Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
1161
Supporting adult-learners’ online interaction in computer-mediated learningOSF
Published 2024-12-01“…In order to validate and improve the quality of the model a Delphi study was carried out among experts (n = 8) to evaluate the various components of the model, including its overall supportiveness for adult-learners in computer-mediated learning. …”
Get full text
Article -
1162
Solving Flexible Job-Shop Scheduling Problems Based on Quantum Computing
Published 2025-02-01“…The results demonstrate that quantum computing holds significant potential for solving FJSPs more efficiently than traditional computational methods.…”
Get full text
Article -
1163
Quality inspection of fertilizer granules using computer vision – a review
Published 2025-02-01“…The study provides an extensive overview of using computer vision to evaluate grain and fertilizer granule quality, highlighting granule size’s significance. …”
Get full text
Article -
1164
DEEP NEURAL NETWORK-BASED APPROACH FOR COMPUTING SINGULAR VALUES OF MATRICES
Published 2025-01-01“…The proposed CNN-based SVD method is evaluated against the conventional SVD algorithm, demonstrating superior performance in terms of computational time and accuracy. …”
Get full text
Article -
1165
The importance of cone-beam computed tomography in endodontic therapy: A review
Published 2023-11-01“…Introduction: Cone-beam computed tomography (CBCT) is a valuable tool in endodontics, particularly for assessing root morphology. …”
Get full text
Article -
1166
Ensemble Learning-Based Soft Computing Approach for Future Precipitation Analysis
Published 2025-06-01“…This study integrated the strengths of ensemble learning and soft computing to develop a future regional rainfall model for evaluating the complex characteristics of island precipitation. …”
Get full text
Article -
1167
Privacy-Preserving Live Video Analytics for Drones via Edge Computing
Published 2024-11-01“…The use of lightweight drones has surged in recent years across both personal and commercial applications, necessitating the ability to conduct live video analytics on drones with limited computational resources. While edge computing offers a solution to the throughput bottleneck, it also opens the door to potential privacy invasions by exposing sensitive visual data to risks. …”
Get full text
Article -
1168
Multi-constrained trusted cooperative task migration strategy for edge computing
Published 2019-11-01“…In order to guarantee the quality of service of edge computing,a trusted cooperative task distribution strategy for edge computing under multi-dimensional constraints was proposed.The strategy was based on the task requirements,and the edge computing collaborative service leader node organizes the coordinated service alliance members.The priority of cooperative service alliance was determined based on the K-dimension weight index of user task migration.Using the load balancing of the members as the adaptive function,the task allocation and dispatch of alliance members were performed by greedy algorithm.The backup node was selected based on routing piggyback,and the priority of migration was evaluated.The scheduling and migration of collaborative services in case of abnormal collaborative services were realized,which improved the quality of service of edge computing task migration and ensured the reliability of task migration.The simulation results show that the mechanism can effectively complete the task distribution and migration scheduling,improve the collaborative efficiency of edge computing,and guarantee the quality of network service.…”
Get full text
Article -
1169
Diagnostic capabilities of cardiac computed tomography in the preoperative diagnosis of hypertrophic cardiomyopathy
Published 2024-12-01“…CONCLUSION: Our scanning protocols developed with computed tomography scanners of various generations enable to evaluate the specific morphological patterns of hypertrophic cardiomyopathy in a single study and provide a detailed interpretation of the geometry of cardiac valves and chambers, left ventricular function, state of the coronary bed, and structural changes of the left ventricular myocardium.…”
Get full text
Article -
1170
Emerging Computing Tools for Emergency Management: Applications, Limitations and Future Prospects
Published 2025-01-01Get full text
Article -
1171
Trends in Computer-Aided Manufacturing in Prosthodontics: A Review of the Available Streams
Published 2014-01-01“…This narrative review aims to evaluate the different streams of computer-aided manufacturing in prosthodontics. …”
Get full text
Article -
1172
Accelerating and Compressing Transformer-Based PLMs for Enhanced Comprehension of Computer Terminology
Published 2024-10-01“…However, the vast size and computational demands of transformer-based PLMs present challenges, particularly regarding storage efficiency and processing speed. …”
Get full text
Article -
1173
Analysis and verification of safety computer time constraints for train-to-train communications
Published 2018-12-01“…The analysis and verification results indicate that onboard safety computer can meet the time constraints of more than three periodic safety-critical applications under the condition of single-core with main frequency of 1GHz, which demonstrates the effectiveness of verifying and evaluating the time constraints of safety computer periodic applications using TPN.…”
Get full text
Article -
1174
A Security Monitoring Method Based on Autonomic Computing for the Cloud Platform
Published 2018-01-01“…With the continuous development of cloud computing, cloud security has become one of the most important issues in cloud computing. …”
Get full text
Article -
1175
Key Technologies of Vehicle Active Safety System Based on Computer Vision
Published 2022-01-01“…Active vehicle safety systems can monitor vehicle status and driver status online in real time. Computer vision technology simulates biological vision and can analyze, identify, detect, and track the data and information in the captured images. …”
Get full text
Article -
1176
Real-Time Threat Mitigation in Financial IT Infrastructures Using Quantum Computing
Published 2025-06-01“…This research evaluates the application of quantum computing algorithms, specifically Continuous-Variable Quantum Neural Networks (CV-QNN), Crystals-Kyber cryptographic methods, and Quantum-enhanced Monte Carlo simulations, within financial IT infrastructures. …”
Get full text
Article -
1177
Using Vision Transformers for Classifying Surgical Tools in Computer Aided Surgeries
Published 2024-12-01“…Automated laparoscopic video analysis is essential for assisting surgeons during computer aided medical procedures. Nevertheless, it faces challenges due to complex surgical scenes and limited annotated data. …”
Get full text
Article -
1178
Energy- and Resource-Aware Computation Offloading for Complex Tasks in Edge Environment
Published 2020-01-01“…Both extensive experimental evaluations and detailed theoretical analysis are conducted to show that the proposed method is effective and efficiency.…”
Get full text
Article -
1179
Effects of Detector Configuration on X-Ray Luminescence Computed Tomography Imaging
Published 2025-05-01“…Background: X-ray luminescence computed tomography (XLCT) has emerged as a promising hybrid biomedical imaging modality for over a decade. …”
Get full text
Article -
1180
Computed Tomography Simulation for Gamma Knife Radiosurgery: Impact on Target Coverage
Published 2025-04-01“…This study evaluated the effectiveness of using a traditional computed tomography (CT) simulation scan in the Leksell Gamma Knife® Icon™ workflow for stereotactic radiosurgery. …”
Get full text
Article