Results 51 to 60 of about 176,906 (321)
Particulate matter (soot) emissions from combustion processes have damaging health and environmental effects. Numerical techniques with varying levels of accuracy and computational time have been developed to model soot formation in flames. High-fidelity
Mehdi Jadidi+2 more
doaj +1 more source
Flexible Sensor‐Based Human–Machine Interfaces with AI Integration for Medical Robotics
This review explores how flexible sensing technology and artificial intelligence (AI) significantly enhance human–machine interfaces in medical robotics. It highlights key sensing mechanisms, AI‐driven advancements, and applications in prosthetics, exoskeletons, and surgical robotics.
Yuxiao Wang+5 more
wiley +1 more source
Formal Verification of Security Protocol Implementations: A Survey [PDF]
Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages.
A Bauer+27 more
core +2 more sources
A More Efficient Conditional Private Preservation Scheme in Vehicular Ad Hoc Networks
It is a challenging issue to provide a secure and conditional anonymous authentication scheme in vehicle ad hoc networks (VANETs) with low storage space and computational cost. In 2008, Lu et al.
Tao Wang, Xiaohu Tang
doaj +1 more source
CRCFound: A Colorectal Cancer CT Image Foundation Model Based on Self‐Supervised Learning
CRCFound is a self‐supervised learning‐based CT image foundation model for colorectal cancer (CRC). Pretrained on 5137 unlabeled CRC CT images, it learns universal feature representations, enabling efficient adaptation to various clinical tasks. The model demonstrates outstanding performance and generalization across multiple diagnostic and prognosis ...
Jing Yang+13 more
wiley +1 more source
Computational Complexity Results for Genetic Programming and the Sorting Problem [PDF]
Genetic Programming (GP) has found various applications. Understanding this type of algorithm from a theoretical point of view is a challenging task. The first results on the computational complexity of GP have been obtained for problems with isolated ...
Neumann, Frank, Wagner, Markus
core
SECURE SEMANTIC COMPUTING [PDF]
This paper explores the integration of semantic computing technologies with security technologies. Past and current research on the application of semantic web technologies for policy management and inference control, the application of data mining technologies for intrusion and malware detection, and programming language-based approaches to mobile ...
Kevin W. Hamlen, Bhavani Thuraisingham
openaire +2 more sources
DECENT is a deep learning method that enhances noninvasive preimplantation genetic testing by accurately reconstructing embryonic copy number variations (CNVs) from cell‐free DNA in spent embryo culture media. By mitigating maternal contamination, DECENT improves diagnostic accuracy, even with high contamination levels, offering a reliable, noninvasive
Zhenyi Zhang+3 more
wiley +1 more source
Constraint-based computational semantics : a comparison between LTAG and LRS [PDF]
This paper compares two approaches to computational semantics, namely semantic unification in Lexicalized Tree Adjoining Grammars (LTAG) and Lexical Resource Semantics (LRS) in HPSG.
Kallmeyer, Laura, Richter, Frank
core
A Metalanguage for Guarded Iteration
Notions of guardedness serve to delineate admissible recursive definitions in various settings in a compositional manner. In recent work, we have introduced an axiomatic notion of guardedness in symmetric monoidal categories, which serves as a unifying ...
A Carboni+27 more
core +1 more source