Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
21
-
22
-
23
A computing allocation strategy for Internet of things’ resources based on edge computing
Published 2021-12-01“…In order to meet the demand for efficient computing services in big data scenarios, a cloud edge collaborative computing allocation strategy based on deep reinforcement learning by combining the powerful computing capabilities of cloud is proposed. …”
Get full text
Article -
24
Computing and Comparing Effective Properties for Flow and Transport in Computer-Generated Porous Media
Published 2017-01-01“…The permeability and hydraulic tortuosity are computed by solving a set of rescaled Stokes equations obtained by homogenization, and the diffusive tortuosity is computed by solving a homogenization problem given for the effective diffusion coefficient that is inversely related to diffusive tortuosity. …”
Get full text
Article -
25
Modeling the Effect of External Computers and Removable Devices on a Computer Network with Heterogeneous Immunity
Published 2021-01-01“…This paper intends to investigate the impact of external computers and removable devices on virus spread in a network with heterogeneous immunity. …”
Get full text
Article -
26
Computer Security Lab Manual /
Published 2006Subjects: “…Computer security Management Handbooks, manuals, etc. 3242…”
View in OPAC
Book -
27
Introduction to Computer Software Applications /
Published 2008Subjects: “…computer 6806…”
View in OPAC
Book -
28
Computer Applications for Data Analysis : a step by step hand book /
Published 2009Subjects: “…computer 6806…”
View in OPAC
Book -
29
Computer Organization and Embedded Systems /
Published 2002Subjects: “…computer 6806…”
View in OPAC
Book -
30
Introduction to Computer Software Aplplications/
Published 2008Subjects: “…computer 6806…”
View in OPAC
Book -
31
Computer Applications for Data Analysis: astep by step hand book /
Published 2009Subjects: “…computer 6806…”
View in OPAC
Book -
32
Computer security lab manual /
Table of contents only
Contributor biographical information
View in OPAC
Book -
33
Computer Security Lab Manual/
Published 2006Subjects: “…computer security 11095…”
View in OPAC
Book -
34
-
35
-
36
-
37
-
38
-
39
-
40
Problems on the computer literacy of educators
Published 2002-12-01“…The main attention should be paid to the constant in-service teachers' training. The Standard of computer literacy for educators has been developed. …”
Get full text
Article