-
501
Cost-Effectiveness of Life Cycle Cost Theory-Based Large Medical Equipment
Published 2022-01-01“…The fundamental point of the maintenance and management of large medical equipment is to strengthen the performance evaluation of medical engineering technicians.…”
Get full text
Article -
502
End-to-end data collection strategy using mobile sink in wireless sensor networks
Published 2022-03-01“…The proposed algorithm first constructs a data-forwarding tree, and then heuristically selects collection points and plans a touring path at the same time. The performance evaluation shows that the end-to-end strategy can improve the network lifetime of wireless sensor network compared to other approaches, especially in the unbalanced distribution scenario of sensors. …”
Get full text
Article -
503
Functionality of the Search and Rescue Transponder (SART) in Maritime Search and Rescue Actions
Published 2025-01-01“…Four scenarios were developed, considering different distances and radar settings. Performance evaluation indicators were also developed. The results are presented both graphically and numerically. …”
Get full text
Article -
504
Computer-Aided Modelling and Analysis of PV Systems: A Comparative Study
Published 2014-01-01“…The utilization of this kind of software tools may be extremely helpful to the successful performance evaluation of energy systems with maximum accuracy and minimum cost in time and effort. …”
Get full text
Article -
505
The efficiency of galvanic wastewater treatment facility 'Frad' in Aleksinac
Published 2020-01-01“…Performance of this plant is an essential parameter to be monitored as the treated effluent is discharged into the Moravica River. The Performance Evaluation will also help for the better understanding of design and operating difficulties (aeration, blowers, etc.) in Sewage Treatment Plant. …”
Get full text
Article -
506
A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack
Published 2016-01-01“…The focus of this paper is to provide a new robust, efficient, and scalable hierarchical overlay architecture that will counter these attacks by providing a structure that can accommodate the fleeting behaviour of nodes without causing much structural inconsistencies. The performance evaluation showed that the proposed architecture has more failure resilience and self-organization as compared to chord based architecture. …”
Get full text
Article -
507
Optimal metrics for evaluating reusability in web applications
Published 2022-03-01“…In other words, based on the criteria for optimal selection criteria, minimum set of criteria that can be fully cover all aspects of web-based software reusability have been recognized and proposed. The performance evaluation of proposed optimal set of selected criteria with content management system, reusability evaluation for every software module could well be done by the developers and the testing system.…”
Get full text
Article -
508
Network Packet Sniffer: A Case Study of Kabale University.
Published 2024“…As a fundamental procedure of network security measurement, network data collection executes real-time network monitoring, supports network performance evaluation, assists network billing, and helps traffic testing and filtering. …”
Get full text
Thesis -
509
Many-objective Optimization Design of a 2PRU-PRUR Parallel Mechanism Without Parasitic Motion
Published 2024-09-01“…Based on the performance evaluation and workspace analysis, a constrained many-objective optimization model was constructed to formulate the design problem of dimensional parameters, and multi-objective evolutionary algorithms were employed to solve this problem. …”
Get full text
Article -
510
Maintaining Web Cache Coherency
Published 2000-01-01“…The ultimate goal is to study the cache behavior under several conditions, which will cover some of the factors that play an important role in the Web cache performance evaluation and quantify their impact on the simulation accuracy. …”
Get full text
Article -
511
Laboratory Study on Properties of Diatomite and Basalt Fiber Compound Modified Asphalt Mastic
Published 2017-01-01“…Softening point, cone penetration, viscosity, and DSR tests were conducted, for the high temperature performance evaluation of DBFCMAM, whereas force ductility and BBR tests were used in the low temperature performance study of the DBFCMAM. …”
Get full text
Article -
512
EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications
Published 2013-11-01“…Furthermore, formal verification implemented in AVISPA proves that the proposed protocol is secure against various malicious attacks. Moreover, performance evaluation demonstrates its efficiency in terms of the signaling overhead, the bandwidth consumption, and the transmission cost.…”
Get full text
Article -
513
APPROACHES TO ASSESSING THE EFFECTIVENESS AND WAYS TO ENCOURAGE THE PUBLICATION ACTIVITY IN THE LARGE MEDICAL SCHOOL
Published 2016-12-01“…We apply anintegrated approach to performance evaluation based on expert evaluation of the importance of research and bibliometric analysis in the citation index. …”
Get full text
Article -
514
Safety Autonomous Platform for Data-Driven Risk Management Based on an On-Site AI Engine in the Electric Power Industry
Published 2025-01-01“…We practically implemented the proposed SAP architecture using the Hadoop ecosystem and verified its feasibility through a performance evaluation of the on-site AI engine and real-time operation of risk assessment and alarm notification for data-driven risk management.…”
Get full text
Article -
515
Gauge Deterioration Prediction of Urban Rail Transit Lines Based on CEEMD and SVR
Published 2025-01-01“…[Result & Conclusion] Compared with the PSO-SVR model and the ARIMA (autoregressive integrated moving average) model, the CEEMD-PSO-SVR prediction model has advantages in three performance evaluation indicators, namely root mean square error, mean absolute error, and absolute value of mean relative error.…”
Get full text
Article -
516
The Utility of LiCSBAS to Carry out InSAR Time Series to Analyze Surface Deformation: An Overview
Published 2023-12-01“…In this study, studies were reviewed in which performance evaluation and comparison of LiCSBAS with other technologies were discussed as well as future developments and challenges in this field. …”
Get full text
Article -
517
Low Carbon Economy Assessment in China Using the Super-SBM Model
Published 2022-01-01“…This review proposes a performance evaluation system of low-carbon economic development based on multiobjective analysis in low-carbon environment. …”
Get full text
Article -
518
Optimizing Aspect-Based Sentiment Analysis Using BERT for Comprehensive Analysis of Indonesian Student Feedback
Published 2024-12-01“…The research uses 10,000 student reviews from Indonesian universities, processed through data labeling, text preprocessing, and splitting, followed by model training and performance evaluation. The model demonstrated superior performance with an aspect extraction accuracy of 0.973, an F1-score of 0.952, a sentiment classification accuracy of 0.979, and an F1-score of 0.974. …”
Get full text
Article -
519
Scheme on user identity attribute preserving based on ring signcryption for cloud computing
Published 2014-09-01“…Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which discusses user key parting management with decentralization.Users can choose some seeds for generation and storage of key,then integrated user key cannot be acquired by registrar,based on this payload on certifica-tion management is reduced.In addition,access-centric blindness ring signcryption verification for identity attribute is designed,which constitutes ring of users and CSP,combined with own attribute users can accomplish ring-oriented sub-linear blindness signcryption and non-interactive public ciphertext verifiability for messages so that integrity and confidentiality of identity attribute can be protected avoiding identity attribute leakage in collusion of multi-CSP.At last,strong blindness and unforgeability of ciphertext and attribute is proved in proposed model,three private key components can be generated by users and identity forgeability of ring member can be prevented successfully on the condition of DBDH difficult assumption and adaptive chosen-ciphertex tattacking.Effectiveness of proposed mechanism is verified via performance evaluation of blindness ring signcryption algorithm based on comprehensive payload in identity attribute protection,and optimization is confirmed compared with similar algorithms.…”
Get full text
Article -
520
Comparison of Performance Measurements of Photovoltaic Modules during Winter Months in Taxila, Pakistan
Published 2014-01-01“…This paper presents the comparative performance evaluation of three commercially available photovoltaic modules (monocrystalline, polycrystalline, and single junction amorphous silicon) in Taxila, Pakistan. …”
Get full text
Article