Showing 741 - 760 results of 26,849 for search 'evaluation computing', query time: 0.21s Refine Results
  1. 741

    Ovarian cancer unmasked by technetium-99m bone scintigraphy and single-photon emission computed tomography-computed tomography by Jolien Verschueren, Ivan Huyghe, Tim Van den Wyngaert

    Published 2019-01-01
    “…We report a case of a 30-year-old female patient with a painless palpable nodule in the chest wall, evaluated for osseous involvement by technetium-99m (Tc-99m) bone scintigraphy. …”
    Get full text
    Article
  2. 742

    Uncertainty-Aware Appraising of User Interfaces in Human Computer Interactions: Blending Tree Soft Sets and Neutrosophic Computational Methodological by Basma K. Eldrandaly, Mona Mohamed

    Published 2025-05-01
    “…Human Computer Interactions (HCI) is a multifaceted discipline that focuses on designing, appraising, and implementing interactive computer systems to improve accessibility, usability, and user experience. …”
    Get full text
    Article
  3. 743
  4. 744
  5. 745
  6. 746

    Towards Trustworthy Energy Efficient P2P Networks: A New Method for Validating Computing Results in Decentralized Networks by Fernando Rodríguez-Sela, Borja Bordel

    Published 2025-06-01
    “…Decentralized P2P networks have emerged as robust instruments to execute computing tasks, with enhanced security and transparency. …”
    Get full text
    Article
  7. 747

    SINGLE-PHOTON EMISSION COMPUTED TOMOGRAPHY IN COMBINATION WITH X-RAY COMPUTED TOMOGRAPHY IN THE STUDY OF LACRIMAL PASSAGES. FIRST RESULTS by E. L. At’kova, I. O. Tomashevskiy, A. I. Luchshev, V. D. Yartsev

    Published 2016-02-01
    “…Objective: to explore the capabilities of single-photon emission computed tomography (SPECT) in combination with x-ray computed tomography (SPECT/CT) in the study of the anatomy and drainage function of lacrimal passages.Material and methods. …”
    Get full text
    Article
  8. 748
  9. 749
  10. 750
  11. 751
  12. 752
  13. 753

    Numerical modelling of a variable rate spraying drone and comparison to experimental evaluations by Fatemeh Joudi-Sarighayeh, Hossein Mousazadeh, Mohammad Hasan Sabet Dizavandi, Farzad Mohammadi, Foad Hassanlou, Niloofar Ghasemi, Zahra Hajalioghli, Alireza Tafteh

    Published 2025-12-01
    “…Numerical simulations were conducted using X-Flow software, which employs Lattice Boltzmann Methods (LBM) to effectively model fluid behaviour within a specified computational domain. The experimental evaluation encompassed some tests on nozzle flow rates across different PWM frequencies and duty cycles. …”
    Get full text
    Article
  14. 754

    How to assess chest wall deformity in children with pectus excavatum - evaluation of the agreement among methods by Kostić Marko, Sretenović Aleksandar, Savić Milan, Popović Marko, Kostić Sanja, Stamenović Davor

    Published 2021-01-01
    “…The study included 35 patients with PE, aged between 7 and 15 years. A noninvasive evaluation of chest deformity was carried out in all patients by photographic method (surrogate of clinical examination), native X-ray imaging, and computed tomography (CT), as well as by echocardiographic examination. …”
    Get full text
    Article
  15. 755
  16. 756
  17. 757

    CONSTRUCTION PRINCIPLES OF COMPUTING UNITS FOR INTELLECTUAL DATA PROCESSING by M. M. Tatur

    Published 2016-09-01
    “…An approach to the development of problem-oriented parallel computers for a wide range of tasks of intelligent data processing is described. …”
    Get full text
    Article
  18. 758

    Research progress of trusted sensor-cloud based on fog computing by Tian WANG, Xuewei SHEN, Hao LUO, Baisheng CHEN, Guojun WANG, Weijia JIA

    Published 2019-03-01
    “…The sensor-cloud is combined with cloud computing and wireless sensor networks,which extends the service ability of WSN by the support of cloud computing.It is one of the hot topics among the current researches.After comparing and surveying the mainstream system adequately,the characteristics and development of sensor-Cloud were summed up.Then,the direct influence of existing trust issues in the system for data protection and application on upper layer were found.The announced reasons explained that existing schemes were difficult to provide trusted sensor-cloud services.This was because that the capabilities of the underlying WSN nodes were too weak,and cloud computing model lacked the direct management of underlying nodes and data and so on.The trusted structures based on fog computing were given,and the key technologies of trusted evaluation,trusted data collection,and trusted storage were designed.Finally,the discussion pointed out new views for the researches in trusted sensor-cloud.…”
    Get full text
    Article
  19. 759

    Trusted secure model for data services in cloud computing by Li-zhi XIONG, Zheng-quan XU, Xin GU

    Published 2014-10-01
    “…For trusted status of cloud service provider (CSP) and security requirements for data services in cloud computing,the trusted re-encryption secure model (TRSM) for cloud data services was proposed.Only with a certain trusted degree in CSP,cloud data security can be ensured by taking effective re-encryption schemes.The re-encryption secure model is verified by the classical cryptographic algorithms and analyzed by random oracles.Thus,the basic requirements of realizing re-encryption algorithm are got.Moreover,trusted evaluation model is proposed and used to dynamically evaluate CSP’s trusted status,provides theoretical basis and realization for establishment of trusted secure data services in cloud computing.…”
    Get full text
    Article
  20. 760