Showing 501 - 520 results of 587 for search '(( Computer supported comparative work. ) OR ( Computer support comparative work. ))', query time: 0.18s Refine Results
  1. 501

    A Novel Efficient Certificateless Signature Scheme for the Prevention of Content Poisoning Attack in Named Data Networking-Based Internet of Things by Saddam Hussain, Syed Sajid Ullah, Abdu Gumaei, Mabrook Al-Rakhami, Ijaz Ahmad, Syed Muhammad Arif

    Published 2021-01-01
    “…” Besides, the formal proof we also compared the designed scheme with some existing solutions to show the cost-efficiency in terms of communication overhead and computation cost. …”
    Get full text
    Article
  2. 502

    Snowdrift‐Permitting Simulations of Seasonal Snowpack Processes Over Large Mountain Extents by Christopher B. Marsh, Zhibang Lv, Vincent Vionnet, Phillip Harder, Raymond J. Spiteri, John W. Pomeroy

    Published 2024-08-01
    “…However, these spatial scales can be computationally intractable for large extents. In this work, the multiscale Canadian Hydrological Model (CHM) was applied to simulate snowpacks at snowdrift‐permitting scales (≈50 m) across the Canadian Cordillera and adjacent regions (1.37 million km2) forced by downscaled atmospheric data. …”
    Get full text
    Article
  3. 503
  4. 504
  5. 505

    Ultra-Lightweight Collaborative SLAM for Robot Swarms by Vlad Niculescu, Tommaso Polonelli, Michele Magno, Luca Benini

    Published 2025-01-01
    “…Remarkably, we achieve a mapping accuracy below 30cm, a result comparable to high-end state-of-the-art solutions while reducing the cost, memory, and computation requirements by two orders of magnitude. …”
    Get full text
    Article
  6. 506

    Origins of the anomalous Hall conductivity in the symmetry enforced Fe3GeTe2 nodal-line ferromagnet by Mikel García-Díez, Haim Beidenkopf, Iñigo Robredo, M G Vergniory

    Published 2025-01-01
    “…Finally, our calculations suggest that electron doping could increase the AHC up to four times compared to its value at the computed Fermi level.…”
    Get full text
    Article
  7. 507

    Simulating and Verifying a 2D/3D Laser Line Sensor Measurement Algorithm on CAD Models and Real Objects by Rok Belšak, Janez Gotlih, Timi Karner

    Published 2024-11-01
    “…This work not only reduces the need for physical prototyping, thereby contributing to sustainability, but also supports AI training by generating accurate synthetic data. …”
    Get full text
    Article
  8. 508

    Experimental validation of parked loads for a floating vertical axis wind turbine: wind–wave basin tests by Md. S. Hossain, D. T. Griffith

    Published 2025-07-01
    “…The datasets from this experimental work can serve as benchmarks for validating other computational parked load estimating tools, while the semi-numerical tool provides a way to gain insight into the unmeasurable quantities.…”
    Get full text
    Article
  9. 509

    Trench MOS Schottky Diodes: A Physics-Based Analytical Model Approach to Charge Sharing by Mohammed Tanvir Quddus, Alvaro D. Latorre-Rey, Zeinab Ramezani, Mihir Mudholkar

    Published 2025-01-01
    “…This work contributes to a valuable tool for TMBS device design, offering insights into electric field management that support high-efficiency, high-voltage applications, including power supplies, automotive electronics, and renewable energy systems.…”
    Get full text
    Article
  10. 510

    Using feature importance as an exploratory data analysis tool on Earth system models by D. Ries, K. Goode, K. McClernon, B. Hillman

    Published 2025-02-01
    “…Our analyses focus on data from ensembles of Earth system models (ESMs) which provide data on different climate states and conditions. We elect to work with ESM ensembles since they allow us to compare feature importance across alternative scenarios not available with observed data. …”
    Get full text
    Article
  11. 511

    Qualitative Analysis of a COVID-19 Mathematical Model with a Discrete Time Delay by Abraham J. Arenas, Gilberto González-Parra, Miguel Saenz Saenz

    Published 2024-12-01
    “…This aspect is a crucial part of this work since other models assume exponential transition for this stage, which can be unrealistic. …”
    Get full text
    Article
  12. 512

    An interpretable and adaptable data-driven model for performance prediction in thermal plants by G. Prokhorskii, M. Preißinger, S. Rudra, E. Eder

    Published 2025-04-01
    “…By balancing predictive accuracy, interpretability, and transferability across plants, this work provides a practical framework for robust, data-driven monitoring and decision support in complex industrial power systems.…”
    Get full text
    Article
  13. 513

    A privacy-preserved horizontal federated learning for malignant glioma tumour detection using distributed data-silos. by Shagun Sharma, Kalpna Guleria, Ayush Dogra, Deepali Gupta, Sapna Juneja, Swati Kumari, Ali Nauman

    Published 2025-01-01
    “…Medical tests, including medical resonance imaging (MRI), computed tomography (CT) scans, biopsy, and electroencephalograms are used for early detection of glioma. …”
    Get full text
    Article
  14. 514

    Association Between Dietary Flavonoid Intake and Cardiovascular Health in Cancer Survivors: A Cross-Sectional Study by Li J, Chen G, Xie Z, Lin J, Luo S, Xu S

    Published 2024-10-01
    “…Then, weighted quantile sum (WQS) regression and quantile-based g-computation (qgcomp) models were performed to assess the mixed effects of the six flavonoid subclasses and to determine the major flavonoid types. …”
    Get full text
    Article
  15. 515

    Automatic segmentation of chest X-ray images via deep-improved various U-Net techniques by Sedat Orenc, Mehmet Sirac Ozerdem, Emrullah Acar, Musa Yilmaz

    Published 2025-08-01
    “…These models also incurred significantly higher computational costs. In contrast, U-Net16 and U-Net32 demonstrated reduced segmentation accuracy compared to U-Net9. …”
    Get full text
    Article
  16. 516

    The series solutions of fractional foam drainage and fractional modified regularized long wave problems by Abdul Hamid Ganie, N. S. Alharthi, Adnan Khan, Abdulkafi Mohammed Saeed, Mohd Asif Shah, Saurav Mallik

    Published 2024-11-01
    “…Abstract In general, integer order differential equations fall short of adequately describing a range of phenomena in many disciplines of science and engineering when compared to fractional order differential equations. …”
    Get full text
    Article
  17. 517
  18. 518

    LiDAR-Based Road Cracking Detection: Machine Learning Comparison, Intensity Normalization, and Open-Source WebGIS for Infrastructure Maintenance by Nicole Pascucci, Donatella Dominici, Ayman Habib

    Published 2025-04-01
    “…A key contribution of this work is the integration of geospatial analytics into an interactive, open-source WebGIS environment—developed using Blender, QGIS, and Lizmap—to support predictive maintenance planning. …”
    Get full text
    Article
  19. 519

    The effect of prone positioning on maternal haemodynamics and fetal wellbeing in the third trimester-A primary cohort study with a scoping review. by Laura Ormesher, Jessica Catchpole, Linda Peacock, Heather Pitt, Anastasia Fabian-Hunt, Dexter Hayes, Claudia Popp, Jason M Carson, Raoul van Loon, Lynne Warrander, Karli Büchling, Alexander E P Heazell

    Published 2023-01-01
    “…The decline in CO may be due to caval compression, as supported by the computational model. Further work is needed to optimise the safety of prone positioning in pregnancy.…”
    Get full text
    Article
  20. 520

    Overview of research on trusted attestation technology of cloud virtualization platform by Bibo TU, Jie CHENG, Haojun XIA, Kun ZHANG, Ruina SUN

    Published 2021-12-01
    “…With the rapid development of cloud computing, the security issues of cloud platforms have also attracted much attention.Trusted computing is an essential supporting technology in the cloud computing security system.Trusted attestation is an important feature in trusted computing.The use of trusted attestation technology verifies whether the cloud virtualization platform is trustworthy, thereby providing a foundation for ensuring the security of the cloud platform.Now based on the definition of trusted attestation, the research progress of key technologies such as the root of trust virtualization, platform identity authentication, platform status certification, and trusted attestation framework for virtual machines were systematically sorted out, typical schemes were analyzed and compared.Furthermore, the limitations of existing work were discussed.Finally, the future research trend of this area were pointed out.…”
    Get full text
    Article