Showing 1,981 - 2,000 results of 26,849 for search 'evaluation computational', query time: 0.27s Refine Results
  1. 1981

    Subtle tarsometatarsal ligament injury in a professional ballerina: weight-bearing computed tomography technical tip by Alexandre Leme Godoy-Santos, Carlos Felipe Teixeira Lobo, Dov Lagus Rosemberg, Rafael Barban Sposeto, François Lintz, Cesar de Cesar Netto

    Published 2025-04-01
    “…Magnetic Resonance imaging associated with weight-bearing computed tomography (WBCT) allows evaluation of such injuries in 3 dimensions (3D) under physiologic load. …”
    Get full text
    Article
  2. 1982

    Supplier Selection Risk: A New Computer-Based Decision-Making System with Fuzzy Extended AHP by Marcus V. C. Fagundes, Bernd Hellingrath, Francisco G. M. Freires

    Published 2021-03-01
    “…In this article, we propose a new computational system based on the ‘Fuzzy Extended Analytic Hierarchy Process (FEAHP)’ method for supplier selection while considering the relevant risks. …”
    Get full text
    Article
  3. 1983
  4. 1984

    Theoretical aspects of the method of teaching higher mathematics using the computer program Maple for students of technical universities by Amon A. Rakhimov

    Published 2025-03-01
    “…In the course of the study, evaluation of the results of educational process in a technical university, where higher mathematics is taught using the Maple computer system, was carried out. …”
    Get full text
    Article
  5. 1985

    The Relationship between the Cloud Computing Model and Information Technology Infrastructure Library (ITIL) from the Viewpoint of Experts by Isaias Scalabrin Bianchi, Antônio Pinto, Ruben Pereira

    Published 2025-07-01
    “… Cloud Computing is widely recognized as a recent computing paradigm of digital transformation, in which scalable and elastic computational resources are delivered as a service through internet technologies. …”
    Get full text
    Article
  6. 1986

    Subtle tarsometatarsal ligament injury in a professional ballerina: weight-bearing computed tomography technical tip by Alexandre Leme Godoy-Santos, Carlos Felipe Teixeira Lobo, Dov Lagus Rosemberg, Rafael Barban Sposeto, François Lintz, Cesar de Cesar Netto

    Published 2025-04-01
    “…Magnetic Resonance imaging associated with weight-bearing computed tomography (WBCT) allows evaluation of such injuries in 3 dimensions (3D) under physiologic load. …”
    Get full text
    Article
  7. 1987

    Greedy gradient-free adaptive variational quantum algorithms on a noisy intermediate scale quantum computer by César Feniou, Muhammad Hassan, Baptiste Claudon, Axel Courtat, Olivier Adjoua, Yvon Maday, Jean-Philip Piquemal

    Published 2025-05-01
    “…Abstract Hybrid quantum-classical adaptive Variational Quantum Eigensolvers (VQE) hold the potential to outperform classical computing for simulating many-body quantum systems. …”
    Get full text
    Article
  8. 1988

    Dynamic Split Computing Framework for Multi-Task Learning Models: A Deep Reinforcement Learning Approach by Haneul Ko, Sangwon Seo, Sangheon Pack

    Published 2025-01-01
    “…The formulated problem is solved using a model-free DRL algorithm (i.e., a deep deterministic policy gradient). Evaluation results demonstrate that D2SCF reduces the average task completion time by more than 50% compared to conventional split computing schemes, while maintaining low energy consumption on the IoT device. …”
    Get full text
    Article
  9. 1989

    A Comprehensive Integrated Security Model with Advanced Access Control for Enhancing WSN Computing in IoT Frameworks by Navaneethan S., Arun A.

    Published 2025-01-01
    “…The detailed framework includes phases such as system initialization, user management, and access permission administration, ensuring robust security throughout data transactions. Evaluation of the model's efficacy is conducted based on various security metrics pertinent to WSN computing environments. …”
    Get full text
    Article
  10. 1990

    Acquisition of transversal competencies through a project-based learning model for computer systems engineering students by Julieta Noguez, Enedina Ortega Gutiérrez, Luis Neri, Julio E. Rubio

    Published 2025-06-01
    “…IntroductionThis article presents an innovative educational practice to promote transversal competences in computer engineering university students, through Project Based Learning (PjBL), providing students with the benefit of experiential learning. …”
    Get full text
    Article
  11. 1991

    Accuracy of Digital Radiography and Cone Beam Computed Tomography on Periapical Radiolucency Detection in Endodontically Treated Teeth by Tadas Venskutonis, Povilas Daugela, Marijus Strazdas, Gintaras Juodzbalys

    Published 2014-07-01
    “…Twenty patients met inclusion criteria and were selected for further evaluation. Results: In 20 patients (42.4 [SD 12.1] years, 65% men and 35% women) a total of 35 endodontically treated teeth (1.75 [SD 0.91]; 27 in maxilla and 8 in mandible) were evaluated. …”
    Get full text
    Article
  12. 1992
  13. 1993

    The retreatment abilities of ProTaper Next and F6 Skytaper: a micro-computed tomography study by Esma Sarıçam, Selen İnce Yusufoğlu, Mert Ocak, Ferhat Geneci, Hakan Hamdi Celik

    Published 2021-05-01
    “…Purpose: The aim of this study was to evaluate the retreatment abilities of the ProTaper Next (PTN) and F6 SkyTaper (F6) systems by using micro-computed tomography (micro-ct), radiographic and microscopic imaging techniques.Materials and Methods: The root canals of twenty-six extracted mandibular premolar teeth were prepared and obturated. …”
    Get full text
    Article
  14. 1994

    Assessment of degenerative changes in the atlanto-odontoid joint using cone-beam computed tomography (CBCT) imaging by Ramazan Berkay Peker, Omer Said Sezgin, Saadettin Kayipmaz, Senem Tuğra Dönmez

    Published 2025-06-01
    “…Background This study sought to evaluate the severity of osteoarthritis in the atlanto-odontoid joint (AOJ) using cone-beam computed tomography (CBCT) and analyse its distribution by age and sex. …”
    Get full text
    Article
  15. 1995

    Soft Computing Solutions for Reducing the Carbon Footprint of Fly Ash Based Concrete. Advances in Civil Engineering by Awoyera, Paul O., Adetola, Joshua, Nayeemuddin, Mohammed, Mewada, Hiren, George Fadugba, Olaolu

    Published 2025
    “…The construction industry significantly contributes to environmental degradation,with many structures exhibiting high carbon footprints throughout their construction processes and lifespans.Activities such as cement hydration and other commoncon-struction practices substantially influence environmental conditions overtime,necessitating a critical evaluation of material and design choices.This study reported the environmental impact of fly ash(FA),which is largely used to enhance concrete strength.A prediction of two end point indicators,that is,global warming potential(GWP)and CO2 emission using soft computing methods are presented,which are particularly effective for handling complex,non linear relationships in environmental data.To achieve this, two machine learning approaches,the random forest(RF)and decision tree(DT)models,are employed to assess the environ- mental impact of structural materials and designs.Two data sets were obtained from reputable databases,including ResearchGate, Science Direct, Semantic Scholar,and Mendeley Data.The models are trained to explore the potential for optimizing structural designs and material selection stominimize environmental impacts.Feature importance is analyzed using Shapley values,providing insights into the most influential factors affecting GWP and CO2 emission Model performance is evaluated using R2 and root mean square error(RMSE) metrics. …”
    Get full text
    Article
  16. 1996

    Applying the defense model to strengthen information security with artificial intelligence in computer networks of the financial services sector by Arodh Lal Karn, Hayder M. A. Ghanimi, Vijayalakshmi Iyengar, Mohd Shuaib Siddiqui, Meshal Ghalib Alharbi, Roobaea Alroobaea, Amr Yousef, Sudhakar Sengan

    Published 2025-08-01
    “…This study aims to develop and evaluate an Artificial Intelligence-Enhanced Defense-in-Depth (AI-E-DiD) designed to provide real-time, adaptive, and scalable cybersecurity prevention for financial networks. …”
    Get full text
    Article
  17. 1997

    The Positional Relationship Between the Mandibular Canal and the Lower Third Molar Determined on Cone-Beam Computed Tomography by Horatiu Urechescu, Ancuta Banu, Marius Pricop, Felicia Streian, Alisia Pricop, Cristiana Cuzic

    Published 2025-07-01
    “…Accurate preoperative evaluation is essential to minimize complications. This study assessed the three-dimensional positional relationship between the mandibular canal and lower third molars using cone-beam computed tomography (CBCT), aiming to identify anatomical positions associated with increased surgical risk. …”
    Get full text
    Article
  18. 1998

    Computed Tomographic Features of Bezoars and Other Gastrointestinal Foreign Bodies in Dogs and Cats: A Comparative Analysis by Jongwon Koo, Kidong Eom, Jaehwan Kim, Jeongyun Jeong, Hongji Yoon, Minsu Lee, Jinsoo Park, Jongmun Cho

    Published 2025-04-01
    “…This study presents a comparative analysis of the computed tomographic (CT), radiographic, and ultrasonographic (US) characteristics of gastrointestinal foreign bodies, including bezoars, in dogs and cats, and evaluates their association with complications and clinical outcomes. …”
    Get full text
    Article
  19. 1999
  20. 2000

    Exploring water, sanitation, and hygiene coverage targets for reaching and sustaining trachoma elimination: G-computation analysis. by Kristin M Sullivan, Emma M Harding-Esch, Alexander P Keil, Matthew C Freeman, Wilfrid E Batcho, Amadou A Bio Issifou, Victor Bucumi, Assumpta L Bella, Emilienne Epee, Segni Bobo Barkesa, Fikre Seife Gebretsadik, Salimato Sanha, Khumbo M Kalua, Michael P Masika, Abdallahi O Minnih, Mariamo Abdala, Marília E Massangaie, Abdou Amza, Boubacar Kadri, Beido Nassirou, Caleb D Mpyet, Nicholas Olobio, Mouctar D Badiane, Balgesa E Elshafie, Gilbert Baayenda, George E Kabona, Oscar Kaitaba, Alistidia Simon, Tawfik Q Al-Khateeb, Consity Mwale, Ana Bakhtiari, Daniel Westreich, Anthony W Solomon, Emily W Gower

    Published 2023-02-01
    “…<h4>Methods/findings</h4>We used g-computation to estimate the impact on the prevalence of trachomatous inflammation-follicular among children aged 1-9 years (TF1-9) when hypothetical WaSH interventions raised the minimum coverages from 5% to 100% for "nearby" face-washing water (<30 minutes roundtrip collection time) and adult latrine use in an evaluation unit (EU). …”
    Get full text
    Article