Showing 441 - 460 results of 587 for search 'computer (supported OR support) comparative work.', query time: 0.17s Refine Results
  1. 441

    Advancements in Multi-Objective Optimization for Planning and Management of Multi-Energy Systems by Marco Tangi, Alessandro Amaranto

    Published 2025-06-01
    “…Multiple objectives are usually merged via monetization rates. The work presented herein aims to develop modelling frameworks to explore of configurations of Multi-energy systems according to non-comparable objectives and extract trade-off solutions through optimization algorithms. …”
    Get full text
    Article
  2. 442

    Investigation of the Pulmonary Artery Hypertension Using an Ad Hoc OpenFOAM CFD Solver by Francesco Duronio, Paola Marchetti

    Published 2024-12-01
    “…The analysis of the data confirmed the importance of CFD as a supportive tool in understanding, diagnosing, and monitoring the pathophysiological mechanisms underlying cardiovascular diseases, proving to be a powerful means for personalizing surgical treatments.…”
    Get full text
    Article
  3. 443
  4. 444

    On а Recursive-Parallel Algorithm for Solving the Knapsack Problem by Vladimir V. Vasilchikov

    Published 2018-04-01
    “…Such applications have the ability to generate parallel branches of computation directly during program execution and dynamically redistribute work between computing modules. …”
    Get full text
    Article
  5. 445

    Digital augmentation of aftercare for patients with anorexia nervosa: the TRIANGLE RCT and economic evaluation by Janet Treasure, Katie Rowlands, Valentina Cardi, Suman Ambwani, David McDaid, Jodie Lord, Danielle Clark Bryan, Pamela Macdonald, Eva Bonin, Ulrike Schmidt, Jon Arcelus, Amy Harrison, Sabine Landau

    Published 2025-07-01
    “…The specific aims were to assess: patient distress at 12 months (primary outcome) other patient outcomes, including patient distress at 18 months, patient motivation and ability to change, eating disorder symptoms, social and work adjustment, and days in hospital cost-effectiveness of ECHOMANTRA for patients at 12 months carer distress and skills at 12 and 18 months adverse events (AEs) during the study process aspects of the study, including adherence to treatment and patients and their carer/supporters’ experiences of receiving and supporting treatment, respectively, in the trial by conducting nested qualitative studies and online surveys about both treatment as usual (TAU) alone and with ECHOMANTRA augmentation. …”
    Get full text
    Article
  6. 446
  7. 447
  8. 448
  9. 449

    Are queries and keys always relevant? A case study on transformer wave functions by Riccardo Rende, Luciano Loris Viteritti

    Published 2025-01-01
    “…Specifically, we perform numerical simulations on the two-dimensional J _1 – J _2 Heisenberg model, a common benchmark in the field of quantum many-body systems on lattice. By comparing the performance of standard attention mechanisms with a simplified version that excludes queries and keys, relying solely on positions, we achieve competitive results while reducing computational cost and parameter usage. …”
    Get full text
    Article
  10. 450

    Defense scheme for the world state based attack in Ethereum by Zhen GAO, Dongbin ZHANG, Xiao TIAN

    Published 2022-04-01
    “…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
    Get full text
    Article
  11. 451
  12. 452

    Identification of unknown operating system type of Internet of Things terminal device based on RIPPER by Shichang Xuan, Dapeng Man, Wu Yang, Wei Wang, Jiashuai Zhao, Miao Yu

    Published 2018-10-01
    “…Also, it is compared with the existing support vector machine and C45 decision tree classification algorithms. …”
    Get full text
    Article
  13. 453

    Finding Transcription Factor Binding Motifs for Coregulated Genes by Combining Sequence Overrepresentation with Cross-Species Conservation by Hui Jia, Jinming Li

    Published 2012-01-01
    “…Novel computational methods for finding transcription factor binding motifs have long been sought due to tedious work of experimentally identifying them. …”
    Get full text
    Article
  14. 454
  15. 455
  16. 456
  17. 457

    A Heavy-Haul Railway Corrugation Diagnosis Method Based on WPD-ASTFT and SVM by Binghuan Xiao, Jinzhao Liu, Ziyuan Zhang

    Published 2022-01-01
    “…The training and testing samples are classified using Support Vector Machine (SVM). The adaptive short-time Fourier transform (ASTFT) is incorporated with the Renyi entropy and the particle swarm optimization algorithm, which achieves a better aggregation of the time-frequency distribution and reduces the computation cost. …”
    Get full text
    Article
  18. 458

    A data driven predictive viscosity model for the microemulsion phase by Akash Talapatra, Bahareh Nojabaei, Pooya Khodaparast

    Published 2025-04-01
    “…Support Vector Regression (SVR) outperformed other models with an R2 of 0.978 and 0.963 and mean absolute errors of 0.059 and 0.072 for training and test datasets, respectively. …”
    Get full text
    Article
  19. 459

    Prevalence and spatial distributions of trachomatous inflammation-follicular among children aged 1–9 years in rural areas of Yilmana Densa and Gonji Kolela districts, Northwestern... by Misganaw Alelign, Asmamaw Malede, Eshetu Shifaw, Tesfahun Taddege, Yideg Abinew, Metadel Adane

    Published 2025-08-01
    “…The results of the study may be used to support the current trachoma control and elimination program, and to help achieve SDG Goal 3 target 3.3 and Goal 6. …”
    Get full text
    Article
  20. 460

    Design model of thrust bearing with porous coating on the way surface by Murman A. Mukutadze, Anastasia N. Garmonina, Victor M. Prikhodko

    Published 2017-10-01
    “…The development of the design model of a thrust sliding bearing with a two-layer porous coating on the way surface running on an electrically conductive lubricant is described. The work objectives are the development and computational justification of the possible increase in oil consumption, growth of the bearing capacity, and reduction of the frictional force, due to their design models refinement. …”
    Get full text
    Article