Showing 1,821 - 1,840 results of 26,849 for search 'evaluation computational', query time: 0.25s Refine Results
  1. 1821
  2. 1822

    Modified grey wolf optimization for energy-efficient internet of things task scheduling in fog computing by Deafallah Alsadie, Musleh Alsulami

    Published 2025-04-01
    “…Abstract Fog-cloud computing has emerged as a transformative paradigm for managing the growing demands of Internet of Things (IoT) applications, where efficient task scheduling is crucial for optimizing system performance. …”
    Get full text
    Article
  3. 1823

    Algorithm for using dual energy computed tomography to determine chemical composition: A feasibility study. by Dong Hyeok Choi, So Hyun Ahn, Kwangwoo Park, Min Cheol Han, Jin Sung Kim

    Published 2025-01-01
    “…Using dual-energy computed tomography (CT), this study aims to develop an algorithm to identify the chemical constituents of an unknown material (compound or mixture) and improve the accuracy of material discrimination. …”
    Get full text
    Article
  4. 1824

    Dynamic load balancing in cloud computing using predictive graph networks and adaptive neural scheduling by K. Rajammal, M. Chinnadurai

    Published 2025-07-01
    “…Additionally, reinforcement learning is incorporated in the proposed work to optimize SNN decisions based on feedback from the TGNN’s state predictions. Experimental evaluations of the proposed model with diverse workload scenarios demonstrate significant improvements in terms of throughput, energy efficiency, make span and response time. …”
    Get full text
    Article
  5. 1825

    Network Usage and Time Efficient Performance Enhancement Model for IoT Applications in Fog Cloud Computing by Upma Arora, Nipur Singh

    Published 2025-04-01
    “…Fog computing bridges IoT applications and cloud computing, providing low latency services through local computation and storage. …”
    Get full text
    Article
  6. 1826

    Use of eXIA 160 XL for Contrast Studies in Micro–Computed Tomography: Experimental Observations by Inneke Willekens, Nico Buls, Michel De Maeseneer, Tony Lahoutte, Johan de Mey

    Published 2013-09-01
    “…The distribution was analyzed by repeated micro–computed tomographic scans up to 48 hours after contrast administration. …”
    Get full text
    Article
  7. 1827

    Student’s Engagement Detection Based on Computer Vision: A Systematic Literature Review by Ikram Qarbal, Nawal Sael, Sara Ouahabi

    Published 2025-01-01
    “…As learning environments increasingly shift toward online and hybrid modes, understanding and monitoring student engagement through automated means has become an essential focus in educational technology. Computer vision techniques offer promising capabilities for detecting and interpreting student behaviors indicative of engagement. …”
    Get full text
    Article
  8. 1828

    Computationally Efficient Transfer Learning Pipeline for Oil Palm Fresh Fruit Bunch Defect Detection by Yang Luo, Anwar P. P. Abdul Majeed, Zaid Omar, Saad Aslam, Yi Chen

    Published 2025-06-01
    “…The present study addresses the inefficiencies of the manual classification of oil palm fresh fruit bunches (FFBs) by introducing a computationally efficient alternative to traditional deep learning approaches that require extensive retraining and large datasets. …”
    Get full text
    Article
  9. 1829

    Factors Influencing Differences Between Computed and Measured Ground Resistance Values for Horizontal Tape Electrodes by Usman Muhammad, Nurul Nadia Ahmad, Normiza Mohamad Nor, Fazlul Aman

    Published 2024-11-01
    “…This paper investigates the steady-state resistance (RDC) of copper tape electrodes across eight configurations. The study evaluates both field measurements and simulations using CDEGS at two distinct sites with varying soil characteristics. …”
    Get full text
    Article
  10. 1830
  11. 1831

    Radiological and Morphometric Features of Canalis Sinuosus in Russian Population: Cone-Beam Computed Tomography Study by Avanesov Anatoly, Yuri Sedov, Evgeniya Gvozdikova, Oleg Mordanov, Liudmila Kruchinina, Karen Avanesov, Anna Vinogradova, Sergei Golub, Dalila Khaydar, Nguyen Giao Hoang, Hadi M. Darawsheh

    Published 2019-01-01
    “…Introduction. Cone-beam computed tomography (CBCT) is considered to be the most informative radiographic method for pre- and postoperative analysis of the maxillary anatomy and for avoiding further complication. …”
    Get full text
    Article
  12. 1832

    Morphology and dimensions of the nasopalatine canal in Palestinian patients assessed using cone beam computed tomography by Khaled R. Beshtawi

    Published 2025-04-01
    “…Abstract The nasopalatine canal (NPC) is a key anatomical structure in maxillofacial surgery and dentistry, influencing surgical and dental procedures. This study evaluated the morphology, dimensions, and variations of the NPC in Palestinian patients using cone-beam computed tomography (CBCT). …”
    Get full text
    Article
  13. 1833
  14. 1834
  15. 1835

    Assessment of prevalence and position of mandibular incisive canal: A cone beam computed tomography study by Reema Talat Ayesha, Balaji Pachipulusu, Poornima Govindaraju

    Published 2020-01-01
    “…This study was aimed to evaluate the prevalence of MIC and its proximity to adjacent structures among Indian population. …”
    Get full text
    Article
  16. 1836

    A Comparison of Two Different Methods for Inducing Apnoea During Thoracic Computed Tomography of Dogs by Thomas Hordle, Maria Navarro-Carrillo, Imogen Schofield, Mark Plested, Maria Chie Niimura del Barrio

    Published 2025-04-01
    “…Therefore, the purpose of this study was to evaluate the efficacy of two different methods used to induce apnoea. …”
    Get full text
    Article
  17. 1837

    Enhancing Property-Based Token Attestation With Homomorphic Encryption (PTA-HE) for Secure Mobile Computing by Thinh Le Vinh, Huan Thien Tran, Samia Bouzefrane

    Published 2025-01-01
    “…Our main contributions are: the introduction of PTA-HE, which resolves these vulnerabilities by enabling computations directly on encrypted data, ensuring continuous protection and resilience against unauthorized access and manipulation; a strategic employment of Trusted Third Parties (TTPs) for secure attestation management, leveraging HE to maintain data confidentiality throughout the entire attestation workflow; rigorous experimental evaluations quantifying computational overhead, communication costs, latency, and scalability implications, transparently illustrating the performance trade-offs associated with enhanced security; and formal verification using the Scyther tool demonstrating PTA-HE’s superior correctness and robustness against multiple security threats, such as replay and man-in-the-middle attacks. …”
    Get full text
    Article
  18. 1838

    Computed tomography-guided cryoablation in treating adrenal metastases: a retrospective single-center study by Claudio Pusceddu, Eliodoro Faiella, Claudio Cau, Pierluigi Rinaldi, Luca Melis, Salvatore Marsico

    Published 2025-07-01
    “…PURPOSE: To assess the effectiveness and safety of computed tomography (CT)-guided cryoablation for treating adrenal metastases (AMs). …”
    Get full text
    Article
  19. 1839

    The effectiveness of education moral intelligence concepts to children through animation, stories, pictures and computer games by Davood Latifi, Yousef Gorji, faezeh taghipour

    Published 2024-05-01
    “…Then using the questionnaire "moral intelligence of Burba children - parent form" the level of moral intelligence of children was checked and after providing education through animation, stories, pictures and computer games, the level of moral intelligence was checked again and after one month the stability of education was evaluated. …”
    Get full text
    Article
  20. 1840

    Real-time human-robot interaction and service provision using hybrid intelligent computing framework. by Mohammed Albekairi, Meshari D Alanazi, Turki M Alanazi, Mohamed Vall O Mohamed, Khaled Kaaniche, Anis Sahbani, Ali Elrashidi

    Published 2025-01-01
    “…This research introduces a Hybrid Intelligent Computing Model (HICM) to improve robots' ability to process inquiries autonomously. …”
    Get full text
    Article