Showing 561 - 580 results of 21,428 for search '"computability"', query time: 0.06s Refine Results
  1. 561

    Mandibular Atrophy and Genial Spines Enlargement on Cone Beam Computed Tomography by Marcelo Lupion Poleti, Christiano Oliveira-Santos, Luciana Maria Paes da Silva Ramos Fernandes, Izabel Regina Fischer Rubira-Bullen

    Published 2014-01-01
    “…The aim of this paper is to report a case in which the cone beam computed tomography (CBCT) was important for the confirmation of the presence of mandibular atrophy and genial spines enlargement. …”
    Get full text
    Article
  2. 562
  3. 563

    Preface to the Iberoamerican Human-Computer Interaction Conference 2024 Special Issue by Maria Amelia Eliseo, Valéria Farinazzo Martins

    Published 2025-02-01
    “… Preface to the Iberoamerican Human-Computer Interaction Conference 2024 Special Issue …”
    Get full text
    Article
  4. 564

    Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network by Zizhen Zhang, Huizhong Yang

    Published 2014-01-01
    “…An SEIQRS model for the transmission of malicious objects in computer network with two delays is investigated in this paper. …”
    Get full text
    Article
  5. 565

    The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures by Ajit Narayanan, Yi Chen, Shaoning Pang, Ban Tao

    Published 2013-01-01
    “…The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). …”
    Get full text
    Article
  6. 566

    Enhancing Railway Maintenance Safety Using Open-Source Computer Vision by Donghee Shin, Jangwon Jin, Jooyoung Kim

    Published 2021-01-01
    “…Images of railway signs, tracks, and maintenance workers on the tracks were recorded through image data. The Computer Vision OpenCV library was utilized to extract the image data. …”
    Get full text
    Article
  7. 567

    Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations by Hang Tu, Debiao He, Baojun Huang

    Published 2014-01-01
    “…A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first. …”
    Get full text
    Article
  8. 568
  9. 569

    Measurements and Analytical Computer-Based Study of CMOS Inverters and Schmitt Triggers by Umesh Kumar

    Published 1996-01-01
    “…Complete detailed theoretical, experimental and computer based results are derived and exhibited.…”
    Get full text
    Article
  10. 570

    TEACHING COMPUTATIONAL THINKING IN SAUDI ARABIAN SCHOOLS USING SMARTPHONE APPS by Abdullah Alenezi

    Published 2024-10-01
    Subjects: “…computational thinking…”
    Get full text
    Article
  11. 571

    On Computation and Analysis of Topological Index-Based Invariants for Complex Coronoid Systems by Muhammad Aamer Rashid, Sarfraz Ahmad, Muhammad Kamran Siddiqui, Mohammed K. A. Kaabar

    Published 2021-01-01
    “…Explicitly, this tremendous improvement has been outstanding in the field of soft computing, molecular biology, and information technology. …”
    Get full text
    Article
  12. 572
  13. 573
  14. 574

    Assessing bias and computational efficiency in vision transformers using early exits by Seth Nixon, Pietro Ruiu, Marinella Cadoni, Andrea Lagorio, Massimo Tistarelli

    Published 2025-01-01
    “…We present an approach using the state of the art Vision Transformer and Early Exits for reducing compute budget without significantly affecting performance. …”
    Get full text
    Article
  15. 575

    A simplified computational liver perfusion model, with applications to organ preservation by Daniel Emerson, Yoed Rabin, Levent Burak Kara

    Published 2025-01-01
    “…Additionally, we introduce the concept of a super lobule which enables a computational abstraction of biological liver lobules. …”
    Get full text
    Article
  16. 576
  17. 577

    Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity by Chinnaraji Annamalai

    Published 2022-09-01
    Subjects: “…algorithm, combinatorics, computation, multinomial coefficient…”
    Get full text
    Article
  18. 578

    Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment by Rongrui Yu, Chunqiong Wu, Bingwen Yan, Baoqin Yu, Xiukao Zhou, Yanliang Yu, Na Chen

    Published 2021-01-01
    “…Finally, based on the impact of cloud computing, mobile e-commerce is analyzed, including relevant theories, service mode, architecture, core technology, and the application in e-commerce, which can realize e-commerce precision marketing, find the optimal path of logistics, and take effective security measures to avoid transaction risks. …”
    Get full text
    Article
  19. 579

    Computer-Aided Modelling and Analysis of PV Systems: A Comparative Study by Charalambos Koukouvaos, Dionisis Kandris, Maria Samarakou

    Published 2014-01-01
    “…The work presented in this paper aims on a first level at the performance analysis of various configurations of photovoltaic systems through computer-aided modelling. On a second level, it provides a comparative evaluation of the credibility of two of the most advanced graphical programming environments, namely, Simulink and LabVIEW, with regard to their application in photovoltaic systems.…”
    Get full text
    Article
  20. 580