Showing 54,961 - 54,980 results of 56,283 for search 'Computex~', query time: 2.66s Refine Results
  1. 54961

    Integrating AutoGluon for Real-Time Monitoring and Classification of Dental Equipment Performance by Muxiu Yang, Fengzhou Li, Wenfeng Qiu

    Published 2025-01-01
    “…The Weighted Ensemble model achieved a 100% accuracy, balanced accuracy and MCC score of 1.0 (indicating perfect reliability in classifying equipment states as ’Optimal,’ ’Warning,’ and ’Failure’). The system was computationally efficient, generalizable across classes, and showed robust generalization, making it suitable for real-time deployment. …”
    Get full text
    Article
  2. 54962

    Blockchain-based cross-data center anonymous and verifiable identity authentication scheme by XU Shujiang, ZHANG Chaoyang, WANG Lianhai, ZHANG Shuhui, SHAO Wei

    Published 2024-04-01
    “…With the progression of big data and cloud computing technologies, there has been an escalating trend in cross-institutional data sharing and interaction within the financial sector. …”
    Get full text
    Article
  3. 54963

    Embedded Rough-Neck Helmholtz Resonator Low-Frequency Acoustic Attenuator by Xianming Sun, Tao Yu, Lipeng Wang, Yunshu Lu, Changzheng Chen

    Published 2024-12-01
    “…To achieve low-frequency absorption within a limited spatial volume, this study proposes an embedded Helmholtz resonator featuring a roughened neck and establishes a numerical computational model that incorporates thermos viscous effects. …”
    Get full text
    Article
  4. 54964

    Integrating Model‐Informed Drug Development With AI: A Synergistic Approach to Accelerating Pharmaceutical Innovation by Karthik Raman, Rukmini Kumar, Cynthia J. Musante, Subha Madhavan

    Published 2025-01-01
    “…By integrating the predictive power of computational models and the data‐driven insights of AI, the synergy between these approaches has the potential to accelerate drug discovery, optimize treatment strategies, and usher in a new era of personalized medicine, benefiting patients, researchers, and the pharmaceutical industry as a whole.…”
    Get full text
    Article
  5. 54965
  6. 54966

    Internet of things enabled smart agriculture: Current status, latest advancements, challenges and countermeasures by Navod Neranjan Thilakarathne, Muhammad Saifullah Abu Bakar, Pg Emeroylariffion Abas, Hayati Yassin

    Published 2025-02-01
    “…Smart agriculture, interchangeably known as smart farming, utilizes IoT and related enabling technologies such as cloud computing, artificial intelligence, and big data in agriculture and offers the potential to enhance agricultural operations by automating and making intelligent decisions, resulting in increased efficiency and a better yield with minimum waste. …”
    Get full text
    Article
  7. 54967

    Survey on blockchain privacy protection techniques in cryptography by Feng LIU, Jie YANG, Jiayin QI

    Published 2022-08-01
    “…In recent years, the issue of data privacy has attracted increased attention, and how to achieve effective privacy protection in blockchain is a new research hotspot.In view of the current research status and development trend of blockchain in privacy protection, the privacy protection methods of blockchain in transaction address,prophecy machine and smart contract were explained, and the privacy strategies of blockchain in the protection of basic elements were summarized.Based on high-level literature at home and abroad, two types of blockchain cryptographic protection methods and usage scenarios were analyzed, including special cryptographic primitives and post-quantum cryptography.The advantages and disadvantages of seven cryptographic techniques applicable to current blockchain privacy protection were also reviewed, including attribute-based encryption, special data signature, homomorphic encryption, secure multi-party computation, zero-knowledge proofs, and lattice ciphers.It was concluded that the privacy protection of blockchain applications cannot be achieved without cryptographic technology.Meanwhile, the blockchain privacy protection technologies were analyzed in terms of both basic element protection and cryptographic protection.It was concluded that it was difficult to effectively solve the privacy problem only from the application and contract layers of the blockchain, and various cryptographic technologies should be used to complement each other according to different needs and application scenarios.In addition, according to the current development status of blockchain privacy cryptography, the narrative was developed from blockchain basic element protection and cryptography-based protection.From the perspectives of both endogenous basic element security and exogenous cryptographic privacy security, basic element privacy protection should be studied first, followed by an in-depth analysis of cryptographic protection techniques for blockchain privacy.The strengths and weaknesses and the potential value of the privacy handling aspects of the corresponding safeguards should be measured in terms of the development of technology in conjunction with practical applications, while considering the timeliness of the technology.Finally, an outlook on the future direction of blockchain privacy protection technologies was provided, indicating the issues that need to be addressed in focus.…”
    Get full text
    Article
  8. 54968
  9. 54969
  10. 54970

    A Parametric Study of Performance of Two Solar Wind Velocity Forecasting Models During 2006–2011 by Sandeep Kumar, Nandita Srivastava

    Published 2022-09-01
    “…Besides these MHD frameworks, the Heliospheric Upwind eXtrapolation (HUX) technique can extrapolate SW from inner heliospheric boundaries to L1 and can give a reliable estimate of the SW velocity at L1 comparable to MHD models but in a short computational time. We carried out an extensive parametric study of the performance of the Model1 (PFSS+WSA+HUX) and Model2 (PFSS+SCS+WSA+HUX) for SW velocity prediction at L1. …”
    Get full text
    Article
  11. 54971

    Survey on RDMA protocol applications and security protection technologies by LIU Yumeng, TANG Zhengliang, LU Songfeng, ZHU Jianxin, LIU Yunqu

    Published 2024-04-01
    “…The remote direct memory access (RDMA) technology, which has been effectively utilized to enhance data transfer rates and reduce CPU utilization, has played a significant role in various domains such as cross-regional data center transfers, high-performance computing, and rapid data read/write operations. However, despite its emerging status, RDMA has been lacking in widely recognized security solutions. …”
    Get full text
    Article
  12. 54972
  13. 54973

    General Log-Linear Weibull Model Combining Vibration and Temperature Characteristics for Remaining Useful Life Prediction of Rolling Element Bearings by Mingzhu Lv, Shixun Liu, Xiaoming Su, Changzheng Chen

    Published 2020-01-01
    “…According to the experimental results, the presented approach provides superior prediction precision and lower computational cost than other approaches for bearings under constant or variable operating conditions.…”
    Get full text
    Article
  14. 54974

    Multi-objective optimization of kitchen comfort based on arithmetic superposition index P by Shunyu Zhang, Xiangrui Zhao, Liangguo Cheng, Zhihang Shen, Zhenlei Chen

    Published 2025-02-01
    “…This study adopts a combination of orthogonal experiments and computational fluid dynamics (CFD) simulations to study the exhaust characteristics of range hoods under different structural parameters and compares and analyzes the rationality and effectiveness of different auxiliary ventilation methods in kitchen ventilation systems to propose the optimal solution. …”
    Get full text
    Article
  15. 54975

    Using FinBERT as a refined approach to measuring impression management in corporate reports during a crisis by Caroline Cherry, Waheeda Mohamed, Yogesh Brahmbhatt

    Published 2023-07-01
    “…FinBERT, a more advanced machine learning model of natural language processing (NLP), was used to investigate the change in net sentiment expressed in the Chairman’s Statements of a sample of South African JSE-listed companies before and during the pandemic. A computation of net sentiment for each report was performed. …”
    Get full text
    Article
  16. 54976

    Effects of Age and Gender on Hand Motion Tasks by Wing Lok Au, Irene Soo Hoon Seah, Wei Li, Louis Chew Seng Tan

    Published 2015-01-01
    “…Wearable and wireless motion sensor devices have facilitated the automated computation of speed, amplitude, and rhythm of hand motion tasks. …”
    Get full text
    Article
  17. 54977
  18. 54978
  19. 54979

    Location-Aware Cross-Layer Design Using Overlay Watermarks by Xianbin Wang, Paul Ho, Yiyan Wu

    Published 2007-01-01
    “…Therefore, efficient collaborative signal processing algorithms that consume less energy for computation and less bandwidth for communication are needed. …”
    Get full text
    Article
  20. 54980