Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Business 6
- Computer security 4
- Design and construction 4
- Human-computer interaction 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Data processing 3
- Design 3
- Management 3
- Web sites 3
- BASIC (Computer program language) 2
- Cloud computing 2
- Computer simulation 2
- Data protection 2
- Digital techniques 2
- Education, Elementary 2
- Educational technology 2
- Handbooks, manuals, etc 2
- Internet 2
- Internet in education 2
- Java (Computer program language) 2
- Mass media 2
-
1721
Application value of CT three-dimensional reconstruction technology in the identification of benign and malignant lung nodules and the characteristics of nodule distribution
Published 2025-01-01Subjects: “…Computed tomography…”
Get full text
Article -
1722
Trusted network connect control based on terminal behavior
Published 2009-01-01Subjects: “…trusted computing…”
Get full text
Article -
1723
Algorithm design on energy efficiency maximization for UAV-assisted edge computing
Published 2020-10-01Subjects: Get full text
Article -
1724
Trust evaluation optimization mechanism for cloud user behavior based on FANP
Published 2022-04-01Subjects: “…cloud computing…”
Get full text
Article -
1725
Nucleophilic addition to carbonyl groups from qualitative to quantitative computational studies. A historical perspective
Published 2024-03-01Subjects: Get full text
Article -
1726
Trusted auditing method of virtual machine based on improved expectation decision method
Published 2018-06-01Subjects: Get full text
Article -
1727
Pulmonary Artery Pseudoaneurysm in a Patient of Rheumatoid Arthritis
Published 2018-01-01Subjects: Get full text
Article -
1728
Usefulness of computed tomography-guided puncture biopsy coupled with rapid on-site evaluation for diagnosis of pulmonary lesions: a systematic review and meta‑analysis
Published 2024-07-01Subjects: “…computed tomography–guided…”
Get full text
Article -
1729
Energy-efficient and fast memristor-based serial multipliers applicable in image processing
Published 2025-03-01Subjects: Get full text
Article -
1730
The integration of self-efficacy and response-efficacy in decision making
Published 2025-01-01Subjects: Get full text
Article -
1731
Cross-attention swin-transformer for detailed segmentation of ancient architectural color patterns
Published 2024-12-01Subjects: Get full text
Article -
1732
Research on safety supervision data sharing of railway construction projects based on edge computing
Published 2020-06-01Subjects: Get full text
Article -
1733
-
1734
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01Subjects: “…Cloud Computing Security…”
Get full text
Article -
1735
Blockchain-Driven Optimized Chaotic Encryption Scheme for Medical Image Transmission in IoT-Edge Environment
Published 2025-01-01Subjects: Get full text
Article -
1736
Trust-aware dynamic level scheduling algorithm in cloud environment
Published 2014-11-01Subjects: “…cloud computing…”
Get full text
Article -
1737
In silico modelling of organ-on-a-chip devices: an overview
Published 2025-01-01Subjects: Get full text
Article -
1738
Research on the incentive mechanism of trusted transactions based on blockchain
Published 2024-08-01Subjects: “…computing power network…”
Get full text
Article -
1739
LTE Network Planning in Current Co-Existing GSM/TD-SCDMA/WLAN Systems
Published 2014-09-01Subjects: “…coverage and capacity computing…”
Get full text
Article -
1740