Showing 961 - 980 results of 26,849 for search 'evaluation computing', query time: 0.22s Refine Results
  1. 961

    3D modelling and x-ray depth analysis map of the pulp with computer software via digital periapical radiography and cone beam computed tomography by Turgut Felek, Samed Satir, Selale Ozel, H. Kursat Celik

    Published 2025-03-01
    “…The diagnostic accuracy of XPAR application on pathological and morphological changes was evaluated by comparing the obtained results with CBCT. …”
    Get full text
    Article
  2. 962
  3. 963

    The diagnostic value of low-dose chest computed tomography for calcium score determining compared with the standard method and the results of computed tomography and selective coro... by K. N. Zhuravlev, O. V. Styazhkina, E. Yu. Vasilieva, V. E. Sinitsyn, A. V. Shpektor

    Published 2019-12-01
    “…Coincidence between the two methods was evaluated by the absolute CS values and by stratification of patients into five risk categories (“zero” CS values were excluded from the analysis). …”
    Get full text
    Article
  4. 964

    The Added Value of a Single-photon Emission Computed Tomography-Computed Tomography in Sentinel Lymph Node Mapping in Patients with Breast Cancer and Malignant Melanoma by George Bennie, Mariza Vorster, John Buscombe, Mike Sathekge

    Published 2015-01-01
    “…Single-photon emission computed tomography-computed tomography (SPECT-CT) allows for physiological and anatomical co-registration in sentinel lymph node (SLN) mapping and offers additional benefits over conventional planar imaging. …”
    Get full text
    Article
  5. 965
  6. 966
  7. 967

    Comparative evaluation of the pontic shield technique versus whole tooth extraction on labial crestal bone resorption using cone-beam computed tomography in the maxillary anterior region: A randomized controlled clinical trial by Mallinath Govind Jadhav, Amit Arvind Agrawal, Swapna Arunkumar Mahale, Kunal Sethi, Triveni Ashok Kale-Bachhav

    Published 2024-11-01
    “…The height of the labial crestal bone and width of the socket at both sites were evaluated by the cone-beam computed tomography examination preoperatively at baseline and after a 3-month follow-up period. …”
    Get full text
    Article
  8. 968
  9. 969

    Design and Implementation of ESP32-Based Edge Computing for Object Detection by Yeong-Hwa Chang, Feng-Chou Wu, Hung-Wei Lin

    Published 2025-03-01
    “…This paper explores the application of the ESP32 microcontroller in edge computing, focusing on the design and implementation of an edge server system to evaluate performance improvements achieved by integrating edge and cloud computing. …”
    Get full text
    Article
  10. 970

    Key Considerations for Real-Time Object Recognition on Edge Computing Devices by Nico Surantha, Nana Sutisna

    Published 2025-07-01
    “…An example of an application is also presented in this article, which is about real-time power transmission line detection using edge computing devices. The evaluation results show the significance of implementing lightweight models and model compression techniques such as quantized Tiny YOLOv7. …”
    Get full text
    Article
  11. 971
  12. 972

    A pair-based task scheduling algorithm for cloud computing environment by Sanjaya Kumar Panda, Shradha Surachita Nanda, Sourav Kumar Bhoi

    Published 2022-01-01
    “…In the cloud computing environment, scheduling algorithms show the vital role of finding a possible schedule of the tasks. …”
    Get full text
    Article
  13. 973

    An NVMe-Based Secure Computing Platform With FPGA-Based TFHE Accelerator by Yoshihiro Ohba, Tomoya Sanuki, Claude Gravel, Kentaro Mihara, Asuka Wakasugi, Kenta Adachi

    Published 2025-01-01
    “…We defined secure computing instructions to evaluate 14-bit to 14-bit functions using TFHE. …”
    Get full text
    Article
  14. 974

    A high-performance tensor computing unit for deep learning acceleration by Qiang Zhou, Tieli Sun, Taoran Shen, York Xue

    Published 2025-06-01
    “…It can readily select proper operators to achieve 96% of the chip peak performance under certain shapes and find the best performance implementation within limited power. The evaluation of a large number of convolution shapes on our tensor computing unit chip shows the generated operators significantly outperform the hand-written ones, achieving 9% higher normalized performance than CUDA according to the silicon data.…”
    Get full text
    Article
  15. 975

    Device-Driven Service Allocation in Mobile Edge Computing with Location Prediction by Qian Zeng, Xiaobo Li, Yixuan Chen, Minghao Yang, Xingbang Liu, Yuetian Liu, Shiwei Xiu

    Published 2025-05-01
    “…With the rapid deployment of edge base stations and the widespread application of 5G technology, Mobile Edge Computing (MEC)has gradually transitioned from a theoretical concept to practical implementation, playing a key role in emerging human-machine interactions and innovative mobile applications. …”
    Get full text
    Article
  16. 976

    Blockchain and signcryption enabled asynchronous federated learning framework in fog computing by Zhou Zhou, Youliang Tian, Jinbo Xiong, Changgen Peng, Jing Li, Nan Yang

    Published 2025-04-01
    “…Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. …”
    Get full text
    Article
  17. 977

    Securing fog computing in healthcare with a zero-trust approach and blockchain by Navjeet Kaur, Ayush Mittal, Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Kashif Saleem, Ehab Seif Ghith

    Published 2025-02-01
    “…Abstract As healthcare systems increasingly adopt fog computing to improve responsiveness and real-time data processing at the edge, significant security challenges emerge due to the decentralized architecture. …”
    Get full text
    Article
  18. 978

    Anderson impurity solver integrating tensor network methods with quantum computing by François Jamet, Lachlan P. Lindoy, Yannic Rath, Connor Lenihan, Abhishek Agarwal, Enrico Fontana, Fedor Simkovic IV, Baptiste Anselme Martin, Ivan Rungger

    Published 2025-03-01
    “…Our algorithm exploits the efficiency of tensor networks for preparing ground states on classical computers and takes advantage of quantum processors for the evaluation of the time evolution, which can become intractable on classical computers. …”
    Get full text
    Article
  19. 979
  20. 980

    Study on filter clogging and filtration performance evaluation of Ballast Water Management System (BWMS) using analytical and numerical methods by Gang Nam Lee, Tien Trung Duong, Sangho Park, Mansoo Kim, Kwang Hyo Jung

    Published 2025-01-01
    “…In this study, an analytical method based on Darcy’s law is devised to predict clogging occurrences and filter performance is evaluated via computational fluid dynamics (CFD) simulations. …”
    Get full text
    Article