Showing 1,101 - 1,120 results of 26,849 for search 'evaluation computing', query time: 0.17s Refine Results
  1. 1101

    An echo state network based on enhanced intersecting cortical model for discrete chaotic system prediction by Xubin Wang, Pei Ma, Jing Lian, Jizhao Liu, Yide Ma

    Published 2025-07-01
    “…Deep learning models, while effective, are associated with high computational costs and large data requirements. As an alternative, Echo State Networks (ESNs) are more computationally efficient, but their predictive accuracy can be constrained by the use of simplistic neuron models and a dependency on hyperparameter tuning.MethodsThis paper proposes a framework, the Echo State Network based on an Enhanced Intersecting Cortical Model (ESN-EICM). …”
    Get full text
    Article
  2. 1102

    Approaches to Addressing Service Selection Ties in Ad Hoc Mobile Cloud Computing by Ayotuyi Tosin Akinola, Matthew Olusegun Adigun

    Published 2018-01-01
    “…These mechanisms were evaluated using the experimental method. The evaluation of the mechanisms mainly focused on the metrics that evaluate the satisfaction of users' interest via the quantitative evaluation. …”
    Get full text
    Article
  3. 1103
  4. 1104
  5. 1105
  6. 1106

    Research on asynchronous robust federated learning method in vehicle computing power network by YIN Hongbo, WANG Shuai, ZHANG Ke, ZHANG Yin

    Published 2024-12-01
    “…The synchronous training mechanism of traditional federated learning was not suitable for dynamic vehicle computing power network scenarios, and lacked effective detection mechanisms under the threat of malicious vehicle attacks. …”
    Get full text
    Article
  7. 1107
  8. 1108

    Evaluation of accuracy and membrane perforation in robotic-assisted implant surgery for transalveolar sinus floor elevation: a retrospective case series by Tao Yang, Wenjing Yi, Wenan Xu, Xiaojian Xing, Buling Wu

    Published 2025-04-01
    “…This study aimed to assess implant placement accuracy and membrane perforation in robotic computer-assisted implant surgery (r-CAIS) for TSFE. …”
    Get full text
    Article
  9. 1109

    Comparing traditional natural language processing and large language models for mental health status classification: a multi-model evaluation by Thomas Kallstenius, Andrea Johansson Capusan, Gerhard Andersson, Adam Williamson

    Published 2025-07-01
    “…We compared the results of the three computational approaches and overfitting was monitored through validation loss across epochs for the fine-tuned LLM. …”
    Get full text
    Article
  10. 1110

    An Improved Dingo Optimization for Resource Aware Scheduling in Cloud Fog Computing Environment by Santhosh Kumar Medishetti, Ganesh Reddy Karri

    Published 2024-02-01
    “…Task scheduling in Cloud-Fog computing environments is a critical aspect of optimizing resource allocation and enhancing performance. …”
    Get full text
    Article
  11. 1111

    Modeling and Performance Analysis of Task Offloading of Heterogeneous Mobile Edge Computing Networks by Wenwang Li, Haohao Zhou

    Published 2025-04-01
    “…Mobile edge computing architecture (MEC) can provide users with low latency services by integrating computing, storage and processing capabilities near users and data sources. …”
    Get full text
    Article
  12. 1112

    Fast and fair split computing for accelerating deep neural network (DNN) inference by Dongju Cha, Jaewook Lee, Daeyoung Jung, Sangheon Pack

    Published 2025-02-01
    “…Additionally, we devise a low-complexity heuristic algorithm called fast and fair split computing (F2SC). Evaluation results demonstrate that F2SC reduces inference time by 3.8%∼20.1% compared to the conventional approaches while maintaining fairness.…”
    Get full text
    Article
  13. 1113

    Enhancing healthcare AI stability with edge computing and machine learning for extubation prediction by Kuo-Yang Huang, Ying-Lin Hsu, Che-Liang Chung, Huang-Chi Chen, Ming-Hwarng Horng, Ching-Hsiung Lin, Ching-Sen Liu, Jia-Lang Xu

    Published 2025-05-01
    “…This paper details the model evaluation and demonstrates the feasibility and efficiency of edge intelligence in ventilator weaning decision support.…”
    Get full text
    Article
  14. 1114

    Effect of gastric juice on the surface, optical, and mechanical properties of different computer-aided design/computer-aided manufacturing dental ceramics: A systematic review and... by Lorena Scaion Silva, Victor Augusto Alves Bento, Kevin Henrique Cruz, Victor Alves Nascimento, Aldiéris Alves Pesqueira, Eduardo Piza Pellizzer

    Published 2025-04-01
    “…Purpose: Effect of an erosive challenge on the surface, optical, and mechanical properties of prostheses manufactured using different types of dental ceramics for computer-aided design/computer-aided manufacturing (CAD/CAM). …”
    Get full text
    Article
  15. 1115

    Computing Non-Dominated Flexible Skylines in Vertically Distributed Datasets with No Random Access by Davide Martinenghi

    Published 2025-05-01
    “…We introduce an algorithm for computing <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mrow><mi>ND</mi></mrow></mrow></semantics></math></inline-formula> in the NRA scenario, prove its correctness and optimality within its class, and provide an experimental evaluation covering a wide range of cases, with both synthetic and real datasets.…”
    Get full text
    Article
  16. 1116

    Edge Computing Architectures for Low-Latency Data Processing in Internet of Things Applications by Banoth Sreenu, M Vineesha, Punna Hari Shankar, P Mathiyalagan, Prakash Vijay, M Jasmin

    Published 2025-01-01
    “…Apply large-scale edge computing solutions in enterprise scenarios: conduct a cost-benefit analysis Evaluation results show that the proposed design achieves substantial latency reduction, energy saving, and data security, recommending it to meet the needs of next generation IoT applications.…”
    Get full text
    Article
  17. 1117

    Fast handover authentication scheme in 5G mobile edge computing scenarios by Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU

    Published 2022-06-01
    “…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
    Get full text
    Article
  18. 1118

    Land Use Analysis Using Machine-Learning Based on Cloud Computing Platform by Syukur Toha Prasetyo, Fahmi Arief Rahman, Sinar Suryawati, Slamet Supriyadi, Eko Setiawan

    Published 2025-08-01
    “…The application of machine-learning on a cloud computing platform (Google Earth Engine, GEE) in land use analysis enables efficient and rapid processing of spatial data on a wide scale. …”
    Get full text
    Article
  19. 1119

    Future of Telepresence Services in the Evolving Fog Computing Environment: A Survey on Research and Use Cases by Dang Van Thang, Artem Volkov, Ammar Muthanna, Andrey Koucheryavy, Abdelhamied A. Ateya, Dushantha Nalin K. Jayakody

    Published 2025-05-01
    “…This survey investigates the convergence of telepresence services with fog computing, evaluating the latest advancements in research developments and practical use cases. …”
    Get full text
    Article
  20. 1120

    Evaluating the value of machine learning models for predicting hematoma expansion in acute spontaneous intracerebral hemorrhage based on CT imaging features of hematomas and surrou... by Tianyu Yang, Tianyu Yang, Zhen Zhao, Yan Gu, Shengkai Yang, Yonggang Zhang, Lei Li, Ting Wang, Zhongchang Miao

    Published 2025-06-01
    “…ObjectiveThis study evaluates the utility of artificial intelligence (AI) for automated segmentation of intracranial hematomas and surrounding oedema in non-contrast computed tomography (CT) images. …”
    Get full text
    Article