Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
1821
-
1822
Modified grey wolf optimization for energy-efficient internet of things task scheduling in fog computing
Published 2025-04-01“…Abstract Fog-cloud computing has emerged as a transformative paradigm for managing the growing demands of Internet of Things (IoT) applications, where efficient task scheduling is crucial for optimizing system performance. …”
Get full text
Article -
1823
Algorithm for using dual energy computed tomography to determine chemical composition: A feasibility study.
Published 2025-01-01“…Using dual-energy computed tomography (CT), this study aims to develop an algorithm to identify the chemical constituents of an unknown material (compound or mixture) and improve the accuracy of material discrimination. …”
Get full text
Article -
1824
Dynamic load balancing in cloud computing using predictive graph networks and adaptive neural scheduling
Published 2025-07-01“…Additionally, reinforcement learning is incorporated in the proposed work to optimize SNN decisions based on feedback from the TGNN’s state predictions. Experimental evaluations of the proposed model with diverse workload scenarios demonstrate significant improvements in terms of throughput, energy efficiency, make span and response time. …”
Get full text
Article -
1825
Network Usage and Time Efficient Performance Enhancement Model for IoT Applications in Fog Cloud Computing
Published 2025-04-01“…Fog computing bridges IoT applications and cloud computing, providing low latency services through local computation and storage. …”
Get full text
Article -
1826
Use of eXIA 160 XL for Contrast Studies in Micro–Computed Tomography: Experimental Observations
Published 2013-09-01“…The distribution was analyzed by repeated micro–computed tomographic scans up to 48 hours after contrast administration. …”
Get full text
Article -
1827
Student’s Engagement Detection Based on Computer Vision: A Systematic Literature Review
Published 2025-01-01“…As learning environments increasingly shift toward online and hybrid modes, understanding and monitoring student engagement through automated means has become an essential focus in educational technology. Computer vision techniques offer promising capabilities for detecting and interpreting student behaviors indicative of engagement. …”
Get full text
Article -
1828
Computationally Efficient Transfer Learning Pipeline for Oil Palm Fresh Fruit Bunch Defect Detection
Published 2025-06-01“…The present study addresses the inefficiencies of the manual classification of oil palm fresh fruit bunches (FFBs) by introducing a computationally efficient alternative to traditional deep learning approaches that require extensive retraining and large datasets. …”
Get full text
Article -
1829
Factors Influencing Differences Between Computed and Measured Ground Resistance Values for Horizontal Tape Electrodes
Published 2024-11-01“…This paper investigates the steady-state resistance (RDC) of copper tape electrodes across eight configurations. The study evaluates both field measurements and simulations using CDEGS at two distinct sites with varying soil characteristics. …”
Get full text
Article -
1830
-
1831
Radiological and Morphometric Features of Canalis Sinuosus in Russian Population: Cone-Beam Computed Tomography Study
Published 2019-01-01“…Introduction. Cone-beam computed tomography (CBCT) is considered to be the most informative radiographic method for pre- and postoperative analysis of the maxillary anatomy and for avoiding further complication. …”
Get full text
Article -
1832
Morphology and dimensions of the nasopalatine canal in Palestinian patients assessed using cone beam computed tomography
Published 2025-04-01“…Abstract The nasopalatine canal (NPC) is a key anatomical structure in maxillofacial surgery and dentistry, influencing surgical and dental procedures. This study evaluated the morphology, dimensions, and variations of the NPC in Palestinian patients using cone-beam computed tomography (CBCT). …”
Get full text
Article -
1833
-
1834
Real-time computed tomography fluoroscopy-guided dye marking prior to robotic pulmonary resection
Published 2024-12-01Get full text
Article -
1835
Assessment of prevalence and position of mandibular incisive canal: A cone beam computed tomography study
Published 2020-01-01“…This study was aimed to evaluate the prevalence of MIC and its proximity to adjacent structures among Indian population. …”
Get full text
Article -
1836
A Comparison of Two Different Methods for Inducing Apnoea During Thoracic Computed Tomography of Dogs
Published 2025-04-01“…Therefore, the purpose of this study was to evaluate the efficacy of two different methods used to induce apnoea. …”
Get full text
Article -
1837
Enhancing Property-Based Token Attestation With Homomorphic Encryption (PTA-HE) for Secure Mobile Computing
Published 2025-01-01“…Our main contributions are: the introduction of PTA-HE, which resolves these vulnerabilities by enabling computations directly on encrypted data, ensuring continuous protection and resilience against unauthorized access and manipulation; a strategic employment of Trusted Third Parties (TTPs) for secure attestation management, leveraging HE to maintain data confidentiality throughout the entire attestation workflow; rigorous experimental evaluations quantifying computational overhead, communication costs, latency, and scalability implications, transparently illustrating the performance trade-offs associated with enhanced security; and formal verification using the Scyther tool demonstrating PTA-HE’s superior correctness and robustness against multiple security threats, such as replay and man-in-the-middle attacks. …”
Get full text
Article -
1838
Computed tomography-guided cryoablation in treating adrenal metastases: a retrospective single-center study
Published 2025-07-01“…PURPOSE: To assess the effectiveness and safety of computed tomography (CT)-guided cryoablation for treating adrenal metastases (AMs). …”
Get full text
Article -
1839
The effectiveness of education moral intelligence concepts to children through animation, stories, pictures and computer games
Published 2024-05-01“…Then using the questionnaire "moral intelligence of Burba children - parent form" the level of moral intelligence of children was checked and after providing education through animation, stories, pictures and computer games, the level of moral intelligence was checked again and after one month the stability of education was evaluated. …”
Get full text
Article -
1840
Real-time human-robot interaction and service provision using hybrid intelligent computing framework.
Published 2025-01-01“…This research introduces a Hybrid Intelligent Computing Model (HICM) to improve robots' ability to process inquiries autonomously. …”
Get full text
Article