Showing 841 - 860 results of 26,849 for search 'evaluation computational', query time: 0.23s Refine Results
  1. 841

    Preliminary Evaluation of the Scandinavian Guidelines for Initial Management of Minimal, Mild, and Moderate Head Injuries with Glial Fibrillary Acidic Protein by Mira Keski-Pukkila, Justin E. Karr, Jussi P. Posti, Ksenia Berghem, Anna-Kerttu Kotilainen, Kaj Blennow, Henrik Zetterberg, Grant L. Iverson, Teemu M. Luoto

    Published 2024-11-01
    “…Glial fibrillary acidic protein (GFAP) has become the most promising biomarker for detecting traumatic abnormalities on head computed tomography (CT) in patients with traumatic brain injury (TBI), but most studies have not addressed the potential added value of combining the biomarker with clinical variables that confer risk for intracranial injuries. …”
    Get full text
    Article
  2. 842

    Evaluation of a Plasmon-Based Optical Integrated Circuit for Error-Tolerant Streaming Applications by Samantha Lubaba Noor, Xuan Wu, Dennis Lin, Pol van Dorpe, Francky Catthoor, Patrick Reynaert, Azad Naeemi

    Published 2024-01-01
    “…We have also holistically evaluated the system-level performance of the computing module, taking into account various factors such as power consumption, operational speed, physical footprint, and average temperature. …”
    Get full text
    Article
  3. 843

    SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation by Seyed Salar Sefati, Bahman Arasteh, Octavian Fratu, Simona Halunga

    Published 2025-07-01
    “…SSLA achieves high detection accuracy with minimal computational overhead, ensuring reliable, real-time protection for cloud-based web applications.…”
    Get full text
    Article
  4. 844

    A Computational Framework to Predict the Soccer Ball Trajectory by Pierluigi Maponi, Riccardo Piombin

    Published 2025-01-01
    “…The starting point of the proposed method is a deep revision of fluid dynamics results to provide an effective computational procedure for the evaluation of the drag force and the lift force on the soccer ball. …”
    Get full text
    Article
  5. 845

    Information Processing and Assessment for Improved Computational Energy Modelling by Zuhair A Nasar

    Published 2021-09-01
    “… This study explores how designer interacts with the computational model. This research intends to demystify how “design knowledge” is obtained, used and processed in the age of computation. …”
    Get full text
    Article
  6. 846
  7. 847

    SIFO: Secure Computational Infrastructure Using FPGA Overlays by Xin Fang, Stratis Ioannidis, Miriam Leeser

    Published 2019-01-01
    “…Secure Function Evaluation (SFE) has received recent attention due to the massive collection and mining of personal data, but remains impractical due to its large computational cost. …”
    Get full text
    Article
  8. 848

    Assessing computational methods of cis-regulatory module prediction. by Jing Su, Sarah A Teichmann, Thomas A Down

    Published 2010-12-01
    “…We also propose key considerations for the development and evaluation of future CRM-prediction methods.…”
    Get full text
    Article
  9. 849
  10. 850

    CONSTRUCTION PRINCIPLES OF COMPUTING UNITS FOR INTELLECTUAL DATA PROCESSING by M. M. Tatur

    Published 2016-09-01
    “…An approach to the development of problem-oriented parallel computers for a wide range of tasks of intelligent data processing is described. …”
    Get full text
    Article
  11. 851

    AN ONTOLOGY SEARCH FOR VIETNAMESE ACADEMIC DOCUMENTS IN COMPUTER SCIENCE by Nguyễn Hữu Vĩnh

    Published 2017-09-01
    “…The proposed artefacts were evaluated using Vietnamese documents in three areas: Software engineering; Programming; and Computer networking. …”
    Get full text
    Article
  12. 852

    Trusted secure model for data services in cloud computing by Li-zhi XIONG, Zheng-quan XU, Xin GU

    Published 2014-10-01
    “…For trusted status of cloud service provider (CSP) and security requirements for data services in cloud computing,the trusted re-encryption secure model (TRSM) for cloud data services was proposed.Only with a certain trusted degree in CSP,cloud data security can be ensured by taking effective re-encryption schemes.The re-encryption secure model is verified by the classical cryptographic algorithms and analyzed by random oracles.Thus,the basic requirements of realizing re-encryption algorithm are got.Moreover,trusted evaluation model is proposed and used to dynamically evaluate CSP’s trusted status,provides theoretical basis and realization for establishment of trusted secure data services in cloud computing.…”
    Get full text
    Article
  13. 853

    Computer Vision Syndrome: Affecting Young and Old Alike by Anchit Wapa, Anu Namgyal

    Published 2018-07-01
    “…Ocular problems are reported as the most frequently occurring health problems among computer users. Here we report case of a young banker who was suffering from computer vision syndrome and after proper evaluation and guidance, she got better.…”
    Get full text
    Article
  14. 854
  15. 855

    Key Technologies of Edge Computing Gateway and Its Application by LI Wenhao, CHEN Zhongsheng

    Published 2022-08-01
    “…In this paper, the literatures and researches on edge computing gateway at home and abroad are investigated, and the function selection and evaluation, key technologies, development history and application progress of edge computing gateway are summarized, the future development of edge computing gateway in the era of 5G and artificial intelligence is prospected based on the current application status and development trend of edge computing technology.…”
    Get full text
    Article
  16. 856

    Towards Intelligent Assessment in Personalized Physiotherapy with Computer Vision by Victor García, Olga C. Santos

    Published 2025-05-01
    “…By extracting skeletal data from video input, the system enables objective evaluation of patient movements and rehabilitation progress. …”
    Get full text
    Article
  17. 857

    Mobile Imaging and Computing for Intelligent Structural Damage Inspection by ZhiQiang Chen, Jianfei Chen

    Published 2014-01-01
    “…The most significant one is the lacking of computing and processing capability in the real time. …”
    Get full text
    Article
  18. 858

    Method of computation of gas-tube engines in windmill modes by I. A. Leshchenko, M. V. Rozhkova, A. A. Tarmaev, V. V. Donskikh

    Published 2025-06-01
    “…The work presents a method for computation of the windmill modes of gas turbine engines based on the use of analytical and numerical methods. …”
    Get full text
    Article
  19. 859

    Resource Scheduling with Uncertain Execution Time in Cloud Computing by LI Cheng-yan, CAO Ke-han, FENG Shi-xiang, SUN Wei

    Published 2019-02-01
    “…For the problem of cloud computing resource scheduling, based on the fuzzy programming theory, a fuzzy cloud resource scheduling model under timecost constraint was set up, the uncertain execution time of tasks is represented by the triangular fuzzy number, and the target is to minimize the average value and standard deviation of the evaluation function An improved chaotic ant colony algorithm was proposed to solve the model, the elitist strategy is introduced to optimize the pheromone updating, a chaotic mapping with infinite folding times is used for chaotic search, and the adaptive chaotic disturbance mechanism is designed to enhance the global searching ability The model and algorithm were tested on the Cloudsim platform, the reliability of the model was proved, and the experimental results showed that the proposed algorithm had better performance in convergence speed, solution ability and load balance…”
    Get full text
    Article
  20. 860

    Achieving liquid processors by colloidal suspensions for reservoir computing by Raphael Fortulan, Noushin Raeisi Kheirabadi, Alessandro Chiolerio, Andrew Adamatzky

    Published 2024-09-01
    “…Abstract The increasing use of machine learning, with its significant computational and environmental costs, has motivated the exploration of unconventional computing substrates. …”
    Get full text
    Article