Showing 1,121 - 1,140 results of 26,849 for search 'evaluation computing', query time: 0.21s Refine Results
  1. 1121

    Extracranial arteriovenous malformations: a 10-year experience at a German vascular anomaly center and evaluation of diagnostic imaging for endovascular therapy assessment by Nadja Werba, Johannes Ludwig, Christel Weiss, Felix Struebing, Stefan Schoenberg, Maliha Sadick

    Published 2024-12-01
    “…Clinical information from patients' records was evaluated. An additional image reading analysis of the available diagnostic imaging using a 4-point Likert scale, focusing on relevant points for minimally invasive treatment planning, was conducted in 13 patients who had all three magnetic resonance tomography (MRI), computed tomography (CT), and conventional angiography available.ResultsBetween April 2014 and March 2024, 60 patients (60% female, 40% male; 12% Parkes Weber syndrome) with AVMs presented to the VAC. …”
    Get full text
    Article
  2. 1122
  3. 1123

    Using Simulation Modeling to Estimate Time Characteristics of a Distributed Computing System by G. A. Zvonareva, D. S. Buzunov

    Published 2022-11-01
    “…Special attention have to be pointed towards evaluating time spent by requests in queues and effects of prioritization algorithms on it.To evaluate computing system’s time characteristics different modeling methods can be used, most effective of which is simulation modeling. …”
    Get full text
    Article
  4. 1124

    Ontology-Based, Process-Oriented, and Society-Independent Agent System for Cloud Computing by Mahmood Fathalipour, Ali Selamat, Jason J. Jung

    Published 2014-03-01
    “…The proposed system can be applied to cloud computing platform. The proposed system has been evaluated from two perspectives, the quality by using the cohesion and the coupling measures for measuring the degree to which the system focuses on solving a particular problem and the applicability by evaluating the manageability and the automatability of the seven processes from three different societies. …”
    Get full text
    Article
  5. 1125

    Enhancing offloading with cybersecurity in edge computing for digital twin‐driven patient monitoring by Ahmed K. Jameil, Hamed Al‐Raweshidy

    Published 2024-12-01
    “…In this study, a new method was introduced, combines edge computing with sophisticated cybersecurity solutions. …”
    Get full text
    Article
  6. 1126

    The Development of a Hydrological Method for Computing Extreme Hydrographs in Engineering Dam Projects by Oscar E. Coronado-Hernández, Vicente S. Fuertes-Miquel, Alfonso Arrieta-Pastrana

    Published 2024-11-01
    “…This study introduces a hydrological method based on data from large rivers which can be used to compute extreme hydrographs for different return periods in engineering dam projects. …”
    Get full text
    Article
  7. 1127

    Enhancing Efficiency: The Impact of Cloud Computing Adoption on Small and Medium Enterprises Performance by Reem A. Abdalla, T. Ramayah, Jayendira P. Sankar, Lamya A. Hidaytalla, Jeena Ann John

    Published 2024-12-01
    “…This study investigated the factors influencing cloud computing adoption (CCA) and its impact on organizational performance (OP) among SMEs employees in Bahrain. …”
    Get full text
    Article
  8. 1128

    Quantum Computing-Accelerated Kalman Filtering for Satellite Clusters: Algorithms and Comparative Analysis by Shreyan Prakash, Raj Bhattacherjee, Sainath Bitragunta, Ashutosh Bhatia, Kamlesh Tiwari

    Published 2025-01-01
    “…These advances significantly improve computational efficiency and error handling, making the method highly scalable under varying noise levels. …”
    Get full text
    Article
  9. 1129

    Modeling nonlinear oscillator networks using physics-informed hybrid reservoir computing by Andrew Shannon, Conor Houghton, David A. W. Barton, Martin Homer

    Published 2025-07-01
    “…To bridge this gap, we investigate hybrid reservoir computing, combining reservoir computing with “expert” analytical models. …”
    Get full text
    Article
  10. 1130
  11. 1131

    Cyber-physical-social-thinking modeling and computing for geological information service system by Yueqin Zhu, Yongjie Tan, Ruixin Li, Xiong Luo

    Published 2016-11-01
    “…Hence, it is necessary to design a geological information service system to analyze and evaluate geological hazards. With the development of computer and Internet service model, it is now possible to obtain rich data and process the data with some advanced computing techniques under network environment. …”
    Get full text
    Article
  12. 1132
  13. 1133

    An Effective QoS-Aware Hybrid Optimization Approach for Workflow Scheduling in Cloud Computing by Min Cui, Yipeng Wang

    Published 2025-07-01
    “…Workflow scheduling in cloud computing is attracting increasing attention. Cloud computing can assign tasks to available virtual machine resources in cloud data centers according to scheduling strategies, providing a powerful computing platform for the execution of workflow tasks. …”
    Get full text
    Article
  14. 1134

    Information Processing via Human Soft Tissue: Soft Tissue Reservoir Computing by Yo Kobayashi

    Published 2025-01-01
    “…Physical reservoir computing refers to the concept of using nonlinear physical systems as computational resources to achieve complex information processing. …”
    Get full text
    Article
  15. 1135

    Priority-Based Cloud Computing Architecture for Multimedia-Enabled Heterogeneous Vehicular Users by Amjad Ali, Hongwu Liu, Ali Kashif Bashir, Shaker El-Sappagh, Farman Ali, Adeel Baig, Daeyoung Park, Kyung Sup Kwak

    Published 2018-01-01
    “…Thus, multimedia cloud computing (MCC) has emerged as an economical and scalable computing technology that can process multimedia-related data efficiently while providing improved Quality of Service (QoS) to vehicular users from anywhere, at any time and on any device, at reduced costs. …”
    Get full text
    Article
  16. 1136

    Reputation computation based on new metric in P2P network by BAO Yu1, ZENG Guo-sun1, ZENG Lian-sun3, CHEN Bo1, WANG Wei1

    Published 2008-01-01
    “…For most of P2P file sharing trusted download,the current researches of the evaluation of the trusted peers based on reputation simply rely on the history of interaction and are not paid enough attention on the time factor.The other behaviors like recommendation are also ignored.The attack actions in reputation evaluation were discussed,and the recommender behavior in P2P network was considered separately,which made up for computation based on the interac-tion behavior in computation of reputation.Secondly,for the positive and negative evaluation,different time-decline co-efficient was added in the method to distinguish the malicious node named smart node which acts as a malicious node at times.Simulation experiments show that this proposed method not only increase the good files ratio in P2P download files,but also restrain the collusion in malicious nodes,especially the spy action.…”
    Get full text
    Article
  17. 1137

    A compact public key encryption with equality test for lattice in cloud computing by Junfei He, Qing Ye, Zhichao Yang, Shixiong Wang, Jiasheng Wang

    Published 2025-07-01
    “…Abstract The rapid proliferation of cloud computing enables users to access computing resources and storage space over the internet, but it also presents challenges in terms of security and privacy. …”
    Get full text
    Article
  18. 1138
  19. 1139

    SCUP-HPC: System for Constructing and Utilizing Provenance on High-Performance Computing Systems by Yuta Namiki, Takeo Hosomi, Hideyuki Tanushi, Akihiro Yamashita, Susumu Date

    Published 2025-01-01
    “…Provenance, which documents how data are produced and processed, plays an important role in improving research reproducibility. In computing systems, provenance typically describes a suite of data relationships between simulation and analysis results, programs that generate results, and the input data fed to the programs. …”
    Get full text
    Article
  20. 1140

    Neural Networks for Solving PDEs on Edge Computing Platforms: A Comprehensive Analysis by Segundo Francisco Segura Altamirano, Diana M. Castro Cardenas

    Published 2025-01-01
    “…Solving elliptic partial differential equations (PDEs) with traditional methods is challenging on edge devices due to their reliance on fine meshes. This study evaluates neural networks as an efficient alternative, comparing 60 architectures and five optimizers on three single-board computers. …”
    Get full text
    Article