Showing 961 - 980 results of 7,728 for search '(programa OR programs) computational', query time: 0.16s Refine Results
  1. 961

    Fault-tolerant and mobility-aware loading via Markov chain in mobile cloud computing by Ning Wang, Ya Li, Yuanbang Li, Huanxin Nie

    Published 2025-05-01
    “…However, mobile devices’ limited memory, computing power, and battery life pose significant challenges to their widespread use. …”
    Get full text
    Article
  2. 962

    Intelligent End-Edge Computation Offloading Based on Lyapunov-Guided Deep Reinforcement Learning by Xue Feng, Chi Xu, Xi Jin, Changqing Xia, Jing Jiang

    Published 2024-11-01
    “…To address the end-edge computation offloading challenge in the multi-terminal and multi-server environment, this paper proposes an intelligent computation offloading algorithm based on Lyapunov optimization and deep reinforcement learning. …”
    Get full text
    Article
  3. 963

    The computer model of a neutron fluxes forming system on a linear electron accelerator by S. P. Gokov, V. M. Horbach, Yu. G. Kazarinov, V. V. Kantemirov, V. I. Kasilov, L. N. Kolpakova, O. A. Lyukhtan, E. V. Tsiats’ko

    Published 2023-12-01
    “…A computer model of the system for generating neutron fluxes at the output of a linear electron accelerator has been developed in the Geant4 and PhysList QGSP BIC HP programming environment. …”
    Get full text
    Article
  4. 964

    COMPUTED TOMOGRAPHY PATTERN OF UNCHANGED MEDIASTINAL LYMPH NODES IN CHILDREN WITH UNINFECTED MYCOBACTERIUM TUBERCULOSIS by L. P. Shepeleva, I. E. Tyurin

    Published 2016-02-01
    “…Objective: to provide X-ray characteristics of mediastinal lymph nodes revealed by computed tomography (CT) in children and adolescents with uninfected Mycobacterium tuberculosis.Material and methods. …”
    Get full text
    Article
  5. 965

    Joint Demand Response and Task Offloading Strategy for 5G Edge Computing Network by Xu LU, Ying CHEN, Zhongping XU, Haiquan ZHANG, Chunfang MU, Kai CHEN, Yi SUN

    Published 2022-10-01
    “…Along with the dramatic increase in demand for IoT communication computing, the 5G communication and edge computing network gradually become the emerging high energy consumption load. …”
    Get full text
    Article
  6. 966

    Assessment of Potential Live Kidney Donors and Computed Tomographic Renal Angiograms at Christchurch Hospital by Thamer Alsulaiman, Stephen Mark, Sarah Armstrong, David McGregor

    Published 2016-01-01
    “…To examine the outcome of potential live kidney donors (PLKD) assessment program at Christchurch Hospital and, also, to review findings of Computed Tomographic (CT) renal angiograms that led to exclusion in the surgical assessment. …”
    Get full text
    Article
  7. 967

    Designing a Monitoring Tool for Mosul University Network to Detect Worm Infected Computers by Asmaa Hamoo, Sundus Muhamed

    Published 2013-07-01
    “…The present study tackles the problem of computers' vulnerability to malware such as worm: a self-replicate computer program that spontaneously copies itself to the vulnerable systems and spreads through the web exploiting security gaps and posing a great danger to the web community. …”
    Get full text
    Article
  8. 968

    New Strategies Based on Hierarchical Matrices for Matrix Polynomial Evaluation in Exascale Computing Era by Luisa Carracciuolo, Valeria Mele

    Published 2025-04-01
    “…These include but are not limited to massive parallelism, effective exploitation, and high complexity in programming, such as heterogeneous computing facilities. …”
    Get full text
    Article
  9. 969

    Water temperature prediction in a subtropical subalpine lake using soft computing techniques by Saeed Samadianfard, Honeyeh Kazemi, Ozgur Kisi, Wen-Cheng Liu

    Published 2016-04-01
    “…In this paper, the performance of soft computing techniques including gene expression programming (GEP), which is a variant of genetic programming (GP), adaptive neuro fuzzy inference system (ANFIS) and artificial neural networks (ANNs) to predict hourly water temperature at a buoy station in the Yuan-Yang Lake (YYL) in north-central Taiwan at various measured depths was evaluated. …”
    Get full text
    Article
  10. 970

    A Survey on Privacy and Security in Distributed Cloud Computing: Exploring Federated Learning and Beyond by Ahmad Rahdari, Elham Keshavarz, Ehsan Nowroozi, Rahim Taheri, Mehrdad Hajizadeh, Mohammadreza Mohammadi, Sima Sinaei, Thomas Bauschert

    Published 2025-01-01
    “…These servers provide cost-effective solutions that make storage and computing accessible to ordinary users. However, they might face significant vulnerabilities, including data leakage, metadata spoofing, insecure programming interfaces, malicious insiders, and denial of service. …”
    Get full text
    Article
  11. 971

    Closed-Loop Control of Extrusion-Based Bioprinting Through Real-Time Computer Vision by Javier Arduengo, Nicolas Hascoët, Francisco Chinesta, Jean-Yves Hascoet

    Published 2025-06-01
    “…A critical aspect of print quality is maintaining a consistent and predictable line width, as pre-programmed trajectories and design fidelity rely on this parameter being well controlled. …”
    Get full text
    Article
  12. 972

    University proceedings. Volga region. Technical sciences by K.A. Suminov

    Published 2025-05-01
    Subjects: “…multiversion programming…”
    Article
  13. 973
  14. 974
  15. 975
  16. 976
  17. 977

    Carrying out entrance control of “Informatics” students’ knowledge with use of specialized computer system by L. V. Larina

    Published 2017-05-01
    “…Nowadays the creation and the use of computer testing systems is one of perspective directions in the field of control of knowledge. …”
    Get full text
    Article
  18. 978

    Automatic morphology phenotyping of tetra- and hexaploid wheat spike using computer vision methods by A. Yu. Pronozin, A. A. Paulish, E. A. Zavarzin, A. Yu. Prikhodko, N. M. Prokhoshin, Yu. V. Kruchinina, N. P. Goncharov, E. G. Komyshev, M. A. Genaev

    Published 2021-03-01
    “…Thus, it has been shown that the morphological characteristics of spikes for hexaploid and tetraploid wheat species, obtained on the basis of computer analysis of images, include differences, which are further used to develop methods for plant classifications by ploidy level and their species in an automatic mode.…”
    Get full text
    Article
  19. 979

    Novel Application of Quantum Computing for Routing and Spectrum Assignment in Flexi-Grid Optical Networks by Oumayma Bouchmal, Bruno Cimoli, Ripalta Stabile, Juan Jose Vegas Olmos, Carlos Hernandez, Ricardo Martinez, Ramon Casellas, Idelfonso Tafur Monroy

    Published 2024-10-01
    “…This work lays the foundation for future exploration of quantum computing in solving large-scale RSA problems in EONs, with the prospect of achieving quantum advantage as quantum technology continues to advance.…”
    Get full text
    Article
  20. 980