Showing 1,161 - 1,180 results of 26,849 for search 'evaluation computational', query time: 0.20s Refine Results
  1. 1161

    Supporting adult-learners’ online interaction in computer-mediated learningOSF by Nanda van der Stap, Theo van den Bogaart, Ebrahim Rahimi, Stan van Ginkel, Tobey Nelson, Johan Versendaal

    Published 2024-12-01
    “…In order to validate and improve the quality of the model a Delphi study was carried out among experts (n = 8) to evaluate the various components of the model, including its overall supportiveness for adult-learners in computer-mediated learning. …”
    Get full text
    Article
  2. 1162

    Solving Flexible Job-Shop Scheduling Problems Based on Quantum Computing by Kaihan Fu, Jianjun Liu, Miao Chen, Huiying Zhang

    Published 2025-02-01
    “…The results demonstrate that quantum computing holds significant potential for solving FJSPs more efficiently than traditional computational methods.…”
    Get full text
    Article
  3. 1163

    Quality inspection of fertilizer granules using computer vision – a review by I.K. Ndukwe, D.V. Yunovidov, M.R. Bahrami, M. Mazzara, T.O. Olugbade

    Published 2025-02-01
    “…The study provides an extensive overview of using computer vision to evaluate grain and fertilizer granule quality, highlighting granule size’s significance. …”
    Get full text
    Article
  4. 1164

    DEEP NEURAL NETWORK-BASED APPROACH FOR COMPUTING SINGULAR VALUES OF MATRICES by Diyari A. Hassan

    Published 2025-01-01
    “…The proposed CNN-based SVD method is evaluated against the conventional SVD algorithm, demonstrating superior performance in terms of computational time and accuracy. …”
    Get full text
    Article
  5. 1165

    The importance of cone-beam computed tomography in endodontic therapy: A review by Shaul Hameed Kolarkodi

    Published 2023-11-01
    “…Introduction: Cone-beam computed tomography (CBCT) is a valuable tool in endodontics, particularly for assessing root morphology. …”
    Get full text
    Article
  6. 1166

    Ensemble Learning-Based Soft Computing Approach for Future Precipitation Analysis by Shiu-Shin Lin, Kai-Yang Zhu, Chen-Yu Wang, Chou-Ping Yang, Ming-Yi Liu

    Published 2025-06-01
    “…This study integrated the strengths of ensemble learning and soft computing to develop a future regional rainfall model for evaluating the complex characteristics of island precipitation. …”
    Get full text
    Article
  7. 1167

    Privacy-Preserving Live Video Analytics for Drones via Edge Computing by Piyush Nagasubramaniam, Chen Wu, Yuanyi Sun, Neeraj Karamchandani, Sencun Zhu, Yongzhong He

    Published 2024-11-01
    “…The use of lightweight drones has surged in recent years across both personal and commercial applications, necessitating the ability to conduct live video analytics on drones with limited computational resources. While edge computing offers a solution to the throughput bottleneck, it also opens the door to potential privacy invasions by exposing sensitive visual data to risks. …”
    Get full text
    Article
  8. 1168

    Multi-constrained trusted cooperative task migration strategy for edge computing by Guangxue YUE, Yasheng DAI, Xiaohui YANG, Youkang ZHU, Zhenxu YOU, Jiansheng LIU

    Published 2019-11-01
    “…In order to guarantee the quality of service of edge computing,a trusted cooperative task distribution strategy for edge computing under multi-dimensional constraints was proposed.The strategy was based on the task requirements,and the edge computing collaborative service leader node organizes the coordinated service alliance members.The priority of cooperative service alliance was determined based on the K-dimension weight index of user task migration.Using the load balancing of the members as the adaptive function,the task allocation and dispatch of alliance members were performed by greedy algorithm.The backup node was selected based on routing piggyback,and the priority of migration was evaluated.The scheduling and migration of collaborative services in case of abnormal collaborative services were realized,which improved the quality of service of edge computing task migration and ensured the reliability of task migration.The simulation results show that the mechanism can effectively complete the task distribution and migration scheduling,improve the collaborative efficiency of edge computing,and guarantee the quality of network service.…”
    Get full text
    Article
  9. 1169

    Diagnostic capabilities of cardiac computed tomography in the preoperative diagnosis of hypertrophic cardiomyopathy by Olga Y. Dariy, Liudmila A. Yurpolskaya, Inna E. Rychina, Aleksey V. Dorofeev, Elena Z. Golukhova

    Published 2024-12-01
    “…CONCLUSION: Our scanning protocols developed with computed tomography scanners of various generations enable to evaluate the specific morphological patterns of hypertrophic cardiomyopathy in a single study and provide a detailed interpretation of the geometry of cardiac valves and chambers, left ventricular function, state of the coronary bed, and structural changes of the left ventricular myocardium.…”
    Get full text
    Article
  10. 1170
  11. 1171

    Trends in Computer-Aided Manufacturing in Prosthodontics: A Review of the Available Streams by Jaafar Abduo, Karl Lyons, Mohammed Bennamoun

    Published 2014-01-01
    “…This narrative review aims to evaluate the different streams of computer-aided manufacturing in prosthodontics. …”
    Get full text
    Article
  12. 1172

    Accelerating and Compressing Transformer-Based PLMs for Enhanced Comprehension of Computer Terminology by Jian Peng, Kai Zhong

    Published 2024-10-01
    “…However, the vast size and computational demands of transformer-based PLMs present challenges, particularly regarding storage efficiency and processing speed. …”
    Get full text
    Article
  13. 1173

    Analysis and verification of safety computer time constraints for train-to-train communications by Ying GAO, Yuan CAO, Yongkui SUN, Lianchuan MA, Chunhua HONG, Yuzhuo ZHANG

    Published 2018-12-01
    “…The analysis and verification results indicate that onboard safety computer can meet the time constraints of more than three periodic safety-critical applications under the condition of single-core with main frequency of 1GHz, which demonstrates the effectiveness of verifying and evaluating the time constraints of safety computer periodic applications using TPN.…”
    Get full text
    Article
  14. 1174

    A Security Monitoring Method Based on Autonomic Computing for the Cloud Platform by Jingjie Zhang, Qingtao Wu, Ruijuan Zheng, Junlong Zhu, Mingchuan Zhang, Ruoshui Liu

    Published 2018-01-01
    “…With the continuous development of cloud computing, cloud security has become one of the most important issues in cloud computing. …”
    Get full text
    Article
  15. 1175

    Key Technologies of Vehicle Active Safety System Based on Computer Vision by Mingzhu Qian, Xiaobao Wang

    Published 2022-01-01
    “…Active vehicle safety systems can monitor vehicle status and driver status online in real time. Computer vision technology simulates biological vision and can analyze, identify, detect, and track the data and information in the captured images. …”
    Get full text
    Article
  16. 1176

    Real-Time Threat Mitigation in Financial IT Infrastructures Using Quantum Computing by Jean Marie Vianney Sindayigaya

    Published 2025-06-01
    “…This research evaluates the application of quantum computing algorithms, specifically Continuous-Variable Quantum Neural Networks (CV-QNN), Crystals-Kyber cryptographic methods, and Quantum-enhanced Monte Carlo simulations, within financial IT infrastructures. …”
    Get full text
    Article
  17. 1177

    Using Vision Transformers for Classifying Surgical Tools in Computer Aided Surgeries by El Moaqet Hisham, Janini Rami, Abdulbaki Alshirbaji Tamer, Aldeen Jalal Nour, Möller Knut

    Published 2024-12-01
    “…Automated laparoscopic video analysis is essential for assisting surgeons during computer aided medical procedures. Nevertheless, it faces challenges due to complex surgical scenes and limited annotated data. …”
    Get full text
    Article
  18. 1178

    Energy- and Resource-Aware Computation Offloading for Complex Tasks in Edge Environment by Kai Peng, Bohai Zhao, Shengjun Xue, Qingjia Huang

    Published 2020-01-01
    “…Both extensive experimental evaluations and detailed theoretical analysis are conducted to show that the proposed method is effective and efficiency.…”
    Get full text
    Article
  19. 1179

    Effects of Detector Configuration on X-Ray Luminescence Computed Tomography Imaging by Yibing Zhang, Jarrod N. Cortez, Changqing Li

    Published 2025-05-01
    “…Background: X-ray luminescence computed tomography (XLCT) has emerged as a promising hybrid biomedical imaging modality for over a decade. …”
    Get full text
    Article
  20. 1180

    Computed Tomography Simulation for Gamma Knife Radiosurgery: Impact on Target Coverage by Sridhar Yaddanapudi, Steven M. Herchko, Deepak K. Shrestha, Bonita L. Gianforti, Kathleen A. Kopacka, Kayla M. Lane, Anna C. Harrell, W. Christopher Fox, Sanjeet S. Grewal, Daniel M. Trifiletti, Jennifer L. Peterson

    Published 2025-04-01
    “…This study evaluated the effectiveness of using a traditional computed tomography (CT) simulation scan in the Leksell Gamma Knife® Icon™ workflow for stereotactic radiosurgery. …”
    Get full text
    Article