Showing 1,101 - 1,120 results of 26,849 for search 'evaluation computational', query time: 0.23s Refine Results
  1. 1101

    Text analysis of DNS queries for data exfiltration protection of computer networks by Ya. V. Bubnov, N. N. Ivanov

    Published 2020-09-01
    “…To classify the requests in convolutional neural network the use of character embedding for representing the string of a domain name is proposed. Quality evaluation of the trained neural network used for recognition of data exfiltration through domain name system using ROC-analysis is performed.The paper presents the software architecture used for deployment of trained neural network into existing infrastructure of the domain name system targeting practical computer networks protection from data exfiltration. …”
    Get full text
    Article
  2. 1102

    Key Considerations for Real-Time Object Recognition on Edge Computing Devices by Nico Surantha, Nana Sutisna

    Published 2025-07-01
    “…An example of an application is also presented in this article, which is about real-time power transmission line detection using edge computing devices. The evaluation results show the significance of implementing lightweight models and model compression techniques such as quantized Tiny YOLOv7. …”
    Get full text
    Article
  3. 1103

    Cone Beam Computed Tomography in Oral Cancer: A Scoping Review by Muhammad Aiman Mohd Nizar, Syed Nabil

    Published 2025-05-01
    “…<b>Objectives</b>: The present scoping review aims to explore and provide an overview of the current applications of cone beam computed tomography (CBCT) in the management of oral cancer. …”
    Get full text
    Article
  4. 1104

    A pair-based task scheduling algorithm for cloud computing environment by Sanjaya Kumar Panda, Shradha Surachita Nanda, Sourav Kumar Bhoi

    Published 2022-01-01
    “…In the cloud computing environment, scheduling algorithms show the vital role of finding a possible schedule of the tasks. …”
    Get full text
    Article
  5. 1105

    An NVMe-Based Secure Computing Platform With FPGA-Based TFHE Accelerator by Yoshihiro Ohba, Tomoya Sanuki, Claude Gravel, Kentaro Mihara, Asuka Wakasugi, Kenta Adachi

    Published 2025-01-01
    “…We defined secure computing instructions to evaluate 14-bit to 14-bit functions using TFHE. …”
    Get full text
    Article
  6. 1106

    THE ROLE OF COMPUTED TOMOGRAPHY IN PATIENTS WITH GASTRIC CANCER IN RADIO-ONCOLOGICAL HOSPITAL by N. K. Silanteva, T. A. Agababian, V. Yu. Skoropad, O. G. Grishina

    Published 2016-02-01
    “…Results. The role of computed tomography in the study of gastric carcinoma is mainly represented by the staging of tumor according to the TNM system; CT topometry; assessment of response to neoadjuvant therapy; evaluation of postoperative complications and the post-therapy control. …”
    Get full text
    Article
  7. 1107

    A high-performance tensor computing unit for deep learning acceleration by Qiang Zhou, Tieli Sun, Taoran Shen, York Xue

    Published 2025-06-01
    “…It can readily select proper operators to achieve 96% of the chip peak performance under certain shapes and find the best performance implementation within limited power. The evaluation of a large number of convolution shapes on our tensor computing unit chip shows the generated operators significantly outperform the hand-written ones, achieving 9% higher normalized performance than CUDA according to the silicon data.…”
    Get full text
    Article
  8. 1108
  9. 1109

    Development of Quizizz-based Learning Media on Basic Computer and Network Subjects by Trully Yetti Puspita, Ganefri Ganefri

    Published 2021-01-01
    “…This study aims to develop Quizizz in basic computer and network subjects as a learning medium and to see the validity, practicality, and effectiveness of Quizizz as a learning medium in Basic Computer and Network subjects. …”
    Get full text
    Article
  10. 1110

    OESOPHAGEAL DILATATION ON CHEST HIGH-RESOLUTION COMPUTED TOMOGRAPHY IN SYSTEMIC SCLEROSIS by Atalay Doğru, Zübeyde Uğurlu

    Published 2025-03-01
    “…Material and Methods: The study included 86 patients. A retrospective evaluation was performed on the demographic data, biochemical and serological tests, and chest high-resolution computed tomography (HRCT) images of the patients. …”
    Get full text
    Article
  11. 1111

    All-You-Can-Compute: Packed Secret Sharing for Combined Resilience by Sebastian Faust, Maximilian Orlt, Kathrin Wirschem, Liang Zhao

    Published 2025-03-01
    “…For example, for an AES evaluation that protects against t probes and e faults, we improve the randomness complexity of the state-of-the-art construction when t + e > 3, leading to an improvement of up to a factor of 2.41. …”
    Get full text
    Article
  12. 1112

    Research on Pork Cut and Freshness Determination Method Based on Computer Vision by Shihao Song, Qiqi Guo, Xiaosa Duan, Xiaojing Shi, Zhenyu Liu

    Published 2024-12-01
    “…To improve the precision and efficiency of pork quality assessment, an automated detection method based on computer vision technology is proposed for evaluating different parts and freshness of pork. …”
    Get full text
    Article
  13. 1113

    New Predictive Models for the Computation of Reinforced Concrete Columns Shear Strength by Anthos I. Ioannou, David Galbraith, Nikolaos Bakas, George Markou, John Bellos

    Published 2024-12-01
    “…The assessment methods for estimating the behavior of the complex mechanics of reinforced concrete (RC) structural elements were primarily based on experimental investigation, followed by the collective evaluation of experimental databases from the available literature. …”
    Get full text
    Article
  14. 1114

    A Comprehensive Review of Explainable Artificial Intelligence (XAI) in Computer Vision by Zhihan Cheng, Yue Wu, Yule Li, Lingfeng Cai, Baha Ihnaini

    Published 2025-07-01
    “…Explainable Artificial Intelligence (XAI) is increasingly important in computer vision, aiming to connect complex model outputs with human understanding. …”
    Get full text
    Article
  15. 1115

    Livestock Biometrics Identification Using Computer Vision Approaches: A Review by Hua Meng, Lina Zhang, Fan Yang, Lan Hai, Yuxing Wei, Lin Zhu, Jue Zhang

    Published 2025-01-01
    “…This paper aims to comprehensively survey the techniques for individual livestock identification based on computer vision methods. It begins by elucidating the uniqueness of the primary biometric features of livestock, such as facial features, and their critical role in the recognition process. …”
    Get full text
    Article
  16. 1116

    Energy-Efficient Distributed Edge Computing to Assist Dense Internet of Things by Sumaiah Algarni, Fathi E. Abd El-Samie

    Published 2025-01-01
    “…The proposed network depends on distributed edge computing at two levels: multiple access edge computing and fog computing. …”
    Get full text
    Article
  17. 1117

    Device-Driven Service Allocation in Mobile Edge Computing with Location Prediction by Qian Zeng, Xiaobo Li, Yixuan Chen, Minghao Yang, Xingbang Liu, Yuetian Liu, Shiwei Xiu

    Published 2025-05-01
    “…With the rapid deployment of edge base stations and the widespread application of 5G technology, Mobile Edge Computing (MEC)has gradually transitioned from a theoretical concept to practical implementation, playing a key role in emerging human-machine interactions and innovative mobile applications. …”
    Get full text
    Article
  18. 1118

    Blockchain and signcryption enabled asynchronous federated learning framework in fog computing by Zhou Zhou, Youliang Tian, Jinbo Xiong, Changgen Peng, Jing Li, Nan Yang

    Published 2025-04-01
    “…Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. …”
    Get full text
    Article
  19. 1119

    Impact of contrast material on calcium burden by coronary computed tomography angiography by Kenji Sadamatsu, Etsuro Kawaguchi, Miwako Shihara, Yoshihiro Fukumoto

    Published 2025-03-01
    “… Background: Coronary computed tomography angiography (CCTA) helps reveal complex coronary lesions and improves the success and complication rates of coronary interventions for the lesions. …”
    Get full text
    Article
  20. 1120

    Securing fog computing in healthcare with a zero-trust approach and blockchain by Navjeet Kaur, Ayush Mittal, Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Kashif Saleem, Ehab Seif Ghith

    Published 2025-02-01
    “…Abstract As healthcare systems increasingly adopt fog computing to improve responsiveness and real-time data processing at the edge, significant security challenges emerge due to the decentralized architecture. …”
    Get full text
    Article