Search alternatives:
efficient » efficiency (Expand Search)
Showing 2,461 - 2,480 results of 31,781 for search '(difference OR different) efficient', query time: 0.34s Refine Results
  1. 2461

    Efficient Terrain Triangulation and Modification Algorithms for Game Applications by Sundar Raman, Zheng Jianmin

    Published 2008-01-01
    “…The density of triangulation in different regions of a terrain is determined by its flatness, as seen from a height map, and a control map. …”
    Get full text
    Article
  2. 2462

    Biomimetic propulsion system efficiency for unmanned underwater vehicle by Piotr Szymak, Paweł Piskur, Rafał Kot, Krzysztof Naus, Daniel Powarzyński

    Published 2025-04-01
    “…The tests were conducted in a laboratory water tunnel equipped with a direct force-measured sensor and system for Particle Image Velocimetry (PIV) analysis. Different control parameters were tested, and then the generated thrust was compared with electric energy consumption. …”
    Get full text
    Article
  3. 2463

    Methodological aspects of improving the efficiency of workers in the extractive industry by A. V. Vaneev

    Published 2023-06-01
    “…The labor efficiency of workers in the mining industry has different indicators, such as labor productivity, available resources, the degree of automation and other factors. …”
    Get full text
    Article
  4. 2464
  5. 2465

    EE-MAC: Energy Efficient Hybrid MAC for WSN by B. Priya, S. Solai Manohar

    Published 2013-12-01
    “…The performance of EE-MAC is obtained through simulations for various packet sizes, traffic loads, and different scenarios which show significant improvements in packet delivery ratio, energy efficiency, and delay compared to existing protocols.…”
    Get full text
    Article
  6. 2466

    Periodic crack-model of comb transducers: efficiency and optimization by E. DANICKI

    Published 2000-01-01
    “…Leaky interface crack waves are generated by a normal incident shear bulk wave beam or by an equivalent excitation of the comb teeth at the interface. The generation efficiency is analyzed in systems where both the comb and the sample halfspaces are from the same material, steel or aluminium, for different teeth width and period, and for the case of solid contact between the two halfspaces between cracks; the other case of sliding contact is discussed briefly. …”
    Get full text
    Article
  7. 2467

    Architecture and mechanisms for secure and efficient internetworking of heterogeneous network by Hongbin LUO, Shan ZHANG, Zhiyuan WANG

    Published 2022-04-01
    “…An architecture named CoLoR (coupling service location and inter-domain routing) was introduced to securely and efficiently interconnect networks with different architectures (called heterogeneous networks below).First, the fundamental challenges and scientific problems that have to be addressed by CoLoR were raised.Then, the core aspects of CoLoR were described, including how to characterize and represent the cyberphysical system comprised by heterogeneous networks, the network architecture, the basic communication model and how secure internetworking was achieved.After that, results from prototype implementation were presented to demonstrate the feasibility and capability of CoLoR, including defending against attacks and preventing data leakage.Finally, some open issues were outlined for future studies.…”
    Get full text
    Article
  8. 2468

    Quantum Carleman linearization efficiency in nonlinear fluid dynamics by Javier Gonzalez-Conde, Dylan Lewis, Sachin S. Bharadwaj, Mikel Sanz

    Published 2025-06-01
    “…Additionally, we introduce the formalism for vector field simulation in different spatial dimensions, providing the discretization of the operators and the boundary conditions.…”
    Get full text
    Article
  9. 2469

    Evaluation of mainline aircraft center section weight efficiency by A. V. Boldyrev, D. V. Zolotov

    Published 2025-04-01
    “…The sensitivity analysis of the force factor coefficient is performed for different positions of the upper boundary of the design area.…”
    Get full text
    Article
  10. 2470
  11. 2471
  12. 2472
  13. 2473

    Efficient and privacy-preserving online face authentication scheme by Ming LI, Xiaopeng YANG, Hui ZHU, Fengwei WANG, Qi LI

    Published 2020-05-01
    “…In traditional face authentication system,the trait template and authentication request were generally matched over plaintext,which may lead to the leakage of users’ sensitive data.In order to address the above-mentioned problem,based on matrix encryption,an efficient and privacy-preserving online face authentication scheme was proposed.Specifically,the users’ face trait template for register and the authentication request were encrypted before being sent to the online authentication server,and the similarity computation between the encrypted face trait template and authentication request was computed by the online authentication server over ciphertexts,which guaranteed the security of users’ sensitive data without affecting the accuracy of face authentication.Security analysis shows that the proposed scheme can achieve multiple security levels according to different security parameters.Moreover,performance evaluation shows that the proposed scheme has low computation cost and communication overhead.Experiments results demonstrate the high efficiency of the proposed scheme,which can be implemented in the real environment effectively.…”
    Get full text
    Article
  14. 2474

    Survey of research on efficient secure inference for deep learning by HU Peng, SUN Lei, HU Cuiyun, GUO Song, WANG Jingwen, WANG Zhihong, YAO Jingyi

    Published 2025-05-01
    “…For secure protocols, the performance and efficiency of different cryptographic primitive solutions were analyzed by distinguishing between linear and nonlinear operations. …”
    Get full text
    Article
  15. 2475
  16. 2476

    Elaborating Multifactor System of Assessing Efficiency of Development Project by G. S. Volyanyuk

    Published 2025-03-01
    “…The article studies specific features of assessing the development project efficiency by using technologies of information modeling (TIM) in view of principle stakeholders. …”
    Get full text
    Article
  17. 2477

    Efficient and privacy-preserving online face authentication scheme by Ming LI, Xiaopeng YANG, Hui ZHU, Fengwei WANG, Qi LI

    Published 2020-05-01
    “…In traditional face authentication system,the trait template and authentication request were generally matched over plaintext,which may lead to the leakage of users’ sensitive data.In order to address the above-mentioned problem,based on matrix encryption,an efficient and privacy-preserving online face authentication scheme was proposed.Specifically,the users’ face trait template for register and the authentication request were encrypted before being sent to the online authentication server,and the similarity computation between the encrypted face trait template and authentication request was computed by the online authentication server over ciphertexts,which guaranteed the security of users’ sensitive data without affecting the accuracy of face authentication.Security analysis shows that the proposed scheme can achieve multiple security levels according to different security parameters.Moreover,performance evaluation shows that the proposed scheme has low computation cost and communication overhead.Experiments results demonstrate the high efficiency of the proposed scheme,which can be implemented in the real environment effectively.…”
    Get full text
    Article
  18. 2478

    METHOD OF EVALUATION OF THE EFFICIENCY OF TELECOMMUNICATION NETWORK MANAGEMENT SYSTEM by Eduard N. Bovda, Oksana G. Gavriluk, Оleksandr M. Guk

    Published 2018-08-01
    “…Indicators of the effectiveness of routing methods are considered as three groups of indicators, which are divided into global, local and operational financial. The efficiency of routing methods (by parameters of productivity, packet delay time) is given when changing the topology and different routing methods for fixed input load and network dimension. …”
    Get full text
    Article
  19. 2479

    An Efficient Heuristic for a Real-Life OAS Problem by Marcin Anholcer, Andrzej Żak

    Published 2025-01-01
    “…The considered problem is thus a variant of the order acceptance and scheduling (OAS) problem, which can be solved using known heuristics. Our approach is different because we study the mechanism by which setup times arise, unlike other approaches where setup times are treated as parts of the instance. …”
    Get full text
    Article
  20. 2480

    Evaluation of Average Quantum Efficiency of Industrial Digital Camera by Zhuochen Deng, Lingfeng Chen, Xuemeng Wei, Xusheng Zhang

    Published 2025-02-01
    “…Systematic experiments and data analyses were performed on two industrial digital cameras under white light sources with different spectral distributions. The results suggest that AQE testing offers a practical and efficient means to evaluate camera performance under broadband illumination, complementing existing monochromatic QE measurement methods.…”
    Get full text
    Article