Showing 1,001 - 1,020 results of 26,849 for search 'evaluation computing', query time: 0.36s Refine Results
  1. 1001

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  2. 1002

    Benchmarking In-Sensor Machine Learning Computing: An Extension to the MLCommons-Tiny Suite by Fabrizio Maria Aymone, Danilo Pietro Pau

    Published 2024-10-01
    “…This paper proposes a new benchmark specifically designed for in-sensor digital machine learning computing to meet an ultra-low embedded memory requirement. …”
    Get full text
    Article
  3. 1003

    Quantum Vulnerability Analysis to Guide Robust Quantum Computing System Design by Fang Qi, Kaitlin N. Smith, Travis LeCompte, Nian-feng Tzeng, Xu Yuan, Frederic T. Chong, Lu Peng

    Published 2024-01-01
    “…By evaluating the CQV with well-known benchmarks on three 27-qubit quantum computers, the CQV success estimation outperforms the estimated probability of success state-of-the-art prediction technique by achieving on average six times less relative prediction error, with best cases at 30 times, for benchmarks with a real SR rate above 0.1%. …”
    Get full text
    Article
  4. 1004

    Possibilities of liver density estimation according to noncontrast computed tomography by A. P. Gonchar, V. A. Gombolevskij, A. B. Elizarov, N. S. Kulberg, M. M. Suleymanova, T. I. Alekseeva, D. A. Chernyshev, M. Yu. Titov, T. A. Levina, V. Yu. Bosin, S. P. Morozov

    Published 2020-03-01
    “…With allowance made for the widespread prevalence of diffuse liver diseases, non-alcoholic fatty liver disease in particular, there is a need for the most objective evaluation of the state of this organ. One of the most important criteria for this evaluation is to estimate liver tissue density values. …”
    Get full text
    Article
  5. 1005

    Multislice computed tomography urography in the diagnosis of urinary tract diseases by Nikolić Olivera, Stojanović Sanja, Till Viktor, Basta-Nikolić Marijana, Petrović Kosta, Vučaj-Ćirilović Viktorija

    Published 2011-01-01
    “…Background/Aim. Multislice computed tomography (MSCT) has triggered considerable changes in uroradiological imaging. …”
    Get full text
    Article
  6. 1006

    ALGORITHMIZATION OF COMPUTER DESIGNING OF FOUNDRY DETAILS WITH THE HELP OF CAD-SYSTEMS by A. N. Chichko, T. V. Matjushinets, L. V. Markov

    Published 2005-11-01
    “…The mathematical model for generalized evaluation of computer-aided method of the complex detail creation by means of CAD-system is offered. …”
    Get full text
    Article
  7. 1007
  8. 1008

    Examination of the Computed Molecular Properties of Compounds Selected for Clinical Development by James F. Blake

    Published 2003-06-01
    “…We have conducted a systematic evaluation of the calculated molecular properties of compounds in clinical development and have found that the development process selects for compounds that have certain computed physical properties. …”
    Get full text
    Article
  9. 1009

    Realization and discussion of selected artificial intelligence algorithms in computer games by Yurii Tyshchenko

    Published 2025-03-01
    “… The study explores the usage of reinforcement learning algorithms in computer card games, such as Proximal Policy Optimization and Monte Carlo Tree Search. …”
    Get full text
    Article
  10. 1010
  11. 1011
  12. 1012

    From speech signal to syntactic structure: A computational implementation by Tina Bögel, Tianyi Zhao

    Published 2025-01-01
    “…A system evaluation with the German data showed good results for this new combination of automatic speech signal analysis and computational grammars, which takes a significant step towards a linguistically fine-grained computational analysis and hence towards real automatic speech understanding. …”
    Get full text
    Article
  13. 1013

    Bus Admittance Matrix Revisited: Performance Challenges on Modern Computers by Hantao Cui

    Published 2024-01-01
    “…Without using the admittance matrix, nodal power injections and the corresponding sparse Jacobian can be computed by an element-wise method, which consists of a highly regular, vectorized evaluation step and a reduction step. …”
    Get full text
    Article
  14. 1014

    Generalization of Computer Assisted Prosody Training: Quantitative and Qualitative Findings by Debra M. Hardison

    Published 2004-01-01
    “…Two experiments investigated the effectiveness of computer-assisted prosody training, its generalization to novel sentences and segmental accuracy, and the relationship between prosodic and lexical information in long-term memory. …”
    Get full text
    Article
  15. 1015

    A comprehensive survey of robust deep learning in computer vision by Jia Liu, Yaochu Jin

    Published 2023-11-01
    “…Besides, this survey elaborates on the current robustness evaluation approaches, which require further exploration. …”
    Get full text
    Article
  16. 1016

    Dynamic Mixture of Experts for Adaptive Computation in Character-Level Transformers by Zhigao Huang, Musheng Chen, Shiyan Zheng

    Published 2025-06-01
    “…This paper challenges the prevailing assumption that Mixture of Experts (MoE) consistently improves computational efficiency through a systematic evaluation of MoE variants in Transformer models. …”
    Get full text
    Article
  17. 1017

    Damage Behaviour of Quasi-Brittle Composites: Mathematical and Computational Aspects by Jiří Vala, Jiří Tomáš

    Published 2025-04-01
    “…In the present paper, an evaluation of the damage behaviour of quasi-brittle composites exposed to mechanical, thermal, and other loads is studied by means of viscoelastic and/or viscoplastic material models, applying some non-local regularisation techniques to the initiation and development of damages. …”
    Get full text
    Article
  18. 1018

    Single‐Cell Hi‐C Technologies and Computational Data Analysis by Madison A Dautle, Yong Chen

    Published 2025-03-01
    “…This review provides a comprehensive overview, quantitative evaluation of thirteen protocols and practical guidance on computational topics. …”
    Get full text
    Article
  19. 1019

    Computational Analysis and Optimization of Polymer-Based Ankle-Foot Orthoses by Rusul Salah Hadi, Hala Mahmood Kadhim

    Published 2025-01-01
    “…This work aims to offer a computational evaluation of the mechanical and thermal performance of an ankle-foot orthosis (AFO). …”
    Get full text
    Article
  20. 1020