Showing 8,641 - 8,660 results of 26,849 for search 'evaluation computing', query time: 0.23s Refine Results
  1. 8641
  2. 8642
  3. 8643
  4. 8644
  5. 8645

    Nucleus pulposus clamping procedures based on optimized material point method for surgical simulation systems by Jianlong Ni, Jingrong Li, Zhiyuan Xie, Qinghui Wang, Chunhai Li, Haoyu Wu, Yang Zhang

    Published 2025-04-01
    “…The virtual operation procedures are then implemented into a training prototype and subsequently tested through simulation experiments and subjective evaluation. The results have demonstrated the feasibility of the approach.…”
    Get full text
    Article
  6. 8646

    Optimization of Combat Resource Allocation Based on Restricted Tournament Selection Social Genetic Algorithm by Shandong Yuan, Yun Ren, Han Zhou, Yongjing Cheng, Kai Yan

    Published 2025-08-01
    “…In addition, we innovatively incorporate the concept of ‘group effect’ from sociology, adding a socialization operator to the algorithm to accelerate convergence and improve the quality of optimal solutions. Comprehensive evaluation confirms RTS2GA’s trade-off profile: though incurring added computational costs, it achieves competitive convergence speed (marginally behind PSO/MPSO; comparable to GA/DE/GA-APSO) while establishing definitive superiority in global optimization across all five benchmarks.…”
    Get full text
    Article
  7. 8647
  8. 8648
  9. 8649
  10. 8650
  11. 8651

    RETRACTED: Pengembangan Sistem Informasi Pengukur Kesiapan Akreditasi Program Studi 9 Kriteria by Aswad Tasdir, Heliawaty Hamrul, Nuralamsyah Zulkarnaim

    Published 2021-12-01
    “… The accreditation system is a form of assessment (evaluation) of the quality and feasibility of higher education institutions or study programs carried out by independent organizations or bodies outside universities. …”
    Get full text
    Article
  12. 8652
  13. 8653
  14. 8654
  15. 8655
  16. 8656
  17. 8657

    Emerging Technologies Driving Zero Trust Maturity Across Industries by Hrishikesh Joshi

    Published 2025-01-01
    “…The research investigates how artificial intelligence, machine learning, blockchain, quantum computing, and cloud/edge technologies are reshaping the implementation and efficacy of Zero Trust architectures. …”
    Get full text
    Article
  18. 8658
  19. 8659
  20. 8660