Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Business 6
- Computer security 4
- Design and construction 4
- Human-computer interaction 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Data processing 3
- Design 3
- Management 3
- Web sites 3
- BASIC (Computer program language) 2
- Cloud computing 2
- Computer simulation 2
- Data protection 2
- Digital techniques 2
- Education, Elementary 2
- Educational technology 2
- Handbooks, manuals, etc 2
- Internet 2
- Internet in education 2
- Java (Computer program language) 2
- Mass media 2
-
2381
ZenLDA: Large-Scale Topic Model Training on Distributed Data-Parallel Platform
Published 2018-03-01Subjects: Get full text
Article -
2382
Teachers’ perception of the implementation of project-based learning in early childhood education in Indonesia<subtitle>Project-Based Learning: a perspective from Indonesian early...
Published 2025-12-01Subjects: “…internet & Multimedia - Computing & IT…”
Get full text
Article -
2383
Double layer federated security learning architecture for artificial intelligence of things
Published 2024-12-01Subjects: Get full text
Article -
2384
Comparative Analysis of Internal Porosity in AM Ti64 Using X-Ray Computed Tomography and Mechanical Polishing Serial Sectioning
Published 2024-01-01Subjects: Get full text
Article -
2385
Edge server deployment decision based on improved NSGA-Ⅱ in the Internet of vehicles edge computing scenario
Published 2024-03-01Subjects: Get full text
Article -
2386
Temporal-Logic-Based Testing Tool for Programs Using the Message Passing Interface (MPI) and Open Multi-Processing (OpenMP) Programming Models
Published 2025-01-01Subjects: Get full text
Article -
2387
Performance evaluation of interrupted and hybrid channel heat sinks for a triple junction high concentrator photovoltaic cell
Published 2025-03-01Subjects: “…Computational fluid dynamic…”
Get full text
Article -
2388
Research on greedy reconstruction algorithms of compressed sensing based on variable metric method
Published 2014-12-01Subjects: Get full text
Article -
2389
Analysis and prospect of communication technology in smart urban rail
Published 2021-04-01Subjects: Get full text
Article -
2390
Analysing Academic Texts with Computational Linguistics Tools
Published 2020-07-01Subjects: Get full text
Article -
2391
Classification and detection of Covid-19 based on X-Ray and CT images using deep learning and machine learning techniques: A bibliometric analysis
Published 2024-03-01Subjects: Get full text
Article -
2392
MSF-GhostNet: Computationally Efficient YOLO for Detecting Drones in Low-Light Conditions
Published 2025-01-01Subjects: “…Computational complexity…”
Get full text
Article -
2393
Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
Published 2025-12-01Subjects: Get full text
Article -
2394
Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption
Published 2021-05-01Subjects: Get full text
Article -
2395
Accelerating computational fluid dynamics simulation of post-combustion carbon capture modeling with MeshGraphNets
Published 2025-01-01Subjects: Get full text
Article -
2396
Lifetime Attributable Risk for Breast Cancer Induced by High-Resolution Computed Tomography During COVID-19 Pandemic
Published 2024-12-01Subjects: Get full text
Article -
2397
Clustered P2P based resource query and dissemination for multi-hop wireless mesh network
Published 2012-11-01Subjects: Get full text
Article -
2398
Hydrogen reaction rate modeling based on convolutional neural network for large eddy simulation
Published 2025-01-01Subjects: Get full text
Article -
2399
Cryogenic Characterization of Low-Frequency Noise in 40-nm CMOS
Published 2024-01-01Subjects: Get full text
Article -
2400
Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
Published 2015-02-01Subjects: “…secure two-party computation…”
Get full text
Article