Suggested Topics within your search.
Suggested Topics within your search.
- Automatic speech recognition 1
- Electric power distribution 1
- Electric power systems 1
- Fourier transformations 1
- Harmonic analysis 1
- Human-computer interaction 1
- Human-machine systems 1
- Interactive computer systems 1
- Natural language processing (Computer science) 1
- Speech processing systems 1
- Speech synthesis 1
- Transformations (Mathematics) 1
-
1461
-
1462
Imaging the large‐scale and cellular response to focal traumatic brain injury in mouse neocortex
Published 2025-02-01Get full text
Article -
1463
Morphological analysis of sigmoid sinus anatomy: clinical applications to neurotological surgery
Published 2019-01-01Get full text
Article -
1464
-
1465
-
1466
Speeding Up FPGA Placement via Partitioning and Multithreading
Published 2009-01-01Get full text
Article -
1467
-
1468
PROFESSOR WORK AT UNIVERSITY: DAILY PROBLEMS AND SOLUTIONS
Published 2016-12-01“…The educational programs should be designed according to the employers' requirements, particularly in such areas as computer engineering and programming. An example of an application of new methods in teaching the discipline «Computer and peripherals» is presented.…”
Get full text
Article -
1469
Analytical Method in Solving Flow of Viscoelastic Fluid in a Porous Converging Channel
Published 2011-01-01Get full text
Article -
1470
Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication
Published 2015-01-01Get full text
Article -
1471
-
1472
-
1473
On Approximations by Trigonometric Polynomials of Classes of Functions Defined by Moduli of Smoothness
Published 2017-01-01Get full text
Article -
1474
Time-Domain Analysis of Coupled Carbon Nanotube Interconnects
Published 2014-01-01Get full text
Article -
1475
Mitigation Measures for Windfarm Effects on Radar Systems
Published 2022-01-01Get full text
Article -
1476
Analytical Method and Semianalytical Method for Analysis of Scattering by Anisotropic Sphere: A Review
Published 2012-01-01Get full text
Article -
1477
Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks
Published 2016-07-01Get full text
Article -
1478
Machine learning-based authentication of banknotes: a comprehensive analysis
Published 2024-03-01Get full text
Article -
1479
Charge Scheduling of an Energy Storage System under Time-of-Use Pricing and a Demand Charge
Published 2014-01-01Get full text
Article -
1480
Means of Question-Answer Interaction for Collaborative Development Activity
Published 2009-01-01Get full text
Article