Showing 621 - 640 results of 28,739 for search '"computational"', query time: 0.08s Refine Results
  1. 621
  2. 622

    Colour analysis of children's drawings of gods using computer vision by Mátyás Turós

    Published 2025-01-01
    “…In our experimental study, we use computer vision to identify the colours of drawings of God in Catholic school children (N = 360) and compare the process and results of analysis using K-means clustering and a classification approach. …”
    Get full text
    Article
  3. 623
  4. 624
  5. 625

    Blind signature scheme based on trusted platform computation module by Wen-ting HUANG, Ling-ling TONG, Yong-jian WANG

    Published 2013-08-01
    “…Compared with the traditional scheme, the proposed scheme has better computational efficiency.…”
    Get full text
    Article
  6. 626
  7. 627
  8. 628
  9. 629
  10. 630
  11. 631

    Multi-objective task offloading algorithm for mobile cloud computing by Fuhong SONG, Huanlai XING, Wei PAN

    Published 2019-09-01
    Subjects: “…mobile cloud computing…”
    Get full text
    Article
  12. 632

    Approach of service evaluation based on trust reasoning for cloud computing by HU Chun-hua1, LUO Xin-xing2, WANG Si-chun1, LIU Yao1

    Published 2011-01-01
    “…The credibility reasoning and deducing of SC and SP were proposed,which were mainly in the direct trust re-lationship established in interactive process among service entities,the public credibility of the feedback system as a sup-plement.The model used probability density function to represents the credibility of entities based on probability theory,which systematically proposed the reasoning and deducing methods of computing,reasoning and merging based on trust relationship in probability density.Then a new method of correcting QoS of SP entities was provided.Finally,the algo-rithm based on trust reasoning and correcting of QoS service was provided.This model can effectively evaluate the credi-bility of service participants,weakening the influence of unreliable entities in service evaluation and enhancing the quali-ties and accuracy of result in service selection through simulated experiment.…”
    Get full text
    Article
  13. 633

    Application of the Logistics Management System Based on Cloud Computing Technology by Shuai Zhang

    Published 2022-01-01
    “…In order to solve the vehicle routing optimization problem of cold chain logistics distribution, this paper proposes a vehicle routing optimization method of cold chain logistics distribution based on cloud computing technology. This paper analyzes the advantages of processing the real-time routing of distribution vehicles under the cloud computing mode and establishes the application service architecture of vehicle routing optimization in cold chain logistics; under this architecture, multisource real-time traffic information is obtained, the vehicle distribution time and comprehensive cost are analyzed, the vehicle routing optimization model of cold chain logistics distribution is constructed, and the coarse-grained parallel genetic algorithm is used to solve the model in the cloud computing environment. …”
    Get full text
    Article
  14. 634
  15. 635

    Secure OpenID Authentication Model by Using Trusted Computing by E. Ghazizadeh, Z. S. Shams Dolatabadi, R. Khaleghparast, M. Zamani, A. A. Manaf, M. S. Abdullah

    Published 2014-01-01
    “…Trusted Platform Module (TPM) and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. …”
    Get full text
    Article
  16. 636

    STUDY OF WORKING CONDITIONS ON WORKING PLACES OF ELECTRONIC COMPUTERS USERS by A. M. Lazarenkov, S. A. Horeva

    Published 2009-08-01
    “…The results of investigations of parameters of industrial environment of the personal computers users and recommendations on decrease of influence on the organism of workers are given.…”
    Get full text
    Article
  17. 637
  18. 638

    SAPA-based approach for defending DoS attacks in cloud computing by Meng YUE, Kun LI, Zhi-jun WU

    Published 2017-04-01
    Subjects: “…cloud computing…”
    Get full text
    Article
  19. 639
  20. 640

    Accuracy and operation procedure of robotic computer-aided implant surgery by Yitian Liu, Qingqing Zheng, Zonghe Xu, Yanjun Lin, Sihui Zhang, Wenxiu Huang, Jiang Chen, Dong Wu

    Published 2025-01-01
    “…Abstract This study assessed the accuracy of robotic computer-aided implant surgery (rCAIS) in partially edentulous patients using a standard operation procedure. …”
    Get full text
    Article