Showing 881 - 900 results of 26,849 for search 'evaluation computational', query time: 0.23s Refine Results
  1. 881
  2. 882
  3. 883

    The Ethical Significance of Brain-Computer Interfaces as Enablers of Communication by Toma Gruica

    Published 2025-08-01
    “…Barriers to and mediators of brain-computer interface user acceptance: Focus group findings. …”
    Get full text
    Article
  4. 884

    Research and Application of Testing Technology of Cloud Computing Database by Hongfei Qiu, Xianxu Li, Chunguang Huang

    Published 2013-10-01
    “…The infrastructure of database products was briefly introduced.Aiming at the performance of cloud computing database under the workload of business type,testing technology standard of cloud computing database was especially analyzed,and the evaluate and assessment methods of capacity of cloud computing database was expatiated.…”
    Get full text
    Article
  5. 885
  6. 886

    Stab Injury of the Thoracic Aorta: Computed Tomography Findings by Seyma Yildiz, Huseyin Toprak, Asli Serter, Ercan Kocakoç

    Published 2013-01-01
    “…Stab injury of the thoracic aorta is a rare condition with high mortality rate. Patients must be evaluated carefully, and the diagnosis usually should be confirmed by radiological modalities. …”
    Get full text
    Article
  7. 887

    Computed Tomography Findings of Pulmonary Mycobacterium simiae Infection by Ayeh Baghizadeh, Payam Mehrian, Poopak Farnia

    Published 2017-01-01
    “…Herein, we aimed to evaluate and compare the computed tomography (CT) scan findings of M. simiae infection in lungs. …”
    Get full text
    Article
  8. 888

    On the Optimal Dynamic Control Strategy of Disruptive Computer Virus by Jichao Bi, Xiaofan Yang, Yingbo Wu, Qingyu Xiong, Junhao Wen, Yuan Yan Tang

    Published 2017-01-01
    “…Disruptive computer viruses have inflicted huge economic losses. …”
    Get full text
    Article
  9. 889

    Cone-Beam Computed Tomography Prescriptions in Pediatric Dentistry by Samareh Mortazavi, Rasoul Sahebalam, Soroush Sadeghi, Iman Shiezadeh

    Published 2025-04-01
    “… Introduction: Cone Beam Computed Tomography (CBCT) is increasingly used in pediatric dentistry for better diagnostics and treatment, but concerns about its potential harm to children remain. …”
    Get full text
    Article
  10. 890

    ENCRYPTION OF IMAGES ON THE BASIS OF CHAOTIC MAPPING AND PARALLEL COMPUTING by A. V. Sidorenko, M. S. Shishko

    Published 2017-12-01
    “…The chaos-based image encryption algorithm using parallel computing is described. To reduce the amount of encrypted data the wavelet-based compression is used. …”
    Get full text
    Article
  11. 891

    Data-intensive service deployment based on edge computing by Yongmei GAO, Guanjie CHENG

    Published 2019-07-01
    “…Due to the huge data transmission between service components, a great transmission delay will affect the overall performance of the system. In the edge computing environment, an optimized deployment strategy based on the negative selection algorithm was proposed to reduce the data transmission time in the service composition. …”
    Get full text
    Article
  12. 892

    Data-intensive service deployment based on edge computing by Yongmei GAO, Guanjie CHENG

    Published 2019-07-01
    “…Due to the huge data transmission between service components, a great transmission delay will affect the overall performance of the system. In the edge computing environment, an optimized deployment strategy based on the negative selection algorithm was proposed to reduce the data transmission time in the service composition. …”
    Get full text
    Article
  13. 893

    Accelerating machine learning at the edge with approximate computing on FPGAs by Luis Gerardo León-Vega, Eduardo Salazar-Villalobos, Jorge Castro-Godínez

    Published 2022-11-01
    “…This research aims to accelerate machine learning by offloading the computation to low-end FPGAs and using approximate computing techniques to optimise resource usage, taking advantage of the inaccurate nature of machine learning models. …”
    Get full text
    Article
  14. 894

    A Novel Clustering Algorithm Inspired by Membrane Computing by Hong Peng, Xiaohui Luo, Zhisheng Gao, Jun Wang, Zheng Pei

    Published 2015-01-01
    “…The tissue-like P system can effectively search for the optimal partitioning with the help of its parallel computing advantage. The proposed clustering algorithm is evaluated on four artificial data sets and six real-life data sets. …”
    Get full text
    Article
  15. 895

    Recent Developments in Computed Tomography for Urolithiasis: Diagnosis and Characterization by P. D. Mc Laughlin, L. Crush, M. M. Maher, O. J. O'Connor

    Published 2012-01-01
    “…Objective. To critically evaluate the current literature in an effort to establish the current role of radiologic imaging, advances in computed tomography (CT) and standard film radiography in the diagnosis, and characterization of urinary tract calculi. …”
    Get full text
    Article
  16. 896

    Analysis of the current status of computed tomography diagnosis of sarcopenia by Qingxin He, Wenfang Xia

    Published 2024-07-01
    “…Compared to previous diagnostic techniques such as dual-energy X-ray absorptiometry (DXA), bioelectrical impedance analysis (BIA), and body composition analysis, computed tomography (CT) offers significant advantages. …”
    Get full text
    Article
  17. 897
  18. 898

    Numerical Computation and Investigation of the Characteristics of Microscale Synthetic Jets by Ann Lee, Guan H. Yeoh, Victoria Timchenko, John Reizes

    Published 2011-01-01
    “…The governing equations are transformed into the curvilinear coordinate system in which the grid velocities evaluated are then fed into the computation of the flow in the cavity domain thus allowing the conservation equations of mass and momentum to be solved within the stationary computational domain. …”
    Get full text
    Article
  19. 899

    Biometric Fusion for Enhanced Authentication in Cloud Computing Environments by Chiyo Miyazawa, Ryosuke Sato

    Published 2024-03-01
    “…In the realm of cloud computing, ensuring robust data security is of utmost importance. …”
    Get full text
    Article
  20. 900

    Use of granular computing for resource optimization in IoT networks by Jaime Govea, Rommel Gutierrez, William Villegas-Ch

    Published 2025-04-01
    “…These techniques were implemented and evaluated in a controlled industrial IoT testbed comprising over 80 devices. …”
    Get full text
    Article