Showing 2,201 - 2,220 results of 26,849 for search 'evaluation computing', query time: 0.21s Refine Results
  1. 2201
  2. 2202
  3. 2203

    Modeling and computing experiment in the problem of predicting the per capita monetary income of the population based on the methods of correlation and regression analysis by Angelina Vladimirovna Vaskina, Victoria Igorevna Naats

    Published 2022-09-01
    “…The numerical calculations are accompanied by statistical evaluations of predictive performance of the considered mathematical model, performed the analysis and discussion of the results. …”
    Get full text
    Article
  4. 2204
  5. 2205

    A KWS System for Edge-Computing Applications with Analog-Based Feature Extraction and Learned Step Size Quantized Classifier by Yukai Shen, Binyi Wu, Dietmar Straeussnigg, Eric Gutierrez

    Published 2025-04-01
    “…Edge-computing applications demand ultra-low-power architectures for both feature extraction and classification tasks. …”
    Get full text
    Article
  6. 2206

    Security and Privacy in the Internet of Everything (IoE): A Review on Blockchain, Edge Computing, AI, and Quantum-Resilient Solutions by Haluk Eren, Özgür Karaduman, Muharrem Tuncay Gençoğlu

    Published 2025-08-01
    “…Comparative analyses are provided based on metrics such as energy consumption, latency, computational load, and security level, while centralized and decentralized models are evaluated through a multi-layered security lens. …”
    Get full text
    Article
  7. 2207

    Performance Characterization of Hardware/Software Communication Interfaces in End-to-End Power Management Solutions of High-Performance Computing Processors by Antonio del Vecchio, Alessandro Ottaviano, Giovanni Bambini, Andrea Acquaviva, Andrea Bartolini

    Published 2024-11-01
    “…Power management (PM) is cumbersome for today’s computing systems. Attainable performance is bounded by the architecture’s computing efficiency and capped in temperature, current, and power. …”
    Get full text
    Article
  8. 2208
  9. 2209

    From energy to ecology: decarbonization pathways for sustainable high-performance computing through global carbon-energy nexus analysis by Guancong Yu, Ziyan Wang, Yulan Xu, Zhuofan Javan Sun, Susan Chen

    Published 2025-06-01
    “…IntroductionHigh-performance computing (HPC) has been a pivotal driving force of technological development.MethodsThis study evaluates the environmental impact of HPC by analyzing energy consumption and carbon emissions across major global centers. …”
    Get full text
    Article
  10. 2210

    Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-Attacks by Muwafaq Jawad, Ali A. Yassin, Hamid Ali Abed Al-asadi, Zaid Ameen Abduljabbar, Vincent Omollo Nyangares, Zaid Alaa Hussien, Husam A. Neamah

    Published 2025-04-01
    “…Simulated on the Ethereum platform using Solidity and evaluated with the JMeter tool, the proposed scheme demonstrates superior performance, with a computational cost reduction of 40% compared to traditional methods like Elliptic Curve Cryptography (ECC). …”
    Get full text
    Article
  11. 2211

    Development of a Cloud Service for Comprehensive Research of Polymer Synthesis Processes by Eldar Miftakhov, Sofya Mustafina, Anastasiya Kashnikova, Andrey Akimov

    Published 2024-12-01
    “…This problem is particularly relevant for polymer synthesis processes, where standard empirical evaluations require enormous computational resources, and existing methods and algorithms prove ineffective when organizing multiple computational trials to select optimal production scenarios. …”
    Get full text
    Article
  12. 2212
  13. 2213
  14. 2214

    A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions by Ashwag Alotaibi, Huda Aldawghan, Ahmed Aljughaiman

    Published 2025-03-01
    “…The specific limitations of IoT contexts, such as constrained computational resources, are frequently not adequately addressed by traditional authentication techniques. …”
    Get full text
    Article
  15. 2215
  16. 2216

    DMS Algorithm in the Application of the Map/Reduce Tasks Schedule by PEI Shu-jun, KONG De-kai, MIAO Hui

    Published 2019-02-01
    “…Finally, the experiment evaluates the Difference Matrix Scheduling ,fair scheduling algorithm, genetic algorithm in the task scheduling and resource utilization efficiency angles. …”
    Get full text
    Article
  17. 2217
  18. 2218
  19. 2219
  20. 2220