Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
14181
Towards formal evaluation of collaborative work
Published 2006-01-01“…<br><b>Introduction.</b> Computer Supported Cooperative Work (CSCW) projects are difficult to evaluate when implemented at most organizations. …”
Get full text
Article -
14182
Classic Dissection of Thoracic Aorta Complicated by Ascending Aortic Intramural Hematoma: Promt Diagnosis and Successful Endovascular Repair
Published 2012-01-01“…Patient was admitted to our institution for evaluation of a severe, constant, tearing anterior chest pain radiated to the neck with suspicion of acute aortic dissection. A multidetector computed tomography scan of thorax and abdomen demonstrated a dissection starting from the middle part of aortic arch and extending downward to the descending aorta till the middle part of the thoracic aorta. …”
Get full text
Article -
14183
A Time-Domain Boundary Element Method for Wave Diffraction in a Two-Layer Fluid
Published 2012-01-01“…For the internal-wave mode, through the definition of a new function respected to velocity potentials of upper and lower fluid on the interface by using matching condition, a single set of linear equations is set up to compute the time histories of wave forces and wave profiles by using a fourth-order Runge-Kutta method. …”
Get full text
Article -
14184
Production and decay of anticharmed pentaquark state with quark content $$\bar{c}sudd$$ c ¯ s u d d
Published 2025-01-01“…With the moderate model parameters, the computed results suggest that the branching fractions of $$\Lambda _b^0\rightarrow P_{\bar{c}s}^{(*)-} D^+ $$ Λ b 0 → P c ¯ s ( ∗ ) - D + can reach approximately $$10^{-4}$$ 10 - 4 . …”
Get full text
Article -
14185
Finite-Time Cluster Synchronization of Fractional-Order Complex-Valued Neural Networks Based on Memristor with Optimized Control Parameters
Published 2025-01-01“…The settling time, related to the system’s initial values, can be computed using the Mittag–Leffler function. We further investigate the optimization of control parameters by formulating an optimization model, which is solved using particle swarm optimization (PSO) to determine the optimal control parameters. …”
Get full text
Article -
14186
CoMFA and CoMSIA Studies on Inhibitors of HIV-1 Integrase - Bicyclic Pyrimidinones
Published 2010-01-01“…To understand the structural requirements of HIV-1 integrase inhibitors and to design new ligands against human HIV-1 integrase with enhanced inhibitory potency, a 3D QSAR (quantitative structure-activity relationship) study with comparative molecular field analysis (CoMFA) and comparative molecular similarity indices analysis (CoMSIA) for a dataset of 35 bicyclic pyrimidinones which are inhibitors of human HIV-1 integrase was performed. QSAR models were computed with Sybyl. The 3D QSAR model showed very good statistical result, namely q2, r2 and r2pred values were high for both CoMFA and CoMSIA. …”
Get full text
Article -
14187
A Resilience-Based Security Assessment Approach for CBTC Systems
Published 2021-01-01“…With the rapid development of urban rail transit systems, large amounts of information technologies are applied to increase efficiency of train control systems, such as general computers, communication protocols, and operation systems. …”
Get full text
Article -
14188
Option Pricing under Two-Factor Stochastic Volatility Jump-Diffusion Model
Published 2020-01-01“…We derive a semianalytical formula for European vanilla option and develop a fast and accurate numerical algorithm for the computation of the option prices using the fast Fourier transform (FFT) technique. …”
Get full text
Article -
14189
A Study on the Measurement and Influencing Factors of Innovation Governance Performance of Hubei Province in China Based on Technology Heterogeneity
Published 2022-01-01“…So, the aim of the research is to find a methodology for computing innovation performance and its influence factors in the Hubei region of China. …”
Get full text
Article -
14190
A fluid flow model for the software defined wide area networks analysis
Published 2025-01-01“…Enhancing Quality of Service (QoS) in computer networks by focusing on bandwidth and communication delay is critical. …”
Get full text
Article -
14191
Differential Evolution without the Scale Factor and the Crossover Probability
Published 2023-01-01“…Differential evolution has made great achievements in various fields such as computational sciences, engineering optimization, and operations management in the past decades. …”
Get full text
Article -
14192
Reliable Distributed Integrated Navigation Based on CI during Mars Entry
Published 2019-01-01“…This distributed fusion approach could meet the lower computation cost and robust and reliable capacity and especially is beneficial to the weakly observable or unobservable subsystems during the Mars entry navigation scheme. …”
Get full text
Article -
14193
An investigation on levels of the empathic tendencies of elite university tennis players in terms of different variables
Published 2014-11-01“…The mean and standard deviation was computed to statistically analyze the data. The t-test and Kruskal-Wallis test for non-parametric groups were employed, and outcomes were presented in tables. …”
Get full text
Article -
14194
Asymptomatic Pulmonary Vein Stenosis: Hemodynamic Adaptation and Successful Ablation
Published 2016-01-01“…We present a patient with severe postatrial fibrillation (AF) ablation pulmonary vein (PV) stenosis, which was seen on multiple imaging modalities including cardiac computed tomography (CT) angiogram, lung perfusion scan, and pulmonary angiogram. …”
Get full text
Article -
14195
Study on the antifungal potential of Piper betle methanol extract against Colletotrichum gloeosporioides cutinase
Published 2024-06-01“…In this work, they were subjected for further computational efforts to complete their bio-chemo-pharmacological profile, and broaden their anti-fungal potentiality against Colletotrichum gloeosporioides cutinase presentative (PDB-3DEA). …”
Get full text
Article -
14196
Comparing an Approximate Queuing Approach with Simulation for the Solution of a Cross-Docking Problem
Published 2017-01-01“…The simulation uses analytic tools to make the problem more detailed, which is not allowed in the theoretical model. The computational analysis compares the results of the simulated model with the ones obtained with the theoretical algorithm, considering the queue length and the average waiting time of the trucks. …”
Get full text
Article -
14197
Modeling The Role Of Wild Birds and Environment in the Dynamics of Newcastle Disease in Village Chicken.
Published 2019“…In this paper, we develop and analyze a deterministic model to investigate the role of wild birds and environment on the transmission dynamics of Newcastle disease in village chicken. We compute the basic reproduction number (R0), a threshold that tells the presence of the disease in a population. …”
Get full text
Article -
14198
Comparative Analysis of Fixed and Variable Step Size Methods for Solving Ordinary Differetial Equations: A Case Study of Runge-Kutta Order 4 and Dormand Prince.
Published 2024“…It uses six function evaluations to compute solutions with fourth and fifth-order accuracy. …”
Get full text
Thesis -
14199
Patients’ Health Records Management in Ugandan Hospitals: A Case of Kabale Regional Referral Hospital
Published 2021“…When asked what they feel about what should be done to stop information disclosure to untrusted parties , 20% of the Interviewees expressed concern for keeping their information in closed rooms, 60% of the Interviewees expressed concern for information storage in the computer with passwords and 20% of the respondents expressed concern for hiring external authorities to store their information. …”
Get full text
Article -
14200