Showing 14,381 - 14,400 results of 26,849 for search 'evaluation computing', query time: 0.30s Refine Results
  1. 14381

    ML-Based Control Strategy for PHEV Under Predictive Vehicle Usage Behaviour by Aleksandr Doikin, Aleksandr Korsunovs, Felician Campean, Oscar García-Afonso, Enrico Agostinelli

    Published 2025-02-01
    “…The broader importance of this study is that it demonstrates the great potential of using predictive insights from computation-efficient and robust ML to learn vehicle usage patterns to optimize the control strategies without reliance on uncertain external inputs.…”
    Get full text
    Article
  2. 14382

    Elastostatic analysis of tapered FGM beams with spatially varying material properties by Justín Murín, Stephan Kugler, Juraj Paulech, Juraj Hrabovský, Vladimír Kutiš, Herbert Mang, Mehdi Aminbaghai

    Published 2025-07-01
    “…The accuracy of the presented method is excellent, and the computational effort is very small compared to other approaches.…”
    Get full text
    Article
  3. 14383

    HCAP: Hybrid cyber attack prediction model for securing healthcare applications. by Mohanad Faeq Ali, Mohammed Shakir Mohmood, Ban Salman Shukur, Rex Bacarra, Jamil Abedalrahim Jamil Alsayaydeh, Masrullizam Mat Ibrahim, Safarudin Gazali Herawan

    Published 2025-01-01
    “…The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. The results demonstrated that the proposed HCAP model achieved 98% accuracy in detecting cyberattacks and outperformed existing models, reducing the false positive rate by 25%. …”
    Get full text
    Article
  4. 14384
  5. 14385

    Robustness of topological persistence in knowledge distillation for wearable sensor data by Eun Som Jeon, Hongjun Choi, Ankita Shukla, Yuan Wang, Matthew P. Buman, Hyunglae Lee, Pavan Turaga

    Published 2024-12-01
    “…However, there are difficulties in leveraging topological features in machine learning and wearable sensors because of the large time consumption and computational resources required to extract the features. …”
    Get full text
    Article
  6. 14386

    Molecular Docking/ADME-TOX-Based Analysis for New Anti-Colorectal Cancer Through Peroxiredoxin 1 Inhibition by Imane Bensahbane, Nadjib Melkemi, Ismail Daoud, Faiza Asli

    Published 2024-11-01
    “…Moreover, an extensive evaluation of ADME-TOX was performed to predict the pharmacokinetic, pharmacodynamic, and toxicological properties of the compounds studied. …”
    Get full text
    Article
  7. 14387
  8. 14388

    Very-Large-Scale Integration-Friendly Method for Vital Activity Detection with Frequency-Modulated Continuous Wave Radars by Krzysztof Ślot, Piotr Łuczak, Paweł Kapusta, Sławomir Hausman, Arto Rantala, Jacek Flak

    Published 2025-03-01
    “…A simple algorithm for respiratory activity detection in data produced by Frequency-Modulated Continuous-Wave (FMCW) radars is presented in this paper. The proposed computational architecture can be directly mapped onto custom digital–analog VLSI hardware, which is a unique approach in research on intelligent FMCW sensor development, offering a potential energy-efficient data analysis solution for target applications, such as preventing human trafficking or providing life-sign detection under limited visibility. …”
    Get full text
    Article
  9. 14389

    Secret Key Generation Driven by Attention-Based Convolutional Autoencoder and Quantile Quantization for IoT Security in 5G and Beyond by Anas Alashqar, Ehsan Olyaei Torshizi, Raed Mesleh, Werner Henkel

    Published 2025-01-01
    “…To facilitate comprehensive performance evaluation, a wiretap channel dataset is generated in accordance with 5G standards, encompassing diverse propagation conditions and including both legitimate users and an eavesdropper. …”
    Get full text
    Article
  10. 14390
  11. 14391
  12. 14392
  13. 14393
  14. 14394
  15. 14395
  16. 14396

    PSL-IoD: PUF-Based Secure Last-Mile Drone Delivery in Supply Chain Management by Mohammad D. Alahmadi, Ahmed S. Alzahrani, Azeem Irshad, Shehzad Ashraf Chaudhry

    Published 2025-06-01
    “…The PSL-IoD supports 26.71% of enhanced security traits compared to other comparative studies. The performance evaluation metrics exhibit convincing findings in terms of efficient computation and communication along with enhanced security features, making it viable for practical implementations.…”
    Get full text
    Article
  17. 14397
  18. 14398
  19. 14399
  20. 14400