Showing 54,201 - 54,220 results of 56,283 for search 'Computex~', query time: 2.98s Refine Results
  1. 54201

    Public management of smart cities: European experience by S. A. Zakharova

    Published 2022-03-01
    “…The third group of publications deals with critical aspects of the development of smart governance in practice and the resulting consequences, in particular, the reassessment of the ability of the private sector to develop and implement intelligent technologies, the predominance of a technocratic approach to decision-making, the inability to ensure impartiality and objectivity, the lack of the ability to analyse urban data, cloud computing on digital platforms to stimulate production in a collaborative environment. …”
    Get full text
    Article
  2. 54202
  3. 54203

    Parameter Extraction for Photovoltaic Models with Flood-Algorithm-Based Optimization by Yacine Bouali, Basem Alamri

    Published 2024-12-01
    “…These findings establish the FLA as a computationally efficient and reliable approach to PV parameter extraction, with promising implications for advancing PV system design and simulation.…”
    Get full text
    Article
  4. 54204

    Fast algorithms for classical specifications of stabiliser states and Clifford gates by Nadish de Silva, Wilfred Salmon, Ming Yin

    Published 2025-01-01
    “…The stabiliser formalism plays a central role in quantum computing, error correction, and fault tolerance. Conversions between and verifications of different specifications of stabiliser states and Clifford gates are important components of many classical algorithms in quantum information, e.g. for gate synthesis, circuit optimisation, and simulating quantum circuits. …”
    Get full text
    Article
  5. 54205
  6. 54206

    Modeling and Optimization of Multiaction Dynamic Dispatching Problem for Shared Autonomous Electric Vehicles by Ning Wang, Jiahui Guo

    Published 2021-01-01
    “…Results show that (1) the Kuhn–Munkres algorithm ensures the computational effectiveness in the large-scale real-time application of the AMoD system; (2) the second optimization model considering long-term return can decrease average user waiting time and achieve a 2.78% increase in total revenue compared with the first model; (3) and integrating combinatorial optimization theory with reinforcement learning theory is a perfect package for solving the multiaction dynamic dispatching problem of SAEVs.…”
    Get full text
    Article
  7. 54207
  8. 54208
  9. 54209

    DARE: A decentralized association rules extraction scheme for embedded data sets in distributed IoT devices by Márcio Alencar, Raimundo Barreto, Horácio Fernandes, Eduardo Souto, Richard Pazzi

    Published 2020-10-01
    “…Performing knowledge extraction in a decentralized approach is a computational challenge considering the tight storage and processing constraints of IoT devices, unlike deep learning, which demands a massive amount of data, memory, and processing capability. …”
    Get full text
    Article
  10. 54210
  11. 54211

    A System of Remote Patients’ Monitoring and Alerting Using the Machine Learning Technique by M. Dhinakaran, Khongdet Phasinam, Joel Alanya-Beltran, Kingshuk Srivastava, D. Vijendra Babu, Sitesh Kumar Singh

    Published 2022-01-01
    “…The proposed methodology makes use of different machine learning algorithms along with cloud computing for continuous data storage. Over the years, these technologies have resulted in significant advancements in the healthcare industry. …”
    Get full text
    Article
  12. 54212

    Unlocking the Research Potential of Early Modern Dutch Maps by Leon van Wissen, Manjusha Kuruppath, Lodewijk Petram

    Published 2025-01-01
    “…This approach highlights the potential of combining historical cartography with computational tools to empower large-scale geographic and historical research. …”
    Get full text
    Article
  13. 54213
  14. 54214

    Anonymous trust management scheme of VANET based on attribute signature by Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO

    Published 2023-04-01
    “…Trust management mechanisms can solve the authenticity assessment problem of messages and establish trust between communication entities in the VANET.However, current trust management schemes lack an effective privacy protection mechanism, leading to privacy concerns for vehicles when binding their identity with their trust level.Based on the anonymity of attribute-based signature, an anonymous trust management scheme was proposed for VANET.The trust level of the vehicle was maintained by the trusted authority.The trust level of vehicles and the current time were taken as the attribute identity set of the vehicle, so as to realize the binding of the anonymous vehicle identity with its trust level, which could provide the privacy protection of vehicles.In addition, the timely update of attribute signature private key could resist false reputation attack and the trust level of the vehicle could be verified anonymously while the attribute signature was verified.Furthermore, the pseudonym was used to hide the real identity of the vehicle, enabling only the trusted authority could parse the real identity of vehicles from the pseudonym to update their trust level, and providing legal and secure tracking of the malicious vehicle identity vehicle.Under the general group model, the attribute-based signature scheme is proven to satisfy the security of unforgerability.The security analysis further shows that the scheme protects the identity and location privacy of vehicles, enables only the trusted authority to legally track malicious vehicles, resists false reputation attacks, ensures communication integrity, and resists replay attacks.Performance analysis confirms that the proposed scheme has better computation and communication efficiency than existing schemes.…”
    Get full text
    Article
  15. 54215

    Correlation analysis between coiling tension and the sleeve's hoop stress by Park Yonghui

    Published 2024-01-01
    “…This analytical solution not only holds promise for predicting the behavior of various thick-walled cylinders produced through different manufacturing processes involving coiling but also facilitates integration with monitoring systems to mitigate slumping during steel rolling operations, all while minimizing computational burden.…”
    Get full text
    Article
  16. 54216

    Brain tumor segmentation by deep learning transfer methods using MRI images by E.Y. Shchetinin

    Published 2024-06-01
    “…Among such models, VGG16, VGG19, Mobilenetv2, Inception, Efficientnetb7, InceptionResnetV2, DenseNet201, DenseNet121 were used. The computational experimental analysis performed in the paper on a set of MRI brain images showed that the best encoder model for the above deep models was the DenseNet121 model with the following values of segmentation metrics Mean IoU of 91.34%, Mean Dice of 94.26%, Accuracy of 94.22%. …”
    Get full text
    Article
  17. 54217

    Numerical study of crack path by MMCG specimen using M integral by S. El Kabir, R. Moutou Pitti, N. Recho, Y. Lapusta, F. Dubois

    Published 2016-01-01
    “…The stability is shown for the opening mode (Mode I), the shear mode (Mode II), and the mixed mode of 15°, 30°, 45°, 60°, 75° by computing the energy release rate versus the crack length. …”
    Get full text
    Article
  18. 54218

    Graph Convolutional Network with Neural Collaborative Filtering for Predicting miRNA-Disease Association by Jihwan Ha

    Published 2025-01-01
    “…<b>Conclusions:</b> We anticipate that our model could not only serve as an effective tool for predicting disease-related miRNAs but could be employed as a universal computational framework for inferring relationships across biological entities.…”
    Get full text
    Article
  19. 54219

    A Model-Driven Realization of AUV Controllers Based on the MDA/MBSE Approach by Ngo Van Hien, Van-Thuan Truong, Ngoc-Tam Bui

    Published 2020-01-01
    “…The paper brings out stepwise adapted AUV dynamics for control that are then combined with the specialization of MDA/MBSE features as follows: the computation independent model (CIM) is defined by the specification of the use-case model together with hybrid automata to gather the requirement analysis for control; the platform-independent model (PIM) is then designed by specializing the real-time UML/SysML’s features including main control capsules that depict structures and behaviors of controllers in detail; and the detailed PIM is subsequently converted into the platform-specific model (PSM) by object-oriented platforms to rapidly implement the AUV controller. …”
    Get full text
    Article
  20. 54220

    In silico drug repurposing at the cytoplasmic surface of human aquaporin 1. by Aled R Lloyd, Karl Austin-Muttitt, Jonathan G L Mullins

    Published 2025-01-01
    “…A small set of compounds which could impede water transport through human AQP1 have been identified in this computational screening study.…”
    Get full text
    Article