Showing 2,141 - 2,160 results of 2,392 for search 'efficiency (source OR sources) utilization', query time: 0.11s Refine Results
  1. 2141

    An Integrated Model for Dam Break Flood Including Reservoir Area, Breach Evolution, and Downstream Flood Propagation by Huiwen Liu, Zhongxiang Wang, Dawei Zhang, Liyun Xiang

    Published 2024-11-01
    “…It is coupled with a multi-architecture (multi-CPU and GPU) open-source two-dimensional flood model, which is based on high-precision terrain and land use data. …”
    Get full text
    Article
  2. 2142

    Assessment of Collaboration-Based and Non-Collaboration-Based Logistics Risks with Plithogenic SWARA Method by Alptekin Ulutaş, Ieva Meidute-Kavaliauskiene, Ayse Topal, Ezgi Demir

    Published 2021-11-01
    “…<i>Conclusions</i>: The proposed technique will help logistics professionals make informed decisions and manage and analyze risks more efficiently. This study will also contribute to the literature as it is the first time that logistical risks have been addressed by utilizing the Plithogenic SWARA technique.…”
    Get full text
    Article
  3. 2143

    Biometric and IoT Integration for Secure and Remote Door Access Control Using Fingerprint Recognition and GSM Technology by S Kanagamalliga, S Rajalingam, A Kannan, M Karthikeyan

    Published 2025-01-01
    “…The reliability and flexibility of Arduino, coupled with the GSM capabilities of SIM900, are utilized to create a robust and efficient solution. …”
    Get full text
    Article
  4. 2144

    CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs by Ahmad Kabil, Heba Aslan, Marianne A. Azer, Mohamed Rasslan

    Published 2024-09-01
    “…This necessitates secure transmission, which requires guarantees of message availability, integrity, source authenticity, and user privacy. Moreover, the traceability of network participants is essential as it deters malicious actors and allows lawful authorities to identify message senders for accountability. …”
    Get full text
    Article
  5. 2145

    Enhancing SR-Tree for Nearest Neighbor Search by Kayumov Abduaziz, Shincheol Lee, Ji Sun Shin

    Published 2025-01-01
    “…This work also provides an open-source implementation of our enhancements to SR-Tree for the Rust ecosystem.…”
    Get full text
    Article
  6. 2146

    An Intelligent Technique for Android Malware Identification Using Fuzzy Rank-Based Fusion by Altyeb Taha, Ahmed Hamza Osman, Yakubu Suleiman Baguda

    Published 2025-01-01
    “…Android’s open-source nature, combined with its large market share, has made it a primary target for malware developers. …”
    Get full text
    Article
  7. 2147

    Advanced computational methods for news classification: A study in neural networks and CNN integrated with GPT by Fahim Sufi

    Published 2025-11-01
    “…This research offers substantial practical contributions, providing detailed insights into news source contributions, effective anomaly detection, and predictive trend analysis using neural networks. …”
    Get full text
    Article
  8. 2148

    Model of the malicious traffic classification based on hypergraph neural network by Wenbo ZHAO, Zitong MA, Zhe YANG

    Published 2023-10-01
    “…As the use and reliance on networks continue to grow, the prevalence of malicious network traffic poses a significant challenge in the field of network security.Cyber attackers constantly seek new ways to infiltrate systems, steal data, and disrupt network services.To address this ongoing threat, it is crucial to develop more effective intrusion detection systems that can promptly detect and counteract malicious network traffic, thereby minimizing the resulting losses.However, current methods for classifying malicious traffic have limitations, particularly in terms of excessive reliance on data feature selection.To improve the accuracy of malicious traffic classification, a novel malicious traffic classification model based on Hypergraph Neural Networks (HGNN) was proposed.The traffic data was represented as hypergraph structures and HGNN was utilized to capture the spatial features of the traffic.By considering the interrelations among traffic data, HGNN provided a more accurate representation of the characteristics of malicious traffic.Additionally, to handle the temporal features of traffic data, Recurrent Neural Networks (RNN) was introduced to further enhance the model’s classification performance.The extracted spatiotemporal features were then used for the classification of malicious traffic, aiding in the detection of potential threats within the network.Through a series of ablative experiments, the effectiveness of the HGNN+RNN method was verified.These experiments demonstrate the model’s ability to efficiently extract spatiotemporal features from traffic, resulting in improved classification performance for malicious traffic.The model achieved outstanding classification accuracy across three widely-used open-source datasets: NSL-KDD (94% accuracy), UNSW-NB15 (95.6% accuracy), and CIC-IDS-2017 (99.08% accuracy).These results underscore the potential significance of the malicious traffic classification model based on hypergraph neural networks in enhancing network security and its capacity to better address the evolving landscape of network threats within the domain of network security.…”
    Get full text
    Article
  9. 2149

    Evaluation of Photo-Fenton and Photo-Fenton-Like Methods for Removing Direct Orange 118 Dye from Wastewater by Tamara Kawther Hussein, Nidaa Adil Jasim

    Published 2025-08-01
    “… Wastewater treatment has used efficient technology methods that can remove any pollutant. …”
    Get full text
    Article
  10. 2150

    High-throughput discovery of perturbation-induced topological magnons by Mohammed J. Karaki, Ahmed E. Fahmy, Archibald J. Williams, Sara Haravifard, Joshua E. Goldberger, Yuan-Ming Lu

    Published 2025-07-01
    “…In this work, we significantly advance the symmetry-based approach for identifying topological magnons through developing a fully automated algorithm, utilizing the theory of symmetry indicators, that enables a highly efficient and large-scale search for candidate materials hosting perturbation-driven topological magnons. …”
    Get full text
    Article
  11. 2151

    Lithium niobate on insulator: an emerging nanophotonic crystal for optimized light control by Midhun Murali, Amit Banerjee, Tanmoy Basu

    Published 2024-11-01
    “…A high refractive index and non-linear optical and electro-optical properties enable LN to be used for more efficient manipulation of light. The highly reflective quarternary stack can play an important role in diverse fields such as photonics, optomechanics, optoelectronics, signal processing, and quantum technologies, spanning the spectrum from photon generation (including single-photon sources and lasers) to their manipulation (encompassing waveguiding, beam splitting, filters, and spin–photon entanglement), and detection (involving single-photon detectors).…”
    Get full text
    Article
  12. 2152

    Inverse design of 3D nanophotonic devices with structural integrity using auxiliary thermal solvers by Kuster Oliver, Augenstein Yannick, Hernández Roberto Narváez, Rockstuhl Carsten, Sturges Thomas Jebb

    Published 2025-04-01
    “…Gradient-based optimization offers an efficient approach to design these complex and non-intuitive structures. …”
    Get full text
    Article
  13. 2153

    Innovative BWM–TOPSIS-based approach to determine the optimum delivery method for offshore projects by Lamisse Raed, Ibrahim Mahdi, Hassan Mohamed Hassan Ibrahim, Ehab Rashad Tolba, Ahmed M. Ebid

    Published 2025-04-01
    “…Abstract Offshore projects hold significant importance in the construction industry by fostering innovation, enabling large-scale infrastructure development, and supporting the expansion of renewable energy sources, enhancing global energy security and economic stability. …”
    Get full text
    Article
  14. 2154

    A Contrast-Enhanced Approach for Aerial Moving Target Detection Based on Distributed Satellites by Yu Li, Hansheng Su, Jinming Chen, Weiwei Wang, Yingbin Wang, Chongdi Duan, Anhong Chen

    Published 2025-03-01
    “…However, target detection is restricted by radiation sources since IOs are often uncontrollable. To address this, we utilize satellite radars operating in an active self-transmitting and self-receiving mode for controllability. …”
    Get full text
    Article
  15. 2155

    An Advanced Recomposition-Based Displaying Technique: Maximizing Image Reconstruction for Virtual Museum Applications by Jingjie Zhao, Xin Shi, Olga Yezhova, Qinchuan Zhan, Xijing Zhang

    Published 2025-01-01
    “…The time-sensitive feature selection utilizes the BING objectness metric to identify and prioritize the most relevant features from multimodal data sources, ensuring efficient extraction and preserving exhibit content. …”
    Get full text
    Article
  16. 2156

    Semantic Web in Healthcare: A Systematic Literature Review of Application, Research Gap, and Future Research Avenues by A. K. M. Bahalul Haque, B. M. Arifuzzaman, Sayed Abu Noman Siddik, Abul Kalam, Tabassum Sadia Shahjahan, T. S. Saleena, Morshed Alam, Md. Rabiul Islam, Foyez Ahmmed, Md. Jamal Hossain

    Published 2022-01-01
    “…However, the key challenge in reaching this ambitious goal is letting the information exchange across heterogeneous sources and methods as well as establishing efficient tools and techniques. …”
    Get full text
    Article
  17. 2157

    ESTIMATING THE DEMAND FOR RAILWAY FREIGHT TRANSPORTATION: A CASE STUDY IN KAZAKHSTAN by Madiyar SULTANBEK, Nazdana ADILOVA, Aleksander SŁADKOWSKI, Arnur KARIBAYEV

    Published 2023-09-01
    “…The current case study specifically examines the National Company Kazakhstan Temir Zholy (KTZ), a transport and logistics holding engaged in rail transportation in Kazakhstan. KTZ’s main sources of income are related to freight transportation. …”
    Get full text
    Article
  18. 2158

    Country-Level Bibliometric Analysis of Edible Insect Research: Geographic Distribution and Contributions to Advancing Sustainable Alternatives for Food and Feed by Budi Wardiman, Asmuddin Natsir, Syahriani Syahrir, Ulva Dianasari, null Ardianto

    Published 2025-01-01
    “…Insects like black soldier fly larvae, crickets, and mealworms are being explored as efficient protein sources for animal feed. Addressing food safety, allergenicity, and cultural barriers remains critical. …”
    Get full text
    Article
  19. 2159

    A novel and rapid method to purify the human complement opsonin C3b from human plasma by Jannik Sichau, Christoph Q. Schmidt

    Published 2025-08-01
    “…Therefore, we developed a rapid (three days) and efficient method that purifies C3b directly from blood sources, requiring fewer steps and reagents than previously published protocols. …”
    Get full text
    Article
  20. 2160

    Comparative analysis of geothermal binary ORC systems: performance and environmental considerations for CO2 andwater as geofluids by Nkemakolam Chinedu Izuwa, Stanley Toochukwu Ekwueme, Ndubuisi Uchechukwu Okereke, Onyebuchi Ivan Nwanwe, Nnaemeka Princewill Ohia

    Published 2024-03-01
    “…This study considers the process simulation of geothermal binary Organic Rankine Cycle (ORC) systems which utilizes CO2 and water as geofluids for electricity generation. …”
    Get full text
    Article