Showing 18,861 - 18,880 results of 26,849 for search 'evaluation computing', query time: 0.18s Refine Results
  1. 18861
  2. 18862

    Multipartite entanglement distribution in a topological photonic network by Juan Zurita, Andrés Agustí Casado, Charles E. Creffield, Gloria Platero

    Published 2025-02-01
    “…In the ongoing effort towards a scalable quantum computer, multiple technologies have been proposed. …”
    Get full text
    Article
  3. 18863

    A Design Approach for Controlled Self-Organization-Based Sensor Networks Focused on Control Timescale by Daichi Kominami, Masayuki Murata

    Published 2013-05-01
    “…Through computer simulations, we show the adaptability and stability of the proposed design approach.…”
    Get full text
    Article
  4. 18864

    SOFTWARE SHELL FOR DEVELOPMENT AND IMPLEMENTATION OF OBJECT RATING ASSESSMENT COEFFICIENT METHODS by Alexander Ivanovich Dolgov

    Published 2013-03-01
    “…The given shell is designed for those users who wish to develop and enrich the computer coefficient techniques by themselves (without professional programmers’ help). …”
    Get full text
    Article
  5. 18865

    New certificateless aggregate signature scheme with universal designated verifier by Zhi-yan XU, Li-bing WU, Li LI, De-biao HE

    Published 2017-11-01
    “…Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks,because they could not only solve the problems of the certificate management and private key escrow,but also realize batch validation and the signer’s privacy protection.A security analysis for a certificateless aggregate signature scheme with universal designated verifier was firstly provided,and two attack methods to demonstrate that their scheme was forgeable was presented.To enhance security,a new certificateless aggregate signature scheme with universal designated verifier was proposed,and then the security of the scheme in the random oracle model was proved.The performance of our proposed scheme was finally evaluated.Compared with the original scheme,the pvoposed scheme fixes the security flaws and the total computational cost is greatly reduced.…”
    Get full text
    Article
  6. 18866

    PROFILE OF NEUROLOGICAL MANIFESTATIONS IN PRIMARY SJOGREN’S SYNDROME by M S Panchovska, J I Slieilanov, R M Sloilov

    Published 2002-06-01
    “…Electromyography, computer tomography, audiometric investigations were realised. …”
    Get full text
    Article
  7. 18867

    Four loop Green’s functions involving the $$n=2$$ n = 2 moment of the Wilson operator by J. A. Gracey

    Published 2025-02-01
    “…Abstract We evaluate the Green’s function for the insertion of the second moment of the twist-2 flavour nonsinglet Wilson operator in a quark 2-point function in all three different single scale external momentum configurations at four loops in the $$\overline{\text{ MS }}$$ MS ¯ scheme and the chiral limit. …”
    Get full text
    Article
  8. 18868

    Theoretical Analysis of the Noise Power Ratio of Nonlinear Power Amplifiers by Rajendra Kumar

    Published 2016-01-01
    “…This paper presents a theoretical analysis and derives the amplifier output noise power spectral density result in a closed form when the input to the amplifier is a band limited Gaussian noise. From the computed power spectral density the NPR is evaluated by a simple subtraction. …”
    Get full text
    Article
  9. 18869

    Design Performance Measurement of Intelligent Garbage Sorting Cart using Neutrosophic Sets and SuperHyperSoft by Yiyue Zhang

    Published 2025-05-01
    “…Two methods are used in this study, such as the CRITIC method to compute the criteria weights and the ARAS method to rank the alternatives. …”
    Get full text
    Article
  10. 18870

    Related-key impossible boomerang cryptanalysis on TWINE by Min XIE, Feng TIAN, Jiaqi LI

    Published 2019-09-01
    “…In order to evaluate the security of the lightweight block cipher TWINE,the method of related-key impossible boomerang cryptanalysis was applied and a related-key impossible boomerang distinguisher consisting of 16-round and 17-round paths was constructed.Based on this new distinguisher,an attack on 23-round TWINE was mounted successfully by concatenating 4-round to the beginning and 2-round for the 17-round path and 3-round for the 16-round path to the end respectively.The attack on 23-round TWINE required data complexity of only 2 <sup>62.05</sup>plaintexts and computational complexity of about 2 <sup>70.49</sup>23-round encryptions.Compared with published cryptanalysis results,the proposed attack has obvious advantages.…”
    Get full text
    Article
  11. 18871

    Address overloading-based packet forwarding verification in SDN by Ping WU, Chaowen CHANG, Zhibin ZUO, Yingying MA

    Published 2022-03-01
    “…Aiming at the problem that the most existing forwarding verification mechanisms in software-defined network (SDN) verified packets hop-by-hop by incorporating new secure communication protocols, which incurred significant computation and communication overhead, an address overloading-based forwarding verification mechanism was proposed.The flow runtime was divided into consecutive random intervals by the ingress switch via overloading address fields of packet, basing on overloading address, packets were forwarded by each subsequent switch, and the controller sampled the packets forwarded by ingress and egress switch in the interval to detect abnormal behavior on the path.Finally, the proposed mechanism and simulation network was implemented and evaluated.Experiments show that the mechanism achieves efficient forwarding and effective anomaly detection with less than 8% of additional forwarding delays.…”
    Get full text
    Article
  12. 18872

    Economic Waves: The Effect of the U.S. Economy on the World Economy by Mario Arturo Ruiz Estrada

    Published 2014-09-01
    “…Using this model, this paper evaluates whether and how an economic recession or financial crisis in the U.S. economy can simultaneously affect the five aforementioned economic regions. …”
    Get full text
    Article
  13. 18873

    Teaching Effectiveness Analysis of Educational Technology in Vocational Colleges: SuperHyperSoft Set Integrated with Decision-Making Approach for Increased Effectiveness by Fangfang Yang

    Published 2025-05-01
    “…Using a multi-criteria decision-making (MCDM) approach, this study computes the criteria weights by the LBWA and the MOORA methodology to rank the alternatives. …”
    Get full text
    Article
  14. 18874

    AS-level model for restraining DoS attacks by Xian-liang JIANG, Guang JIN, Jian-gang YANG, Jia-ming HE

    Published 2013-09-01
    “…Combined with the next generation security architecture,a novel AS-level defense scheme was proposed to restrain DoS attacks in the Internet.And the deficiencies of previous capability schemes were analyzed in detail,especially on requesting/withdrawing authorization of capabilities.The scheme takes account of a congestion feedback mechanism,a combination with multi-level active queue management,and the credit computation.Then a further analysis on the scheme’s effectiveness was presented.Several experiments with NS2 and CAIDA’s topology datasets were performed to evaluate the authorizing time and traffic,the average requesting time and common file transfer time of different schemes.The results show that this scheme can effectively reduce the average requesting time of capabilities,improve common file transfer efficiency,and enhance the feasibility and robustness.…”
    Get full text
    Article
  15. 18875

    Demagnetizer Frequency Converter by G. I. Goulkov, A. A. Migdalionok, Rashid Shaibi

    Published 2009-06-01
    “…Simulation modeling within the system of computer «Mathlab Simulink» modeling has been applied with the purpose to evaluate the algorithm quality. …”
    Get full text
    Article
  16. 18876

    Enhanced Network Traffic Classification Using Bayesian-Optimized Logistic Regression and Random Forest Algorithm by Manisankar Sannigrahi, R. Thandeeswaran

    Published 2025-01-01
    “…Compared to other machine learning algorithms, the proposed models demonstrate superior performance in balancing accuracy, computational efficiency, and detection speed, making them ideal for real-time network security applications. …”
    Get full text
    Article
  17. 18877
  18. 18878
  19. 18879
  20. 18880