Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
581
Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network
Published 2014-01-01“…An SEIQRS model for the transmission of malicious objects in computer network with two delays is investigated in this paper. …”
Get full text
Article -
582
The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures
Published 2013-01-01“…The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). …”
Get full text
Article -
583
Enhancing Railway Maintenance Safety Using Open-Source Computer Vision
Published 2021-01-01“…Images of railway signs, tracks, and maintenance workers on the tracks were recorded through image data. The Computer Vision OpenCV library was utilized to extract the image data. …”
Get full text
Article -
584
Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations
Published 2014-01-01“…A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first. …”
Get full text
Article -
585
Measurements and Analytical Computer-Based Study of CMOS Inverters and Schmitt Triggers
Published 1996-01-01“…Complete detailed theoretical, experimental and computer based results are derived and exhibited.…”
Get full text
Article -
586
On Computation and Analysis of Topological Index-Based Invariants for Complex Coronoid Systems
Published 2021-01-01“…Explicitly, this tremendous improvement has been outstanding in the field of soft computing, molecular biology, and information technology. …”
Get full text
Article -
587
Identification of Levothyroxine Antichagasic Activity through Computer-Aided Drug Repurposing
Published 2014-01-01Get full text
Article -
588
First-order phase transition of the Schwinger model with a quantum computer
Published 2025-01-01Get full text
Article -
589
An Efficient Computation of Effective Ground Range Using an Oblate Earth Model
Published 2014-01-01Get full text
Article -
590
Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity
Published 2022-09-01Subjects: “…algorithm, combinatorics, computation, multinomial coefficient…”
Get full text
Article -
591
Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment
Published 2021-01-01“…Finally, based on the impact of cloud computing, mobile e-commerce is analyzed, including relevant theories, service mode, architecture, core technology, and the application in e-commerce, which can realize e-commerce precision marketing, find the optimal path of logistics, and take effective security measures to avoid transaction risks. …”
Get full text
Article -
592
Computer-Aided Modelling and Analysis of PV Systems: A Comparative Study
Published 2014-01-01“…The work presented in this paper aims on a first level at the performance analysis of various configurations of photovoltaic systems through computer-aided modelling. On a second level, it provides a comparative evaluation of the credibility of two of the most advanced graphical programming environments, namely, Simulink and LabVIEW, with regard to their application in photovoltaic systems.…”
Get full text
Article -
593
Multi-Tier Blockchain-Based Land Registry Using Fog Computing
Published 2025-01-01Subjects: Get full text
Article -
594
Similarity Learning and Generalization with Limited Data: A Reservoir Computing Approach
Published 2018-01-01“…We present two Reservoir Computing architectures, which loosely resemble neural dynamics, and show that a Reservoir Computer (RC) trained to identify relationships between image pairs drawn from a subset of training classes generalizes the learned relationships to substantially different classes unseen during training. …”
Get full text
Article -
595
Usability of Computer-Aided Translation Software Based on Deep Learning Algorithms
Published 2022-01-01“…In recent years, due to the development of computer technology and information technology, web technology has changed the mode of translation at an alarming rate. …”
Get full text
Article -
596
Perancangan Aplikasi Computer based Test (CBT) Psikotes Berbasis Website
Published 2022-10-01“…Maka, perlu dibangun aplikasi Computer Based Test (CBT) psikotes. Aplikasi ini dapat diikuti oleh peserta umum maupun pelajar. …”
Get full text
Article -
597
Tendencies of development of youth extremism in the conditions of progress of information and computer technologies
Published 2013-06-01Subjects: Get full text
Article -
598
Second Mesiobuccal Canal Evaluation Features with Cone-Beam Computed Tomography
Published 2019-01-01Get full text
Article -
599
Sigmoid Volvulus in Pregnancy Assessed by Contrast-Enhanced Computed Tomography Scanning
Published 2021-01-01Get full text
Article -
600
A Computer Vision-Based Framework for Snow Removal Operation Routing
Published 2024-01-01Subjects: Get full text
Article