Showing 621 - 640 results of 21,428 for search '"computing"', query time: 0.08s Refine Results
  1. 621

    GAZE DIRECTION MONITORING MODEL IN COMPUTER SYSTEM FOR ACADEMIC PERFORMANCE ASSESSMENT by Olesia Barkovska, Yaroslav Liapin, Tetiana Muzyka, Ihor Ryndyk, Pavlo Botnar

    Published 2024-02-01
    “…The practical novelty of the proposed model of monitoring the direction of gaze in a computer-based knowledge control system lies in the possibility of automated remote control over a large audience of students. …”
    Get full text
    Article
  2. 622

    The Analytical Method to Compute the Strain on the Soft PSD in Double-Pulse SRM by Chunguang Wang, Guiyang Xu

    Published 2019-01-01
    “…In order to obtain the analytical method to compute the circumferential strain on a soft pulse separation device (PSD), deformation processes of the middle section of the soft PSD, the medicine propellant grain and the case are simplified into a two-dimensional plane strain state. …”
    Get full text
    Article
  3. 623
  4. 624
  5. 625
  6. 626
  7. 627
  8. 628
  9. 629

    Application of Computer Simulation Optimization Algorithm in Waste Treatment of Drilling Engineering by Chang Shu, JiChuan Zhang

    Published 2021-01-01
    “…The existing computer technology is used to conduct an in-depth study and analysis of drilling waste treatment, and the results are analyzed by computer simulation optimization algorithms. …”
    Get full text
    Article
  10. 630

    The Analyze Comparative of Physics Computational Thinking Skill (CTs) in Experiment Laboratory by Suritno Fayanto, Sul Daeng Naba, Aris Kurniawan, Utami Putri, Veronika Dua Padang

    Published 2024-07-01
    Subjects: “…computational thinking, abstraction, decomposition, algorithm thinking, evaluation, & generalization, experiment…”
    Get full text
    Article
  11. 631

    DETERMINATION OF FERRITE-CEMENTITE INTERLAMELLAR SPACINGS IN STEELS, USING COMPUTER TECHNOLOGY by D. A. Novick

    Published 2012-09-01
    “…The algorithm of determination of an average inter-plate distance according to the computer image of the microstructure, enabling to improve degree of work automation of metallurgist is offered.…”
    Get full text
    Article
  12. 632
  13. 633

    Computed Tomography to Estimate the Representative Elementary Area for Soil Porosity Measurements by Jaqueline Aparecida Ribaski Borges, Luiz Fernando Pires, André Belmont Pereira

    Published 2012-01-01
    “…Computed tomography (CT) is a technique that provides images of different solid and porous materials. …”
    Get full text
    Article
  14. 634

    Mandibular Atrophy and Genial Spines Enlargement on Cone Beam Computed Tomography by Marcelo Lupion Poleti, Christiano Oliveira-Santos, Luciana Maria Paes da Silva Ramos Fernandes, Izabel Regina Fischer Rubira-Bullen

    Published 2014-01-01
    “…The aim of this paper is to report a case in which the cone beam computed tomography (CBCT) was important for the confirmation of the presence of mandibular atrophy and genial spines enlargement. …”
    Get full text
    Article
  15. 635

    Preface to the Iberoamerican Human-Computer Interaction Conference 2024 Special Issue by Maria Amelia Eliseo, Valéria Farinazzo Martins

    Published 2025-02-01
    “… Preface to the Iberoamerican Human-Computer Interaction Conference 2024 Special Issue …”
    Get full text
    Article
  16. 636

    Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network by Zizhen Zhang, Huizhong Yang

    Published 2014-01-01
    “…An SEIQRS model for the transmission of malicious objects in computer network with two delays is investigated in this paper. …”
    Get full text
    Article
  17. 637

    The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures by Ajit Narayanan, Yi Chen, Shaoning Pang, Ban Tao

    Published 2013-01-01
    “…The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). …”
    Get full text
    Article
  18. 638

    Enhancing Railway Maintenance Safety Using Open-Source Computer Vision by Donghee Shin, Jangwon Jin, Jooyoung Kim

    Published 2021-01-01
    “…Images of railway signs, tracks, and maintenance workers on the tracks were recorded through image data. The Computer Vision OpenCV library was utilized to extract the image data. …”
    Get full text
    Article
  19. 639

    Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations by Hang Tu, Debiao He, Baojun Huang

    Published 2014-01-01
    “…A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first. …”
    Get full text
    Article
  20. 640