Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
841
Preliminary Evaluation of the Scandinavian Guidelines for Initial Management of Minimal, Mild, and Moderate Head Injuries with Glial Fibrillary Acidic Protein
Published 2024-11-01“…Glial fibrillary acidic protein (GFAP) has become the most promising biomarker for detecting traumatic abnormalities on head computed tomography (CT) in patients with traumatic brain injury (TBI), but most studies have not addressed the potential added value of combining the biomarker with clinical variables that confer risk for intracranial injuries. …”
Get full text
Article -
842
Evaluation of a Plasmon-Based Optical Integrated Circuit for Error-Tolerant Streaming Applications
Published 2024-01-01“…We have also holistically evaluated the system-level performance of the computing module, taking into account various factors such as power consumption, operational speed, physical footprint, and average temperature. …”
Get full text
Article -
843
SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation
Published 2025-07-01“…SSLA achieves high detection accuracy with minimal computational overhead, ensuring reliable, real-time protection for cloud-based web applications.…”
Get full text
Article -
844
A Computational Framework to Predict the Soccer Ball Trajectory
Published 2025-01-01“…The starting point of the proposed method is a deep revision of fluid dynamics results to provide an effective computational procedure for the evaluation of the drag force and the lift force on the soccer ball. …”
Get full text
Article -
845
Information Processing and Assessment for Improved Computational Energy Modelling
Published 2021-09-01“… This study explores how designer interacts with the computational model. This research intends to demystify how “design knowledge” is obtained, used and processed in the age of computation. …”
Get full text
Article -
846
-
847
SIFO: Secure Computational Infrastructure Using FPGA Overlays
Published 2019-01-01“…Secure Function Evaluation (SFE) has received recent attention due to the massive collection and mining of personal data, but remains impractical due to its large computational cost. …”
Get full text
Article -
848
Assessing computational methods of cis-regulatory module prediction.
Published 2010-12-01“…We also propose key considerations for the development and evaluation of future CRM-prediction methods.…”
Get full text
Article -
849
Computational biology approach to predict molecular mechanism in cancer
Published 2024-12-01Get full text
Article -
850
CONSTRUCTION PRINCIPLES OF COMPUTING UNITS FOR INTELLECTUAL DATA PROCESSING
Published 2016-09-01“…An approach to the development of problem-oriented parallel computers for a wide range of tasks of intelligent data processing is described. …”
Get full text
Article -
851
AN ONTOLOGY SEARCH FOR VIETNAMESE ACADEMIC DOCUMENTS IN COMPUTER SCIENCE
Published 2017-09-01“…The proposed artefacts were evaluated using Vietnamese documents in three areas: Software engineering; Programming; and Computer networking. …”
Get full text
Article -
852
Trusted secure model for data services in cloud computing
Published 2014-10-01“…For trusted status of cloud service provider (CSP) and security requirements for data services in cloud computing,the trusted re-encryption secure model (TRSM) for cloud data services was proposed.Only with a certain trusted degree in CSP,cloud data security can be ensured by taking effective re-encryption schemes.The re-encryption secure model is verified by the classical cryptographic algorithms and analyzed by random oracles.Thus,the basic requirements of realizing re-encryption algorithm are got.Moreover,trusted evaluation model is proposed and used to dynamically evaluate CSP’s trusted status,provides theoretical basis and realization for establishment of trusted secure data services in cloud computing.…”
Get full text
Article -
853
Computer Vision Syndrome: Affecting Young and Old Alike
Published 2018-07-01“…Ocular problems are reported as the most frequently occurring health problems among computer users. Here we report case of a young banker who was suffering from computer vision syndrome and after proper evaluation and guidance, she got better.…”
Get full text
Article -
854
Composite trapezoidal quadrature for computing hypersingular integrals on interval
Published 2024-12-01Get full text
Article -
855
Key Technologies of Edge Computing Gateway and Its Application
Published 2022-08-01“…In this paper, the literatures and researches on edge computing gateway at home and abroad are investigated, and the function selection and evaluation, key technologies, development history and application progress of edge computing gateway are summarized, the future development of edge computing gateway in the era of 5G and artificial intelligence is prospected based on the current application status and development trend of edge computing technology.…”
Get full text
Article -
856
Towards Intelligent Assessment in Personalized Physiotherapy with Computer Vision
Published 2025-05-01“…By extracting skeletal data from video input, the system enables objective evaluation of patient movements and rehabilitation progress. …”
Get full text
Article -
857
Mobile Imaging and Computing for Intelligent Structural Damage Inspection
Published 2014-01-01“…The most significant one is the lacking of computing and processing capability in the real time. …”
Get full text
Article -
858
Method of computation of gas-tube engines in windmill modes
Published 2025-06-01“…The work presents a method for computation of the windmill modes of gas turbine engines based on the use of analytical and numerical methods. …”
Get full text
Article -
859
Resource Scheduling with Uncertain Execution Time in Cloud Computing
Published 2019-02-01“…For the problem of cloud computing resource scheduling, based on the fuzzy programming theory, a fuzzy cloud resource scheduling model under timecost constraint was set up, the uncertain execution time of tasks is represented by the triangular fuzzy number, and the target is to minimize the average value and standard deviation of the evaluation function An improved chaotic ant colony algorithm was proposed to solve the model, the elitist strategy is introduced to optimize the pheromone updating, a chaotic mapping with infinite folding times is used for chaotic search, and the adaptive chaotic disturbance mechanism is designed to enhance the global searching ability The model and algorithm were tested on the Cloudsim platform, the reliability of the model was proved, and the experimental results showed that the proposed algorithm had better performance in convergence speed, solution ability and load balance…”
Get full text
Article -
860
Achieving liquid processors by colloidal suspensions for reservoir computing
Published 2024-09-01“…Abstract The increasing use of machine learning, with its significant computational and environmental costs, has motivated the exploration of unconventional computing substrates. …”
Get full text
Article