Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
461
Hydrometallurgical Recovery of Copper from Computer-Printed Circuit Boards
Published 2024-01-01“…This study focused on extracting copper (Cu) and gold (Au) from three different sources of computer-printed circuit boards (PCBs): board, USB jack, and capacitor. …”
Get full text
Article -
462
The results of the 10th Republican competition “Computer. Education. The Internet”
Published 2015-06-01Get full text
Article -
463
Computer vision syndrome: neuro- and pathophysiological aspects (analytical review)
Published 2024-03-01“…</p> <p> <b>Keywords: </b>computer vision syndrome, dry eye disease, accommodation, pathogenesis, neurophysiology, visual motor integration. …”
Get full text
Article -
464
DYNAMICS OF DETECTED FIRE FACTORS IN CLOSED COMPARTMENT: COMPUTER SIMULATION
Published 2015-12-01“…Computer simulation of the initial fire stages in closed compartment with the volume of ≈ 60 m3 and with a burner on a floor and 2 m above floor have been carried using FDS software. …”
Get full text
Article -
465
Computer-Aided Rapid Establishment of Fingerprint of Xiaojin Capsule by HPLC
Published 2021-01-01“…In this study, we used Xiaojin capsule (XJC) as a case and developed a rapid fingerprint method based on increasing the column temperature and flow rate simultaneously combined with computer-aided. First, the elution gradient was optimized based on the retention parameters and peak shape parameters of the four linear gradients, and then, the column temperature and flow rate were increased simultaneously to shorten the analysis time. …”
Get full text
Article -
466
Shaping the future of commercial quantum computer and the challenge for information security
Published 2016-03-01Subjects: “…Canadian quantum computer…”
Get full text
Article -
467
Software engineering : A practitioner's approach /
Published 2020Subjects: “…computer pogramming 9993…”
View in OPAC
Book -
468
2000 Access: aprofessional approach/
Published 2000Subjects: “…computer access 10431…”
View in OPAC
Book -
469
Digital Planet : tomorrow's technology and you /
Published 2014Subjects: “…Computer science 3898…”
View in OPAC
Book -
470
Understanding the network : a practical guide to internetworking /
Published 2000Subjects: “…Computer networks. 10789…”
View in OPAC
Book -
471
Imaginaire informatique et science-fiction, du cyberpunk à nos jours
Published 2017-11-01Subjects: Get full text
Article -
472
-
473
Improvement of in Vivo Quantification of [I]-Iodobenzovesamicol in Single-Photon Emission Computed Tomography/Computed Tomography Using Anatomic Image to Brain Atlas Nonrigid Registration
Published 2013-07-01“…Patients with multiple system atrophy (MSA) and age-matched healthy subjects underwent an MRI and a single-photon emission computed tomographic (SPECT) examination using [ 123 I]-iodobenzovesamicol (IBVM). …”
Get full text
Article -
474
Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
Published 2014-01-01“…We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. …”
Get full text
Article -
475
Control of Linear-Threshold Brain Networks via Reservoir Computing
Published 2024-01-01Subjects: Get full text
Article -
476
Improved direct anonymous attestation scheme for mobile computing platforms
Published 2013-06-01Subjects: “…trusted computing…”
Get full text
Article -
477
Computational measures of irregularity molecular descriptors of octahedral and icosahedral networks
Published 2025-01-01Subjects: Get full text
Article -
478
Soft computing approaches of direct torque control for DFIM Motor's
Published 2025-02-01Get full text
Article -
479
Privacy-preserving digital rights management scheme in cloud computing
Published 2014-02-01Subjects: Get full text
Article -
480
Computation of Graph Fourier Transform Centrality Using Graph Filter
Published 2024-01-01“…For conventional computation method, it needs to use the non-sparse transform matrix of graph Fourier transform (GFT) to compute GFTC scores. …”
Get full text
Article