Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
361
Multiobjective Optimization and Network Routing With Near-Term Quantum Computers
Published 2024-01-01Subjects: Get full text
Article -
362
Reducing Computational Overhead by Improving the CRI and IRI Implication Step
Published 2015-01-01Get full text
Article -
363
Online auction-based resource scheduling in grid computing networks
Published 2016-10-01“…The aim of this article is to introduce a novel auction-based algorithm for grid computing wireless networks and resolve some incompetence with dynamic mechanisms. …”
Get full text
Article -
364
THE MAMMALIAN CIRCADIAN CLOCK: GENE REGULATORY NETWORK AND THEIR COMPUTER ANALYSIS
Published 2015-01-01Get full text
Article -
365
Survey of Distributed Computing Frameworks for Supporting Big Data Analysis
Published 2023-06-01Subjects: “…distributed computing frameworks…”
Get full text
Article -
366
COMPUTER HYDRODYNAMICS OF THE MELT AND POWDER CARBONIC MATERIALS MIXING IN BOWL
Published 2004-08-01“…The mathematical mechanism for modeling of the mixing processes of melts and powder materials, assumed as a basis of the out-of-furnace steel processing, is presented. The computer calculations of the melt speed fields, formed in the industrial bowl of the Belorussian metallurgical works, are given and analyzed.…”
Get full text
Article -
367
Retracted: Computation of M-Polynomial and Topological Indices of Phenol Formaldehyde
Published 2023-01-01Get full text
Article -
368
Computationally Effective Modeling of Cold Rolling: Application to Al Alloys
Published 2024-12-01“…An accurate and numerically efficient description of the rolling process is a challenging task since the degree of computational accuracy is directly related to the complexity of the algorithm employed. …”
Get full text
Article -
369
Computer-Aided Detection and Diagnosis of Breast Cancer: a Review
Published 2024-06-01“…Advances in Distributed Computing and Artificial Intelligence Journal…”
Get full text
Article -
370
Integrating molecular photoswitch memory with nanoscale optoelectronics for neuromorphic computing
Published 2025-01-01“…Abstract Photonic solutions are potentially highly competitive for energy-efficient neuromorphic computing. However, a combination of specialized nanostructures is needed to implement all neuro-biological functionality. …”
Get full text
Article -
371
Computing FGZ Index of Sum Graphs under Strong Product
Published 2021-01-01“…At the end, FGZI of the two particular families of sum graphs are also computed as applications of the main results. Moreover, the dominating role of the FGZI among these sum graphs is also shown using the numerical values and their graphical presentations.…”
Get full text
Article -
372
Computational Modeling of the Interaction of Silver Nanoparticles with the Lipid Layer of the Skin
Published 2018-01-01Get full text
Article -
373
Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing
Published 2025-01-01Subjects: Get full text
Article -
374
PARALLEL COMPUTING IN THE HEAT AND MOISTURE TRANSFER USING SPS SOFTWARE
Published 2016-09-01Get full text
Article -
375
Scientific and Technical Texts: Translation Aspects in Electrical and Computer Engineering
Published 2024-11-01Subjects: Get full text
Article -
376
Application of computational modeling to the kinetics of precipitation of aluminum nitride in steels
Published 2012-01-01“…The precise knowledge of the precipitation-dissolution behavior of AlN in special in these two latter classes of steels is of great importance to their correct processing. In this work, a computational tool for simulating multiparticle precipitation kinetics of diffusion-controlled processes in multi-component and multi-phase alloy systems is employed in an attempt to describe these precipitation processes. …”
Get full text
Article -
377
Application of the Logistics Management System Based on Cloud Computing Technology
Published 2022-01-01“…In order to solve the vehicle routing optimization problem of cold chain logistics distribution, this paper proposes a vehicle routing optimization method of cold chain logistics distribution based on cloud computing technology. This paper analyzes the advantages of processing the real-time routing of distribution vehicles under the cloud computing mode and establishes the application service architecture of vehicle routing optimization in cold chain logistics; under this architecture, multisource real-time traffic information is obtained, the vehicle distribution time and comprehensive cost are analyzed, the vehicle routing optimization model of cold chain logistics distribution is constructed, and the coarse-grained parallel genetic algorithm is used to solve the model in the cloud computing environment. …”
Get full text
Article -
378
An SLBRS Model with Vertical Transmission of Computer Virus over the Internet
Published 2012-01-01Get full text
Article -
379
Computational frameworks transform antagonism to synergy in optimizing combination therapies
Published 2025-01-01“…This review systematically analyzes computational methods for predicting drug combination effects through multi-omics data integration. …”
Get full text
Article -
380
Secure OpenID Authentication Model by Using Trusted Computing
Published 2014-01-01“…Trusted Platform Module (TPM) and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. …”
Get full text
Article