Showing 1,981 - 2,000 results of 26,849 for search 'evaluation computing', query time: 0.21s Refine Results
  1. 1981

    Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing by Dengzhi Liu, Zhimin Li, Dongbao Jia

    Published 2023-12-01
    “…The proposed auditing scheme in this paper can be used to guarantee the correctness and the completeness of the stored data in 5G-enabled software-defined edge computing. The auditing results of the distributed data in the proposed scheme can be used as an important basis for evaluating the trustworthiness of the edge devices. …”
    Get full text
    Article
  2. 1982

    Embankment Breach Simulation and Inundation Mapping Leveraging High-Performance Computing for Enhanced Flood Risk Prediction and Assessment by U. Dutta, Y. K. Singh, T. S. M. Prabhu, G. Yendargaye, R. Kale, M. K. Khare, B. Kumar, R. Panchang

    Published 2024-11-01
    “…This research delves into a case study on simulating embankment breaches to evaluate the extent of flooding. Leveraging advanced hydrodynamic models validated through high-performance computing (HPC) systems, and integrating real-time data assimilation, we aim to improve accuracy in flood forecasting. …”
    Get full text
    Article
  3. 1983

    I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach by Md. Sharafat Hossain, Md. Alamgir Hossain, Md. Saiful Islam

    Published 2024-10-01
    “…Abstract Cloud computing offers cost-effective IT solutions but is susceptible to security threats, particularly the Economic Denial of Sustainability (EDoS) attack. …”
    Get full text
    Article
  4. 1984

    How fast does the WallGo? A package for computing wall velocities in first-order phase transitions by Andreas Ekstedt, Oliver Gould, Joonas Hirvonen, Benoit Laurent, Lauri Niemi, Philipp Schicho, Jorinde van de Vis

    Published 2025-04-01
    “…Abstract WallGo is an open-source software designed to compute the bubble wall velocity in first-order cosmological phase transitions. …”
    Get full text
    Article
  5. 1985

    Drone-Enabled AI Edge Computing and 5G Communication Network for Real-Time Coastal Litter Detection by Sarun Duangsuwan, Phoowadon Prapruetdee

    Published 2024-12-01
    “…High-speed 5G communication supports seamless data transmission, allowing efficient monitoring. We evaluated drone performance under optimal flying heights above ground of 5 m, 7 m, and 10 m, analyzing accuracy, precision, recall, and F1-score. …”
    Get full text
    Article
  6. 1986

    Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks by Sharaf Aldeen Abdulkadhum Abbas, Abdullahi Abdu Ibrahim

    Published 2024-06-01
    “…We evaluate these algorithms using metrics such as the confusion matrix, F1 score, and AUC-ROC to determine their performance in managing imbalanced datasets and generating meaningful insights. …”
    Get full text
    Article
  7. 1987

    Analysis of chemical reactive nanofluid flow on stretching surface using numerical soft computing approach for thermal enhancement by Saleem Nasir, Abdallah S. Berrouk, Taza Gul

    Published 2024-12-01
    “…In this work, computational intelligence methodologies are used to investigate the trihybrid nanofluid, a new theoretical model with remarkable thermal transmission properties to enhance liquid thermal performance. …”
    Get full text
    Article
  8. 1988

    Reducing time and computing costs in EC-Earth: an automatic load-balancing approach for coupled Earth system models by S. Palomas, M. C. Acosta, G. Utrera, E. Tourigny

    Published 2025-06-01
    “…Determining the appropriate number of resources to use for each component in coupled ESMs is crucial for efficient utilization of the high-performance computing (HPC) infrastructures used in climate modeling. …”
    Get full text
    Article
  9. 1989
  10. 1990
  11. 1991
  12. 1992

    Blockchain and RL-Based Secured Task Offloading Framework for Software-Defined 5G Edge Networks by N. Sethu Subramanian, Prabhakar Krishnan, Kurunandan Jain, K. B. Aneesh Kumar, Tulika Pandey, Rajkumar Buyya

    Published 2025-01-01
    “…Experimental evaluations demonstrate that SAGE reduces task offloading delays by 36% and task durations by 30% compared to baseline methods under varying load and energy constraints.…”
    Get full text
    Article
  13. 1993

    Assurance in Advanced 5G Edge Continuum by Filippo Berto, Claudio A. Ardagna, Massimo Banzi, Marco Anisetti

    Published 2024-01-01
    “…., Multi-access Edge Computing) and powerful and reliable connectivity links (i.e., network slices). …”
    Get full text
    Article
  14. 1994
  15. 1995

    Grammatical error correction for low-resource languages: a review of challenges, strategies, computational and future directions by Syauqie Muhammad Marier, Xiangfan Chen, Linan Zhu, Xiangjie Kong

    Published 2025-07-01
    “…Despite notable progress, this review identifies gaps in evaluation methodologies and typology-specific solutions, calling for future innovations in multilingual modeling, dataset creation, and computationally efficient GEC systems tailored to the unique needs of low-resource languages.…”
    Get full text
    Article
  16. 1996

    Enhancing Multi-Key Fully Homomorphic Encryption with Efficient Key Switching and Batched Multi-Hop Computations by Liang Zhou, Ruwei Huang, Bingbing Wang

    Published 2025-05-01
    “…We propose novel algorithms for evaluation key generation and key switching that simplify the computation while allowing each party to independently precompute and share its evaluation keys, thereby reducing both computational overhead and storage costs. …”
    Get full text
    Article
  17. 1997

    Computationally derived linguistic features of L2 narrative essays and their relations to human-judged writing quality by Mostafa Janebi Enayat

    Published 2025-07-01
    “…Abstract Computational tools have become increasingly prevalent in the analysis and evaluation of various linguistic dimensions in second language (L2) writing pedagogy and research. …”
    Get full text
    Article
  18. 1998

    Rockburst Monitoring in Deep Coalmines with Protective Coal Panels Using Integrated Microseismic and Computed Tomography Methods by Dong Li, Junfei Zhang

    Published 2020-01-01
    “…To reduce such type of rockburst, this study firstly proposes a mathematic model to analyse the overall static stress distribution in the protective panel based on the mining practice in Longyun coalmine, Shandong Province, China. To evaluate the stress concentration caused by geological defects in the protective panel, a new rockburst evaluation index is proposed based on the computed tomography (CT) method. …”
    Get full text
    Article
  19. 1999

    Target screening and optimization of candidate compounds for breast cancer treatment using bioinformatics and computational chemistry approaches by Jian Xu, Xue Li, Yiduo Jia, Yiduo Jia

    Published 2025-05-01
    “…Molecular docking and molecular dynamics (MD) simulations were performed to evaluate the binding stability between selected compounds and the human adenosine A1 receptor-Gi2 protein complex (PDB ID: 7LD3). …”
    Get full text
    Article
  20. 2000

    Development of a Computer Vision-Based Method for Sizing and Boat Error Assessment in Olive Pitting Machines by Luis Villanueva Gandul, Antonio Madueño-Luna, José Miguel Madueño-Luna, Miguel Calixto López-Gordillo, Manuel Jesús González-Ortega

    Published 2025-06-01
    “…To address these challenges, this study presents a novel computer vision (CV) system integrated into a commercial DRR machine. …”
    Get full text
    Article