Showing 501 - 520 results of 806 for search '"performance evaluation"', query time: 0.08s Refine Results
  1. 501

    Cost-Effectiveness of Life Cycle Cost Theory-Based Large Medical Equipment by Xiaoyi Chang, Yongqiang Zhao, Yuebin Li, Ting Bai, Jungang Gao, Chao Zhao

    Published 2022-01-01
    “…The fundamental point of the maintenance and management of large medical equipment is to strengthen the performance evaluation of medical engineering technicians.…”
    Get full text
    Article
  2. 502

    End-to-end data collection strategy using mobile sink in wireless sensor networks by Xiaofeng Wu, Zhuangqi Chen, Yi Zhong, Hui Zhu, Pingjian Zhang

    Published 2022-03-01
    “…The proposed algorithm first constructs a data-forwarding tree, and then heuristically selects collection points and plans a touring path at the same time. The performance evaluation shows that the end-to-end strategy can improve the network lifetime of wireless sensor network compared to other approaches, especially in the unbalanced distribution scenario of sensors. …”
    Get full text
    Article
  3. 503

    Functionality of the Search and Rescue Transponder (SART) in Maritime Search and Rescue Actions by Marzena Malyszko, Miroslaw Wielgosz, Brunon Rzepka

    Published 2025-01-01
    “…Four scenarios were developed, considering different distances and radar settings. Performance evaluation indicators were also developed. The results are presented both graphically and numerically. …”
    Get full text
    Article
  4. 504

    Computer-Aided Modelling and Analysis of PV Systems: A Comparative Study by Charalambos Koukouvaos, Dionisis Kandris, Maria Samarakou

    Published 2014-01-01
    “…The utilization of this kind of software tools may be extremely helpful to the successful performance evaluation of energy systems with maximum accuracy and minimum cost in time and effort. …”
    Get full text
    Article
  5. 505

    The efficiency of galvanic wastewater treatment facility 'Frad' in Aleksinac by Veličković Jasmina, Arsić Nebojša B., Stošić Ljiljana

    Published 2020-01-01
    “…Performance of this plant is an essential parameter to be monitored as the treated effluent is discharged into the Moravica River. The Performance Evaluation will also help for the better understanding of design and operating difficulties (aeration, blowers, etc.) in Sewage Treatment Plant. …”
    Get full text
    Article
  6. 506

    A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack by Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar

    Published 2016-01-01
    “…The focus of this paper is to provide a new robust, efficient, and scalable hierarchical overlay architecture that will counter these attacks by providing a structure that can accommodate the fleeting behaviour of nodes without causing much structural inconsistencies. The performance evaluation showed that the proposed architecture has more failure resilience and self-organization as compared to chord based architecture. …”
    Get full text
    Article
  7. 507

    Optimal metrics for evaluating reusability in web applications by Abbas ali Rezaee, Mohammad Hadi Zahedi

    Published 2022-03-01
    “…In other words, based on the criteria for optimal selection criteria, minimum set of criteria that can be fully cover all aspects of web-based software reusability have been recognized and proposed. The performance evaluation of proposed optimal set of selected criteria with content management system, reusability evaluation for every software module could well be done by the developers and the testing system.…”
    Get full text
    Article
  8. 508

    Network Packet Sniffer: A Case Study of Kabale University. by Mugarurebye, Shawn, Gumoshabe, Rebecca

    Published 2024
    “…As a fundamental procedure of network security measurement, network data collection executes real-time network monitoring, supports network performance evaluation, assists network billing, and helps traffic testing and filtering. …”
    Get full text
    Thesis
  9. 509

    Many-objective Optimization Design of a 2PRU-PRUR Parallel Mechanism Without Parasitic Motion by Che Linxian, Peng Siyang, Huang Xin, He Bing, He Xiaohui, Ao Jin

    Published 2024-09-01
    “…Based on the performance evaluation and workspace analysis, a constrained many-objective optimization model was constructed to formulate the design problem of dimensional parameters, and multi-objective evolutionary algorithms were employed to solve this problem. …”
    Get full text
    Article
  10. 510

    Maintaining Web Cache Coherency

    Published 2000-01-01
    “…The ultimate goal is to study the cache behavior under several conditions, which will cover some of the factors that play an important role in the Web cache performance evaluation and quantify their impact on the simulation accuracy. …”
    Get full text
    Article
  11. 511

    Laboratory Study on Properties of Diatomite and Basalt Fiber Compound Modified Asphalt Mastic by Yongchun Cheng, Chunfeng Zhu, Guojin Tan, Zehua Lv, Jinsheng Yang, Jiansheng Ma

    Published 2017-01-01
    “…Softening point, cone penetration, viscosity, and DSR tests were conducted, for the high temperature performance evaluation of DBFCMAM, whereas force ductility and BBR tests were used in the low temperature performance study of the DBFCMAM. …”
    Get full text
    Article
  12. 512

    EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications by Rong Jiang, Chengzhe Lai, Jun Luo, Xiaoping Wang, Hong Wang

    Published 2013-11-01
    “…Furthermore, formal verification implemented in AVISPA proves that the proposed protocol is secure against various malicious attacks. Moreover, performance evaluation demonstrates its efficiency in terms of the signaling overhead, the bandwidth consumption, and the transmission cost.…”
    Get full text
    Article
  13. 513

    APPROACHES TO ASSESSING THE EFFECTIVENESS AND WAYS TO ENCOURAGE THE PUBLICATION ACTIVITY IN THE LARGE MEDICAL SCHOOL by Vladimir N. Nikolenko, Anatoliy I. Vyalkov, Svetlana A. Martynchik, Ekaterina A. Glukhova

    Published 2016-12-01
    “…We apply anintegrated approach to performance evaluation based on expert evaluation of the importance of research and bibliometric analysis in the citation index. …”
    Get full text
    Article
  14. 514

    Safety Autonomous Platform for Data-Driven Risk Management Based on an On-Site AI Engine in the Electric Power Industry by Dongyeop Lee, Daesik Lim, Joonwon Lee

    Published 2025-01-01
    “…We practically implemented the proposed SAP architecture using the Hadoop ecosystem and verified its feasibility through a performance evaluation of the on-site AI engine and real-time operation of risk assessment and alarm notification for data-driven risk management.…”
    Get full text
    Article
  15. 515

    Gauge Deterioration Prediction of Urban Rail Transit Lines Based on CEEMD and SVR by JIA Qingtian, LIN Haijian, JIN Zhong

    Published 2025-01-01
    “…[Result & Conclusion] Compared with the PSO-SVR model and the ARIMA (autoregressive integrated moving average) model, the CEEMD-PSO-SVR prediction model has advantages in three performance evaluation indicators, namely root mean square error, mean absolute error, and absolute value of mean relative error.…”
    Get full text
    Article
  16. 516

    The Utility of LiCSBAS to Carry out InSAR Time Series to Analyze Surface Deformation: An Overview by Zuhour Katia Thamer, Ahmed H. Hamdullah, Mamoun Ubaid Mohammed, Md Tanvir Sowgath

    Published 2023-12-01
    “…In this study, studies were reviewed in which performance evaluation and comparison of LiCSBAS with other technologies were discussed as well as future developments and challenges in this field. …”
    Get full text
    Article
  17. 517

    Low Carbon Economy Assessment in China Using the Super-SBM Model by Yanhong Ding, Yu Han

    Published 2022-01-01
    “…This review proposes a performance evaluation system of low-carbon economic development based on multiobjective analysis in low-carbon environment. …”
    Get full text
    Article
  18. 518

    Optimizing Aspect-Based Sentiment Analysis Using BERT for Comprehensive Analysis of Indonesian Student Feedback by Ahmad Jazuli, Widowati, Retno Kusumaningrum

    Published 2024-12-01
    “…The research uses 10,000 student reviews from Indonesian universities, processed through data labeling, text preprocessing, and splitting, followed by model training and performance evaluation. The model demonstrated superior performance with an aspect extraction accuracy of 0.973, an F1-score of 0.952, a sentiment classification accuracy of 0.979, and an F1-score of 0.974. …”
    Get full text
    Article
  19. 519

    Scheme on user identity attribute preserving based on ring signcryption for cloud computing by Shuan-bao LI, Jian-ming FU, Huan-guo ZHANG, Jing CHEN, Jing WANG, Bi-jun REN

    Published 2014-09-01
    “…Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which discusses user key parting management with decentralization.Users can choose some seeds for generation and storage of key,then integrated user key cannot be acquired by registrar,based on this payload on certifica-tion management is reduced.In addition,access-centric blindness ring signcryption verification for identity attribute is designed,which constitutes ring of users and CSP,combined with own attribute users can accomplish ring-oriented sub-linear blindness signcryption and non-interactive public ciphertext verifiability for messages so that integrity and confidentiality of identity attribute can be protected avoiding identity attribute leakage in collusion of multi-CSP.At last,strong blindness and unforgeability of ciphertext and attribute is proved in proposed model,three private key components can be generated by users and identity forgeability of ring member can be prevented successfully on the condition of DBDH difficult assumption and adaptive chosen-ciphertex tattacking.Effectiveness of proposed mechanism is verified via performance evaluation of blindness ring signcryption algorithm based on comprehensive payload in identity attribute protection,and optimization is confirmed compared with similar algorithms.…”
    Get full text
    Article
  20. 520

    Comparison of Performance Measurements of Photovoltaic Modules during Winter Months in Taxila, Pakistan by Muhammad Anser Bashir, Hafiz Muhammad Ali, Shahid Khalil, Muzaffar Ali, Aysha Maryam Siddiqui

    Published 2014-01-01
    “…This paper presents the comparative performance evaluation of three commercially available photovoltaic modules (monocrystalline, polycrystalline, and single junction amorphous silicon) in Taxila, Pakistan. …”
    Get full text
    Article