Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
561
Mandibular Atrophy and Genial Spines Enlargement on Cone Beam Computed Tomography
Published 2014-01-01“…The aim of this paper is to report a case in which the cone beam computed tomography (CBCT) was important for the confirmation of the presence of mandibular atrophy and genial spines enlargement. …”
Get full text
Article -
562
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01Subjects: Get full text
Article -
563
Preface to the Iberoamerican Human-Computer Interaction Conference 2024 Special Issue
Published 2025-02-01“… Preface to the Iberoamerican Human-Computer Interaction Conference 2024 Special Issue …”
Get full text
Article -
564
Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network
Published 2014-01-01“…An SEIQRS model for the transmission of malicious objects in computer network with two delays is investigated in this paper. …”
Get full text
Article -
565
The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures
Published 2013-01-01“…The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). …”
Get full text
Article -
566
Enhancing Railway Maintenance Safety Using Open-Source Computer Vision
Published 2021-01-01“…Images of railway signs, tracks, and maintenance workers on the tracks were recorded through image data. The Computer Vision OpenCV library was utilized to extract the image data. …”
Get full text
Article -
567
Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations
Published 2014-01-01“…A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first. …”
Get full text
Article -
568
Computational Study of Cold-Formed-Steel X-Braced Shear Walls
Published 2018-01-01Get full text
Article -
569
Measurements and Analytical Computer-Based Study of CMOS Inverters and Schmitt Triggers
Published 1996-01-01“…Complete detailed theoretical, experimental and computer based results are derived and exhibited.…”
Get full text
Article -
570
TEACHING COMPUTATIONAL THINKING IN SAUDI ARABIAN SCHOOLS USING SMARTPHONE APPS
Published 2024-10-01Subjects: “…computational thinking…”
Get full text
Article -
571
On Computation and Analysis of Topological Index-Based Invariants for Complex Coronoid Systems
Published 2021-01-01“…Explicitly, this tremendous improvement has been outstanding in the field of soft computing, molecular biology, and information technology. …”
Get full text
Article -
572
Identification of Levothyroxine Antichagasic Activity through Computer-Aided Drug Repurposing
Published 2014-01-01Get full text
Article -
573
First-order phase transition of the Schwinger model with a quantum computer
Published 2025-01-01Get full text
Article -
574
Assessing bias and computational efficiency in vision transformers using early exits
Published 2025-01-01“…We present an approach using the state of the art Vision Transformer and Early Exits for reducing compute budget without significantly affecting performance. …”
Get full text
Article -
575
A simplified computational liver perfusion model, with applications to organ preservation
Published 2025-01-01“…Additionally, we introduce the concept of a super lobule which enables a computational abstraction of biological liver lobules. …”
Get full text
Article -
576
An Efficient Computation of Effective Ground Range Using an Oblate Earth Model
Published 2014-01-01Get full text
Article -
577
Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity
Published 2022-09-01Subjects: “…algorithm, combinatorics, computation, multinomial coefficient…”
Get full text
Article -
578
Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment
Published 2021-01-01“…Finally, based on the impact of cloud computing, mobile e-commerce is analyzed, including relevant theories, service mode, architecture, core technology, and the application in e-commerce, which can realize e-commerce precision marketing, find the optimal path of logistics, and take effective security measures to avoid transaction risks. …”
Get full text
Article -
579
Computer-Aided Modelling and Analysis of PV Systems: A Comparative Study
Published 2014-01-01“…The work presented in this paper aims on a first level at the performance analysis of various configurations of photovoltaic systems through computer-aided modelling. On a second level, it provides a comparative evaluation of the credibility of two of the most advanced graphical programming environments, namely, Simulink and LabVIEW, with regard to their application in photovoltaic systems.…”
Get full text
Article -
580
Multi-Tier Blockchain-Based Land Registry Using Fog Computing
Published 2025-01-01Subjects: Get full text
Article