Showing 17,221 - 17,240 results of 26,849 for search 'evaluation computing', query time: 0.24s Refine Results
  1. 17221

    并联式HEV机电耦合方案对比研究 by 赵克刚, 罗玉涛

    Published 2007-01-01
    “…For fulfilling actual requirements of developing Parallel hybrid electric vehicles (PHEVs), mathematical model of powertrain is designed and the powertrain is simulated by computer in order to evaluate vehicle performance. …”
    Get full text
    Article
  2. 17222

    Une réalisation de l'apprentissage partagé dans un environnement multimédia by Colette Mrowa-Hopkins

    Published 2000-12-01
    “…It is anticipated that computer-mediated interaction shares with a traditional face-to-face contact many of the same interactional features which are believed to make oral negotiation beneficial to learning. …”
    Get full text
    Article
  3. 17223

    Localizing Adversarial Attacks To Produces More Imperceptible Noise by Pavan Reddy, Aditya Sanjay Gujral

    Published 2025-05-01
    “…This study systematically evaluates localized adversarial attacks across widely-used methods, including FGSM, PGD, and C&W, to quantify their effectiveness, imperceptibility, and computational efficiency. …”
    Get full text
    Article
  4. 17224

    Crypto-coding technique based on polar code and secret key generated from wireless channel characteristics for wireless communication systems. by Dinh Van Linh, Vu Van Yem, Hoang Thi Phuong Thao

    Published 2025-01-01
    “…A simulation with different key lengths and code lengths is carried out in Additive white Gaussian noise (AWGN) that helps us to evaluate this technique by the error correction and security performance, computational complexity. …”
    Get full text
    Article
  5. 17225

    The sky remembers everything: Celestial amplitude, shadow and OPE in quadratic EFT of gravity by Arpan Bhattacharyya, Saptaswa Ghosh, Sounak Pal

    Published 2025-08-01
    “…In this paper, we compute the celestial amplitude arising from higher curvature corrections to Einstein gravity, incorporating phase dressing. …”
    Get full text
    Article
  6. 17226

    Exploiting chaotic dynamics as deep neural networks by Shuhong Liu, Nozomi Akashi, Qingyao Huang, Yasuo Kuniyoshi, Kohei Nakajima

    Published 2025-07-01
    “…These characteristics suggest a depth of expressivity that underscores their potential for advanced computational applications. However, strategies to effectively exploit chaotic dynamics for information processing have largely remained elusive. …”
    Get full text
    Article
  7. 17227

    A Scalable Hybrid Autoencoder–Extreme Learning Machine Framework for Adaptive Intrusion Detection in High-Dimensional Networks by Anubhav Kumar, Rajamani Radhakrishnan, Mani Sumithra, Prabu Kaliyaperumal, Balamurugan Balusamy, Francesco Benedetto

    Published 2025-05-01
    “…Additionally, the framework exhibits strong adaptability to emerging threats and reduced computational overhead, making it a practical solution for real-time, scalable IDS in next-generation network infrastructures.…”
    Get full text
    Article
  8. 17228
  9. 17229

    A Synergistic Approach to Colon Cancer Detection: Leveraging EfficientNet and NSGA-II for Enhanced Diagnostic Performance by Noushin Saba, Afia Zafar, Mohsin Suleman, Kainat Zafar, Shahneer Zafar, Adil Ali Saleem, Hafeez Ur Rehman Siddiqui, Muhammad Iqbal, Syed Sajid Ullah

    Published 2024-01-01
    “…This hybrid approach significantly enhances diagnostic performance while reducing computational complexity. The model was evaluated using five diverse datasets: Colon Cancer Histopathological Images, Kvasir, Kvasir-SEG, Hyper-Kvasir, and Endotect. …”
    Get full text
    Article
  10. 17230
  11. 17231
  12. 17232
  13. 17233
  14. 17234
  15. 17235

    A Hybrid Approach to Call Admission Control in 5G Networks by Mohammed Al-Maitah, Olena O. Semenova, Andriy O. Semenov, Pavel I. Kulakov, Volodymyr Yu. Kucheruk

    Published 2018-01-01
    “…Performance of the proposed admission control is evaluated through computer simulation.…”
    Get full text
    Article
  16. 17236

    Impact of data bias on machine learning for crystal compound synthesizability predictions by Ali Davariashtiyani, Busheng Wang, Samad Hajinazar, Eva Zurek, Sara Kadkhodaei

    Published 2024-01-01
    “…We use two data sets for illustration: a mixed-source data set that integrates experimental and computational crystal samples and a single-source data set consisting of data exclusively from one computational database. …”
    Get full text
    Article
  17. 17237

    Bayesian inference and impact of parameter prior specification in flexible multilevel nonlinear models in the context of infectious disease modeling by Olaiya Mathilde Adéoti, Aliou Diop, Romain Glèlè Kakaï

    Published 2025-03-01
    “…A simulation study was conducted to evaluate the impact of modifying prior assumptions on posterior estimates and their subsequent effects on the interpretations. …”
    Get full text
    Article
  18. 17238

    Low-Carbon Transport for Prefabricated Buildings: Optimizing Capacitated Truck–Trailer Routing Problem with Time Windows by Jiajie Zhou, Qiang Du, Qian Chen, Zhongnan Ye, Libiao Bai, Yi Li

    Published 2025-04-01
    “…The efficiency and robustness of the methodology are validated through two computational experiments. The results indicate that the DASA-TS consistently demonstrates excellent performance across all evaluations, with significant reductions in both transportation costs and carbon emissions costs for prefabricated components, particularly in large-scale computational instances. …”
    Get full text
    Article
  19. 17239

    Modelling of a wave energy converter array with non‐linear power take‐off using a mixed time‐domain/frequency‐domain method by Y. Wei, A. Bechlenberg, B. Jayawardhana, A. I. Vakis

    Published 2021-10-01
    “…It is shown that the proposed model can significantly reduce the computational cost with an acceptable accuracy penalty.…”
    Get full text
    Article
  20. 17240

    Parameter Estimation of the Lomax Lifetime Distribution Based on Middle-Censored Data: Methodology, Applications, and Comparative Analysis by Peiyao Ren, Wenhao Gui, Shan Liang

    Published 2025-04-01
    “…The expectation–maximization algorithm is employed to compute the maximum likelihood estimates of the two unknown parameters of the Lomax distribution. …”
    Get full text
    Article