Showing 28,521 - 28,540 results of 28,739 for search '"computability"', query time: 0.14s Refine Results
  1. 28521

    Prevalence of Myocardial Infarction With Obstructive and Non-Obstructive Coronary Arteries in a Middle-Aged Population With Chronic Airflow Limitation: A Cross-Sectional Study by Sundh J, Ekström M, Blomberg A, Lindberg E, Malinovschi A, Olin AC, Sköld CM, Torén K, Wollmer P, Östgren CJ, Jernberg T

    Published 2025-02-01
    “…MI-CAD was defined as a self-reported MI with coronary computed tomography angiography findings of previous revascularization or at least one significant coronary stenosis (> 50%), and MINOCA as self-reported MI with no previous revascularization and no significant coronary stenosis.Results: In total, 1735 (8.3%) of 20,882 included participants had CAL. …”
    Get full text
    Article
  2. 28522

    Pengembangan Business Intelligence Dashboard untuk Monitoring Aktivitas Pariwisata (Studi Kasus: Dinas Pariwisata Provinsi Bali) by Evan Himawan Saragih, I Putu Agung Bayupati, Gusti Agung Ayu Putri

    Published 2021-11-01
    “…This study develops an information system using the BI approach in analyzing Bali tourism data and data management by replacing paper use as computer media so that data does not just disappear, but is used as a reference when making decisions. …”
    Get full text
    Article
  3. 28523
  4. 28524

    Penggabungan Best Worst Method, Moora Dan Copeland Score Pada Sistem Pendukung Keputusan Kelompok Penentuan Penerima Bantuan Pada Dinas Sosial by Willy Bima Alfajri, Dinar Mutiara Kusumo Nugraheni, Bayu Surarso

    Published 2023-07-01
    “…The weighting of the criteria in this study is computed quantitatively using the best worst method. …”
    Get full text
    Article
  5. 28525
  6. 28526
  7. 28527
  8. 28528
  9. 28529
  10. 28530
  11. 28531
  12. 28532
  13. 28533
  14. 28534

    Effectiveness of Virtual Reality Training in Improving Outcomes for Dialysis Patients: Systematic Review and Meta-Analysis by Xin Kang, Yiping Zhang, Chaonan Sun, Jiaxin Zhang, Zhe Che, Jinhui Zang, Rongzhi Zhang

    Published 2025-01-01
    “… BackgroundVirtual reality (VR) training uses computer-generated simulations that enable users to engage with immersive virtual environments, simulating real-world activities or therapeutic exercises. …”
    Get full text
    Article
  15. 28535

    Analisis Komparatif Keamanan Aplikasi Pengelola Kata Sandi Berbayar Lastpass, 1Password, dan Keeper Berdasarkan ISO/IEC 25010 by Whisnu Yudha Aditama, Ira Rosianal Hikmah, Dimas Febriyan Priambodo

    Published 2023-08-01
    “…Abstract  Authentication is one of the most important factors in the scope of computer security, passwords are the dominant authentication method applied to websites or desktops. …”
    Get full text
    Article
  16. 28536

    Implementasi Web Push Notification pada Sistem Informasi Manajemen Arsip Menggunakan PUSHJS by Alam Rahmatulloh, Andi Nur Rachman, Fahmi Anwar

    Published 2019-05-01
    “…Abstract Technology continues to evolve, various types of technology continue to emerge such as records management information systems, the problem is that workers sometimes do other work on the computer so that the archive is not controlled. Web Push Notification application can display website-based notifications even if you don't open the web browser directly or in a minimized condition. …”
    Get full text
    Article
  17. 28537

    Automated Video Assistant Referee in Lead Climbing by Eliane Künzler, David Roder, Urs Stöcker, Peter Wolf

    Published 2025-01-01
    “…RTMO: Towards high-performance one-stage real-time multi-person pose estimation. 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 1491–1500. https://doi.org/10.1109/CVPR52733.2024.00148 …”
    Get full text
    Article
  18. 28538
  19. 28539

    Identifikasi Malicious Host dalam Local Area Network Menggunakan Teknik Graph Clustering dan Filtering by Khafidzun Fadli, Achmad Basuki, Eko Setiawan

    Published 2020-05-01
    “…The cause of LAN becomes insecure because firewall technology is not able to protect the host (computer) in LAN from spreading malware. The spread of malware contained within a LAN is carried out by hosts in the LAN which are referred to as malicious hosts. …”
    Get full text
    Article
  20. 28540