Showing 441 - 460 results of 587 for search '(( Computer supported comparative work. ) OR ( Computer support comparative work. ))', query time: 0.18s Refine Results
  1. 441
  2. 442

    Calculation of a heat exchanger using heat pipes in the exhaust air heat recovery system by A. S. Zaitsev, M. V. Shamarov, R. A. Zhlobo, E. O. Ivchenko

    Published 2024-01-01
    “…The research is based on methods of thermodynamic analysis, full-scale and computational modeling of processes and objects of refrigeration and cryogenic technology, air conditioning and life support systems. …”
    Get full text
    Article
  3. 443

    Implementation and Performance Evaluation of Quantum Machine Learning Algorithms for Binary Classification by Surajudeen Shina Ajibosin, Deniz Cetinkaya

    Published 2024-11-01
    “…In this work, we studied the use of Quantum Machine Learning (QML) algorithms for binary classification and compared their performance with classical Machine Learning (ML) methods. …”
    Get full text
    Article
  4. 444

    Preclinical Positron Emission Tomographic Imaging of Acute Hyperoxia Therapy of Chronic Hypoxia during Pregnancy by Alexander Zheleznyak, Joel R. Garbow, Michal Neeman, Suzanne E. Lapi

    Published 2015-07-01
    “…Hypoxic placentas and fetuses retained more 64 Cu-ATSM compared to normoxic placentas and fetuses. Herein we report first-in-mouse PET imaging of fetuses employing both tracers [ 18 F]FDG (metabolism) and 64 Cu-ATSM (hypoxia). [ 18 F]FDG PET/CT imaging allowed clear visualization of placental-fetal structures and supported quantification of tracer uptake, making this a sensitive tool for monitoring placental function in preclinical rodent models. …”
    Get full text
    Article
  5. 445
  6. 446
  7. 447
  8. 448
  9. 449
  10. 450

    Coarse-Grained Hawkes Processes by Shinsuke Koyama

    Published 2025-05-01
    “…The introduced model, termed the coarse-grained Hawkes process, effectively captures the second-order statistical characteristics of the bin-count representation of the Hawkes process, particularly when the bin size is large relative to the typical support of the excitation kernel. Building upon this model, we develop a method for inferring the underlying Hawkes process from bin-count observations, and demonstrate through simulation studies that the proposed approach performs comparably to, or even surpasses, existing techniques, while maintaining computational efficiency in parameter estimation.…”
    Get full text
    Article
  11. 451

    Partnerships as Professional Learning: Early Childhood Teaching Assistants’ Role Development and Navigation of Challenges Within a Culturally Responsive Robotics Program by Hannah R. Thompson, Lori A. Caudle, Frances K. Harper, Margaret F. Quinn, Mary Kate Avin, The CRRAFT Partnership

    Published 2025-04-01
    “…Accordingly, early childhood educators both require substantial support when integrating culturally responsive computing into curriculum and instruction and offer valuable perspectives on emerging practices. …”
    Get full text
    Article
  12. 452

    Organising general practice for care homes: a multi-method study by Barbara Hanratty, Rachel Stocker, David Sinclair, Katie Brittain, Karen Spilsbury, Daniel Stow, Louise Robinson, Fiona E Matthews

    Published 2025-04-01
    “…NHS England funded the Vanguard initiative (2015–8) to identify and support innovative ways of working with care homes in five areas. …”
    Get full text
    Article
  13. 453

    Advancements in Multi-Objective Optimization for Planning and Management of Multi-Energy Systems by Marco Tangi, Alessandro Amaranto

    Published 2025-06-01
    “…Multiple objectives are usually merged via monetization rates. The work presented herein aims to develop modelling frameworks to explore of configurations of Multi-energy systems according to non-comparable objectives and extract trade-off solutions through optimization algorithms. …”
    Get full text
    Article
  14. 454

    On а Recursive-Parallel Algorithm for Solving the Knapsack Problem by Vladimir V. Vasilchikov

    Published 2018-04-01
    “…Such applications have the ability to generate parallel branches of computation directly during program execution and dynamically redistribute work between computing modules. …”
    Get full text
    Article
  15. 455

    Optimization of management of patients with critical lower limb ischemia, allowing for risk of gangrene by A. V. Bykov, N. A. Korenevsky, S. A. Parkhomenko, I. I. Khripina

    Published 2019-04-01
    “…The obtained mathematical models should be used in the medical practice of vascular surgeons and angiologists, both in the form of software for smartphones and tablet computers, and as part of decision support systems, including telemedicine systems.…”
    Get full text
    Article
  16. 456
  17. 457
  18. 458
  19. 459

    Are queries and keys always relevant? A case study on transformer wave functions by Riccardo Rende, Luciano Loris Viteritti

    Published 2025-01-01
    “…Specifically, we perform numerical simulations on the two-dimensional J _1 – J _2 Heisenberg model, a common benchmark in the field of quantum many-body systems on lattice. By comparing the performance of standard attention mechanisms with a simplified version that excludes queries and keys, relying solely on positions, we achieve competitive results while reducing computational cost and parameter usage. …”
    Get full text
    Article
  20. 460

    Defense scheme for the world state based attack in Ethereum by Zhen GAO, Dongbin ZHANG, Xiao TIAN

    Published 2022-04-01
    “…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
    Get full text
    Article