Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
641
Computing Singular Points of Projective Plane Algebraic Curves by Homotopy Continuation Methods
Published 2014-01-01“…We present an algorithm that computes the singular points of projective plane algebraic curves and determines their multiplicities and characters. …”
Get full text
Article -
642
A comparison of computational efficiencies of stochastic algorithms in terms of two infection models
Published 2012-06-01“…The relative efficiency of each algorithm is determined based on computational time and degree of precision required. …”
Get full text
Article -
643
Taper Preparation Variability Compared to Current Taper Standards Using Computed Tomography
Published 2012-01-01“…After preparation with Twisted Files and PathFiles-ProTaper to size 25 taper .08, the diameter was measured using computed tomography (CT) at 1, 3, and 16 mm. Canal taper preparation was calculated at the apical third and at the middle-cervical third. …”
Get full text
Article -
644
Protocol to computationally average confocal images of zebrafish lymphatic vessels to identify phenotypes
Published 2025-03-01“…We describe steps for preparing samples, obtaining confocal images, and their computational alignment. In addition, we supply sample images for testing.For complete details on the use and execution of this protocol, please refer to Arnold et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
Get full text
Article -
645
Retracted: Prediction and Application of Computer Simulation in Time-Lagged Financial Risk Systems
Published 2024-01-01Get full text
Article -
646
A Computer Programme With Temperature Gradient Capability for the Network Analysis of Hybrid Circuits
Published 1980-01-01Get full text
Article -
647
Optimization of a Continuous Hybrid Impeller Mixer via Computational Fluid Dynamics
Published 2014-01-01“…This paper presents the preliminary steps required for conducting experiments to obtain the optimal operating conditions of a hybrid impeller mixer and to determine the residence time distribution (RTD) using computational fluid dynamics (CFD). In this paper, impeller speed and clearance parameters are examined. …”
Get full text
Article -
648
Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing
Published 2015-01-01“…Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. …”
Get full text
Article -
649
Component Importance Measure Computation Method Based Fuzzy Integral with Its Application
Published 2017-01-01Get full text
Article -
650
Film and Television Animation Sensing and Visual Image by Computer Digital Image Technology
Published 2022-01-01“…In order to study the application of computer digital image processing technology in film and television (FAT) animation visual sensing expression, by studying the principle of digital image processing technology and visual sensing technology, a spatial image adaptive steganography image enhancement algorithm by multiscale filters is proposed to carry out enhancement processing of the original image in FAT production. …”
Get full text
Article -
651
Classification of Cigarette Types Using Computer Vision: An Analysis of Smoke Aggregation Features
Published 2025-01-01Subjects: Get full text
Article -
652
The role of gaze in meaning negotiation episodes in video synchronous computer-mediated interactions
Published 2022-08-01“…Journal of China Computer-Assisted Language Learning…”
Get full text
Article -
653
Solving Spatial Optimization Problems via Lagrangian Relaxation and Automatic Gradient Computation
Published 2025-01-01“…By automating the (sub)gradient computation, we significantly lower the cost of developing a Lagrangian algorithm for the <i>p</i>-median. …”
Get full text
Article -
654
Retracted: Application of Wireless Sensor Network Computer Technology in Financial Management System
Published 2023-01-01Get full text
Article -
655
Parallel Computation of RCS of Electrically Large Platform with Coatings Modeled with NURBS Surfaces
Published 2012-01-01“…This paper uses large-scale parallel Physical Optics (PO) to realize the fast computation of RCS to electrically large targets, which are modeled by Non-Uniform Rational B-Spline (NURBS) surfaces and coated with dielectric materials. …”
Get full text
Article -
656
Automatic Scaling Mechanism of Intermodal EDI System under Green Cloud Computing
Published 2022-01-01“…In order to solve the problem of mismatching between application load and computing resource capacity and realize on-demand resource allocation and low carbon emission, this paper proposes to build an Extensible EDI system (XEDI) based on MSA and studies the scaling mechanism in container environment. …”
Get full text
Article -
657
The Value of Thoracic Computed Tomography Scans in Clinical Diagnosis: A Prospective Study
Published 2006-01-01“…BACKGROUND: Computed tomography (CT) scans are used extensively to investigate chest disease because of their cross-sectional perspective and superior contrast resolution compared with chest radiographs. …”
Get full text
Article -
658
Dynamics of a Computer Virus Propagation Model with Delays and Graded Infection Rate
Published 2017-01-01“…A four-compartment computer virus propagation model with two delays and graded infection rate is investigated in this paper. …”
Get full text
Article -
659
COMPUTER MODELING OF STRAINS ON PHASE BOUNDARIES IN DUCTILE CAST IRON AT HOT EXTRUSION
Published 2017-03-01“…The computer modeling of the strain distribution in the structure of ductile iron with ferrite-pearlite matrix and inclusions of spherical graphite dependence on increasing degree of deformation during direct hot extrusion was researched. …”
Get full text
Article -
660
Joint Resource Allocation Optimization of Wireless Sensor Network Based on Edge Computing
Published 2021-01-01“…Therefore, this paper proposes a joint optimization algorithm of resource allocation based on edge computing. We establish a wireless sensor allocation model and then propose our algorithm model combined with the advantages of edge computing. …”
Get full text
Article