Showing 41 - 60 results of 385 for search '"Computer software"', query time: 0.09s Refine Results
  1. 41
  2. 42
  3. 43

    Advanced Software Package for Estimatiom Boundary Trajectories of Electron Beams and Other Practical Applications by Igor Melnyk, Mykhailo Skrypka, Alina Pochynok, Olga Demyanchenko

    Published 2025-04-01
    “…The article describes advanced computer software for numerical simulation, interpolation, extrapolation, and approximation of electron beam boundary trajectories. …”
    Get full text
    Article
  4. 44
  5. 45

    PERAN PRODUCT CUES AND RISK AVERSION PADA PURCHASE INTENTION DAN POST PURCHASE FEELINGS by Sri Rejeki Ekasasi, Ayu Hema Ajeng Diwasasri

    Published 2015-11-01
    “…The analysis using Structural Equation Model (SEM) show that product cues and risk aversion give different significant impact towards purchase intention and post-purchase feeling of counterfeited computer software and music CD. The research concluded that risk aversion and extrinsic cues has a significant influence to purchase intention of counterfeited computer software while it does not appear similar result to music CD. …”
    Get full text
    Article
  6. 46

    PERAN PRODUCT CUES AND RISK AVERSION PADA PURCHASE INTENTION DAN POST PURCHASE FEELINGS by Sri Rejeki Ekasasi, Ayu Hema Ajeng Diwasasri

    Published 2015-11-01
    “…The analysis using Structural Equation Model (SEM) show that product cues and risk aversion give different significant impact towards purchase intention and post-purchase feeling of counterfeited computer software and music CD. The research concluded that risk aversion and extrinsic cues has a significant influence to purchase intention of counterfeited computer software while it does not appear similar result to music CD. …”
    Get full text
    Article
  7. 47

    Overview of current software capabilities for EEG recording and analyzing by A. A. Ivanov

    Published 2023-03-01
    “…The basic and innovative capabilities of computer software in the field of mathematical processing and analysis of EEG signals are discussed, the limitations of using mathematical processing methods are described.…”
    Get full text
    Article
  8. 48
  9. 49

    Overview of control-flow hijacking attack and defense techniques for process by Fengfeng WANG, Tao ZHANG, Weiguang XU, Meng SUN

    Published 2019-12-01
    “…Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized.…”
    Get full text
    Article
  10. 50

    Determination of Energy Capacity and Suitable Location Selection Criteria in Flexible Rock Barriers Against Rockfall Risks by Eroltan Durmuş, Özkan Coruk, Ahmet Karakaş

    Published 2025-01-01
    “…During the determination of these criteria, calculated energy, speed, bounce height values and trajectories were compared with the computer software results. As a result of the comparisons, it was seen that there were no significant differences in the block bounce heights and surface contact points, but the kinetic energy values obtained in the calculations (2515 kJ) were higher than the kinetic energy result given by the computer software (1600 kJ). …”
    Get full text
    Article
  11. 51
  12. 52
  13. 53

    Research on Key Technologies of Reconfiguration of Railway Computer Interlocking Software by Junying CHU, Tong SUN, Ri LIU, Dewei LI, Sheng ZHANG, Xinwei LIU

    Published 2021-03-01
    “…On this basis, a new computer interlocking route search algorithm was proposed by using recursive algorithm to achieve the goal of reusing the upper computer software of the whole computer interlocking system. …”
    Get full text
    Article
  14. 54
  15. 55

    LICENCJE WOLNEGO OPROGRAMOWANIA by Piotr Gawrysiak

    Published 2017-06-01
    “… Open Source Software Licences Summary Computer software is regarded in popular culture as a typical consumer good. …”
    Get full text
    Article
  16. 56
  17. 57
  18. 58
  19. 59
  20. 60