Search alternatives:
efficient » efficiency (Expand Search)
Showing 301 - 320 results of 1,416 for search 'Spreading efficient', query time: 0.09s Refine Results
  1. 301
  2. 302

    Small but Mighty: Nanobodies in the Fight Against Infectious Diseases by Wenning Jiang, Chundong Huang, Serge Muyldermans, Lingyun Jia

    Published 2025-04-01
    “…Infectious diseases, caused by pathogenic microorganisms and capable of spreading, pose a significant threat to global public health. …”
    Get full text
    Article
  3. 303

    Distinguishing Human From Machine: A Review of Advances and Challenges in AI-Generated Text Detection by Serena Fariello, Giuseppe Fenza, Flavia Forte, Mariacristina Gallo, Martina Marotta

    Published 2025-06-01
    “…The rise of Large Language Models (LLMs) has dramatically altered the generation and spreading of textual content. This advancement offers benefits in various domains, including medicine, education, law, coding, and journalism, but also has negative implications, mainly related to ethical concerns. …”
    Get full text
    Article
  4. 304

    Cascading Dynamics of Heterogenous Scale-Free Networks with Recovery Mechanism by Shudong Li, Zhongtian Jia, Aiping Li, Lixiang Li, Xinran Liu, Yixian Yang

    Published 2013-01-01
    “…In network security, how to use efficient response methods against cascading failures of complex networks is very important. …”
    Get full text
    Article
  5. 305

    A model of thalamo-cortical interaction for incremental binding in mental contour-tracing. by Daniel Schmid, Heiko Neumann

    Published 2025-05-01
    “…Through simulations, we investigate the model properties and demonstrate how an attentional spreading mechanism tags neurons that participate in the object binding process. …”
    Get full text
    Article
  6. 306

    SOLVING THE PROBLEMS OF THE SUBMERGENCE IN URBAN CONSTRUCTION SPHERE by V. I. Sologaev

    Published 2019-03-01
    “…Then the author considers the filtration spreading of the domed man-made groundwater beneath the city road. …”
    Get full text
    Article
  7. 307

    Impact Dynamics and Freezing Performance of Porcine Bile Droplets on Horizontal Cold Substrates: Towards Advanced and Sustainable Food Processing by Xinkang Hu, Bo Zhang, Libang Chen, Zhenpeng Zhang, Huanhuan Zhang, Xintong Du, Xu Wang, Lulu Zhang, Tao Yang, Chundu Wu

    Published 2025-06-01
    “…With the development of the agro-processing industry, the efficient cryogenic treatment and resource utilization of porcine bile—a high-value byproduct—has received increasing attention. …”
    Get full text
    Article
  8. 308

    Technological advances and the use of IoT in monitoring Diaphorina citri in citrus cultivation by Eduardo Goiano da Silva, Franciely da Silva Ponce, Silvia Graciele Hulse de Souza

    Published 2025-04-01
    “…Internet of Things (IoT) technology is a promising tool in agriculture, enabling real-time monitoring and control systems that increase the efficiency and sustainability of agricultural practices. …”
    Get full text
    Article
  9. 309

    Robust models of disease heterogeneity and control, with application to the SARS-CoV-2 epidemic. by Kory D Johnson, Annemarie Grass, Daniel Toneian, Mathias Beiglböck, Jitka Polechová

    Published 2022-01-01
    “…The model thus includes super-spreading observed in the COVID-19 pandemic which is important for accurate uncertainty prediction. …”
    Get full text
    Article
  10. 310

    ESKOM and the problems of South African energy by SKUBKO Yury Sergeevich

    Published 2023-12-01
    “…Until early 2000, Eskom was considered one of the most advanced and efficient energy utilities of the world. During the last two decades it is in deep crisis and actually turned bankrupt, being drained by corruption, mismanagement and technological decay. …”
    Get full text
    Article
  11. 311

    Analysis of Earthquake Vulnerable Indicators in Exhausted Urban Tissue Case Study of Fakharan Neighborhood located in Kazerun County by Mohammadreza Ehsandoost, Ibrahim Zare

    Published 2020-08-01
    “…And so they are now facing a lot of problems and they are spreading to the whole city. It seems that in the worn texture, due to the wide range and intensity of the problems facing these tissues, the most efficient approach that can be used to deal with With the shortcomings and shortcomings, it is possible to achieve the goals of sustainable development in the field of improvement of these tissues. …”
    Get full text
    Article
  12. 312

    Distributed anonymous authentication scheme based on the blockchain in VANET by Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG

    Published 2022-09-01
    “…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
    Get full text
    Article
  13. 313

    Distributed anonymous authentication scheme based on the blockchain in VANET by Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG

    Published 2022-09-01
    “…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
    Get full text
    Article
  14. 314

    FLOOD MODEL FOR THE BÓDVA CATCHMENT by RÓBERT NÉMETH, ENDRE DOBOS

    Published 2015-06-01
    “…However, when dykes cannot withstand against the increasing load and a dyke burst occurs, fast and efficient protection measures shall be taken in the protected areas. …”
    Get full text
    Article
  15. 315

    Crossroad control algorithm based on V2I-interaction by A. N. Klimovich, V. N. Shuts

    Published 2019-02-01
    “…The importance of efficient traffic management problem grows every year. …”
    Get full text
    Article
  16. 316

    Attenuated African swine fever viruses and the live vaccine candidates: a comprehensive review by Jiaqi Fan, Haisheng Yu, Faming Miao, Junnan Ke, Rongliang Hu

    Published 2024-11-01
    “…ABSTRACT The African swine fever virus (ASFV) is spreading worldwide and causing huge economic losses to the global pig industry. …”
    Get full text
    Article
  17. 317

    Setting-based surveillance and One Health in the Mpox response by Marc K. Yambayamba, Simon Rüegg

    Published 2025-04-01
    “…Although Mpox has been endemic in parts of Africa since the 1970s, it only gained global attention after spreading beyond Africa, highlighting the geopolitical dimension of global health. …”
    Get full text
    Article
  18. 318

    Coopération et contrebande de drogue dans les parcs co-frontaliers du nord-ouest américain (Massif des Cascades) by Caroline Moumaneix

    Published 2014-01-01
    “…Since the 1990’s, drug smuggling has been spreading in the co-border parks between British Columbia (Canada) and Washington State (United States). …”
    Get full text
    Article
  19. 319

    Sequence analysis of tyrosine recombinases allows annotation of mobile genetic elements in prokaryotic genomes by Georgy Smyshlyaev, Alex Bateman, Orsolya Barabas

    Published 2021-05-01
    “…Abstract Mobile genetic elements (MGEs) sequester and mobilize antibiotic resistance genes across bacterial genomes. Efficient and reliable identification of such elements is necessary to follow resistance spreading. …”
    Get full text
    Article
  20. 320

    Transfer Learning Methods for Hate Speech Detection in Bahasa Indonesia by Fairuz Astari Devianty

    Published 2025-05-01
    “…However, this can be misused, such as for spreading hate speech. Building an efficient hate speech detection model requires sufficient annotated data to train the model. …”
    Get full text
    Article