Showing 54,161 - 54,180 results of 56,283 for search 'Computex~', query time: 3.63s Refine Results
  1. 54161

    Ontology-based expansion of virtual gene panels to improve diagnostic efficiency for rare genetic diseases by Jaemoon Shin, Toyofumi Fujiwara, Hirotomo Saitsu, Atsuko Yamaguchi

    Published 2025-02-01
    “…We also performed computational experiments on an evaluation dataset comprising 74 patients to determine the optimal VGP design method. …”
    Get full text
    Article
  2. 54162

    Behavior of a Multi-Story Steel Structure with Eccentric X-Brace by Abdulkhalik J. Abdulridha

    Published 2023-10-01
    “…This study employs computational modelling to analyze multi-story steel buildings featuring an eccentric X-brace system. …”
    Get full text
    Article
  3. 54163
  4. 54164

    A framework for understanding the path to achieve high resilience of maritime supply chain by Xiuqian Chen, Liangyong Chu, Mengyao Wang, Qion Chen

    Published 2025-01-01
    “…The paper proposes a methodological framework based on the structural equation model (SEM), Necessary Condition Analysis (NCA), fuzzy set qualitative comparative analysis (fsQCA), and utilizes questionnaire data from the maritime industry in China to evaluate the resilience in MSC. The computational results indicate that: (1) The high resilience of MSC is the result of the synergistic interaction among multiple factors, and these factors boost MSC resilience through diverse paths; (2) There are four pathways for high MSC resilience: the ‘collaboration + carbon reduction + digitization’ path, the ‘early warning + collaboration’ path, the ‘agility + early warning’ path, and the ‘carbon reduction’ path; (3) Digitization level can play a catalytic role in increasing the resilience of MSC by helping other factors. …”
    Get full text
    Article
  5. 54165

    Dynamic Characteristics Analysis of 3D Blade Tip Clearance for Turbine Blades with Typical Cracks by Xiaodong Zhang, Yiwei Xiong, Xin Huang, Bochao Fan, Zhen Zhao, Jiahao Zhu

    Published 2022-01-01
    “…Then, a novel dynamic computation method is proposed to calculate the 3D-BTC based on the blade deformation. …”
    Get full text
    Article
  6. 54166
  7. 54167

    A maturity model for assessing sustainable project management knowledge areas: A case study within a logistics firm by Elifcan Göçmen

    Published 2021-12-01
    “…Practicality of these approaches is illustrated through a real data in a logistics organization. As a result, computational results indicate that risk management dimension with the level 1,4 has the lowest rating of all nine dimensions. …”
    Get full text
    Article
  8. 54168

    Research on Lateral Stability Control of Four-Wheel Independent Drive Electric Vehicle Based on State Estimation by Yu-Jie Ma, Chih-Keng Chen, Hongbin Ren

    Published 2025-01-01
    “…Through closed-loop Double Lane Change (DLC) tests under low-, medium-, and high-road-adhesion conditions, the results demonstrate that the proposed hierarchical estimation method offers high computational efficiency and superior estimation accuracy. …”
    Get full text
    Article
  9. 54169

    A Dynamic Framework for Community-Facility Siting with Inter-Community Competition by Sisi Zhu, Haoying Han, Anran Dai

    Published 2025-01-01
    “…This framework includes the BOMSDM itself, the data collection and processing method, and the constrained NSGA-II as the computational algorithm. Under this framework, the BOMSDM, along with three comparative frameworks derived from traditional models—including a random allocation non-incremental model, a random allocation incremental model, and an average allocation non-incremental model—was applied to a real-world scenario in Shaoxing. …”
    Get full text
    Article
  10. 54170

    A New Sensors-Based Covert Channel on Android by Ahmed Al-Haiqi, Mahamod Ismail, Rosdiadee Nordin

    Published 2014-01-01
    “…Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. …”
    Get full text
    Article
  11. 54171

    Evaluation of a Semiempirical, Zero-Dimensional, Multizone Model to Predict Nitric Oxide Emissions in DI Diesel Engines’ Combustion Chamber by Nicholas S. Savva, Dimitrios T. Hountalas

    Published 2016-01-01
    “…As proven from the investigation conducted herein, the proposed model adequately predicts NO emissions and NO trends when the engine settings vary, with low computational cost. These encourage its use for engine control optimization regarding NOx abatement and real-time/model-based NOx control applications.…”
    Get full text
    Article
  12. 54172
  13. 54173

    Anonymous group key distribution scheme for the internet of vehicles by Zhiwang HE, Huaqun WANG

    Published 2023-10-01
    “…Vehicular ad hoc networks (VANET) play a crucial role in intelligent transportation systems by providing driving information and services such as collision prevention and improved traffic efficiency.However, when a trusted third party (TTP) interacts with a vehicle in VANET, it can be vulnerable to security threats like eavesdropping, tampering, and forgery.Many existing schemes rely heavily on TTP for key negotiation to establish session keys and ensure session security.However, this over-reliance on TTP can introduce a single point of failure and redundancy issues when TTP sends the same information to multiple vehicles.Additionally, key negotiation methods used for creating group session keys often result in increased interaction data and interaction times.An anonymous group key distribution scheme for the internet of vehicles was proposed to address these challenges.The Road Side Units (RSUs) were used to facilitate the creation of group session keys among multiple vehicles.Identity-based public key cryptography and an improved multi-receiver encryption scheme were utilized for communication between RSUs and vehicles, enabling two-way authentication and secure distribution of group session keys.During the key distribution process, a single encryption operation was sufficient to allow all group members to obtain a consistent session key.This reduced the reliance on TTP for authentication and group communication.Formal security proofs demonstrate that the proposed scheme satisfies basic security requirements.Furthermore, performance analysis and comparisons indicate that this scheme offers lower computational overhead and communication overhead compared to similar schemes.…”
    Get full text
    Article
  14. 54174

    Technology and practice of intelligent governance for financial data security by Peng HOU, Zhixin LI, Fei ZHANG, Xu SUN, Dan CHEN, Yihao CUI, Hanbing ZHANG, Yinan JIN, Hongfeng CHAI

    Published 2023-06-01
    “…In the “14th Five-Year Plan” era, the digitization of the financial industry has entered a phase of deepening and high-quality development.Strengthening Financial Data Security Governance (FDSG) and protecting financial data security have become an objective need and essential requirements for developing national economic security.FDSG utilizes data governance measures as a fundamental tool with a focus on sensitive data to ensure the comprehensive security of the entire lifecycle of financial data.It aims to promote data circulation among financial institutions, activate data value, and facilitate market-oriented allocation of financial data elements.FDSG is increasingly intertwined with big data, artificial intelligence, cloud computing, and blockchain technologies, transforming traditional data security governance into intelligent governance and accelerating the evolution of FDSG towards automation, intelligence, efficiency, and precision.FDSG’s essence, scope, and governance framework were introduced, and the core concepts and critical supporting technologies for the intellectual development of FDSG were elaborated, outlining the roadmap for intelligent governance.With consideration of FDSG’s demands and characteristics of intelligent technologies, vital directions for the practical application of intelligent technologies in FDSG were outlined, including data classification, data traceability, content control, privacy protection, and data twinning.Examples of current intelligent governance practices in banking, securities, and insurance industries were provided.Policy recommendations were proposed in the paper to promote the standardized and intelligent development of FDSG in China’s new era, aiming to foster the sustainable development of financial institutions and industries and ensure a healthy and secure environment for the future.…”
    Get full text
    Article
  15. 54175

    Study on Hydraulic Connection and Seepage Law of Goaf Groups in Coal Mine Underground Reservoir by Wei Qin

    Published 2022-01-01
    “…On this basis, the computational fluid dynamics (CFD) numerical calculation of seepage properties of the coal/rock pillars was conducted. …”
    Get full text
    Article
  16. 54176
  17. 54177
  18. 54178

    Avoiding catastrophic overfitting in fast adversarial training with adaptive similarity step size. by Jie-Chao Zhao, Jin Ding, Yong-Zhi Sun, Ping Tan, Ji-En Ma, You-Tong Fang

    Published 2025-01-01
    “…In recent years, fast adversarial training methods have gained widespread attention due to their lower computational cost. However, since fast adversarial training uses single-step adversarial attacks instead of multi-step attacks, the generated adversarial examples lack diversity, making models prone to catastrophic overfitting and loss of robustness. …”
    Get full text
    Article
  19. 54179

    An Analytical Solution for the Vibration and Far-Field Sound Radiation Analysis of Finite, Semisubmerged Cylindrical Shells by Wenjie Guo, Zhou Yang, Yueyang Han

    Published 2021-01-01
    “…Besides, in consideration of simplicity and less computation effort, the present method can be used for the rapid prediction of the vibration and far-field sound pressure of a semisubmerged cylindrical shell with low-frequency excitation.…”
    Get full text
    Article
  20. 54180