-
461
Tiny? Make it mighty! Maximizing a limited-budget upgrade of a pint-sized hospital library using UX methods
Published 2024-12-01“…Observed behaviours support the continued need for desks with a deep surface area to accommodate multiple devices used in tandem. …”
Get full text
Article -
462
PhaPl: software to plot and research phase portraits automatically
Published 2017-07-01“…The software supports linear and nonlinear autonomous systems of 2 differential equations. …”
Get full text
Article -
463
Coarse-Grained Hawkes Processes
Published 2025-05-01“…The introduced model, termed the coarse-grained Hawkes process, effectively captures the second-order statistical characteristics of the bin-count representation of the Hawkes process, particularly when the bin size is large relative to the typical support of the excitation kernel. Building upon this model, we develop a method for inferring the underlying Hawkes process from bin-count observations, and demonstrate through simulation studies that the proposed approach performs comparably to, or even surpasses, existing techniques, while maintaining computational efficiency in parameter estimation.…”
Get full text
Article -
464
Exploring the Realization of Creative Dimensions within the Metaverse: The Case of Tabriz Metropolis
Published 2025-06-01“…Creative people need space to live, work, inspire and display their work. Unfortunately, such spaces do not meet the needs of the creative class in most areas of Tabriz metropolis. …”
Get full text
Article -
465
-
466
-
467
On а Recursive-Parallel Algorithm for Solving the Knapsack Problem
Published 2018-04-01“…Such applications have the ability to generate parallel branches of computation directly during program execution and dynamically redistribute work between computing modules. …”
Get full text
Article -
468
Implementation and Performance Evaluation of Quantum Machine Learning Algorithms for Binary Classification
Published 2024-11-01“…In this work, we studied the use of Quantum Machine Learning (QML) algorithms for binary classification and compared their performance with classical Machine Learning (ML) methods. …”
Get full text
Article -
469
On Extended Numerical Discretization Technique of Fractional Models with Caputo-Type Derivatives
Published 2025-04-01“…The ENDT method offers accuracy, stability, and efficiency compared to traditional methods. It effectively handles challenges in complex systems, supports any fractional order, is simple to implement, improves computing efficiency with sophisticated methodologies, and applies it to epidemic predictions and biological simulations.…”
Get full text
Article -
470
Geometric constraints on tributary fluvial network junction angles
Published 2025-03-01“…We map the mean junction angles computed along valley bottoms within each <span class="inline-formula">2.5 km×2.5 km</span> pixel of the conterminous USA and document lower mean junction angles in incised Late Cenozoic alluvial piedmont deposits compared to those of incised bedrock/older deposits. …”
Get full text
Article -
471
TCN enhanced novel malicious traffic detection for IoT devices
Published 2022-12-01“…Experiments show that this work has better detection performance and faster detection speed compared to existing approaches, proving the effectiveness of the proposed detection flow and Multi-class S-TCN in IoT scenarios.…”
Get full text
Article -
472
Advancements in Multi-Objective Optimization for Planning and Management of Multi-Energy Systems
Published 2025-06-01“…Multiple objectives are usually merged via monetization rates. The work presented herein aims to develop modelling frameworks to explore of configurations of Multi-energy systems according to non-comparable objectives and extract trade-off solutions through optimization algorithms. …”
Get full text
Article -
473
Comparison of Intraosseous and Conventional Dental Anesthesia in Children—A Scoping Review
Published 2025-07-01“…<b>Conclusions</b>: The selected studies support the assertion that CCIA is a promising technique since it results in less pain perception and is preferred by patients compared to conventional local anesthesia. …”
Get full text
Article -
474
Variation within and between digital pathology and light microscopy for the diagnosis of histopathology slides: blinded crossover comparison study
Published 2025-07-01“…As a result, digital pathology could potentially lead to safer more efficient working. In order to use digital pathology in practice, we need to know pathologists produce equivalent reports as compared to light microscopy. …”
Get full text
Article -
475
Are queries and keys always relevant? A case study on transformer wave functions
Published 2025-01-01“…Specifically, we perform numerical simulations on the two-dimensional J _1 – J _2 Heisenberg model, a common benchmark in the field of quantum many-body systems on lattice. By comparing the performance of standard attention mechanisms with a simplified version that excludes queries and keys, relying solely on positions, we achieve competitive results while reducing computational cost and parameter usage. …”
Get full text
Article -
476
The Effect of Gamified Physical Activities on the Quality of Students' Leisure Time (Case Study: Female Secondary School Students in Ardabil City)
Published 2024-01-01“…Excessive engagement with computer games by students and emulation of these games can foster tension and unhealthy behaviors. …”
Get full text
Article -
477
Defense scheme for the world state based attack in Ethereum
Published 2022-04-01“…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
Get full text
Article -
478
Identification of unknown operating system type of Internet of Things terminal device based on RIPPER
Published 2018-10-01“…Also, it is compared with the existing support vector machine and C45 decision tree classification algorithms. …”
Get full text
Article -
479
-
480
A Cross-Chain Solution to Connect Multiple DNS Blockchains in Consensus Roots System
Published 2025-07-01Get full text
Article