Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
12221
-
12222
Editorial: Protecting privacy in neuroimaging analysis: balancing data sharing and privacy preservation
Published 2025-01-01Get full text
Article -
12223
A *-mixing convergence theorem for convex set valued processes
Published 1987-01-01Get full text
Article -
12224
A Novel Approach to Fuzzy Soft Set-Based Group Decision-Making
Published 2018-01-01Get full text
Article -
12225
-
12226
-
12227
-
12228
Analytical Method in Solving Flow of Viscoelastic Fluid in a Porous Converging Channel
Published 2011-01-01“…An analytical method, called homotopy perturbation method (HPM), is used to compute an approximation to the solution of the nonlinear differential equation governing the problem of two-dimensional and steady flow of a second-grade fluid in a converging channel. …”
Get full text
Article -
12229
Cramér-Rao Bound Study of Multiple Scattering Effects in Target Separation Estimation
Published 2013-01-01Get full text
Article -
12230
Optical-Theorem-Based Coherent Scatterer Detection in Complex Environments
Published 2013-01-01Get full text
Article -
12231
CHAT: Clustered hierarchical key management for wireless sensor networks using network topology
Published 2017-11-01Get full text
Article -
12232
More than just a name? From magnetic to optical skyrmions and the topology of light
Published 2025-01-01Get full text
Article -
12233
-
12234
The Periodic Boundary Value Problem for a Quasilinear Evolution Equation in Besov Spaces
Published 2015-01-01Get full text
Article -
12235
A Study on Nash-Collative Differential Game of N-Players for Counterterrorism
Published 2021-01-01Get full text
Article -
12236
A Geometric Approach for Robotic Arm Kinematics with Hardware Design, Electrical Design, and Implementation
Published 2010-01-01Get full text
Article -
12237
An Incremental Interesting Maximal Frequent Itemset Mining Based on FP-Growth Algorithm
Published 2022-01-01Get full text
Article -
12238
Controlled Roof Collapse during Secondary Mining in Coal Mines
Published 2012-01-01“…The failure of the beam for values of 𝐵 greater than 𝐵1 is investigated computationally.…”
Get full text
Article -
12239
A Fuzzy Genetic Algorithm Based on Binary Encoding for Solving Multidimensional Knapsack Problems
Published 2012-01-01“…The second technique focuses on controlling the genetic parameters by applying the fuzzy logic controller. Computational experiments are conducted on the proposed techniques and the results are compared with other genetic operators, heuristics, and local search algorithms commonly used for solving multidimensional 0/1 knapsack problems published in the literature.…”
Get full text
Article -
12240
An Algorithm That Predicts CSI to Allocate Bandwidth for Healthcare Monitoring in Hospital's Waiting Rooms
Published 2012-01-01Get full text
Article