Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
201
Comparative Evaluation of the Effectiveness of Standard and Non-standard Computer Perimetry Methods in the Early Diagnosis of Glaucoma
Published 2025-06-01“…For diagnosis of early POAG a combination of standard and non-standard computer perimetry methods is advisable. Both FDT perimetry strategies had a significant advantage in the sensitivity level of their results compared to Pulsar perimetry data.…”
Get full text
Article -
202
Modeling and Evaluating a Cache System in ICN Routers Using a Programmable Switch and Computers
Published 2024-01-01“…To solve this bottleneck, this paper proposes the two algorithms, the cache admission and lazy response ones, to reduce the number of packets sent between the switch and the computers. In order to validate them, we evaluate the forwarding rate improvement by developing an analytical model and a prototype ICN router implementation on a programmable switch with computers. …”
Get full text
Article -
203
Wide-Detector Computed Tomography for Evaluating the Effectiveness of Microsurgical Autotransplantation of Tissue Complexes in the Urogenital Region
Published 2020-09-01“…Objective: to demonstrate the possibilities and advantages of wide-detector computed tomography for performing dynamic studies and evaluating the effectiveness of microsurgical autotransplantation of tissue complexes in the urogenital region, by using a perfusion computed tomography and dynamic voiding computed cystourethrography.Subjects and methods. …”
Get full text
Article -
204
-
205
-
206
Evaluation on formation rate of Pleurotus eryngii primordium under different humidity conditions by computer vision
Published 2017-03-01“…According to the statistics on the primordium under different relative humidity conditions, the formation rate model of primordium was established. It is found that computer vision based statistical method for primordium can be used to evaluate the formation rate of primordium under different humidity conditions.…”
Get full text
Article -
207
-
208
-
209
AN EVALUATION OF SERIOUS GAMES AND COMPUTER-BASED LEARNING ON STUDENT OUTCOMES IN UNIVERSITY LEVEL GEOGRAPHIC EDUCATION
Published 2022-12-01“…The students completed one of the two experimental assignments as well as a control assignment that did not involve gaming, gathering data, or a computer. The groups were contrasted on their own evaluation of the assignments as well as their performance in multiple class outcomes. …”
Get full text
Article -
210
Performance Evaluation of Convolutional Neural Network (CNN) for Skin Cancer Detection on Edge Computing Devices
Published 2025-03-01“…Unlike previous research, which seldom offers detailed performance evaluations on IoT hardware, this work benchmarks the CNN model on multiple single-board computers (SBCs), including low-computing devices like Raspberry Pi and Jetson Nano. …”
Get full text
Article -
211
-
212
3D Evaluation of Maxillary Sinus Using Computed Tomography: A Sexual Dimorphic Study
Published 2017-01-01Get full text
Article -
213
Volumetric Computed Tomography Angiography in the Evaluation of Mediastinal Fluid Collections following Congenital Cardiac Surgery
Published 2013-01-01“…Recent advances in volumetric computed tomography allow fast and accurate imaging of cardiovascular and extravascular structures in children with acceptable radiation dose, providing a powerful imaging tool for the evaluation of complications after congenital cardiac surgery.…”
Get full text
Article -
214
Synthesis, computational studies and In Silico approaches of novel organophosphorus derivatives as anti-Alzheimer Agents
Published 2025-03-01Subjects: Get full text
Article -
215
Wearable Sensor-Based Exercise Monitoring System for Higher Education Students Using a Multi-Attribute Fuzzy Evaluation Model
Published 2024-01-01“…During the analysis, MM-Fit dataset information is utilized to evaluate the system efficiency in which the system ensures the minimum computation complexity <inline-formula> <tex-math notation="LaTeX">$O\left ({{ r.m.n }}\right)$ </tex-math></inline-formula> and minimum latency value <inline-formula> <tex-math notation="LaTeX">$\left ({{ \approx 70mAh }}\right)$ </tex-math></inline-formula>.. …”
Get full text
Article -
216
COMPUTER SIMULATION GDP DYNAMICS AT DIFFERENT OPTIONS FOR TAX REFORM
Published 2018-01-01Get full text
Article -
217
-
218
-
219
Verifiably private outsourcing scheme for multivariate polynomial evaluation
Published 2015-08-01“…With the development of cloud computing and big data,it had important practical significance for how to outsource private data and verify the computing result efficiently.A verifiably outsourcing scheme for multivariate polynomial evaluation based on multilinear maps and homomorphic encryption was proposed where the user could verify the computing result exactly.The proposed scheme is provably secure without random oracles and the multivariate polynomial itself and the input of the function are private for the server.Moreover,the cost of the user is much smaller than that of the server,and it is much smaller than that of computing the multivariate polynomial directly.…”
Get full text
Article -
220
Verifiably private outsourcing scheme for multivariate polynomial evaluation
Published 2015-08-01“…With the development of cloud computing and big data,it had important practical significance for how to outsource private data and verify the computing result efficiently.A verifiably outsourcing scheme for multivariate polynomial evaluation based on multilinear maps and homomorphic encryption was proposed where the user could verify the computing result exactly.The proposed scheme is provably secure without random oracles and the multivariate polynomial itself and the input of the function are private for the server.Moreover,the cost of the user is much smaller than that of the server,and it is much smaller than that of computing the multivariate polynomial directly.…”
Get full text
Article