Search alternatives:
supported » support (Expand Search)
Showing 461 - 480 results of 587 for search 'Computer supported comparative work.', query time: 0.12s Refine Results
  1. 461

    Tiny? Make it mighty! Maximizing a limited-budget upgrade of a pint-sized hospital library using UX methods by Sarah May Visintini, Jessica McEwan

    Published 2024-12-01
    “…Observed behaviours support the continued need for desks with a deep surface area to accommodate multiple devices used in tandem. …”
    Get full text
    Article
  2. 462

    PhaPl: software to plot and research phase portraits automatically by A. A. Cherepanov

    Published 2017-07-01
    “…The software supports linear and nonlinear autonomous systems of 2 differential equations. …”
    Get full text
    Article
  3. 463

    Coarse-Grained Hawkes Processes by Shinsuke Koyama

    Published 2025-05-01
    “…The introduced model, termed the coarse-grained Hawkes process, effectively captures the second-order statistical characteristics of the bin-count representation of the Hawkes process, particularly when the bin size is large relative to the typical support of the excitation kernel. Building upon this model, we develop a method for inferring the underlying Hawkes process from bin-count observations, and demonstrate through simulation studies that the proposed approach performs comparably to, or even surpasses, existing techniques, while maintaining computational efficiency in parameter estimation.…”
    Get full text
    Article
  4. 464

    Exploring the Realization of Creative Dimensions within the Metaverse: The Case of Tabriz Metropolis by Saied Jaffari namvar, Hossein Nazmfar, Ibrahim Taghav

    Published 2025-06-01
    “…Creative people need space to live, work, inspire and display their work. Unfortunately, such spaces do not meet the needs of the creative class in most areas of Tabriz metropolis. …”
    Get full text
    Article
  5. 465
  6. 466
  7. 467

    On а Recursive-Parallel Algorithm for Solving the Knapsack Problem by Vladimir V. Vasilchikov

    Published 2018-04-01
    “…Such applications have the ability to generate parallel branches of computation directly during program execution and dynamically redistribute work between computing modules. …”
    Get full text
    Article
  8. 468

    Implementation and Performance Evaluation of Quantum Machine Learning Algorithms for Binary Classification by Surajudeen Shina Ajibosin, Deniz Cetinkaya

    Published 2024-11-01
    “…In this work, we studied the use of Quantum Machine Learning (QML) algorithms for binary classification and compared their performance with classical Machine Learning (ML) methods. …”
    Get full text
    Article
  9. 469

    On Extended Numerical Discretization Technique of Fractional Models with Caputo-Type Derivatives by Reem Allogmany, S. S. Alzahrani

    Published 2025-04-01
    “…The ENDT method offers accuracy, stability, and efficiency compared to traditional methods. It effectively handles challenges in complex systems, supports any fractional order, is simple to implement, improves computing efficiency with sophisticated methodologies, and applies it to epidemic predictions and biological simulations.…”
    Get full text
    Article
  10. 470

    Geometric constraints on tributary fluvial network junction angles by J. D. Pelletier, R. G. Hayes, O. Hoch, B. Fenerty, L. A. McGuire

    Published 2025-03-01
    “…We map the mean junction angles computed along valley bottoms within each <span class="inline-formula">2.5 km×2.5 km</span> pixel of the conterminous USA and document lower mean junction angles in incised Late Cenozoic alluvial piedmont deposits compared to those of incised bedrock/older deposits. …”
    Get full text
    Article
  11. 471

    TCN enhanced novel malicious traffic detection for IoT devices by Liu Xin, Liu Ziang, Zhang Yingli, Zhang Wenqiang, Lv Dong, Zhou Qingguo

    Published 2022-12-01
    “…Experiments show that this work has better detection performance and faster detection speed compared to existing approaches, proving the effectiveness of the proposed detection flow and Multi-class S-TCN in IoT scenarios.…”
    Get full text
    Article
  12. 472

    Advancements in Multi-Objective Optimization for Planning and Management of Multi-Energy Systems by Marco Tangi, Alessandro Amaranto

    Published 2025-06-01
    “…Multiple objectives are usually merged via monetization rates. The work presented herein aims to develop modelling frameworks to explore of configurations of Multi-energy systems according to non-comparable objectives and extract trade-off solutions through optimization algorithms. …”
    Get full text
    Article
  13. 473

    Comparison of Intraosseous and Conventional Dental Anesthesia in Children—A Scoping Review by Anastasia Dermata, Sotiria Davidopoulou, Aristidis Arhakis, Nikolaos Dabarakis, Konstantinos N. Arapostathis, Sotirios Kalfas

    Published 2025-07-01
    “…<b>Conclusions</b>: The selected studies support the assertion that CCIA is a promising technique since it results in less pain perception and is preferred by patients compared to conventional local anesthesia. …”
    Get full text
    Article
  14. 474
  15. 475

    Are queries and keys always relevant? A case study on transformer wave functions by Riccardo Rende, Luciano Loris Viteritti

    Published 2025-01-01
    “…Specifically, we perform numerical simulations on the two-dimensional J _1 – J _2 Heisenberg model, a common benchmark in the field of quantum many-body systems on lattice. By comparing the performance of standard attention mechanisms with a simplified version that excludes queries and keys, relying solely on positions, we achieve competitive results while reducing computational cost and parameter usage. …”
    Get full text
    Article
  16. 476

    The Effect of Gamified Physical Activities on the Quality of Students' Leisure Time (Case Study: Female Secondary School Students in Ardabil City) by aylar sefidgar, Hamed Kheirollahi Meidani, Mehrdad Moharramzadeh

    Published 2024-01-01
    “…Excessive engagement with computer games by students and emulation of these games can foster tension and unhealthy behaviors. …”
    Get full text
    Article
  17. 477

    Defense scheme for the world state based attack in Ethereum by Zhen GAO, Dongbin ZHANG, Xiao TIAN

    Published 2022-04-01
    “…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
    Get full text
    Article
  18. 478

    Identification of unknown operating system type of Internet of Things terminal device based on RIPPER by Shichang Xuan, Dapeng Man, Wu Yang, Wei Wang, Jiashuai Zhao, Miao Yu

    Published 2018-10-01
    “…Also, it is compared with the existing support vector machine and C45 decision tree classification algorithms. …”
    Get full text
    Article
  19. 479
  20. 480