Showing 4,941 - 4,960 results of 26,849 for search 'evaluation computing', query time: 0.23s Refine Results
  1. 4941

    GPU Accelerating Algorithms for Three-Layered Heat Conduction Simulations by Nicolás Murúa, Aníbal Coronel, Alex Tello, Stefan Berres, Fernando Huancas

    Published 2024-11-01
    “…We evaluate performance and scalability and contribute to advancing computational techniques for modeling complex physical processes accurately and efficiently.…”
    Get full text
    Article
  2. 4942

    Efficacy and safety of 4% articaine with epinephrine for the anterior middle superior alveolar nerve block comparing to the computer-controlled and conventional anesthetic delivery... by Ćetković Dejan, Milić Marija S., Biočanin Vladimir, Brajić Ivana, Ćalasan Dejan, Radović Katarina, Živković Rade, Brković Božidar

    Published 2019-01-01
    “…Efficacy of pulpal anesthesia after the AMSA nerve block was evaluated by measuring a success rate, onset and duration of pulpal anesthesia, using an electrical pulp tester. …”
    Get full text
    Article
  3. 4943

    C-shaped canal configuration in mandibular second molars of a selected Uyghur adults in Xinjiang: prevalence, correlation, and differences of root canal configuration using cone‐be... by Maliyamuguli Pataer, Aerman Abulizi, Sakendeke Jumatai, Xuelei Zhang, Xiaofang Zhang, Jin Zhao

    Published 2025-04-01
    “…Axial sections of each tooth were evaluated in the coronal, middle, and apical thirds to identify canal configurations and analyze root morphology. …”
    Get full text
    Article
  4. 4944

    Problems in Determining the Consumer Value of a Software Product by A. I. Semikalenova

    Published 2018-12-01
    “…When trying to establish the consumer properties and use value of a computer program, it should be treated as a complex multi-faceted object that warrants a comprehensive approach to forensic investigation, including computer forensics and consumer goods evaluation. …”
    Get full text
    Article
  5. 4945

    A service-oriented microservice framework for differential privacy-based protection in industrial IoT smart applications by Dileep Kumar Murala, K. Vara Prasada Rao, Veera Ankalu Vuyyuru, Beakal Gizachew Assefa

    Published 2025-08-01
    “…Edge and cloud computing offer low-cost, scalable, and on-demand computational resources, enabling service providers to deliver intelligent data analytics and real-time insights to end-users. …”
    Get full text
    Article
  6. 4946

    Research on redundant structure of cloud-based interlocking systems by HE Zhibin, XING Kejia, LIANG Zhiguo, WEI Dongdong, ZHENG Changzong

    Published 2023-11-01
    “…Subsequently, this paper analyzed the working mode and server failure factors, and established a server fault tree model and dynamic fault tree model to evaluate the probability of failure on danger (PFD) and probability of failure to safety (PFS). …”
    Get full text
    Article
  7. 4947
  8. 4948

    DRL-Driven Intelligent SFC Deployment in MEC Workload for Dynamic IoT Networks by Seyha Ros, Intae Ryoo, Seokhoon Kim

    Published 2025-07-01
    “…To achieve adaptive and intelligent decision-making, the proposed approach leverages Deep Reinforcement Learning (DRL) to dynamically allocate resources and offload task execution, thereby improving overall system efficiency and addressing the optimal policy in edge computing. Deep Q-network (DQN), which is leveraged to learn an optimal network resource adjustment policy and task offloading, ensures flexible adaptation in SFC deployment evaluations. …”
    Get full text
    Article
  9. 4949

    SmartTrust: a hybrid deep learning framework for real-time threat detection in cloud environments using Zero-Trust Architecture by Umesh Kumar Lilhore, Sarita Simaiya, Roobaea Alroobaea, Abdullah M. Baqasah, Majed Alsafyani, Afnan Alhazmi, Md Monish Khan

    Published 2025-07-01
    “…Abstract The rapid growth of cloud computing has brought scalability and flexibility to modern organizations, but it has also introduced a new wave of complex and evolving security threats. …”
    Get full text
    Article
  10. 4950

    LightSTATE: A Generalized Framework for Real-Time Human Activity Detection Using Edge-Based Video Processing and Vision Language Models by Anik Debnath, Yong-Woon Kim, Yung-Cheol Byun

    Published 2025-01-01
    “…However, traditional methods often rely on computationally intensive models, which are unsuitable for edge devices due to their limited resources and high latency. …”
    Get full text
    Article
  11. 4951
  12. 4952
  13. 4953
  14. 4954
  15. 4955

    A new mathematical model to improve encryption process based on Split-Radix Fast Fourier Transform algorithm by Abdulle Hassan Mohamud

    Published 2025-01-01
    “…Several types of cryptoanalysis attacks such as brute-forcing, autocorrelation and dictionary attacks are comparatively evaluated and the end result of SRFFT evaluation indicates that SRFFT is preferable in many practical encryption applications since SRFFT complexity increases with the range of split-radix computations thus eliminating the potential chances of cryptanalysis attacks.…”
    Get full text
    Article
  16. 4956
  17. 4957

    Evaluating QoS in Dynamic Virtual Machine Migration: A Multi-Class Queuing Model for Edge-Cloud Systems by Anna Kushchazli, Kseniia Leonteva, Irina Kochetkova, Abdukodir Khakimov

    Published 2025-04-01
    “…The efficient migration of virtual machines (VMs) is critical for optimizing resource management, ensuring service continuity, and enhancing resiliency in cloud and edge computing environments, particularly as 6G networks demand higher reliability and lower latency. …”
    Get full text
    Article
  18. 4958
  19. 4959
  20. 4960

    An Exploration of the Use of Educational Robotics in Preschool Education by Veronica Mihaela Rus, Beatrice Almășan

    Published 2024-11-01
    “…Decomposition, abstraction, pattern recognition and algorithms were the four components of computational thinking analyzed and all obtained a score above the mean of the Likert scale used. …”
    Get full text
    Article