Showing 5,241 - 5,260 results of 26,849 for search 'evaluation computing', query time: 0.23s Refine Results
  1. 5241
  2. 5242
  3. 5243
  4. 5244
  5. 5245
  6. 5246
  7. 5247

    Effect of rituximab on the manifestations of activity and pulmonary function in patients with systemic sclerosis: one-year follow-up evaluation by L. P. Ananyeva, O. A. Koneva, O. V. Desinova, L. A. Garzanova, S. I. Glukhova, M. N. Starovoitova, O. B. Ovsyannikova, A. V. Volkov, A. P. Aleksankin, E. L. Nasonov

    Published 2019-07-01
    “…The investigation included 71 patients with a valid diagnosis of SS. Multi-slice spiral computed tomography (MSCT) revealed ILD in 90% of patients. …”
    Get full text
    Article
  8. 5248
  9. 5249

    On QoS evaluation for ZigBee incorporated Wireless Sensor Network (IEEE 802.15.4) using mobile sensor nodes by Vishal Kumar Arora, Vishal Sharma, Monika Sachdeva

    Published 2022-02-01
    “…Subsequently, an attempt to compute the comprehensive recital of a non-beacon mode based 802.15.4/ZigBee integrated WSN network is demonstrated. …”
    Get full text
    Article
  10. 5250
  11. 5251

    Research on 5G MEC security assessment system and method by Qiucheng LU, Jinhui TANG, Congying BAO, Hao WU, Yusun FU

    Published 2023-08-01
    “…Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.…”
    Get full text
    Article
  12. 5252

    AERO: Adaptive Edge-Cloud Orchestration With a Sub-1K-Parameter Forecasting Model by Berend J. D. Gort, Godfrey M. Kibalya, Angelos Antonopoulos

    Published 2025-01-01
    “…Our extensive evaluations on real-world cloud workload datasets demonstrate that AERO achieves comparable prediction accuracy to complex state-of-the-art models with millions of parameters, while significantly reducing model size and computational overhead. …”
    Get full text
    Article
  13. 5253

    Big Five Personality Trait Prediction Based on User Comments by Kit-May Shum, Michal Ptaszynski, Fumito Masui

    Published 2025-05-01
    “…Using the PANDORA dataset from Reddit, the RoBERTa and BERT models, including both the base and large variants, were fine-tuned and evaluated to determine their effectiveness in personality trait prediction. …”
    Get full text
    Article
  14. 5254
  15. 5255

    Investigative prototyping a tissue P system for solving distributed task assignment problem in heterogeneous wireless sensor network by Titus Issac, Salaja Silas, Elijah Blessing Rajsingh

    Published 2022-06-01
    “…The experimental analyses of the proposed method have been self-evaluated as well as compared with the corresponding recent benchmark algorithms under various conditions and its performance metrics are analysed.…”
    Get full text
    Article
  16. 5256
  17. 5257

    Efficient resource allocation in cloud environment using SHO-ANN-based hybrid approach by Sanjeev Sharma, Pradeep Singh Rawat

    Published 2024-01-01
    “…The cloud computing paradigm provides services to users in an on-demand fashion using high-speed Internet. …”
    Get full text
    Article
  18. 5258

    TinyML-enabled fuzzy logic for enhanced road anomaly detection in remote sensing by Amna Khatoon, Weixing Wang, Mengfei Wang, Limin Li, Asad Ullah

    Published 2025-07-01
    “…Our framework addresses critical gaps in existing methodologies, such as high computational demands and limited real-time processing capabilities, by leveraging model compression, quantization, and pruning techniques. …”
    Get full text
    Article
  19. 5259

    Medical Data over Sound—CardiaWhisper Concept by Radovan Stojanović, Jovan Đurković, Mihailo Vukmirović, Blagoje Babić, Vesna Miranović, Andrej Škraba

    Published 2025-07-01
    “…The receiver, in the form of a mobile phone, tablet, or desktop computer, captures the acoustic signal via its built-in microphone and executes software routines to decode the data. …”
    Get full text
    Article
  20. 5260