Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
541
Bone evaluation of single edentulous areas of maxilla: short communication
Published 2021-12-01“…Materials and Methods: In this cross-sectional study, cone-beam computed tomography (CBCT) images of single edentulous areas of maxilla of patients who needed aesthetic single implant rehabilitations were evaluated for measure the height and thickness using an implant planning software. …”
Get full text
Article -
542
Bone evaluation of single edentulous areas of maxilla: short communication
Published 2021-12-01“…Materials and Methods: In this cross-sectional study, cone-beam computed tomography (CBCT) images of single edentulous areas of maxilla of patients who needed aesthetic single implant rehabilitations were evaluated for measure the height and thickness using an implant planning software. …”
Get full text
Article -
543
Reputation computation based on new metric in P2P network
Published 2008-01-01“…For most of P2P file sharing trusted download,the current researches of the evaluation of the trusted peers based on reputation simply rely on the history of interaction and are not paid enough attention on the time factor.The other behaviors like recommendation are also ignored.The attack actions in reputation evaluation were discussed,and the recommender behavior in P2P network was considered separately,which made up for computation based on the interac-tion behavior in computation of reputation.Secondly,for the positive and negative evaluation,different time-decline co-efficient was added in the method to distinguish the malicious node named smart node which acts as a malicious node at times.Simulation experiments show that this proposed method not only increase the good files ratio in P2P download files,but also restrain the collusion in malicious nodes,especially the spy action.…”
Get full text
Article -
544
Optimal Computation Offloading Decisions Based on System Utility and Cost Balance
Published 2025-01-01“…In this study, we address the offloading problem of partitionable tasks in collaborative edge computing systems and propose a new evaluation model that jointly optimizes the time and energy costs along with the system utility. …”
Get full text
Article -
545
Subdivision Depth Computation for Tensor Product n-Ary Volumetric Models
Published 2011-01-01“…We offer computational formula of subdivision depth for tensor product n-ary (n⩾2) volumetric models based on error bound evaluation technique. …”
Get full text
Article -
546
-
547
New Predictive Models for the Computation of Reinforced Concrete Columns Shear Strength
Published 2024-12-01“…The assessment methods for estimating the behavior of the complex mechanics of reinforced concrete (RC) structural elements were primarily based on experimental investigation, followed by the collective evaluation of experimental databases from the available literature. …”
Get full text
Article -
548
Improved computation of genomic and pedigree inbreeding and relationships accounting for the X chromosome
Published 2025-06-01“…Allele frequency also affects the computation of Fgen. Programs to compute pedigree and genomic measures were revised to improve speed and memory use, as well as to better account for the X chromosome. …”
Get full text
Article -
549
Evaluation Study for Celiac Disease Diagnosing by using Deep Learning Techniques
Published 2025-06-01Get full text
Article -
550
Comprehensive and Dedicated Metrics for Evaluating AI-Generated Residential Floor Plans
Published 2025-05-01Subjects: Get full text
Article -
551
Preparation and performance evaluation of cyclodextrin bifunctional monomer molecularly imprinted polymers
Published 2018-11-01“…The preparation and performance evaluation of the cyclodextrin bifunctional monomer molecularly imprinted polymer were studied. …”
Get full text
Article -
552
Evaluation of Various Free Software Options for Catphan 504 Phantom Analysis
Published 2024-03-01“…In computed tomography, image quality tests are important to guarantee a correct medical diagnosis and a better cost and benefit for the patient. …”
Get full text
Article -
553
A Modular Efficiency Determination Formula for Information Retrieval Evaluations and Optimizations
Published 2023-06-01Get full text
Article -
554
-
555
Evaluating DL Model Scaling Trade-Offs During Inference via an Empirical Benchmark Analysis
Published 2024-12-01Get full text
Article -
556
-
557
Energy- and Resource-Aware Computation Offloading for Complex Tasks in Edge Environment
Published 2020-01-01“…Both extensive experimental evaluations and detailed theoretical analysis are conducted to show that the proposed method is effective and efficiency.…”
Get full text
Article -
558
A High-Order Fractional Parallel Scheme for Efficient Eigenvalue Computation
Published 2025-05-01“…The method is implemented within a parallel computing framework, allowing simultaneous computations across multiple processors to improve both efficiency and reliability. …”
Get full text
Article -
559
Kernel to computation: identifying optimal feature set for red rice classification
Published 2025-12-01Get full text
Article -
560
Beyond analytic bounds: Re-evaluating predictive power in risky decision models
Published 2024-01-01Get full text
Article