Showing 841 - 860 results of 26,849 for search 'evaluation computing', query time: 0.20s Refine Results
  1. 841

    Design and Evaluation of ADANet: A High-Fidelity Motion Acquisition Framework for Assistive Gesture-Based Interfaces by Md Ettashamul Haque, Atique Tajwar, Akm Azad, Salem A. Alyami, Md Mehedi Hasan

    Published 2025-01-01
    “…A structured preprocessing architecture is developed, incorporating zero-lag Butterworth filtering, entropy-based temporal smoothing, and computation of 33 handcrafted statistical features, including axis-specific jerk, signal magnitude area (SMA), and range-normalized entropy. …”
    Get full text
    Article
  2. 842
  3. 843

    A comparative analysis of CT angiography and echocardiography in the evaluation of chest findings in patients with interrupted aortic arch by Zhanar Moldakhanova, Raushan Rakhimzhanova, Tairkhan Dautov, Lazzat Bastarbekova, Bauyrzhan Kaliyev, Assel Almussina, Aizhan Zhankorazova, Nurmakhan Zholshybek

    Published 2025-06-01
    “…This study aimed to compare the diagnostic accuracy of echocardiography and computed tomography angiography (CTA) in evaluating thoracic findings in patients with IAA. …”
    Get full text
    Article
  4. 844
  5. 845
  6. 846
  7. 847

    vConnect: V2V Connectivity Prediction and Independent Task Offloading Framework in Vehicular Edge Computing by Adsadawut Chanakitkarnchok, Kiattikun Kawila, Kultida Rojviboonchai

    Published 2025-01-01
    “…Vehicular Edge Computing enables the utilization of idle resources on vehicles. …”
    Get full text
    Article
  8. 848
  9. 849
  10. 850
  11. 851
  12. 852
  13. 853

    Preliminary Evaluation of the Scandinavian Guidelines for Initial Management of Minimal, Mild, and Moderate Head Injuries with Glial Fibrillary Acidic Protein by Mira Keski-Pukkila, Justin E. Karr, Jussi P. Posti, Ksenia Berghem, Anna-Kerttu Kotilainen, Kaj Blennow, Henrik Zetterberg, Grant L. Iverson, Teemu M. Luoto

    Published 2024-11-01
    “…Glial fibrillary acidic protein (GFAP) has become the most promising biomarker for detecting traumatic abnormalities on head computed tomography (CT) in patients with traumatic brain injury (TBI), but most studies have not addressed the potential added value of combining the biomarker with clinical variables that confer risk for intracranial injuries. …”
    Get full text
    Article
  14. 854

    New cross-layer reputation mechanism for mobile cloud computing by Mengyang YU, Hui LIN, Youliang TIAN

    Published 2018-03-01
    “…Users are facing increasingly serious security threats such as data leakage and privacy exposure while using various mobile cloud services.Based on the data security and privacy protection for mobile cloud computing research background,combining the cross-layer design and credit mechanism,in the node between the introduction of the MAC layer and network layer in the process of credit evaluation of factors affecting user reputation,to identify and manage internal malicious nodes.The credibility of the simulation results show that the proposed mechanism can effectively resist the internal defamation and multilayer attack,enhance the credibility of mobile terminals,thus improve the mobile cloud service data security and privacy protection.…”
    Get full text
    Article
  15. 855

    Exploration and practice of data quality governance in privacy computing scenarios by Yan ZHANG, Yifan YANG, Ren YI, Shengmei LUO, Jianfei TANG, Zhengxun XIA

    Published 2022-09-01
    “…Privacy computing is a new data processing technology, which can realize the transformation and circulation of a data value on the premise of protecting data privacy and security.However, the invisible feature of data in private computing scenarios poses a great challenge to traditional data quality management.There is still a lack of perfect solutions.To solve the above problems in the industry, a data quality governance method and process suitable for privacy computing scenarios were proposed.A local and multi-party data quality evaluation system was constructed, which could take into account the data quality governance of the local domain and the federal domain.At the same time, a data contribution measurement method was proposed to explore the long-term incentive mechanism of privacy computing, improve the data quality of privacy computing, and improve the accuracy of computing results.…”
    Get full text
    Article
  16. 856

    Microservice selection approach for mobile users in edge computing environment by ZHAO Shuxu, JIANG Kaijun, WANG Xiaolong

    Published 2025-05-01
    “…To address the problem of service discontinuity caused by frequent user mobility in mobile edge computing, a microservice selection and deployment strategy was developed by integrating the cloud-edge speedup ratio and the edge gain index (EGI). …”
    Get full text
    Article
  17. 857

    The Application of Web-Based Scientific Computing System in Innovation and Entrepreneurship by Tingli Cheng

    Published 2022-01-01
    “…With the development of high-performance computing technology, various parallel computers have appeared and are widely used. …”
    Get full text
    Article
  18. 858

    Quantum computing for solving Bayesian networks of bridges – method and recommendations by Tareq Abdelmalek, Fadi Oudah

    Published 2025-12-01
    “…This paper provides practical recommendations regarding the accuracy and efficiency of quantum computing for solving diverse types of Bayesian networks for bridge evaluation and maintenance, including basic and fuzzy-based networks. …”
    Get full text
    Article
  19. 859

    Blockchain-Enhanced Security for 5G Edge Computing in IoT by Manuel J. C. S. Reis

    Published 2025-04-01
    “…By combining permissioned and permissionless blockchain layers with Layer-2 scaling solutions and adaptive consensus mechanisms, the framework enhances both security and scalability while maintaining computational efficiency. Using synthetic datasets that simulate real-world adversarial behaviour, our evaluation shows an average authentication latency of 172.50 s and a 50% reduction in gas fees compared to traditional Ethereum-based implementations. …”
    Get full text
    Article
  20. 860

    Quantum DeepONet: Neural operators accelerated by quantum computing by Pengpeng Xiao, Muqing Zheng, Anran Jiao, Xiu Yang, Lu Lu

    Published 2025-06-01
    “…However, classical DeepONet entails quadratic complexity concerning input dimensions during evaluation. Given the progress in quantum algorithms and hardware, here we propose to utilize quantum computing to accelerate DeepONet evaluations, yielding complexity that is linear in input dimensions. …”
    Get full text
    Article