Showing 1,261 - 1,280 results of 26,849 for search 'evaluation computing', query time: 0.23s Refine Results
  1. 1261

    Approximated 2-Bit Adders for Parallel In-Memristor Computing With a Novel Sum-of-Product Architecture by Christian Simonides, Dominik Gausepohl, Peter M. Hinkel, Fabian Seiler, Nima Taherinejad

    Published 2024-01-01
    “…Conventional computing methods struggle with the exponentially increasing demand for computational power, caused by applications including image processing and machine learning (ML). …”
    Get full text
    Article
  2. 1262
  3. 1263

    Comparative analysis of sandstone microtomographic image segmentation using advanced convolutional neural networks with pixelwise and physical accuracy evaluation by Mazaher Hayatdavoudi, Mohammad Emami Niri, Ahmad Kalhor

    Published 2025-07-01
    “…These methods enable precise evaluations of critical properties such as porosity and fluid flow characteristics, thereby enhancing the efficiency of reservoir characterization. …”
    Get full text
    Article
  4. 1264
  5. 1265
  6. 1266

    Dynamic game and reliable recommendation based transferring reputation mechanism for mobile cloud computing by Hui LIN, Mengyang YU, Youliang TIAN, Yijie HUANG

    Published 2018-05-01
    “…The booming development of the mobile internet and cloud computing leads to the emerging of many mobile cloud platforms based services.However,since mobile users store lots of data and privacy information in the cloud when they are using the mobile cloud services,they are facing multiple increasingly serious security threats such as data leaks and privacy exposures.The data security and privacy protection was investigated in mobile cloud computing,aiming at the internal bad mouthing attacks and mobile attacks.A dynamic game and reliable recommendation based transferring reputation mechanism was proposed.First,a dynamic game based recommendation incentive mechanism was proposed.Secondly,a reliable recommendation reputation evaluation model was established based on the incentive mechanism.Last,a novel transferring reputation mechanism was proposed that combined the above mentioned incentive mechanism and reputation evaluation model.Simulation results demonstrate the proposed transferring reputation mechanism can defend against the internal bad mouthing attacks and mobile attacks effectively,enhance the credibility of mobile terminals and improve the data security and privacy protection of mobile cloud services.…”
    Get full text
    Article
  7. 1267

    Optimizing makespan and resource utilization in cloud computing environment via evolutionary scheduling approach. by Faten K Karim, Sara Ghorashi, Salem Alkhalaf, Saadia H A Hamza, Anis Ben Ishak, S Abdel-Khalek

    Published 2024-01-01
    “…As a new computing resources distribution platform, cloud technology greatly influenced society with the conception of on-demand resource usage through virtualization technology. …”
    Get full text
    Article
  8. 1268

    Evaluation value of single-phase images from photon-counting CT-based low-dose pancreatic dynamic volume perfusion scanning for pancreatic cancer imaging by CHANG Rui, LI Jiqiang, YANG Yanzhao, CHAI Weimin, YAN Fuhua, DONG Haipeng.

    Published 2025-04-01
    “…Objective This study aims to evaluate the image quality of single-phase images in low-dose pancreatic dynamic volume perfusion computed tomography (VPCT) scans based on photon-counting computed tomography (PCCT) and assess their feasibility for morphological evaluation of pancreatic ductal adenocarcinoma (PDAC). …”
    Get full text
    Article
  9. 1269
  10. 1270

    An Integrated Node Selection Model Using FAHP and FTOPSIS for Data Retrieval in Ubiquitous Computing by Belal Z. Hassan, Ahmed. A. A. Gad-Elrab, Mohamed S. Farag, Shaban E. Abo Youssef

    Published 2022-01-01
    “…Ubiquitous computing (UC) is an advanced computing concept that makes services and computing available everywhere and anytime. …”
    Get full text
    Article
  11. 1271

    Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system by Parminder Singh, Sujatha Krishnamoorthy, Anand Nayyar, Ashish Kr Luhach, Avinash Kaur

    Published 2019-10-01
    “…In this article, a soft-computing-based approach has been designed to reduce the false-positive rate for hierarchical data of anomaly-based intrusion detection system. …”
    Get full text
    Article
  12. 1272

    Investigating amplitude amplification in optimization-based control for a continuous stirred tank reactor by Kip Nieman, Helen Durand, Saahil Patel, Daniel Koch, Paul M. Alsing

    Published 2024-12-01
    “…Quantum computers, which utilize quantum states called ‘qubits’ to process information, are becoming of increased interest in a variety of fields because they have the potential to outperform classical computers in certain situations. …”
    Get full text
    Article
  13. 1273

    An anonymous access authentication scheme for vehicular ad hoc networks under edge computing by Tianhan Gao, Yanqiang Li, Nan Guo, Ilsun You

    Published 2018-02-01
    “…Moreover, in this article, we combine vehicular ad hoc networks with edge computing together to provide a new clue for the development of mobile edge computing.…”
    Get full text
    Article
  14. 1274
  15. 1275

    Perception of premium services based on the evolution of hyper-service network in mobile edge computing by Xiaojun Zhang, Zhizhong Liu, Dianhui Chu, Meiyue Zhao

    Published 2025-05-01
    “…Next, we devise the evaluation indexes based on the topological characteristics of hypergraphs, which are updated according to the evolution of the hyper-service network. …”
    Get full text
    Article
  16. 1276
  17. 1277

    Empowering self-sustained agriculture: an IoT field tracking model driven by fog computing by Gurpreet Singh, Jaspreet Singh, Sapna Juneja, Yonis Gulzar, Deepali Gupta, Kayhan Zrar Ghafoor, Mukesh Kumar

    Published 2025-04-01
    “…Fog platform brings computation and storing nearer at the network’s the border, allowing for the efficient processing of data produced by IoT devices across smart agricultural systems. …”
    Get full text
    Article
  18. 1278
  19. 1279

    A Scalable All-Digital Near-Memory Computing Architecture for Edge AIoT Applications by Masoud Nouripayam, Arturo Prieto, Joachim Rodrigues

    Published 2025-01-01
    “…The proposed design offers a configurable architecture capable of processing a wide range of CNN models with a computational efficiency of 94%. For evaluation purposes, widely recognized CNN benchmark models are utilized, showing a performance of 96GOPS and an energy efficiency of 1828GOPS/W for 8-bit precision at 200MHz. …”
    Get full text
    Article
  20. 1280