Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
621
GAZE DIRECTION MONITORING MODEL IN COMPUTER SYSTEM FOR ACADEMIC PERFORMANCE ASSESSMENT
Published 2024-02-01“…The practical novelty of the proposed model of monitoring the direction of gaze in a computer-based knowledge control system lies in the possibility of automated remote control over a large audience of students. …”
Get full text
Article -
622
The Analytical Method to Compute the Strain on the Soft PSD in Double-Pulse SRM
Published 2019-01-01“…In order to obtain the analytical method to compute the circumferential strain on a soft pulse separation device (PSD), deformation processes of the middle section of the soft PSD, the medicine propellant grain and the case are simplified into a two-dimensional plane strain state. …”
Get full text
Article -
623
Text analysis of DNS queries for data exfiltration protection of computer networks
Published 2020-09-01Subjects: Get full text
Article -
624
Correction: Patient-specific computational simulation of coronary artery bypass grafting.
Published 2025-01-01Get full text
Article -
625
COMPUTATIONAL SCREENING TO IDENTIFY GENES INVOLVED IN DNA REPAIR IN ARABIDOPSIS THALIANA
Published 2024-12-01Get full text
Article -
626
Development of a computational model of glucose toxicity in the progression of diabetes mellitus
Published 2016-06-01Subjects: Get full text
Article -
627
Computational Investigation of the Electronic and Optical Properties of Planar Ga-Doped Graphene
Published 2015-01-01Get full text
Article -
628
A Generalized Approach for Computation of Near Field Radiation Pattern of an Antenna
Published 2014-01-01Get full text
Article -
629
Application of Computer Simulation Optimization Algorithm in Waste Treatment of Drilling Engineering
Published 2021-01-01“…The existing computer technology is used to conduct an in-depth study and analysis of drilling waste treatment, and the results are analyzed by computer simulation optimization algorithms. …”
Get full text
Article -
630
The Analyze Comparative of Physics Computational Thinking Skill (CTs) in Experiment Laboratory
Published 2024-07-01Subjects: “…computational thinking, abstraction, decomposition, algorithm thinking, evaluation, & generalization, experiment…”
Get full text
Article -
631
DETERMINATION OF FERRITE-CEMENTITE INTERLAMELLAR SPACINGS IN STEELS, USING COMPUTER TECHNOLOGY
Published 2012-09-01“…The algorithm of determination of an average inter-plate distance according to the computer image of the microstructure, enabling to improve degree of work automation of metallurgist is offered.…”
Get full text
Article -
632
Computational and Bioinformatics Frameworks for Next-Generation Whole Exome and Genome Sequencing
Published 2013-01-01Get full text
Article -
633
Computed Tomography to Estimate the Representative Elementary Area for Soil Porosity Measurements
Published 2012-01-01“…Computed tomography (CT) is a technique that provides images of different solid and porous materials. …”
Get full text
Article -
634
Mandibular Atrophy and Genial Spines Enlargement on Cone Beam Computed Tomography
Published 2014-01-01“…The aim of this paper is to report a case in which the cone beam computed tomography (CBCT) was important for the confirmation of the presence of mandibular atrophy and genial spines enlargement. …”
Get full text
Article -
635
Preface to the Iberoamerican Human-Computer Interaction Conference 2024 Special Issue
Published 2025-02-01“… Preface to the Iberoamerican Human-Computer Interaction Conference 2024 Special Issue …”
Get full text
Article -
636
Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network
Published 2014-01-01“…An SEIQRS model for the transmission of malicious objects in computer network with two delays is investigated in this paper. …”
Get full text
Article -
637
The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures
Published 2013-01-01“…The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). …”
Get full text
Article -
638
Enhancing Railway Maintenance Safety Using Open-Source Computer Vision
Published 2021-01-01“…Images of railway signs, tracks, and maintenance workers on the tracks were recorded through image data. The Computer Vision OpenCV library was utilized to extract the image data. …”
Get full text
Article -
639
Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations
Published 2014-01-01“…A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first. …”
Get full text
Article -
640
Computational Study of Cold-Formed-Steel X-Braced Shear Walls
Published 2018-01-01Get full text
Article