Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
1121
Extracranial arteriovenous malformations: a 10-year experience at a German vascular anomaly center and evaluation of diagnostic imaging for endovascular therapy assessment
Published 2024-12-01“…Clinical information from patients' records was evaluated. An additional image reading analysis of the available diagnostic imaging using a 4-point Likert scale, focusing on relevant points for minimally invasive treatment planning, was conducted in 13 patients who had all three magnetic resonance tomography (MRI), computed tomography (CT), and conventional angiography available.ResultsBetween April 2014 and March 2024, 60 patients (60% female, 40% male; 12% Parkes Weber syndrome) with AVMs presented to the VAC. …”
Get full text
Article -
1122
Performance Assessment of an Electrostatic Filter-Diverter Stent Cerebrovascular Protection Device: Evaluation of a Range of Potential Electrostatic Fields Focusing on Small Partic...
Published 2024-11-01“…Both are based on computational fluid dynamics (CFD) coupled with the Lagrangian particle tracking method. …”
Get full text
Article -
1123
Using Simulation Modeling to Estimate Time Characteristics of a Distributed Computing System
Published 2022-11-01“…Special attention have to be pointed towards evaluating time spent by requests in queues and effects of prioritization algorithms on it.To evaluate computing system’s time characteristics different modeling methods can be used, most effective of which is simulation modeling. …”
Get full text
Article -
1124
Ontology-Based, Process-Oriented, and Society-Independent Agent System for Cloud Computing
Published 2014-03-01“…The proposed system can be applied to cloud computing platform. The proposed system has been evaluated from two perspectives, the quality by using the cohesion and the coupling measures for measuring the degree to which the system focuses on solving a particular problem and the applicability by evaluating the manageability and the automatability of the seven processes from three different societies. …”
Get full text
Article -
1125
Enhancing offloading with cybersecurity in edge computing for digital twin‐driven patient monitoring
Published 2024-12-01“…In this study, a new method was introduced, combines edge computing with sophisticated cybersecurity solutions. …”
Get full text
Article -
1126
The Development of a Hydrological Method for Computing Extreme Hydrographs in Engineering Dam Projects
Published 2024-11-01“…This study introduces a hydrological method based on data from large rivers which can be used to compute extreme hydrographs for different return periods in engineering dam projects. …”
Get full text
Article -
1127
Enhancing Efficiency: The Impact of Cloud Computing Adoption on Small and Medium Enterprises Performance
Published 2024-12-01“…This study investigated the factors influencing cloud computing adoption (CCA) and its impact on organizational performance (OP) among SMEs employees in Bahrain. …”
Get full text
Article -
1128
Quantum Computing-Accelerated Kalman Filtering for Satellite Clusters: Algorithms and Comparative Analysis
Published 2025-01-01“…These advances significantly improve computational efficiency and error handling, making the method highly scalable under varying noise levels. …”
Get full text
Article -
1129
Modeling nonlinear oscillator networks using physics-informed hybrid reservoir computing
Published 2025-07-01“…To bridge this gap, we investigate hybrid reservoir computing, combining reservoir computing with “expert” analytical models. …”
Get full text
Article -
1130
Utilizing Soft Computing Techniques to Estimate the Axial Permanent Deformation of Asphalt Concrete
Published 2025-02-01Get full text
Article -
1131
Cyber-physical-social-thinking modeling and computing for geological information service system
Published 2016-11-01“…Hence, it is necessary to design a geological information service system to analyze and evaluate geological hazards. With the development of computer and Internet service model, it is now possible to obtain rich data and process the data with some advanced computing techniques under network environment. …”
Get full text
Article -
1132
Multidimensional Resource Task Scheduling Based on Particle Swarm Optimization in Edge Computing
Published 2025-01-01Get full text
Article -
1133
An Effective QoS-Aware Hybrid Optimization Approach for Workflow Scheduling in Cloud Computing
Published 2025-07-01“…Workflow scheduling in cloud computing is attracting increasing attention. Cloud computing can assign tasks to available virtual machine resources in cloud data centers according to scheduling strategies, providing a powerful computing platform for the execution of workflow tasks. …”
Get full text
Article -
1134
Information Processing via Human Soft Tissue: Soft Tissue Reservoir Computing
Published 2025-01-01“…Physical reservoir computing refers to the concept of using nonlinear physical systems as computational resources to achieve complex information processing. …”
Get full text
Article -
1135
Priority-Based Cloud Computing Architecture for Multimedia-Enabled Heterogeneous Vehicular Users
Published 2018-01-01“…Thus, multimedia cloud computing (MCC) has emerged as an economical and scalable computing technology that can process multimedia-related data efficiently while providing improved Quality of Service (QoS) to vehicular users from anywhere, at any time and on any device, at reduced costs. …”
Get full text
Article -
1136
Reputation computation based on new metric in P2P network
Published 2008-01-01“…For most of P2P file sharing trusted download,the current researches of the evaluation of the trusted peers based on reputation simply rely on the history of interaction and are not paid enough attention on the time factor.The other behaviors like recommendation are also ignored.The attack actions in reputation evaluation were discussed,and the recommender behavior in P2P network was considered separately,which made up for computation based on the interac-tion behavior in computation of reputation.Secondly,for the positive and negative evaluation,different time-decline co-efficient was added in the method to distinguish the malicious node named smart node which acts as a malicious node at times.Simulation experiments show that this proposed method not only increase the good files ratio in P2P download files,but also restrain the collusion in malicious nodes,especially the spy action.…”
Get full text
Article -
1137
A compact public key encryption with equality test for lattice in cloud computing
Published 2025-07-01“…Abstract The rapid proliferation of cloud computing enables users to access computing resources and storage space over the internet, but it also presents challenges in terms of security and privacy. …”
Get full text
Article -
1138
A Novel Multi-Server Federated Learning Framework in Vehicular Edge Computing
Published 2025-07-01Get full text
Article -
1139
SCUP-HPC: System for Constructing and Utilizing Provenance on High-Performance Computing Systems
Published 2025-01-01“…Provenance, which documents how data are produced and processed, plays an important role in improving research reproducibility. In computing systems, provenance typically describes a suite of data relationships between simulation and analysis results, programs that generate results, and the input data fed to the programs. …”
Get full text
Article -
1140
Neural Networks for Solving PDEs on Edge Computing Platforms: A Comprehensive Analysis
Published 2025-01-01“…Solving elliptic partial differential equations (PDEs) with traditional methods is challenging on edge devices due to their reliance on fine meshes. This study evaluates neural networks as an efficient alternative, comparing 60 architectures and five optimizers on three single-board computers. …”
Get full text
Article