Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
741
Tendencies of development of youth extremism in the conditions of progress of information and computer technologies
Published 2013-06-01Subjects: Get full text
Article -
742
A Computer Vision-Based Framework for Snow Removal Operation Routing
Published 2024-01-01Subjects: Get full text
Article -
743
Stability and Hopf Bifurcation for a Delayed SLBRS Computer Virus Model
Published 2014-01-01“…By incorporating the time delay due to the period that computers use antivirus software to clean the virus into the SLBRS model a delayed SLBRS computer virus model is proposed in this paper. …”
Get full text
Article -
744
Analysis and verification of safety computer time constraints for train-to-train communications
Published 2018-12-01Subjects: Get full text
Article -
745
Hunting the Pertinency of Bloom Filter in Computer Networking and Beyond: A Survey
Published 2019-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
746
Key Technology of Internet of Things Middleware and Computer Event Matching Algorithm
Published 2022-01-01“…Journal of Electrical and Computer Engineering…”
Get full text
Article -
747
Analytical skills of computer security students in the structure of analytical thinking readiness
Published 2015-11-01Subjects: Get full text
Article -
748
Folate Receptor–Targeted Single-Photon Emission Computed Tomography/Computed Tomography to Detect Activated Macrophages in Atherosclerosis: Can It Distinguish Vulnerable from Stable Atherosclerotic Plaques?
Published 2014-01-01“…We investigated the feasibility of a folate-based radiopharmaceutical ( 111 In-EC0800) with high-resolution animal single-photon emission computed tomography/computed tomography (SPECT/CT) to differentiate between stable and vulnerable atherosclerotic plaques in apolipoprotein E 7 mice in which we can induce plaques with the characteristics of stable and vulnerable plaques by placing a flow-modifying cast around the common carotid artery. …”
Get full text
Article -
749
An Introduction to Object-Oriented Programming with Java /
Published 2006Subjects: “…Object-oriented programming (Computer science) 1557…”
Table of contents only
Publisher description
View in OPAC
Book -
750
Signal acquisition of brain–computer interfaces: A medical-engineering crossover perspective review
Published 2025-01-01Subjects: “…Brain–computer interface…”
Get full text
Article -
751
Practical Guide to Oracle SQL, T-SQL and MySQL
Published 2018Subjects: “…Oracle (Computer file) 10279…”
View in OPAC
Book -
752
Protocol for functional screening of CFTR-targeted genetic therapies in patient-derived organoids using DETECTOR deep-learning-based analysis
Published 2025-03-01Subjects: Get full text
Article -
753
Semantic‐aware visual consistency network for fused image harmonisation
Published 2023-06-01Subjects: “…computer vision…”
Get full text
Article -
754
Geometry-symmetry-free and material-symmetry-guaranteed polariton-induced transparency
Published 2025-02-01Subjects: Get full text
Article -
755
Cooperative evolution with reward-based heterogeneous tax in spatial public goods games
Published 2025-02-01Subjects: “…Computer science…”
Get full text
Article -
756
Emprego em TICs e gênero no ramo de informática: uma primeira exploração
Published 2009-01-01Subjects: Get full text
Article -
757
Streaming Science #5: Using Virtual Reality Tours for Engagement With Your Target Audience
Published 2023-10-01Subjects: “…Computer Simulation…”
Get full text
Article -
758
-
759
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection
Published 2019-01-01“…The feasibility of utilizing Granular Computing (GC) as a solution to the most current challenges in cybersecurity is researched. …”
Get full text
Article -
760
A Dynamic Bayesian Approach to Computational Laban Shape Quality Analysis
Published 2009-01-01“…Advances in Human-Computer Interaction…”
Get full text
Article