Suggested Topics within your search.
Suggested Topics within your search.
-
41
A novel reconstruction-based video anomaly detection with idempotent generative network
Published 2025-06-01Get full text
Article -
42
Knowledge Distillation and Transformer-Based Framework for Automatic Spine CT Report Generation
Published 2025-01-01Get full text
Article -
43
Advanced Software Package for Estimatiom Boundary Trajectories of Electron Beams and Other Practical Applications
Published 2025-04-01“…The article describes advanced computer software for numerical simulation, interpolation, extrapolation, and approximation of electron beam boundary trajectories. …”
Get full text
Article -
44
-
45
PERAN PRODUCT CUES AND RISK AVERSION PADA PURCHASE INTENTION DAN POST PURCHASE FEELINGS
Published 2015-11-01“…The analysis using Structural Equation Model (SEM) show that product cues and risk aversion give different significant impact towards purchase intention and post-purchase feeling of counterfeited computer software and music CD. The research concluded that risk aversion and extrinsic cues has a significant influence to purchase intention of counterfeited computer software while it does not appear similar result to music CD. …”
Get full text
Article -
46
PERAN PRODUCT CUES AND RISK AVERSION PADA PURCHASE INTENTION DAN POST PURCHASE FEELINGS
Published 2015-11-01“…The analysis using Structural Equation Model (SEM) show that product cues and risk aversion give different significant impact towards purchase intention and post-purchase feeling of counterfeited computer software and music CD. The research concluded that risk aversion and extrinsic cues has a significant influence to purchase intention of counterfeited computer software while it does not appear similar result to music CD. …”
Get full text
Article -
47
Overview of current software capabilities for EEG recording and analyzing
Published 2023-03-01“…The basic and innovative capabilities of computer software in the field of mathematical processing and analysis of EEG signals are discussed, the limitations of using mathematical processing methods are described.…”
Get full text
Article -
48
-
49
Overview of control-flow hijacking attack and defense techniques for process
Published 2019-12-01“…Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized.…”
Get full text
Article -
50
Determination of Energy Capacity and Suitable Location Selection Criteria in Flexible Rock Barriers Against Rockfall Risks
Published 2025-01-01“…During the determination of these criteria, calculated energy, speed, bounce height values and trajectories were compared with the computer software results. As a result of the comparisons, it was seen that there were no significant differences in the block bounce heights and surface contact points, but the kinetic energy values obtained in the calculations (2515 kJ) were higher than the kinetic energy result given by the computer software (1600 kJ). …”
Get full text
Article -
51
Flood Detection/Monitoring Using Adjustable Histogram Equalization Technique
Published 2014-01-01Get full text
Article -
52
-
53
Research on Key Technologies of Reconfiguration of Railway Computer Interlocking Software
Published 2021-03-01“…On this basis, a new computer interlocking route search algorithm was proposed by using recursive algorithm to achieve the goal of reusing the upper computer software of the whole computer interlocking system. …”
Get full text
Article -
54
A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure
Published 2014-01-01Get full text
Article -
55
LICENCJE WOLNEGO OPROGRAMOWANIA
Published 2017-06-01“… Open Source Software Licences Summary Computer software is regarded in popular culture as a typical consumer good. …”
Get full text
Article -
56
-
57
-
58
Sarcasm Detection in Sentiment Analysis Using Recurrent Neural Networks
Published 2025-01-01Get full text
Article -
59
Enhancing code search through query expansion: A fusion of LSTM with GloVe and BERT model (ECSQE)
Published 2025-09-01Get full text
Article -
60
A study on an efficient OSS inspection scheme based on encrypted GML
Published 2025-06-01Get full text
Article