Showing 28,561 - 28,580 results of 28,739 for search '"computing"', query time: 0.15s Refine Results
  1. 28561
  2. 28562
  3. 28563
  4. 28564
  5. 28565

    Effectiveness of Virtual Reality Training in Improving Outcomes for Dialysis Patients: Systematic Review and Meta-Analysis by Xin Kang, Yiping Zhang, Chaonan Sun, Jiaxin Zhang, Zhe Che, Jinhui Zang, Rongzhi Zhang

    Published 2025-01-01
    “… BackgroundVirtual reality (VR) training uses computer-generated simulations that enable users to engage with immersive virtual environments, simulating real-world activities or therapeutic exercises. …”
    Get full text
    Article
  6. 28566

    Analisis Komparatif Keamanan Aplikasi Pengelola Kata Sandi Berbayar Lastpass, 1Password, dan Keeper Berdasarkan ISO/IEC 25010 by Whisnu Yudha Aditama, Ira Rosianal Hikmah, Dimas Febriyan Priambodo

    Published 2023-08-01
    “…Abstract  Authentication is one of the most important factors in the scope of computer security, passwords are the dominant authentication method applied to websites or desktops. …”
    Get full text
    Article
  7. 28567

    Implementasi Web Push Notification pada Sistem Informasi Manajemen Arsip Menggunakan PUSHJS by Alam Rahmatulloh, Andi Nur Rachman, Fahmi Anwar

    Published 2019-05-01
    “…Abstract Technology continues to evolve, various types of technology continue to emerge such as records management information systems, the problem is that workers sometimes do other work on the computer so that the archive is not controlled. Web Push Notification application can display website-based notifications even if you don't open the web browser directly or in a minimized condition. …”
    Get full text
    Article
  8. 28568

    Automated Video Assistant Referee in Lead Climbing by Eliane Künzler, David Roder, Urs Stöcker, Peter Wolf

    Published 2025-01-01
    “…RTMO: Towards high-performance one-stage real-time multi-person pose estimation. 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 1491–1500. https://doi.org/10.1109/CVPR52733.2024.00148 …”
    Get full text
    Article
  9. 28569
  10. 28570

    Identifikasi Malicious Host dalam Local Area Network Menggunakan Teknik Graph Clustering dan Filtering by Khafidzun Fadli, Achmad Basuki, Eko Setiawan

    Published 2020-05-01
    “…The cause of LAN becomes insecure because firewall technology is not able to protect the host (computer) in LAN from spreading malware. The spread of malware contained within a LAN is carried out by hosts in the LAN which are referred to as malicious hosts. …”
    Get full text
    Article
  11. 28571
  12. 28572

    Analisis dan Perancangan Aplikasi Chatbot Menggunakan Framework Rasa dan Sistem Informasi Pemeliharaan Aplikasi (Studi Kasus: Chatbot Penerimaan Mahasiswa Baru Politeknik Astra) by Laksmi Anindyati

    Published 2023-04-01
    “…Rasa NLU as a base library to build interactions between computers and humans using artificial intelligence. …”
    Get full text
    Article
  13. 28573
  14. 28574
  15. 28575

    The Contribution of the Hotel Industry on Youth Empowerment in Mbarara City: A Case Study of Hotel Triangle Mbarara City. by Owomuhangi, Emmanuel

    Published 2024
    “…Data collected was edited, coded, entered into the computer, and analyzed with Excel, a Microsoft statistical package, the results were presented in tables. …”
    Get full text
    Thesis
  16. 28576

    Effectiveness of a universal film intervention in reducing violence against children and increasing positive parenting among migrant and displaced caregivers from Myanmar: a commun... by Amanda Sim, Khaing Zar Lwin, Stephanie Eagling-Peche, G.J. Melendez-Torres, Seema Vyas, Francisco Calderon, Tawanchai Jirapramukpitak, Jamie Lachman, Sureeporn Punpuing, Andrea Gonzalez, Mary Soan, Nway Nway Oo, Ivet Castello Mitjans, Greg Tyrosvoutis, Eve Puffer

    Published 2025-02-01
    “…Methods: We implemented a two-arm, cluster randomised trial in Tak province, Thailand, on the border with Myanmar. 44 communities were stratified by district and randomly allocated to intervention or control (1:1) using a computer-generated list of random numbers. Intervention group participants received a screening of a 66-min narrative drama film about parenting, followed by a 30–40-min discussion and a 5-min video and poster summarising key messages. …”
    Get full text
    Article
  17. 28577

    Diversity in the medical research ecosystem: a descriptive scientometric analysis of over 49 000 studies and 150 000 authors published in high-impact medical journals between 2007... by Leo Anthony Celi, Jonathan Shaffer, Marie-Laure Charpignon, Liam G McCoy, Luis Filipe Nakayama, Jack Gallifant, Urvish Jain, Joao Matos, Pia Gabrielle I Alfonso, Marisa Cobanaj, Amelia Morel Fiske, Alexander J Gates, Frances Dominique V Ho, Mohammad Kashkooli, Naira Link

    Published 2025-01-01
    “…We characterised the overall gender and country income category representation across the five medical journals. In addition, we computed article-level diversity metrics and contrasted their distributions across the journals.Results We studied 151 536 authors across 49 764 articles published in five top medical journals, over a period spanning 15 years. …”
    Get full text
    Article
  18. 28578

    Lipoleiomyoma of the uterus in a woman of reproductive age (clinical case) by V.V. Talash, Ya.V. Palyokha, A.M. Gromova, V.V. Talash, V.B. Martynenko, N.O. Prylutska, N.I. Mityunina

    Published 2024-10-01
    “…For the planned diagnosis of neoplasms of the female genital organs, preference should be given to non-invasive research methods: magnetic resonance or computer tomography with contrast enhancement. The problem of these tumors lies in their unpredictable histogenesis, the unexpected presence of fat in the microscopic structure, and in the visual similarity to sarcomas. …”
    Get full text
    Article
  19. 28579
  20. 28580

    Complex program for the prevention of the development and progression of refractive errors in school year children by T.K. Botabekova, N.A. Aldasheva, V.R. Abdullina, I.S. Stepanova, B.I. Isergepova, Zh.S. Iskakbaeva

    Published 2021-09-01
    “…The efficacy of the detection of visual impairments in schoolers during preventive and distant computer screening was compared. In addition, significant indicators for visual impairment monitoring in schoolers were identified.…”
    Get full text
    Article