Showing 3,001 - 3,020 results of 7,047 for search 'application origin', query time: 0.15s Refine Results
  1. 3001

    A Multipath Routing Approach for Secure and Reliable Data Delivery in Wireless Sensor Networks by Hind Alwan, Anjali Agarwal

    Published 2013-03-01
    “…Our approach uses node-disjoint routing and the selection mechanism of these paths depends on different application requirements in terms of security. The original data message is split into packets that are coded using Reed-Solomon (RS) codes and, to provide diverse levels of security, different number of fragments is encrypted related to the requested security level before being transmitted along independent node-disjoint paths. …”
    Get full text
    Article
  2. 3002

    Between Truth and Hallucinations: Evaluation of the Performance of Large Language Model-Based AI Plugins in Website Quality Analysis by Karol Król

    Published 2025-02-01
    “…The article evaluates the performance of LLM AI plugins (GPT models) in website and web application auditing. The author built and tested two original ChatGPT-4o Plus (OpenAI) plugins: Website Quality Auditor (WQA) and WebGIS Quality Auditor (WgisQA). …”
    Get full text
    Article
  3. 3003

    Design of task dividing and offloading algorithm in mobile edge computing by Jing LU, Hanlin LI, Lin GAO

    Published 2021-06-01
    “…Mobile edge computing (MEC) emerges as a new paradigm that pushes the computing infrastructure from the remote cloud data center to the edge equipments.It provides a new solution to meet the delay sensitive and computing intensive requirements of Internet of things (IoT).In this work, the problem of tasks offloading and scheduling in the multi-user and multi-server MEC system was considered.Specifically, each user had a task-dependent application and the tasks could be either executed locally or remotely according to the dependence.Thus, the network performance was improved by unloading and scheduling the sub tasks.Quality of experience (QoE) and fairness between users were used to characterize the network performance, and the optimization problem was modeled as a joint dependent task offloading and scheduling (J-DTOS) problem.The J-DTOS problem was a non-linear mixed integer programming, which was NP-hard in general.The original problem was reformulated by introducing intermediate variables and proposing a near-optimal solution.Simulation results show that the proposed offloading and scheduling design can significantly improve the performance of the system.…”
    Get full text
    Article
  4. 3004

    The Comprehensive Investigation and Discussion on the Progress of Ethereum Proof-of-Stake by Feng Xiaojie

    Published 2025-01-01
    “…This article aims to promote the continuous development of PoS algorithm through these perspectives, in order to adapt to more complex and diverse blockchain application scenarios.…”
    Get full text
    Article
  5. 3005

    Measuring early care and education quality in Peru: Validation of the CLASS toddler by Marta Dormal

    Published 2025-12-01
    “…Confirmatory factor analyses showed that the measure’s original framework had acceptable model fit with minor adjustments. …”
    Get full text
    Article
  6. 3006

    Black feminism and Artificial Intelligence: the possibilities and limitations of contesting discriminatory AI from a critical social theory perspective by Laura Schelenz

    Published 2025-07-01
    “…This paper takes a closer look at the application of Black feminism as a critical social theory, which originated as a theory protesting the oppression of Black women as a group in the United States. …”
    Get full text
    Article
  7. 3007

    Research on Anime-Style Image Generation Based on Stable Diffusion by Yang Mingbo

    Published 2025-01-01
    “…The experimental results show that the generated image is highly consistent with the original image in terms of style and detail, and successfully captures the unique characteristics of animation art. …”
    Get full text
    Article
  8. 3008

    Enterprise Management Decision and Financial Management Based on Dynamic Cost Volume Profit Model by Yanlin Guo

    Published 2022-01-01
    “…Based on the interpretation of cost behavior by multiple cost drivers, this paper establishes a dynamic CVP model of traditional CVP analysis, breaks through the limitations of original assumptions, and improves the application value of CVP analysis in practice. …”
    Get full text
    Article
  9. 3009

    Uranium fluoride micromaterials: a new frontier in nuclear engineering by Harry Jang, Frederic Poineau

    Published 2025-03-01
    “…This perspective explores recent advancements in the synthesis and application of uranium fluoride micromaterials, emphasizing their role in the nuclear industry. …”
    Get full text
    Article
  10. 3010

    Corporate Social Responsibility: A Victim or a Hero of the COVID-19 Crisis? by Lenka Veselovská

    Published 2025-05-01
    “…However, the biggest disparities were recorded in the environmental dimension. The originality of the study lies in the development of a novel methodological approach to documenting the CSR involvement in organization and its application to compare the pandemic and post-pandemic levels. …”
    Get full text
    Article
  11. 3011

    AI-Generated Artwork as a Modern Interpretation of Historical Paintings by Wai Yie Leong

    Published 2025-03-01
    “…Artificial intelligence (AI) offers unprecedented opportunities to reinterpret historical paintings, bringing classical masterpieces into modern artworks We explored the application of AI, particularly generative models such as generative adversarial networks (GANs) and neural style transfers (NST) in the contemporary interpretations of historical paintings. …”
    Get full text
    Article
  12. 3012

    PROCESSING OF DETAIL WAVELET-COEFFICIENTS TO IMPROVE THE ACCURACY OF REFLECTOMETRY MEASUREMENTS by I. V. Manonina

    Published 2016-12-01
    “…In the article a modern data processing method of reflectometry measurement of communication line, based on the application of wavelet transform to reflectograms is claimed. …”
    Get full text
    Article
  13. 3013

    Treatment and prophylaxis of NSAID-induced gastropathies in a therapeutist’s practice by T. L. Lapina

    Published 2009-08-01
    “…The aim of review – to present up-to-date data on application of proton pump inhibitors (PPI) e.g. esomeprazole for treatment and prophylaxes of gastropathies, induced by intake of nonsteroid anti-inflammatory drugs (NSAIDs).Original positions. …”
    Get full text
    Article
  14. 3014

    NEURAL NETWORK ALGORITHM SAFE OVERFLIGHT AERIAL OBSTACLES AND PROHIBITED LAND AREAS by D. A. Mikhaylin

    Published 2017-09-01
    “…As the continuing  of the aircraft flight along the original route is possible, as a result, a training sample is in the form of a chart. …”
    Get full text
    Article
  15. 3015

    Interference coupling cooperative suppression method for wideband carrier communication based on improved variational mode decomposition by Dandan DONG, Ning SUN

    Published 2023-05-01
    “…The interference coupling of power line broadband carrier communication aggravates the frequency domain tailing between subcarriers, reduces the sensitivity of suppression methods, and the communication quality is poor.Therefore, a cooperative suppression method of interference coupling of power line broadband carrier communication based on improved variational modal decomposition was proposed.Based on the channel characteristics of power line broadband carrier communication, a communication channel model with multipath propagation and Doppler effect was established, the communication signal was simulated, the original signal was preprocessed by using the improved variational modal decomposition algorithm, and the suppression problem was transformed into a variational problem.At the same time, the signal was expressed in the discrete form of unconstrained variational problem.The variational problem was continuously updated to complete the separation and processing of the signal, and realize the cooperative suppression of communication interference.The experimental results show that the proposed method has low bit error rate, small frequency offset, and practical application value.…”
    Get full text
    Article
  16. 3016

    The Enneagram’s Science of the Soul by Samuel Bendeck Sotillos

    Published 2024-10-01
    “…Furthermore, the true source of this symbol (and its application) also remains enigmatic to a secular mentality. …”
    Get full text
    Article
  17. 3017

    A method for PCR-free library preparation for sequencing palaeogenomes. by Kirstin Henneberger, Axel Barlow, Federica Alberti, Michaela Preick, Silviu Constantin, Doris Döppes, Wilfried Rosendahl, Michael Hofreiter, Johanna L A Paijmans

    Published 2025-01-01
    “…Our amplification-free library preparation method could find application in experimental designs where the original template molecule needs to be characterised more directly.…”
    Get full text
    Article
  18. 3018

    "GLOKAL CHANGE": GEOGRAPHY MEETS REMOTE SENSING IN THE CONTEXT OF THE EDUCATION FOR SUSTAINABLE DEVELOPMENT by Markus JAHN, Michelle HASPEL, Alexander SIEGMUND

    Published 2022-01-01
    “…"GLOKAL Change" supports an original encounter by providing worksheets and methodology papers on various fieldwork methods, and by the application of a micro-drone for taking their own aerial imagery. …”
    Get full text
    Article
  19. 3019

    Design of shuffling protocol based on additive secret sharing by ZHANG Yanshuo, MAN Ziqi, ZHOU Xingyu, YANG Yatao, HU Ronglei

    Published 2024-08-01
    “…Compared with the existing literature, the proposed protocol can meet the current security standards in security, and has high efficiency in processing large-scale data sets. It improves the applicability of the protocol and further promotes its application in the current environment.…”
    Get full text
    Article
  20. 3020

    Internal Due Date Assignment in a Wafer Fabrication Factory by an Effective Fuzzy-Neural Approach by Toly Chen

    Published 2013-01-01
    “…In addition, the simultaneous application of PCA, fuzzy c-means (FCM), and back propagation network (BPN) further improved the estimation accuracy. …”
    Get full text
    Article