Rocio L. Segura, Patrick Paultre

    Published 2025-01-01
    “…The goodness of fit of the models and the computational time to produce the dataset are used to identify the combination that optimizes the MFS model performance. …”
    Get full text
    Article
  20. 11180