Showing 421 - 440 results of 587 for search 'Computer support comparative work.', query time: 0.17s Refine Results
  1. 421
  2. 422
  3. 423

    Experimental Validation and Optimization of a Hydrogen–Gasoline Dual-Fuel Combustion Model in a Spark Ignition Engine with a Moderate Hydrogen Ratio by Attila Kiss, Bálint Szabó, Krisztián Kun, Barna Hanula, Zoltán Weltsch

    Published 2025-07-01
    “…In addition to improving model accuracy, this work investigates the occurrence of abnormal combustion phenomena—including backfiring, auto-ignition, and knock—under enriched conditions. …”
    Get full text
    Article
  4. 424
  5. 425

    Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation by Vlad-Florin Drăgoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, Vincent Grosso

    Published 2024-12-01
    “…In this article, we propose a new side-channel attack on the syndrome computation in the decapsulation algorithm that recovers the private key, which consists of the private Goppa polynomial g and the permuted support L. …”
    Get full text
    Article
  6. 426

    HawkEye: AI-Driven Software for Objective Analysis and Characterization of Nodular Cast Iron Microstructures by Javier Nieves, Antonio Serena-Barriuso, Guillermo Elejoste-Rementeria

    Published 2025-06-01
    “…The software supports both etched and non-etched specimens and automates the segmentation and classification of graphite nodules, gathering their morphological descriptors; it identifies microstructural phases and provides a global quality assessment. …”
    Get full text
    Article
  7. 427
  8. 428

    Investigation of the Pulmonary Artery Hypertension Using an Ad Hoc OpenFOAM CFD Solver by Francesco Duronio, Paola Marchetti

    Published 2024-12-01
    “…Specifically, the aim of this study is the fluid dynamic analysis of the pulmonary artery, comparing the characteristics of the blood flow in a healthy subject with that of a patient affected by pulmonary arterial hypertension. …”
    Get full text
    Article
  9. 429

    Advancements in Multi-Objective Optimization for Planning and Management of Multi-Energy Systems by Marco Tangi, Alessandro Amaranto

    Published 2025-06-01
    “…Multiple objectives are usually merged via monetization rates. The work presented herein aims to develop modelling frameworks to explore of configurations of Multi-energy systems according to non-comparable objectives and extract trade-off solutions through optimization algorithms. …”
    Get full text
    Article
  10. 430
  11. 431

    On а Recursive-Parallel Algorithm for Solving the Knapsack Problem by Vladimir V. Vasilchikov

    Published 2018-04-01
    “…Such applications have the ability to generate parallel branches of computation directly during program execution and dynamically redistribute work between computing modules. …”
    Get full text
    Article
  12. 432
  13. 433
  14. 434
  15. 435

    Digital augmentation of aftercare for patients with anorexia nervosa: the TRIANGLE RCT and economic evaluation by Janet Treasure, Katie Rowlands, Valentina Cardi, Suman Ambwani, David McDaid, Jodie Lord, Danielle Clark Bryan, Pamela Macdonald, Eva Bonin, Ulrike Schmidt, Jon Arcelus, Amy Harrison, Sabine Landau

    Published 2025-07-01
    “…The specific aims were to assess: patient distress at 12 months (primary outcome) other patient outcomes, including patient distress at 18 months, patient motivation and ability to change, eating disorder symptoms, social and work adjustment, and days in hospital cost-effectiveness of ECHOMANTRA for patients at 12 months carer distress and skills at 12 and 18 months adverse events (AEs) during the study process aspects of the study, including adherence to treatment and patients and their carer/supporters’ experiences of receiving and supporting treatment, respectively, in the trial by conducting nested qualitative studies and online surveys about both treatment as usual (TAU) alone and with ECHOMANTRA augmentation. …”
    Get full text
    Article
  16. 436

    Are queries and keys always relevant? A case study on transformer wave functions by Riccardo Rende, Luciano Loris Viteritti

    Published 2025-01-01
    “…Specifically, we perform numerical simulations on the two-dimensional J _1 – J _2 Heisenberg model, a common benchmark in the field of quantum many-body systems on lattice. By comparing the performance of standard attention mechanisms with a simplified version that excludes queries and keys, relying solely on positions, we achieve competitive results while reducing computational cost and parameter usage. …”
    Get full text
    Article
  17. 437

    Defense scheme for the world state based attack in Ethereum by Zhen GAO, Dongbin ZHANG, Xiao TIAN

    Published 2022-04-01
    “…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
    Get full text
    Article
  18. 438
  19. 439
  20. 440

    Identification of unknown operating system type of Internet of Things terminal device based on RIPPER by Shichang Xuan, Dapeng Man, Wu Yang, Wei Wang, Jiashuai Zhao, Miao Yu

    Published 2018-10-01
    “…Also, it is compared with the existing support vector machine and C45 decision tree classification algorithms. …”
    Get full text
    Article