Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
961
3D modelling and x-ray depth analysis map of the pulp with computer software via digital periapical radiography and cone beam computed tomography
Published 2025-03-01“…The diagnostic accuracy of XPAR application on pathological and morphological changes was evaluated by comparing the obtained results with CBCT. …”
Get full text
Article -
962
-
963
The diagnostic value of low-dose chest computed tomography for calcium score determining compared with the standard method and the results of computed tomography and selective coro...
Published 2019-12-01“…Coincidence between the two methods was evaluated by the absolute CS values and by stratification of patients into five risk categories (“zero” CS values were excluded from the analysis). …”
Get full text
Article -
964
The Added Value of a Single-photon Emission Computed Tomography-Computed Tomography in Sentinel Lymph Node Mapping in Patients with Breast Cancer and Malignant Melanoma
Published 2015-01-01“…Single-photon emission computed tomography-computed tomography (SPECT-CT) allows for physiological and anatomical co-registration in sentinel lymph node (SLN) mapping and offers additional benefits over conventional planar imaging. …”
Get full text
Article -
965
-
966
-
967
Comparative evaluation of the pontic shield technique versus whole tooth extraction on labial crestal bone resorption using cone-beam computed tomography in the maxillary anterior region: A randomized controlled clinical trial
Published 2024-11-01“…The height of the labial crestal bone and width of the socket at both sites were evaluated by the cone-beam computed tomography examination preoperatively at baseline and after a 3-month follow-up period. …”
Get full text
Article -
968
Cybersecurity in Cloud Computing AI-Driven Intrusion Detection and Mitigation Strategies
Published 2025-01-01Get full text
Article -
969
Design and Implementation of ESP32-Based Edge Computing for Object Detection
Published 2025-03-01“…This paper explores the application of the ESP32 microcontroller in edge computing, focusing on the design and implementation of an edge server system to evaluate performance improvements achieved by integrating edge and cloud computing. …”
Get full text
Article -
970
Key Considerations for Real-Time Object Recognition on Edge Computing Devices
Published 2025-07-01“…An example of an application is also presented in this article, which is about real-time power transmission line detection using edge computing devices. The evaluation results show the significance of implementing lightweight models and model compression techniques such as quantized Tiny YOLOv7. …”
Get full text
Article -
971
-
972
A pair-based task scheduling algorithm for cloud computing environment
Published 2022-01-01“…In the cloud computing environment, scheduling algorithms show the vital role of finding a possible schedule of the tasks. …”
Get full text
Article -
973
An NVMe-Based Secure Computing Platform With FPGA-Based TFHE Accelerator
Published 2025-01-01“…We defined secure computing instructions to evaluate 14-bit to 14-bit functions using TFHE. …”
Get full text
Article -
974
A high-performance tensor computing unit for deep learning acceleration
Published 2025-06-01“…It can readily select proper operators to achieve 96% of the chip peak performance under certain shapes and find the best performance implementation within limited power. The evaluation of a large number of convolution shapes on our tensor computing unit chip shows the generated operators significantly outperform the hand-written ones, achieving 9% higher normalized performance than CUDA according to the silicon data.…”
Get full text
Article -
975
Device-Driven Service Allocation in Mobile Edge Computing with Location Prediction
Published 2025-05-01“…With the rapid deployment of edge base stations and the widespread application of 5G technology, Mobile Edge Computing (MEC)has gradually transitioned from a theoretical concept to practical implementation, playing a key role in emerging human-machine interactions and innovative mobile applications. …”
Get full text
Article -
976
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
Published 2025-04-01“…Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. …”
Get full text
Article -
977
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01“…Abstract As healthcare systems increasingly adopt fog computing to improve responsiveness and real-time data processing at the edge, significant security challenges emerge due to the decentralized architecture. …”
Get full text
Article -
978
Anderson impurity solver integrating tensor network methods with quantum computing
Published 2025-03-01“…Our algorithm exploits the efficiency of tensor networks for preparing ground states on classical computers and takes advantage of quantum processors for the evaluation of the time evolution, which can become intractable on classical computers. …”
Get full text
Article -
979
-
980
Study on filter clogging and filtration performance evaluation of Ballast Water Management System (BWMS) using analytical and numerical methods
Published 2025-01-01“…In this study, an analytical method based on Darcy’s law is devised to predict clogging occurrences and filter performance is evaluated via computational fluid dynamics (CFD) simulations. …”
Get full text
Article