Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
841
Design and Evaluation of ADANet: A High-Fidelity Motion Acquisition Framework for Assistive Gesture-Based Interfaces
Published 2025-01-01“…A structured preprocessing architecture is developed, incorporating zero-lag Butterworth filtering, entropy-based temporal smoothing, and computation of 33 handcrafted statistical features, including axis-specific jerk, signal magnitude area (SMA), and range-normalized entropy. …”
Get full text
Article -
842
SPECT and MRI Evaluation of Cerebrovascular Reactivity with CO<sub>2</sub> Inhalation—A Preliminary Study
Published 2025-05-01Get full text
Article -
843
A comparative analysis of CT angiography and echocardiography in the evaluation of chest findings in patients with interrupted aortic arch
Published 2025-06-01“…This study aimed to compare the diagnostic accuracy of echocardiography and computed tomography angiography (CTA) in evaluating thoracic findings in patients with IAA. …”
Get full text
Article -
844
A reliability centred maintenance-oriented framework for modelling, evaluating, and optimising complex repairable flow networks
Published 2025-03-01Subjects: “…Maintenance strategy evaluation…”
Get full text
Article -
845
-
846
Approach for distributed BPEL engine placement using K-means
Published 2014-05-01Get full text
Article -
847
vConnect: V2V Connectivity Prediction and Independent Task Offloading Framework in Vehicular Edge Computing
Published 2025-01-01“…Vehicular Edge Computing enables the utilization of idle resources on vehicles. …”
Get full text
Article -
848
-
849
-
850
Evaluation of Overall Survival Predictions In Inoperable Pancreas Ductal Adenocarcinoma
Published 2022-02-01Get full text
Article -
851
-
852
-
853
Preliminary Evaluation of the Scandinavian Guidelines for Initial Management of Minimal, Mild, and Moderate Head Injuries with Glial Fibrillary Acidic Protein
Published 2024-11-01“…Glial fibrillary acidic protein (GFAP) has become the most promising biomarker for detecting traumatic abnormalities on head computed tomography (CT) in patients with traumatic brain injury (TBI), but most studies have not addressed the potential added value of combining the biomarker with clinical variables that confer risk for intracranial injuries. …”
Get full text
Article -
854
New cross-layer reputation mechanism for mobile cloud computing
Published 2018-03-01“…Users are facing increasingly serious security threats such as data leakage and privacy exposure while using various mobile cloud services.Based on the data security and privacy protection for mobile cloud computing research background,combining the cross-layer design and credit mechanism,in the node between the introduction of the MAC layer and network layer in the process of credit evaluation of factors affecting user reputation,to identify and manage internal malicious nodes.The credibility of the simulation results show that the proposed mechanism can effectively resist the internal defamation and multilayer attack,enhance the credibility of mobile terminals,thus improve the mobile cloud service data security and privacy protection.…”
Get full text
Article -
855
Exploration and practice of data quality governance in privacy computing scenarios
Published 2022-09-01“…Privacy computing is a new data processing technology, which can realize the transformation and circulation of a data value on the premise of protecting data privacy and security.However, the invisible feature of data in private computing scenarios poses a great challenge to traditional data quality management.There is still a lack of perfect solutions.To solve the above problems in the industry, a data quality governance method and process suitable for privacy computing scenarios were proposed.A local and multi-party data quality evaluation system was constructed, which could take into account the data quality governance of the local domain and the federal domain.At the same time, a data contribution measurement method was proposed to explore the long-term incentive mechanism of privacy computing, improve the data quality of privacy computing, and improve the accuracy of computing results.…”
Get full text
Article -
856
Microservice selection approach for mobile users in edge computing environment
Published 2025-05-01“…To address the problem of service discontinuity caused by frequent user mobility in mobile edge computing, a microservice selection and deployment strategy was developed by integrating the cloud-edge speedup ratio and the edge gain index (EGI). …”
Get full text
Article -
857
The Application of Web-Based Scientific Computing System in Innovation and Entrepreneurship
Published 2022-01-01“…With the development of high-performance computing technology, various parallel computers have appeared and are widely used. …”
Get full text
Article -
858
Quantum computing for solving Bayesian networks of bridges – method and recommendations
Published 2025-12-01“…This paper provides practical recommendations regarding the accuracy and efficiency of quantum computing for solving diverse types of Bayesian networks for bridge evaluation and maintenance, including basic and fuzzy-based networks. …”
Get full text
Article -
859
Blockchain-Enhanced Security for 5G Edge Computing in IoT
Published 2025-04-01“…By combining permissioned and permissionless blockchain layers with Layer-2 scaling solutions and adaptive consensus mechanisms, the framework enhances both security and scalability while maintaining computational efficiency. Using synthetic datasets that simulate real-world adversarial behaviour, our evaluation shows an average authentication latency of 172.50 s and a 50% reduction in gas fees compared to traditional Ethereum-based implementations. …”
Get full text
Article -
860
Quantum DeepONet: Neural operators accelerated by quantum computing
Published 2025-06-01“…However, classical DeepONet entails quadratic complexity concerning input dimensions during evaluation. Given the progress in quantum algorithms and hardware, here we propose to utilize quantum computing to accelerate DeepONet evaluations, yielding complexity that is linear in input dimensions. …”
Get full text
Article