Showing 17,581 - 17,600 results of 26,849 for search 'evaluation computing', query time: 0.29s Refine Results
  1. 17581

    Propagation of Blood Function Errors to the Estimates of Kinetic Parameters with Dynamic PET by Yafang Cheng, İmam Şamil Yetik

    Published 2011-01-01
    “…Computer simulations show that analytical expressions we derive are sufficiently close to results obtained from numerical methods. …”
    Get full text
    Article
  2. 17582

    Aeroengine Remaining Life Prediction Using Feature Selection and Improved SE Blocks by Hairui Wang, Shijie Xu, Guifu Zhu, Ya Li

    Published 2024-01-01
    “…Currently, filtering useful sensor data and removing useless data is challenging in predicting the remaining useful life (RUL) of an aeroengine using deep learning. To reduce computational costs and improve prediction performance, we use random forest to evaluate the feature importance of sensor data. …”
    Get full text
    Article
  3. 17583

    Design of Simulation Program for Analysis of Shortest Path Algorithms in Grid-Based Path Planning by İbrahim Şanlialp, İbrahim Yandı

    Published 2025-03-01
    “…The performance of the algorithms is compared in terms of computation time, number of cells visited, and transition cost. …”
    Get full text
    Article
  4. 17584
  5. 17585
  6. 17586

    Deep learning-based debris flow hazard detection and recognition system: a case study by Fei Wu, Jianlin Zhang, Dunlong Liu, Andreas Maier, Vincent Christlein

    Published 2025-02-01
    “…All the networks are optimized and evaluated on a newly annotated image dataset called Debrisflow23. …”
    Get full text
    Article
  7. 17587
  8. 17588
  9. 17589

    High Throughput 512Mbps True Random Number Generation Using Uncertainty in Mobile Communication Bands by Farid Alidoust Aghdam, Mohammad Erfanimehr, Hodjat Ahmadi, Armin Zarghami, Seyed Ahmad Madani, Ali Rostami

    Published 2024-01-01
    “…Due to the high speed of generating random numbers, this optimal and efficient TRNG system can have broad applications in cryptography, statistical analysis, and computational simulations.…”
    Get full text
    Article
  10. 17590
  11. 17591
  12. 17592
  13. 17593
  14. 17594

    An optimize canny algorithm with traditional machine learning for edge detection enhancement by Russel Lafta, Zainab Sultani

    Published 2025-04-01
    “…The performance of the improved algorithm was evaluated using 50 images from the Berkeley Computer Vision dataset. …”
    Get full text
    Article
  15. 17595
  16. 17596
  17. 17597

    An Efficient Authentication and Key Agreement Scheme for the Internet of Underwater Things (IoUT) Environment by Abdullah M. Almuhaideb, Dania M. Al-Khulaifi

    Published 2024-01-01
    “…The scheme’s performance was evaluated using Burrows-Abadi-Needham (BAN) logic and the Automated Validation of Internet Security Protocols Applications (AVISPA) simulation. …”
    Get full text
    Article
  18. 17598
  19. 17599

    Finding Friendly Neighborhood: Optimal D2D Relaying in mmWave IoT Networks by J. Vamshi Vijay Krishna, V. Mahendran, Venkataramana Badarla

    Published 2025-01-01
    “…The optimality of the proposed solutions is shown analytically, and their performance concerning the state of the art is evaluated using extensive simulation.…”
    Get full text
    Article
  20. 17600

    A Novel Transformer-Based Approach for Adult’s Facial Emotion Recognition by Uzma Nawaz, Zubair Saeed, Kamran Atif

    Published 2025-01-01
    “…The model is evaluated on five widely used datasets: FER2013, CK+, AffectNet, RAF-DB, and AFEW. …”
    Get full text
    Article