Showing 21,301 - 21,320 results of 21,428 for search '"computing"', query time: 0.12s Refine Results
  1. 21301
  2. 21302

    Prevalence of Myocardial Infarction With Obstructive and Non-Obstructive Coronary Arteries in a Middle-Aged Population With Chronic Airflow Limitation: A Cross-Sectional Study by Sundh J, Ekström M, Blomberg A, Lindberg E, Malinovschi A, Olin AC, Sköld CM, Torén K, Wollmer P, Östgren CJ, Jernberg T

    Published 2025-02-01
    “…MI-CAD was defined as a self-reported MI with coronary computed tomography angiography findings of previous revascularization or at least one significant coronary stenosis (> 50%), and MINOCA as self-reported MI with no previous revascularization and no significant coronary stenosis.Results: In total, 1735 (8.3%) of 20,882 included participants had CAL. …”
    Get full text
    Article
  3. 21303

    Pengembangan Business Intelligence Dashboard untuk Monitoring Aktivitas Pariwisata (Studi Kasus: Dinas Pariwisata Provinsi Bali) by Evan Himawan Saragih, I Putu Agung Bayupati, Gusti Agung Ayu Putri

    Published 2021-11-01
    “…This study develops an information system using the BI approach in analyzing Bali tourism data and data management by replacing paper use as computer media so that data does not just disappear, but is used as a reference when making decisions. …”
    Get full text
    Article
  4. 21304
  5. 21305

    Penggabungan Best Worst Method, Moora Dan Copeland Score Pada Sistem Pendukung Keputusan Kelompok Penentuan Penerima Bantuan Pada Dinas Sosial by Willy Bima Alfajri, Dinar Mutiara Kusumo Nugraheni, Bayu Surarso

    Published 2023-07-01
    “…The weighting of the criteria in this study is computed quantitatively using the best worst method. …”
    Get full text
    Article
  6. 21306
  7. 21307
  8. 21308
  9. 21309
  10. 21310
  11. 21311
  12. 21312
  13. 21313

    Analisis Komparatif Keamanan Aplikasi Pengelola Kata Sandi Berbayar Lastpass, 1Password, dan Keeper Berdasarkan ISO/IEC 25010 by Whisnu Yudha Aditama, Ira Rosianal Hikmah, Dimas Febriyan Priambodo

    Published 2023-08-01
    “…Abstract  Authentication is one of the most important factors in the scope of computer security, passwords are the dominant authentication method applied to websites or desktops. …”
    Get full text
    Article
  14. 21314

    Implementasi Web Push Notification pada Sistem Informasi Manajemen Arsip Menggunakan PUSHJS by Alam Rahmatulloh, Andi Nur Rachman, Fahmi Anwar

    Published 2019-05-01
    “…Abstract Technology continues to evolve, various types of technology continue to emerge such as records management information systems, the problem is that workers sometimes do other work on the computer so that the archive is not controlled. Web Push Notification application can display website-based notifications even if you don't open the web browser directly or in a minimized condition. …”
    Get full text
    Article
  15. 21315

    Automated Video Assistant Referee in Lead Climbing by Eliane Künzler, David Roder, Urs Stöcker, Peter Wolf

    Published 2025-01-01
    “…RTMO: Towards high-performance one-stage real-time multi-person pose estimation. 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 1491–1500. https://doi.org/10.1109/CVPR52733.2024.00148 …”
    Get full text
    Article
  16. 21316

    Identifikasi Malicious Host dalam Local Area Network Menggunakan Teknik Graph Clustering dan Filtering by Khafidzun Fadli, Achmad Basuki, Eko Setiawan

    Published 2020-05-01
    “…The cause of LAN becomes insecure because firewall technology is not able to protect the host (computer) in LAN from spreading malware. The spread of malware contained within a LAN is carried out by hosts in the LAN which are referred to as malicious hosts. …”
    Get full text
    Article
  17. 21317
  18. 21318

    Analisis dan Perancangan Aplikasi Chatbot Menggunakan Framework Rasa dan Sistem Informasi Pemeliharaan Aplikasi (Studi Kasus: Chatbot Penerimaan Mahasiswa Baru Politeknik Astra) by Laksmi Anindyati

    Published 2023-04-01
    “…Rasa NLU as a base library to build interactions between computers and humans using artificial intelligence. …”
    Get full text
    Article
  19. 21319
  20. 21320

    The Contribution of the Hotel Industry on Youth Empowerment in Mbarara City: A Case Study of Hotel Triangle Mbarara City. by Owomuhangi, Emmanuel

    Published 2024
    “…Data collected was edited, coded, entered into the computer, and analyzed with Excel, a Microsoft statistical package, the results were presented in tables. …”
    Get full text
    Thesis