Showing 81 - 100 results of 758 for search 'Parallel made', query time: 0.11s Refine Results
  1. 81
  2. 82
  3. 83
  4. 84

    Research Framework and Anticipated Results of Key Technologies for Distributed Certificate-less Network Identity Systems by ZHANG Xiaosong, CAO Sheng, LU Tianbo, YANG Kun, GUI Xun, XIE Guotao, NIU Weina

    Published 2025-05-01
    “…It explored five key research directions: high-performance certificate-less network identity authentication technologies and architectures, certificate-less distributed key management, hardware-enhanced high-parallel distributed terminal access, multi-level parallelized smart contract virtual machines, and large-scale distributed IoT identity authentication applications and validation. …”
    Get full text
    Article
  5. 85

    Kampanye Bahaya Rokok dan Pendekatan Rasa Takut (Fear Appeal) by Eriyanto Eriyanto, Irwa R Zarkasi

    Published 2017-05-01
    “…The result shows that PSA created by the Ministry of Health of RI doesn’t fully contain elements of good persuasive message compared to PSA made by the Ministry of Health of Malaysia.…”
    Get full text
    Article
  6. 86

    ARTIFICIAL INTELLIGENCE AS AN INNOVATIVE TOOL OF CORRUPTION PREVENTION IN JUDICIARY: THE RISKS by Oleksiy Nepsha

    Published 2025-03-01
    “…There has been made an attempt in the article to evaluate and systematize the risks of IT-technologies application and their highest manifestation – artificial intelligence – as an anti-corruption mechanism in the judiciary. …”
    Get full text
    Article
  7. 87

    Trinocular Vision-Driven Robotic Fertilization: Enhanced YOLOv8n for Precision Mulberry Growth Synchronization by Ma Ming, Osama Elsherbiny, Jianmin Gao

    Published 2025-04-01
    “…The system incorporates a parallel robotic arm spraying device and employs trinocular vision to capture image datasets of mulberry tree branches. …”
    Get full text
    Article
  8. 88

    CFD Comparative study of Design and Performance of shell-and-tube Heat Exchangers with different configurations by Heba Abdelhamid, Ayman Bakry, Hagar Alm ElDin Mohamad

    Published 2022-09-01
    “…Each model for heat exchanger has different assumptions for first model one tube & one pass with tube length 3 meter, was made with 2 different cases (each case have the same conditions such as same temperature, same velocity, changing the direction of the flow between parallel and counter flow). …”
    Get full text
    Article
  9. 89
  10. 90

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  11. 91

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  12. 92
  13. 93

    Comparative analysis of adders hardware implementation on FPGA by Nikolay Ivanovich Chervyakov, Pavel Alekseyevich Lyakhov, Maria Vasilevna Valueva, O. V. Krivolapova

    Published 2022-09-01
    “…In this work we considered two types of adders for addition of two binary numbers implementation: carry propagate adders and parallel-prefix adders. In this article simulation on FPGA for both architectures and their comparative analysis is made. …”
    Get full text
    Article
  14. 94
  15. 95
  16. 96

    Generalized fermi derivative on the hypersurfaces by Ayşenur Uçar, Fatma Karakuş

    Published 2022-06-01
    “…Generalizations have been made in Eⁿ.…”
    Get full text
    Article
  17. 97
  18. 98

    Support on four paws—does the integration of a therapy dog reduce anxiety and increase positive affect in spider phobics during in vivo exposure therapy?: study protocol for a para... by Tanja Michael, Moritz Nicolai Braun, Monika Equit, Johanna Lass-Hennemann

    Published 2025-07-01
    “…Any deviations from this study protocol or the preregistrations as well as any adverse events potentially arising in the course of the trial, will be made explicit in the publication of the trial results. …”
    Get full text
    Article
  19. 99

    Processing streams in a monitoring cloud cluster by Alexey N. Nazarov

    Published 2020-01-01
    “…Based on the poly-burst nature of the bit rate model, a model of group content traffic of any sources of different services processed in the cloud cluster was created. The obtained results made it possible to develop mathematical models of parallel DStreams from sources processed in a cloud cluster via Hadoop technology using the micro-batch architecture of the Spark Streaming module. …”
    Get full text
    Article
  20. 100