Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
21301
-
21302
Prevalence of Myocardial Infarction With Obstructive and Non-Obstructive Coronary Arteries in a Middle-Aged Population With Chronic Airflow Limitation: A Cross-Sectional Study
Published 2025-02-01“…MI-CAD was defined as a self-reported MI with coronary computed tomography angiography findings of previous revascularization or at least one significant coronary stenosis (> 50%), and MINOCA as self-reported MI with no previous revascularization and no significant coronary stenosis.Results: In total, 1735 (8.3%) of 20,882 included participants had CAL. …”
Get full text
Article -
21303
Pengembangan Business Intelligence Dashboard untuk Monitoring Aktivitas Pariwisata (Studi Kasus: Dinas Pariwisata Provinsi Bali)
Published 2021-11-01“…This study develops an information system using the BI approach in analyzing Bali tourism data and data management by replacing paper use as computer media so that data does not just disappear, but is used as a reference when making decisions. …”
Get full text
Article -
21304
-
21305
Penggabungan Best Worst Method, Moora Dan Copeland Score Pada Sistem Pendukung Keputusan Kelompok Penentuan Penerima Bantuan Pada Dinas Sosial
Published 2023-07-01“…The weighting of the criteria in this study is computed quantitatively using the best worst method. …”
Get full text
Article -
21306
LUOJIA Explorer PMS: Panoramic Odometry and Mapping with Structural Information
Published 2025-01-01Get full text
Article -
21307
-
21308
-
21309
Expression of cell-wall related genes is highly variable and correlates with sepal morphology
Published 2023-09-01Get full text
Article -
21310
-
21311
Policy brief: Optimising antimicrobial usage in paediatric inpatient hospital settings
Published 2024-04-01Get full text
Article -
21312
-
21313
Analisis Komparatif Keamanan Aplikasi Pengelola Kata Sandi Berbayar Lastpass, 1Password, dan Keeper Berdasarkan ISO/IEC 25010
Published 2023-08-01“…Abstract Authentication is one of the most important factors in the scope of computer security, passwords are the dominant authentication method applied to websites or desktops. …”
Get full text
Article -
21314
Implementasi Web Push Notification pada Sistem Informasi Manajemen Arsip Menggunakan PUSHJS
Published 2019-05-01“…Abstract Technology continues to evolve, various types of technology continue to emerge such as records management information systems, the problem is that workers sometimes do other work on the computer so that the archive is not controlled. Web Push Notification application can display website-based notifications even if you don't open the web browser directly or in a minimized condition. …”
Get full text
Article -
21315
Automated Video Assistant Referee in Lead Climbing
Published 2025-01-01“…RTMO: Towards high-performance one-stage real-time multi-person pose estimation. 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 1491–1500. https://doi.org/10.1109/CVPR52733.2024.00148 …”
Get full text
Article -
21316
Identifikasi Malicious Host dalam Local Area Network Menggunakan Teknik Graph Clustering dan Filtering
Published 2020-05-01“…The cause of LAN becomes insecure because firewall technology is not able to protect the host (computer) in LAN from spreading malware. The spread of malware contained within a LAN is carried out by hosts in the LAN which are referred to as malicious hosts. …”
Get full text
Article -
21317
-
21318
Analisis dan Perancangan Aplikasi Chatbot Menggunakan Framework Rasa dan Sistem Informasi Pemeliharaan Aplikasi (Studi Kasus: Chatbot Penerimaan Mahasiswa Baru Politeknik Astra)
Published 2023-04-01“…Rasa NLU as a base library to build interactions between computers and humans using artificial intelligence. …”
Get full text
Article -
21319
-
21320
The Contribution of the Hotel Industry on Youth Empowerment in Mbarara City: A Case Study of Hotel Triangle Mbarara City.
Published 2024“…Data collected was edited, coded, entered into the computer, and analyzed with Excel, a Microsoft statistical package, the results were presented in tables. …”
Get full text
Thesis