Showing 121 - 140 results of 370 for search 'addition computational modification', query time: 0.11s Refine Results
  1. 121

    SMAD-LDS: enhanced secure message authentication and dissemination with lightweight digital signature in the Internet of Vehicles by Islam Z. Ahmed, Yasser Hifny, Rowayda A. Sadek

    Published 2025-06-01
    “…Additionally, the overall cost of communications in the proposed article has improved. …”
    Get full text
    Article
  2. 122
  3. 123
  4. 124
  5. 125
  6. 126
  7. 127
  8. 128

    Viability Study of SYCL as a Unified Programming Model for Heterogeneous Systems Based on GPUs in Bioinformatics by Manuel Costanzo

    Published 2024-10-01
    “…This standard facilitates the development of portable applications that can efficiently leverage the capabilities of different hardware devices, such as NVIDIA, Intel, and AMD GPUs, without needing significant modifications to the source code. Therefore, this thesis set out as its general objective to evaluate the feasibility of SYCL as a unified, portable, and efficient heterogeneous programming model for the design and development of computationally demanding applications on heterogeneous GPU-based systems, specifically in the field of bioinformatics. …”
    Get full text
    Article
  9. 129
  10. 130
  11. 131
  12. 132

    A sparse and invisible targeted backdoor attack in federated learning by Qikun Zhang, Mengyang Yu, Ruifang Wang, Yongjiao Li, Junling Yuan, Yu-an Tan

    Published 2025-07-01
    “…Abstract In distributed edge Computing scenarios within the Internet of Things (IoT), individual clients are susceptible to adversarial backdoor attacks, wherein malicious modifications to local data may be introduced. …”
    Get full text
    Article
  13. 133

    A New SDIMSIM Methods with Optimized Region of Stability and Sustainable Development with Applications On Neutrosophic Data by A.Y. J. Almasoodi, Mohammed Kadhim Mohsin, Sarah A.AL-Ameedee, Mohammed Amer Shanyoor

    Published 2025-05-01
    “…In the scenario when second derivatives, in addition to first derivatives, can be computed, a GLM modification known as SGLMs (GLM with second derivative) was created. …”
    Get full text
    Article
  14. 134

    Network Completion Using Dynamic Programming and Least-Squares Fitting by Natsu Nakajima, Takeyuki Tamura, Yoshihiro Yamanishi, Katsuhisa Horimoto, Tatsuya Akutsu

    Published 2012-01-01
    “…We employ here a certain type of differential equations as gene regulation rules in a genetic network, gene expression time series data as observed data, and deletions and additions of edges as basic modification operations. …”
    Get full text
    Article
  15. 135

    Improved YOLOv8-Based Algorithm for Citrus Leaf Disease Detection by Zhengbing Zheng, Yibang Zhang, Luchao Sun

    Published 2025-01-01
    “…The proposed approach uses YOLOv8n as the base model and introduces adaptive convolution into the Backbone, allowing the model to dynamically prioritize different disease features. This modification increases the model’s parameter count without adding to the computational cost in terms of floating-point operations. …”
    Get full text
    Article
  16. 136

    Surface plasmon enhanced linear and nonlinear optical properties of lycopene bioconjugated silver nanoparticles by E. L. T. Ngounou, N. M. Mwenze, M. N. Hounkonnou, M. Maaza

    Published 2025-07-01
    “…We found that the static (ω = 0) enhancement results from Ag-lycopene interaction induced dipole modification, whereas the dynamic response (ω = 532 nm > ω = 1064 nm) exhibits wavelength-dependent plasmonic modification, being stronger at resonance (532 nm) due to localised field enhancement and weaker off-resonance (1064 nm) via higher-order effects. …”
    Get full text
    Article
  17. 137

    Adaptation of the modular number system in threshold secret sharing schemes by A. F. Chernyavskiy, A. I. Kazlova, V. S. Sadov, A. A. Kolyada

    Published 2025-03-01
    “…A modification of Adi Shamir's secret sharing scheme in a threshold cryptosystem based on modular arithmetic (MA cryptosystem) with the generation of shares of secret sharing participants in two stages is considered. …”
    Get full text
    Article
  18. 138

    Application of physics-informed neural networks for two-phase flow model with variable diffusion and experimental validation by Daulet Kalesh, Timur Merembayev, Sagyn Omirbekov, Yerlan Amanbek

    Published 2025-06-01
    “…In addition, we investigate the application of the PINNs for laboratory experimental data by assessing the performance of PINNs in capturing the saturation front dynamics. …”
    Get full text
    Article
  19. 139

    YOLO-SMUG: An Efficient and Lightweight Infrared Object Detection Model for Unmanned Aerial Vehicles by Xinzhe Luo, Xiaogang Zhu

    Published 2025-03-01
    “…This modification decreases computational complexity while maintaining the model’s ability to capture and integrate essential feature information across multiple scales. …”
    Get full text
    Article
  20. 140

    Dynamic Harmony Search with Polynomial Mutation Algorithm for Valve-Point Economic Load Dispatch by M. Karthikeyan, T. Sree Ranga Raja

    Published 2015-01-01
    “…The DHSPM algorithm is tested with three power system cases consisting of 3, 13, and 40 thermal units. The computational results show that the DHSPM algorithm is more effective in finding better solutions than other computational intelligence based methods.…”
    Get full text
    Article