Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
28441
AEOS: Transport of Metals from Minihalos following Population III Stellar Feedback
Published 2025-01-01Get full text
Article -
28442
Symptoms of anxiety and depression among health and social science students: A multicenter study
Published 2025-01-01Get full text
Article -
28443
Perbandingan Kinerja Inception- Resnetv2, Xception, Inception-v3, dan Resnet50 pada Gambar Bentuk Wajah
Published 2023-02-01“…Deep learning is becoming a trend in the field of computer vision because it gives the best results than the previous method. …”
Get full text
Article -
28444
Systematic review and quantitative meta-analysis of age-dependent human T-lymphocyte homeostasis
Published 2025-01-01Get full text
Article -
28445
Intelligent prediction method of virtual network function resource capacity for polymorphic network service slicing
Published 2022-06-01“…Conclusions: With the vigorous development of artificial intelligence technology, polymorphic network has given computing, storage and transmission capabilities to virtual nodes on network slices,and has been able to realize the dual improvement of network resource utilization and user experience through the adaptive flow of business demand data on the basis of autonomously sensing data throughput and autonomously predicting the resource requirements of VNFs on nodes. …”
Get full text
Article -
28446
Serum Pharmacochemistry and Network Pharmacology Reveal Active Compounds and Mechanisms of the Huaxian Formula in Alleviating Radiation-Induced Pulmonary Fibrosis
Published 2025-01-01“…The Huaxian formula (HXF), a traditional Chinese herbal remedy, shows promise in alleviating RIPF; however, its active ingredients and underlying mechanisms remain poorly understood.Methods: Through serum pharmacochemistry, network pharmacology, molecular docking, and experimental validation, we investigate the potential mechanisms of HXF in the prevention and treatment of radiation-induced pulmonary fibrosis (RIPF).Results: Histological examination and non-invasive computed tomography (CT) scans in animal experiments revealed that HXF improved extracellular matrix collagen deposition in the lung tissue of irradiated mice and reduced fibrosis manifestations on CT images. …”
Get full text
Article -
28447
-
28448
-
28449
Nitric oxide modulates contrast suppression in a subset of mouse retinal ganglion cells
Published 2025-01-01Get full text
Article -
28450
Temu Kembali Citra Tenun Nusa Tenggara Timur menggunakan Esktraksi Fitur yang Robust terhadap Perubahan Skala, Rotasi, dan Pencahayaan
Published 2020-02-01“…The results of the trial showed that SURF obtained higher accuracy in all conditions of tenun image data with an average value of 89.86% whereas MSER obtained an average accuracy value of 84.04%. But MSER's computation time is 1.95 seconds faster than SURF which is 9.94 seconds. …”
Get full text
Article -
28451
Pengkontruksian Bidirected Overlap Graph untuk Perakitan Sekuens DNA
Published 2020-02-01“…DNA assembly process is computational intensive. To reduce the execution time suffix and prefix was converted into the single value so that the detection of overlap could be done by comparing the values. …”
Get full text
Article -
28452
Neurological history both twinned and queried by generative artificial intelligence
Published 2025-01-01Get full text
Article -
28453
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
Published 2022-06-01“…Secondly, the proposed scheme is compared with some access control schemes with similar technologies in recent years in terms of group order,access structure,policy hiding and so on,it can be seen from the comparison results that the scheme in this paper has certain advantages in terms of functional characteristics.Afterwards,the cost of deploying contracts and executing related functions on the blockchain is evaluated.The results show that the gas cost of the scheme in this paper is within a reasonable range.The final simulation results show that the proposed scheme has high efficiency in both the access control stage and the data sharing stage.According to the design of the existing paper comparative experiments,we set the number of attributes to 0-20.In the access control stage, the initialization time, key generation time, encryption time and decryption time are compared with other schemes.The results show that although the computational overhead of the proposed scheme is relatively large in the initialization stage, the efficiency in the key generation stage, encryption stage and decryption stage is higher than that of the other three schemes, so the proposed scheme has higher efficiency in the access control stage.In the data sharing stage, the re-encryption time and re-decryption time are compared with other schemes, respectively. …”
Get full text
Article -
28454
-
28455
-
28456
-
28457
Perancangan User Experience Portal Media Interaksi Komunitas Kampus dengan Pendekatan Social Media Platform
Published 2022-12-01“…Covers all activities that take place in The Faculty of Computer Science (FILKOM). Not all residents in it interact efficiently. …”
Get full text
Article -
28458
-
28459
-
28460
Linking Research Data with Physically Preserved Research Materials in Chemistry
Published 2025-01-01Get full text
Article