Search alternatives:
computation » computational (Expand Search)
Showing 541 - 560 results of 26,849 for search 'evaluation computation', query time: 0.21s Refine Results
  1. 541

    Bone evaluation of single edentulous areas of maxilla: short communication by Ana Luísa de Barros Pascoal, Keiverton Rones Gurgel Paiva, Amanda Karoline Dantas Cavalcante, Ana Roberta Assunção de Freitas, Wagner Ranier Maciel Dantas, Bruno César de Vasconcelos Gurgel, Patrícia dos Santos Calderón

    Published 2021-12-01
    “…Materials and Methods: In this cross-sectional study, cone-beam computed tomography (CBCT) images of single edentulous areas of maxilla of patients who needed aesthetic single implant rehabilitations were evaluated for measure the height and thickness using an implant planning software. …”
    Get full text
    Article
  2. 542

    Bone evaluation of single edentulous areas of maxilla: short communication by Ana Luísa de Barros Pascoal, Keiverton Rones Gurgel Paiva, Amanda Karoline Dantas Cavalcante, Ana Roberta Assunção de Freitas, Wagner Ranier Maciel Dantas, Bruno César de Vasconcelos Gurgel, Patrícia dos Santos Calderón

    Published 2021-12-01
    “…Materials and Methods: In this cross-sectional study, cone-beam computed tomography (CBCT) images of single edentulous areas of maxilla of patients who needed aesthetic single implant rehabilitations were evaluated for measure the height and thickness using an implant planning software. …”
    Get full text
    Article
  3. 543

    Reputation computation based on new metric in P2P network by BAO Yu1, ZENG Guo-sun1, ZENG Lian-sun3, CHEN Bo1, WANG Wei1

    Published 2008-01-01
    “…For most of P2P file sharing trusted download,the current researches of the evaluation of the trusted peers based on reputation simply rely on the history of interaction and are not paid enough attention on the time factor.The other behaviors like recommendation are also ignored.The attack actions in reputation evaluation were discussed,and the recommender behavior in P2P network was considered separately,which made up for computation based on the interac-tion behavior in computation of reputation.Secondly,for the positive and negative evaluation,different time-decline co-efficient was added in the method to distinguish the malicious node named smart node which acts as a malicious node at times.Simulation experiments show that this proposed method not only increase the good files ratio in P2P download files,but also restrain the collusion in malicious nodes,especially the spy action.…”
    Get full text
    Article
  4. 544

    Optimal Computation Offloading Decisions Based on System Utility and Cost Balance by Bingxue Zhang, Xisheng Li, Jia You

    Published 2025-01-01
    “…In this study, we address the offloading problem of partitionable tasks in collaborative edge computing systems and propose a new evaluation model that jointly optimizes the time and energy costs along with the system utility. …”
    Get full text
    Article
  5. 545

    Subdivision Depth Computation for Tensor Product n-Ary Volumetric Models by Ghulam Mustafa, Muhammad Sadiq Hashmi

    Published 2011-01-01
    “…We offer computational formula of subdivision depth for tensor product n-ary (n⩾2) volumetric models based on error bound evaluation technique. …”
    Get full text
    Article
  6. 546
  7. 547

    New Predictive Models for the Computation of Reinforced Concrete Columns Shear Strength by Anthos I. Ioannou, David Galbraith, Nikolaos Bakas, George Markou, John Bellos

    Published 2024-12-01
    “…The assessment methods for estimating the behavior of the complex mechanics of reinforced concrete (RC) structural elements were primarily based on experimental investigation, followed by the collective evaluation of experimental databases from the available literature. …”
    Get full text
    Article
  8. 548

    Improved computation of genomic and pedigree inbreeding and relationships accounting for the X chromosome by Juan P. Nani, Gerald B. Jansen, Hafedh Ben Zaabza, Paul M. VanRaden

    Published 2025-06-01
    “…Allele frequency also affects the computation of Fgen. Programs to compute pedigree and genomic measures were revised to improve speed and memory use, as well as to better account for the X chromosome. …”
    Get full text
    Article
  9. 549
  10. 550
  11. 551

    Preparation and performance evaluation of cyclodextrin bifunctional monomer molecularly imprinted polymers by YU Haining, HUANG Haiyong, HE Chengzijing, LAY Sovichea, SHEN Shengrong

    Published 2018-11-01
    “…The preparation and performance evaluation of the cyclodextrin bifunctional monomer molecularly imprinted polymer were studied. …”
    Get full text
    Article
  12. 552

    Evaluation of Various Free Software Options for Catphan 504 Phantom Analysis by Lorena Cunha Fernandes, Maira Ribeiro dos Santos, Leonardo Peres da Silva, Thiago Viana Miranda Lima, Rafael Figueiredo Pohlmann Simões

    Published 2024-03-01
    “…In computed tomography, image quality tests are important to guarantee a correct medical diagnosis and a better cost and benefit for the patient. …”
    Get full text
    Article
  13. 553
  14. 554
  15. 555
  16. 556
  17. 557

    Energy- and Resource-Aware Computation Offloading for Complex Tasks in Edge Environment by Kai Peng, Bohai Zhao, Shengjun Xue, Qingjia Huang

    Published 2020-01-01
    “…Both extensive experimental evaluations and detailed theoretical analysis are conducted to show that the proposed method is effective and efficiency.…”
    Get full text
    Article
  18. 558

    A High-Order Fractional Parallel Scheme for Efficient Eigenvalue Computation by Mudassir Shams, Bruno Carpentieri

    Published 2025-05-01
    “…The method is implemented within a parallel computing framework, allowing simultaneous computations across multiple processors to improve both efficiency and reliability. …”
    Get full text
    Article
  19. 559
  20. 560