Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
961
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Published 2022-01-01“…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
Get full text
Article -
962
Effects of Resource Limitations and Cost Influences on Computer Virus Epidemic Dynamics and Tipping Points
Published 2012-01-01“…One of the most important assessment indicators of computer virus infections is epidemic tipping point. …”
Get full text
Article -
963
Computer Vision-assisted Wireless Channel Simulation for Millimeter Wave Human Motion Recognition
Published 2025-02-01Subjects: Get full text
Article -
964
Feasibility and appropriateness of using electronic hierarchical structures in teaching computer science in primary school
Published 2024-12-01“…Modern requirements for teaching computer science in primary schools demonstrate the necessity of using innovative educational technologies. …”
Get full text
Article -
965
Computationally Inexpensive Approach for Pitch Control of Offshore Wind Turbine on Barge Floating Platform
Published 2013-01-01“…In allusion to the external disturbances and uncertain system parameters of OFWT due to the proximity to load centers and strong wave coupling, this paper proposes a computationally inexpensive robust adaptive control approach with memory-based compensation for blade pitch control. …”
Get full text
Article -
966
Computer Vision-Based Structural Displacement Monitoring and Modal Identification with Subpixel Localization Refinement
Published 2022-01-01“…In order to overcome these shortcomings, the computer vision- (CV-) based method has been introduced into SHM, and its practical applications are increasing. …”
Get full text
Article -
967
Computational Chemistry Study of pH-Responsive Fluorescent Probes and Development of Supporting Software
Published 2025-01-01“…This study employs quantum chemical computational methods to predict the spectroscopic properties of fluorescent probes 2,6-bis(2-benzimidazolyl)pyridine (BBP) and (<i>E</i>)-3-(2-(1<i>H</i>-benzo[<i>d</i>]imidazol-2-yl)vinyl)-9-(2-(2-methoxyethoxy)ethyl)-9<i>H</i>-carbazole (BIMC). …”
Get full text
Article -
968
Computationally expensive constrained problems via surrogate-assisted dynamic population evolutionary optimization
Published 2025-01-01“…Abstract This paper proposes a surrogate-assisted dynamic population optimization algorithm (SDPOA) for the purpose of solving computationally expensive constrained optimization problems, in which the population is dynamically updated based on the real-time iteration information to achieve targeted searches for solutions with different qualities. …”
Get full text
Article -
969
Computer simulation of stress-strain states in zygomatic bones after complex installation of implants
Published 2024-01-01“…Based on the results of the FEM-based computer simulation, the algorithm was proposed for planning prosthetic treatment, which involves the iterative method for selecting both size and location of installing zygomatic implants depending on the results of the SSS calculation and the onset of a critical condition (primarily in bone tissue at the contact area with zygomatic implants).…”
Get full text
Article -
970
Augmented reality technology and possibilities of its use in teaching computer science to junior schoolchildren
Published 2024-12-01Subjects: Get full text
Article -
971
Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology
Published 2017-01-01“…Journal of Electrical and Computer Engineering…”
Get full text
Article -
972
Agricultural Information Management Data Model Construction Based on Cloud Computing and Semantic Technology
Published 2022-01-01“…The registration rate improves than the traditional method by 12.46% and computational cost by 23.76%. This method has higher accuracy in storage data mining and retrieval for large information management systems and superior performance than the traditional method. …”
Get full text
Article -
973
CARPAL TUNNEL SYNDROME (CTS) FOR WORKERS USING COMPUTER IN THE FINANCE DIVISION OF PROPERTY INDUSTRY
Published 2022-11-01“…Jobs that are at risk of CTS involve doing repetitive movements, working with awkward postures, working in a motorized vehicle production or working using computers. Purpose: To determine the factors associated with the incidence of CTS in workers that used computers in the finance division of Property Industry. …”
Get full text
Article -
974
-
975
Retracted: A Microgrid Security Defense Method Based on Cooperation in an Edge-Computing Environment
Published 2023-01-01“…Journal of Electrical and Computer Engineering…”
Get full text
Article -
976
Bilateral Obturator Hernia Diagnosed by Computed Tomography: A Case Report with Review of the Literature
Published 2014-01-01“…It is mistakenly diagnosed as femoral or inguinal hernia on USG. Computed tomography is diagnostic and is a valuable tool for preoperative diagnosis. …”
Get full text
Article -
977
Silymarin as a Therapeutic Agent for Hepatocellular Carcinoma: A Multi-Approach Computational Study
Published 2025-01-01Get full text
Article -
978
Parallel remote state preparation for fully device-independent verifiable blind quantum computation
Published 2025-01-01“…We introduce a device-independent two-prover scheme in which a classical verifier can use a simple untrusted quantum measurement device (the client device) to securely delegate a quantum computation to an untrusted quantum server. To do this, we construct a parallel self-testing protocol to perform device-independent remote state preparation of n qubits and compose this with the unconditionally secure universal verifiable blind quantum computation (VBQC) scheme of Fitzsimons and Kashefi [Phys. …”
Get full text
Article -
979
Computational Insights in DNA Methylation: Catalytic and Mechanistic Elucidations for Forming 3-Methyl Cytosine
Published 2022-01-01“…To gain a deeper insight into the formation of 3 mC, we have performed density functional theory (DFT) modeling studies at different levels of theory to clearly map out the mechanistic details for this new methylation approach. Our computed results are in harmony with pertinent experimental observations and shed light on a crucial off-target activity of DNMTs.…”
Get full text
Article -
980
Synthesis and evaluation of nitrochromene derivatives as potential antileishmanial therapeutics through biological and computational studies
Published 2025-01-01“…The dual approach of combining experimental and computational methods aims to provide a robust understanding of the compounds’ mechanisms of action and their potential as effective anti-leishmanial agents. …”
Get full text
Article