Showing 7,201 - 7,220 results of 9,922 for search 'open computing', query time: 0.11s Refine Results
  1. 7201
  2. 7202
  3. 7203
  4. 7204
  5. 7205

    In-Silico Exploration of Plant Metabolites as Potential Remedies of Norovirus by Zenifer Alam, Md. Nazmul Islam Bappy, Abida Sultana, Fayeza Sadia Laskar, Kawsar Miah, Kazi Md. Ali Zinnah, Sudeb Saha

    Published 2022-01-01
    “…These discoveries may open the way for the development of effective norovirus therapies and safety measures. …”
    Get full text
    Article
  6. 7206
  7. 7207

    Mutation‐inspired symbolic execution for software testing by Kevin J. Valle‐Gómez, Antonio García‐Domínguez, Pedro Delgado‐Pérez, Inmaculada Medina‐Bulo

    Published 2022-10-01
    “…First, this known result on a set of open source programs is confirmed: DSE by itself is not good at killing mutants, detecting only 59.9% out of all mutants. …”
    Get full text
    Article
  8. 7208
  9. 7209
  10. 7210
  11. 7211

    Technical, forensic and organisational aspects of work with Monero cryptocurrency by V. V. Nosov, O. V. Manzhai, V. O. Kovtun

    Published 2023-09-01
    “…Examples of criminal offences in which Monero is used are presented. The functionality of OpenAlias to facilitate the work with Monero addresses is disclosed. …”
    Get full text
    Article
  12. 7212

    A Comparative Study on Battery Modelling via Specific Hybrid Pulse Power Characterization Testing for Unmanned Aerial Vehicles in Real Flight Conditions by Waiard Saikong, Prasophchok Phumma, Suradet Tantrairatn, Chaiyut Sumpavakup

    Published 2025-01-01
    “…Using the Specific Hybrid Pulse Power Characterization (SHPPC) method, key parameters, including Open Circuit Voltage (OCV), internal resistance (Ri), polarization resistance (R1), and polarization capacitance (C1), were estimated across multiple states of charge (SOC). …”
    Get full text
    Article
  13. 7213

    Robust Radio Frequency Fingerprinting With Signal Denoising and Stacked Multivariate Ensemble Learning for Secure Wireless Communications by Syed Usman Ali Shah, Muhammad Usama Zahid, Syed Abuzar H Shah, Saeed Ur Rehman, Dan Komosny

    Published 2025-01-01
    “…Experimental results on real-world walkie-talkie datasets, as well as two open-source benchmark datasets for cellphones and drones, demonstrate that the proposed method outperforms state-of-the-art deep learning approaches in both accuracy and robustness.…”
    Get full text
    Article
  14. 7214
  15. 7215
  16. 7216

    Smart intrusion detection model to identify unknown attacks for improved road safety and management by Faisal Alshammari, Abdullah Alsaleh

    Published 2025-05-01
    “…ACIDS integrates convolutional neural networks (CNN) for hierarchical feature extraction, the synthetic minority over-sampling technique (SMOTE) to address class imbalance and an open-set classification framework to detect novel attack patterns. …”
    Get full text
    Article
  17. 7217
  18. 7218
  19. 7219
  20. 7220