Search alternatives:
computation » computational (Expand Search)
Showing 201 - 220 results of 26,849 for search 'evaluation computation', query time: 0.25s Refine Results
  1. 201

    Comparative Evaluation of the Effectiveness of Standard and Non-standard Computer Perimetry Methods in the Early Diagnosis of Glaucoma by I. L. Simakova, A. N. Kulikov, S. A. Serdyukova, I. A. Tikhonovskay

    Published 2025-06-01
    “…For diagnosis of early POAG a combination of standard and non-standard computer perimetry methods is advisable. Both FDT perimetry strategies had a significant advantage in the sensitivity level of their results compared to Pulsar perimetry data.…”
    Get full text
    Article
  2. 202

    Modeling and Evaluating a Cache System in ICN Routers Using a Programmable Switch and Computers by Junji Takemasa, Yuki Koizumi, Toru Hasegawa

    Published 2024-01-01
    “…To solve this bottleneck, this paper proposes the two algorithms, the cache admission and lazy response ones, to reduce the number of packets sent between the switch and the computers. In order to validate them, we evaluate the forwarding rate improvement by developing an analytical model and a prototype ICN router implementation on a programmable switch with computers. …”
    Get full text
    Article
  3. 203

    Wide-Detector Computed Tomography for Evaluating the Effectiveness of Microsurgical Autotransplantation of Tissue Complexes in the Urogenital Region by I. O. Shchekoturov, R. F. Bakhtiozin, A. L. Istranov, N. S. Serova, O. A. Mkhitaryan, M. R. Ibregimova

    Published 2020-09-01
    “…Objective: to demonstrate the possibilities and advantages of wide-detector computed tomography for performing dynamic studies and evaluating the effectiveness of microsurgical autotransplantation of tissue complexes in the urogenital region, by using a perfusion computed tomography and dynamic voiding computed cystourethrography.Subjects and methods. …”
    Get full text
    Article
  4. 204
  5. 205
  6. 206

    Evaluation on formation rate of Pleurotus eryngii primordium under different humidity conditions by computer vision by ZHOU Jun, DING Wenjie, ZHU Xuejun, CAO Junyi, NIU Xueming

    Published 2017-03-01
    “…According to the statistics on the primordium under different relative humidity conditions, the formation rate model of primordium was established. It is found that computer vision based statistical method for primordium can be used to evaluate the formation rate of primordium under different humidity conditions.…”
    Get full text
    Article
  7. 207
  8. 208
  9. 209

    AN EVALUATION OF SERIOUS GAMES AND COMPUTER-BASED LEARNING ON STUDENT OUTCOMES IN UNIVERSITY LEVEL GEOGRAPHIC EDUCATION by Daniel ERVIN, David LOPEZ-CARR

    Published 2022-12-01
    “…The students completed one of the two experimental assignments as well as a control assignment that did not involve gaming, gathering data, or a computer. The groups were contrasted on their own evaluation of the assignments as well as their performance in multiple class outcomes. …”
    Get full text
    Article
  10. 210

    Performance Evaluation of Convolutional Neural Network (CNN) for Skin Cancer Detection on Edge Computing Devices by Vincent, Garry Darian, Nico Surantha

    Published 2025-03-01
    “…Unlike previous research, which seldom offers detailed performance evaluations on IoT hardware, this work benchmarks the CNN model on multiple single-board computers (SBCs), including low-computing devices like Raspberry Pi and Jetson Nano. …”
    Get full text
    Article
  11. 211
  12. 212
  13. 213

    Volumetric Computed Tomography Angiography in the Evaluation of Mediastinal Fluid Collections following Congenital Cardiac Surgery by Arno A. W. Roest, Joost Roelofs, Mark G. Hazekamp, Marry E. B. Rijlaarsdam, Jacob Geleijns, Lucia J. M. Kroft

    Published 2013-01-01
    “…Recent advances in volumetric computed tomography allow fast and accurate imaging of cardiovascular and extravascular structures in children with acceptable radiation dose, providing a powerful imaging tool for the evaluation of complications after congenital cardiac surgery.…”
    Get full text
    Article
  14. 214
  15. 215

    Wearable Sensor-Based Exercise Monitoring System for Higher Education Students Using a Multi-Attribute Fuzzy Evaluation Model by Shiping Yu, Xiaowei Peng

    Published 2024-01-01
    “…During the analysis, MM-Fit dataset information is utilized to evaluate the system efficiency in which the system ensures the minimum computation complexity <inline-formula> <tex-math notation="LaTeX">$O\left ({{ r.m.n }}\right)$ </tex-math></inline-formula> and minimum latency value <inline-formula> <tex-math notation="LaTeX">$\left ({{ \approx 70mAh }}\right)$ </tex-math></inline-formula>.. …”
    Get full text
    Article
  16. 216
  17. 217
  18. 218
  19. 219

    Verifiably private outsourcing scheme for multivariate polynomial evaluation by Yan-li REN, Da-wu GU, Jian-xing CAI, Chun-shui HUANG

    Published 2015-08-01
    “…With the development of cloud computing and big data,it had important practical significance for how to outsource private data and verify the computing result efficiently.A verifiably outsourcing scheme for multivariate polynomial evaluation based on multilinear maps and homomorphic encryption was proposed where the user could verify the computing result exactly.The proposed scheme is provably secure without random oracles and the multivariate polynomial itself and the input of the function are private for the server.Moreover,the cost of the user is much smaller than that of the server,and it is much smaller than that of computing the multivariate polynomial directly.…”
    Get full text
    Article
  20. 220

    Verifiably private outsourcing scheme for multivariate polynomial evaluation by Yan-li REN, Da-wu GU, Jian-xing CAI, Chun-shui HUANG

    Published 2015-08-01
    “…With the development of cloud computing and big data,it had important practical significance for how to outsource private data and verify the computing result efficiently.A verifiably outsourcing scheme for multivariate polynomial evaluation based on multilinear maps and homomorphic encryption was proposed where the user could verify the computing result exactly.The proposed scheme is provably secure without random oracles and the multivariate polynomial itself and the input of the function are private for the server.Moreover,the cost of the user is much smaller than that of the server,and it is much smaller than that of computing the multivariate polynomial directly.…”
    Get full text
    Article