Showing 1,181 - 1,200 results of 26,849 for search 'evaluation computational', query time: 0.28s Refine Results
  1. 1181

    TU-DAT: A Computer Vision Dataset on Road Traffic Anomalies by Pavana Pradeep Kumar, Krishna Kant

    Published 2025-05-01
    “…This paper introduces TU-DAT, a novel, freely downloadable computer vision dataset for analyzing traffic accidents using roadside cameras. …”
    Get full text
    Article
  2. 1182

    Advantages of two quantum programming platforms in quantum computing and quantum chemistry by Pei-Hua Wang, Wei-Yeh Wu, Che-Yu Lee, Jia-Cheng Hong, Yufeng Jane Tseng

    Published 2025-05-01
    “…We delve into their basic and advanced usage, examine their learning curves, and evaluate their capabilities in quantum computing experiments. …”
    Get full text
    Article
  3. 1183

    Task offloading and resource allocation for blockchain‐enabled mobile edge computing by Renbin Fang, Peng Lin, Yize Liu, Yan Liu

    Published 2024-12-01
    “…Abstract Mobile edge computing (MEC) has risen as an effective approach to support ubiquitous and prosperous mobile applications. …”
    Get full text
    Article
  4. 1184

    Empowering drones in vehicular network through fog computing and blockchain technology. by Shivani Wadhwa, Divya Gupta, Shalli Rani, Maha Driss, Wadii Boulila

    Published 2025-01-01
    “…Fog nodes strategically placed near IoT devices serve as computational resources for drones, ensuring quick service responses for deadline-driven tasks. …”
    Get full text
    Article
  5. 1185

    PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing by Sreeja Cherillath Sukumaran, Mohammed Misbahuddin

    Published 2021-05-01
    “…Cloud computing technology got relevance as computing paradigm, which delivers massively scalable computing technologies based on the Internet for the organizations. …”
    Get full text
    Article
  6. 1186

    Reducing Unnecessary Brain Computed Tomography Scan in a Tertiary Center by Mohamed Abdoun, Abdelmoneim Mahgoub, J. Motwali

    Published 2021-01-01
    “…Brain Computed Tomography (CT) is routinely requested before Lumbar Puncture (LP) to rule out increased intracranial pressure. …”
    Get full text
    Article
  7. 1187

    Comparative study of IoT- and AI-based computing disease detection approaches by Wasiur Rhmann, Jalaluddin Khan, Ghufran Ahmad Khan, Zubair Ashraf, Babita Pandey, Mohammad Ahmar Khan, Ashraf Ali, Amaan Ishrat, Abdulrahman Abdullah Alghamdi, Bilal Ahamad, Mohammad Khaja Shaik

    Published 2025-03-01
    “…This study evaluated different machine learning and deep learning algorithms and their hybrid and optimized algorithms for IoT-based disease detection, using the most recent papers on IoT-based disease detection systems that include computing approaches, such as cloud, edge, and fog. …”
    Get full text
    Article
  8. 1188
  9. 1189

    Task Offloading Optimization Using PSO in Fog Computing for the Internet of Drones by Sofiane Zaidi, Mohamed Amine Attalah, Lazhar Khamer, Carlos T. Calafate

    Published 2024-12-01
    “…This particularity makes it difficult to apply the conventional task offloading technologies, such as cloud computing and edge computing, in IoD environments. …”
    Get full text
    Article
  10. 1190

    Computer-Controlled Local Anaesthesia Delivery efficacy − a literature review by Katarzyna Janik, Wojciech Niemczyk, Robert Peterek, Rafał Rój, Agnieszka Balicz, Tadeusz Morawiec

    Published 2024-08-01
    “…One of them is using the Computer-Controlled Local Anaesthesia Delivery systems (CCLADs). …”
    Get full text
    Article
  11. 1191

    Elicitation of Nonfunctional Requirements in Agile Development Using Cloud Computing Environment by Muhammad Younas, Dayang Norhayati Abang Jawawi, Muhammad Arif Shah, Ahmad Mustafa, Muhammad Awais, Muhammad Kamran Ishfaq, Karzan Wakil

    Published 2020-01-01
    “…The methodology is evaluated by applying on eProcurement dataset. The results are improved by 8.77% and 1.76% in terms of “Successful” NFR. …”
    Get full text
    Article
  12. 1192

    Analysis of performance indicators of computer systems software on objects of special importance by V. V. Konobeevskikh, A. O. Efimov

    Published 2023-08-01
    “…To achieve this goal, such methods as system analysis, computational and expert statistical are used.Result. …”
    Get full text
    Article
  13. 1193

    Incentive Mechanism for Cloud Service Offloading in Edge–Cloud Computing Environment by Chendie Yao, Junjie Xie, Zhong Liu

    Published 2025-05-01
    “…Edge computing refers to provision storage and computation resources at the network edge, closer to end users than the remote cloud. …”
    Get full text
    Article
  14. 1194

    High-performance computing for static security assessment of large power systems by Venkateswara Rao Kagita, Sanjaya Kumar Panda, Ram Krishan, P. Deepak Reddy, Jabba Aswanth

    Published 2023-12-01
    “…We perform extensive experiments to evaluate the efficacy of the proposed algorithm. As a result, we establish that the proposed parallel algorithm with high-performance computing (HPC) computing is much faster than the traditional algorithms. …”
    Get full text
    Article
  15. 1195

    A High-Order Fractional Parallel Scheme for Efficient Eigenvalue Computation by Mudassir Shams, Bruno Carpentieri

    Published 2025-05-01
    “…The method is implemented within a parallel computing framework, allowing simultaneous computations across multiple processors to improve both efficiency and reliability. …”
    Get full text
    Article
  16. 1196

    Imaging cells and nanoparticles using modulated optically computed phase microscopy by Xuan Liu, Rupak Bhakta, Emily Kryvorutsky, Yuanwei Zhang

    Published 2025-01-01
    “…To overcome the tradeoff, we develop a technology termed as modulated optically computed phase microscopy (M-OCPM) based on low coherence interferometry and optical computation. …”
    Get full text
    Article
  17. 1197

    Computed Tomographic Findings of Eosinophilic Enteritis in Eight Cats: Case Series by Toshiyuki Tanaka, Hana Tsuruta, Koudai Furukawa, Hideo Akiyoshi

    Published 2025-05-01
    “…Gastrointestinal eosinophilic sclerosing fibroplasia is a unique fibroblastic response of EE. Contrast‐enhanced computed tomography (CT) facilitates the objective characterisation of intestinal lesions and associated pathology. …”
    Get full text
    Article
  18. 1198

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  19. 1199

    On achievements and contradictions in the development of computer technology in the USSR in the second half of the 1950s by E. V. Bodrova, V. V. Kalinov

    Published 2024-05-01
    “…As arguments that the leadership of the country was able to evaluate, data on the situation in the United States in this area were given. …”
    Get full text
    Article
  20. 1200

    Simulation Conditions to Compute the Dispersion Diagram of 3D Periodic Structures by Hairu Wang, Oskar Zetterstrom, Pilar Castillo-Tapia, Francisco Mesa, Oscar Quevedo-Teruel

    Published 2024-01-01
    “…In this work, we examine the methodology for numerically computing the dispersion diagram of three-dimensional periodic structures using commercial electromagnetic simulators. …”
    Get full text
    Article