Showing 3,221 - 3,240 results of 26,849 for search 'evaluation computing', query time: 0.27s Refine Results
  1. 3221

    An interpretable machine learning model based on computed tomography radiomics for predicting programmed death ligand 1 expression status in gastric cancer by Lihuan Dai, Jinxue Yin, Xin Xin, Chun Yao, Yongfang Tang, Xiaohong Xia, Yuanlin Chen, Shuying Lai, Guoliang Lu, Jie Huang, Purong Zhang, Jiansheng Li, Xiangguang Chen, Xi Zhong

    Published 2025-03-01
    “…Here, we developed and validated an interpretable machine learning (ML) model based on contrast-enhanced computed tomography (CECT) radiomics for preoperatively predicting PD-L1 expression status in patients with gastric cancer (GC). …”
    Get full text
    Article
  2. 3222
  3. 3223

    Effects of Computer-Assisted Working Memory Training Programme on Working Memory Ability and Mathematical Performance of Children at Risk of Mathematical Learning Difficulties by Kamyar Azimi, Manijeh Shehniyailagh, Alireza Hajiyakhchali, Maneli Shehni Karamzadeh

    Published 2024-08-01
    “…The purpose of this study was to investigate the effect of a computer-assisted working memory training programme on the working memory ability and mathematical performance of children at risk of mathematical learning difficulties. …”
    Get full text
    Article
  4. 3224
  5. 3225

    Construction and Evaluation of Scenarios as a Learning Strategy through Modelling-Simulation by Juan Luis Peñaloza Figueroa, Carmen Vargas Perez

    Published 2014-12-01
    “…The inclusion of new computing and communication resources to the learning process turns them into teaching tools, which makes it possible to organize the teaching and learning process in a different way. …”
    Get full text
    Article
  6. 3226
  7. 3227

    Evaluating the Power Systems Reliability by Developing Reliability Network Equivalent Techniques by MohammadReza Zare, M Iranpour

    Published 2024-02-01
    “…Finally, RTS IEEE is used as the sample network in order to evaluate the efficiency of the proposed algorithm. …”
    Get full text
    Article
  8. 3228
  9. 3229

    Bit‐level evaluation of piccolo block cipher by satisfiability problem solver by Shion Utsumi, Kosei Sakamoto, Takanori Isobe

    Published 2023-07-01
    “…Designers have undergone a rough security evaluation against differential, impossible differential, and related‐key differential attacks, based on nibble‐wise estimations due to the limitation of computational resource. …”
    Get full text
    Article
  10. 3230
  11. 3231

    Efficiency Evaluation in Indonesia's Quarrying Industry Using Variable Combinations DEA by Erni Puspanantasari Putri, Ivan A. Parinov, Chuleeporn Wongloucha

    Published 2024-10-01
    “…DEA and variable selection are important in performance evaluation because DEA aids in determining relative efficiency, whereas variable selection guarantees that the evaluation is based on the most relevant and significant aspects. …”
    Get full text
    Article
  12. 3232

    Exploration of the Efficiency of SLM-Enabled Platforms for Everyday Tasks by Volodymyr Rusinov, Nikita Basenko

    Published 2025-04-01
    “…The study concludes that SLMs offer an optimal trade-off between performance and computational efficiency, particularly in environments where data security and resource constraints are critical. …”
    Get full text
    Article
  13. 3233

    Scheme of Attribute-Based Disclosure Mobile Trust Negotiation by Qiuyun Wang, Wenbao Jiang, Hong Wang

    Published 2013-10-01
    “…For it is difficult to use traditional trust negotiation on the mobile environment,which has large communication overhead,storage overhead and computational overhead,an attribute-based disclosure mobile trust negotiation scheme was proposed.In the negotiation process,two sides in trust negotiation exchange certificate which contains encrypted credential attributes firstly,then,one side in trust negotiation can selectively dispose the sensitive attributes to the other side in trust negotiation procedure based on the trust evaluation result of the other,next,two sides in trust negotiation exchange attribute encryption key based on personal security policy until the trust negotiation was completed.The implementation procedure was given in concrete application instances and the scheme was analyzed.…”
    Get full text
    Article
  14. 3234
  15. 3235
  16. 3236

    Study of the Acoustic Suitability of an Open Plan Office Based on STI and DL2 Simulations by Carolina Reich Marcon PASSERO, Paulo Henrique Trombetta ZANNIN

    Published 2013-10-01
    “…This evaluation was performed through a computational model calibrated from a real office. …”
    Get full text
    Article
  17. 3237
  18. 3238

    Development of Land Consolidation Studies in Türkiye (1961-2004) by Safiye Pınar Tunalı

    Published 2025-03-01
    “…This study aims to comprehensively evaluate land consolidation studies carried out in Türkiye between 1961 and 2004. …”
    Get full text
    Article
  19. 3239
  20. 3240