Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
461
Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network
Published 2014-01-01“…An SEIQRS model for the transmission of malicious objects in computer network with two delays is investigated in this paper. …”
Get full text
Article -
462
The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures
Published 2013-01-01“…The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). …”
Get full text
Article -
463
Enhancing Railway Maintenance Safety Using Open-Source Computer Vision
Published 2021-01-01“…Images of railway signs, tracks, and maintenance workers on the tracks were recorded through image data. The Computer Vision OpenCV library was utilized to extract the image data. …”
Get full text
Article -
464
Measurements and Analytical Computer-Based Study of CMOS Inverters and Schmitt Triggers
Published 1996-01-01“…Complete detailed theoretical, experimental and computer based results are derived and exhibited.…”
Get full text
Article -
465
Identification of Levothyroxine Antichagasic Activity through Computer-Aided Drug Repurposing
Published 2014-01-01Get full text
Article -
466
First-order phase transition of the Schwinger model with a quantum computer
Published 2025-01-01Get full text
Article -
467
Computer-Aided Modelling and Analysis of PV Systems: A Comparative Study
Published 2014-01-01“…The work presented in this paper aims on a first level at the performance analysis of various configurations of photovoltaic systems through computer-aided modelling. On a second level, it provides a comparative evaluation of the credibility of two of the most advanced graphical programming environments, namely, Simulink and LabVIEW, with regard to their application in photovoltaic systems.…”
Get full text
Article -
468
Usability of Computer-Aided Translation Software Based on Deep Learning Algorithms
Published 2022-01-01“…In recent years, due to the development of computer technology and information technology, web technology has changed the mode of translation at an alarming rate. …”
Get full text
Article -
469
Perancangan Aplikasi Computer based Test (CBT) Psikotes Berbasis Website
Published 2022-10-01“…Maka, perlu dibangun aplikasi Computer Based Test (CBT) psikotes. Aplikasi ini dapat diikuti oleh peserta umum maupun pelajar. …”
Get full text
Article -
470
Tendencies of development of youth extremism in the conditions of progress of information and computer technologies
Published 2013-06-01Subjects: Get full text
Article -
471
A Computer Vision-Based Framework for Snow Removal Operation Routing
Published 2024-01-01Subjects: Get full text
Article -
472
Stability and Hopf Bifurcation for a Delayed SLBRS Computer Virus Model
Published 2014-01-01“…By incorporating the time delay due to the period that computers use antivirus software to clean the virus into the SLBRS model a delayed SLBRS computer virus model is proposed in this paper. …”
Get full text
Article -
473
Hunting the Pertinency of Bloom Filter in Computer Networking and Beyond: A Survey
Published 2019-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
474
Key Technology of Internet of Things Middleware and Computer Event Matching Algorithm
Published 2022-01-01“…Journal of Electrical and Computer Engineering…”
Get full text
Article -
475
-
476
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection
Published 2019-01-01“…The feasibility of utilizing Granular Computing (GC) as a solution to the most current challenges in cybersecurity is researched. …”
Get full text
Article -
477
A Dynamic Bayesian Approach to Computational Laban Shape Quality Analysis
Published 2009-01-01“…Advances in Human-Computer Interaction…”
Get full text
Article -
478
Post-processing methods for delay embedding and feature scaling of reservoir computers
Published 2025-01-01“…Abstract Reservoir computing is a machine learning method that is well-suited for complex time series prediction tasks. …”
Get full text
Article -
479
CLOUD COMPUTING AND FINANCIAL PERFORMANCE OF LISTED DEPOSIT MONEY BANKS IN NIGERIA
Published 2024-12-01Subjects: Get full text
Article -
480
Correlation of Image Quality Metrics with Expert Perception for Industrial Computed Tomography
Published 2025-02-01“…This study contributes to a deeper understanding of the relationship between objective image quality metrics and subjective human perception in the context of industrial computed tomography. …”
Get full text
Article