Showing 54,921 - 54,940 results of 56,283 for search 'Computex~', query time: 2.96s Refine Results
  1. 54921

    Downscaling of ERA5 reanalysis land surface temperature based on attention mechanism and Google Earth Engine by Shiyu Li, Hong Wan, Qun Yu, Xinyuan Wang

    Published 2025-01-01
    “…Therefore, to improve the spatial resolution of ERA5-Land LST data, this study proposes an Attention Mechanism U-Net (AMUN) method, which combines data acquisition and preprocessing on the Google Earth Engine (GEE) cloud computing platform, to downscale the hourly monthly mean reanalysis LST data of ERA5-Land across China’s territory from 0.1° to 0.01°. …”
    Get full text
    Article
  2. 54922

    Evaluation of Anti-HIV-1 Integrase and Anti-Inflammatory Activities of Compounds from Betula alnoides Buch-Ham by Prapaporn Chaniad, Teeratad Sudsai, Abdi Wira Septama, Arnon Chukaew, Supinya Tewtrakul

    Published 2019-01-01
    “…Potential interactions of compounds with IN active sites were investigated using computational docking. The results indicated that active compounds interacted with Asp64, a residue participating in 3′-processing, and Thr66, His67, and Lys159, residues participating in strand-transfer reactions of the integration process. …”
    Get full text
    Article
  3. 54923

    A Health Economic Analysis Exploring the Cost Consequence of Using a Surgical Site Infection Prevention Bundle for Hip and Knee Arthroplasty in Germany by Rhodri Saunders, Rafael Torrejon Torres, Henning Reuter, Scott Gibson

    Published 2023-12-01
    “…Research into how bundles of measures perform together is required to further inform the results of this computational analysis.…”
    Get full text
    Article
  4. 54924

    Identifying Critical Input Parameters for Improving Drag‐Based CME Arrival Time Predictions by C. Kay, M. L. Mays, C. Verbeke

    Published 2020-01-01
    “…Drag‐based models typically are much more computationally efficient than magnetohydrodynamic models, allowing for ensemble modeling. …”
    Get full text
    Article
  5. 54925

    Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network by Weicheng QIU, Xiuzhen CHEN, Yinghua MA, Jin MA, Zhihong ZHOU

    Published 2023-08-01
    “…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
    Get full text
    Article
  6. 54926

    THERMAL EFFECTIVENESS OF THE GAS FLOW VORTICAL HEAT-RELEASE INTENSIFICATION AT AXIAL AND TRANSVERSAL FLOWING-AROUND THE ROUND-TUBULAR SURFACES. Part 1 by V. B. Kuntysh, A. V. Sukhotskiy, A. V. Yatsevich

    Published 2015-06-01
    “…To exclude the heat-exchange surface square influence on the result and for obtaining the comparable valuesi it is indispensable to calculate the power input by the effective value of the surface square.While performing computations of the energy effectiveness it is necessary to recon with the fact that accounting for the stream-pressure local losses at the tube entrance and exit reduces the axial-stream thermal effectiveness coefficient by 33 %. …”
    Get full text
    Article
  7. 54927

    Breast mass lesion area detection method based on an improved YOLOv8 model by Yihua Lan, Yingjie Lv, Jiashu Xu, Yingqi Zhang, Yanhong Zhang

    Published 2024-10-01
    “…Experiments conducted on the MIAS and DDSM datasets show that the new models achieved significantly improved computational efficiency while maintaining high detection accuracy. …”
    Get full text
    Article
  8. 54928

    Design of miner type identification mechanism based on reputation management model by Jiaren YU, Youliang TIAN, Hui LIN

    Published 2022-02-01
    “…In the public mining pool, miners can freely enter the mining pool to submit proof of work to obtain rewards, and there are no conditions to restrict different types of miners.There will be malicious miners submitting invalid workloads and miners not submitting workloads in the mining pool, occupying the verification computing resources of the mining pool, reducing the verification efficiency of the mining pool, and causing the mining pool system to collapse.Aiming at the problem that it is difficult to distinguish the type of miners in the mining pool, which leads to the collapse of the mining pool system, a reputation management mechanism was introduced to measure the behavior of miners, and contracts were deployed to prevent miners from colluding with the pool manager.A design of miner type identification mechanism based on reputation management model was proposed.A reputation mechanism was constructed to measure the behavior of miners.When a miner conducts malicious behavior, the miner's reputation value would be lowered.When the miner's reputation value was less than the reputation threshold of the mining pool, the system would remove the miner, so that the miner can no longer enter the mining pool to submit proof of work and get rewards.The miners in the mining pool were dynamically updated by Markov process, so that the miners in the mining pool were conducting honest behaviors and submitting proof of work.At the same time, a reward system was designed to motivate the miners in the mining pool, and smart contracts were deployed in the mining pool to prevent miners from collusion with the mining pool manager.Finally, analyzing the scheme from the perspective of security and performance, the proposed scheme was not only safe in the process of miners submitting proof of workload, but also solved the problem of identifying miner types in public mining pools, thereby solving the problem of malicious miners submitting invalid workloads, eliminating malicious miners, and avoiding mining pools verifying invalid workloads, to improve the verification efficiency of the mining pool.…”
    Get full text
    Article
  9. 54929

    A thermo-magnetohydrodynamic particle-fluid suspension moves peristaltically through a porous medium by N.M. Hafez, A.M. Abd-Alla, S.R. Mahmoud

    Published 2025-01-01
    “…A computational study is conducted on the magnetohydrodynamic peristaltic circulation of Casson nanofluid within a non-uniform conduit when Joule heating, thermal radiation, and combined mass/heat transportation impacts are present and the porous medium is saturated. …”
    Get full text
    Article
  10. 54930

    Utilizing MRAMs With Low Resistance and Limited Dynamic Range for Efficient MAC Accelerator by Sateesh, Kaustubh Chakarwar, Shubham Sahay

    Published 2024-01-01
    “…The recent advancements in data mining, machine learning algorithms and cognitive systems have necessitated the development of neuromorphic processing engines which may enable resource and computationally intensive applications on the internet-of-Things (IoT) edge devices with unprecedented energy efficiency. …”
    Get full text
    Article
  11. 54931

    Comprehensive Analysis of Breast Cancer Cell Lines: Genome-wide Insights from ChIP-seq Analysis by Tanishq Sahu, Ruchi Yadav

    Published 2024-12-01
    “…Motif analysis was done through the Multiple Expectation maximizations for Motif Elicitation database (https://meme-suite.org/meme/db/motifs). Results: Computational investigation demonstrates the binding sequences of the T47-D breast cancer cell line as TTTTGTATTTTTAGT, and this motif occurs 2123 times in the Homo Sapiens reference genome that is hg19. …”
    Get full text
    Article
  12. 54932

    Estimation of aeroelastic stability of a tower spire by A. M. Belostotsky, I. Yu. Negrozova, O. S. Goryachevsky

    Published 2023-11-01
    “…Using the developed computational dynamic finite element models, natural frequencies and vibration modes are determined. …”
    Get full text
    Article
  13. 54933

    Influence of Non-Structural Localized Inertia on Free Vibration Response of Thin-Walled Structures by Variable Kinematic Beam Formulations by Alfonso Pagani, Francesco Zangallo, Erasmo Carrera

    Published 2014-01-01
    “…The results highlight the efficiency of the proposed models and, in particular, the enhanced capabilities of LE modelling approach, which is able to reproduce solid-like analysis with very low computational costs.…”
    Get full text
    Article
  14. 54934
  15. 54935

    Performance Analysis of Thermal and Surface Roughness Effect of Slider Bearings with Unsteady Fluid Film Lubricant Using Finite Element Method by Girma Desu Tessema, Getachew Adamu Derese, Awoke Andargie Tiruneh

    Published 2024-01-01
    “…For simplicity of numerical computation, the irregularity caused by the texture of the surface is transformed into a regular domain. …”
    Get full text
    Article
  16. 54936

    Antigen Delivery Platforms for Next-Generation Coronavirus Vaccines by Aziz A. Chentoufi, Jeffrey B. Ulmer, Lbachir BenMohamed

    Published 2024-12-01
    “…This review will (1) present the current state of antigen delivery platforms involving a multifaceted approach, including bioinformatics, molecular and structural biology, immunology, and advanced computational methods; (2) discuss the challenges facing the development of safe and effective antigen delivery platforms; and (3) highlight the potential of nucleoside-modified mRNA encapsulated in lipid nanoparticles (LNP) as the platform that is well suited to the needs of a next-generation pan-CoV vaccine, such as the ability to induce broad-based immunity and amenable to large-scale manufacturing to safely provide durable protective immunity against current and future Coronavirus threats.…”
    Get full text
    Article
  17. 54937

    Analysis of Settlement Induced by Shield Construction of the Metro Passing under Existing Buildings Based on the Finite Difference Method by Rui Wang, Bin Zhang, You Wang

    Published 2022-01-01
    “…Based on the settlement monitoring data, this study analyzed the impact of tunnel shield construction on the foundation settlement of adjacent buildings. The computational analysis of the shield tunnel was performed by numerical simulation, taking into account the upper building load and the construction disturbance to the surrounding rock. …”
    Get full text
    Article
  18. 54938
  19. 54939

    An estimation method of sound speed profile based on grouped dilated convolution informer model by Siyuan Qin, Yi Zhang, Zhou Chen

    Published 2025-02-01
    “…By replacing the standard one-dimensional convolution in the Informer model with GDC, the proposed model expands its receptive field and improves computational efficiency. The model was trained using Argo profile data from 2008 to 2017, incorporating empirical orthogonal function (EOF) decomposition data, geographic location, temporal information, and historical SSP data, enabling SSP inversion across diverse regions and time periods.ResultsThe model’s performance was evaluated using mean absolute error (MAE), root mean square error (RMSE) and mean absolute percentage error (MAPE) metrics. …”
    Get full text
    Article
  20. 54940

    Factors Associated with High Prevalence of Multibacillary Leprosy in West Bengal: A Case–Control Study by Dipta Kanti Mukhopadhyay, Tarun Kumar Sarkar, Supantha Chatterjee, Soumalya Ray, Pritam Roy, Asit Kumar Biswas

    Published 2024-04-01
    “…R, version 4.1.1 (R Foundation for Statistical Computing, 2021, Vienna, Austria) was used for data analysis. …”
    Get full text
    Article