Suggested Topics within your search.
Suggested Topics within your search.
- Application software 4
- Civil war 2
- Computer-assisted instruction 2
- Development 2
- Economic aspects 2
- Economic development 2
- Education, Elementary 2
- Educational technology 2
- Information technology 2
- Internet in education 2
- Internet in public administration 2
- Nursing 2
- Nursing Assessment 2
- Nursing Care 2
- Perioperative Nursing 2
- Political aspects 2
- Public administration 2
- Surgical nursing 2
- computer 2
- Academic writing 1
- Access control 1
- Automobiles 1
- CAD System Software 1
- Censorship 1
- Computer software 1
- Digital techniques 1
- Digital watermarking 1
- Digitale Photographie 1
- Dissertations, Academic 1
- Engineering 1
-
1221
Breast mass lesion area detection method based on an improved YOLOv8 model
Published 2024-10-01Get full text
Article -
1222
Modelling of statically loaded single pile taking into account nonlinearity of foundation soil
Published 2023-09-01“…With the help of modern software packages, it is possible to carry out more accurate calculations. …”
Get full text
Article -
1223
A lung nodule segmentation model based on the transformer with multiple thresholds and coordinate attention
Published 2024-12-01Get full text
Article -
1224
-
1225
Connecting Patterns Inspire Link Prediction in Complex Networks
Published 2017-01-01Get full text
Article -
1226
-
1227
Optimisation of sparse deep autoencoders for dynamic network embedding
Published 2024-12-01Get full text
Article -
1228
PhiloLogic4: An Abstract TEI Query System
Published 2013-06-01“…A common problem for TEI software development is that projects develop their own custom software stack to address the semantic intricacies present in a deeply-encoded TEI corpus. …”
Get full text
Article -
1229
Comparison of numerical model, neural intelligent and GeoStatistical in estimating groundwater table
Published 2018-03-01“…In this study, MODFLOW numerical code in GMS software, artificial neural network (ANN) and neural – fuzzy (CANFIS) method in NeuroSolution software, wavelet-neural method in MATLAB software and geostatistical method in ArcGIS software were used. …”
Get full text
Article -
1230
Estimation of Biochemical Oxygen Demand Based on Dissolved Organic Carbon, UV Absorption, and Fluorescence Measurements
Published 2013-01-01“…This study was performed to develop software sensors to predict the BOD5 of river water and wastewater. …”
Get full text
Article -
1231
A Biometric Key Establishment Protocol for Body Area Networks
Published 2011-08-01Get full text
Article -
1232
-
1233
Numerical Simulation of Surface Movement and Deformation Caused by Underground Mining with Complex Stratigraphic Boundary
Published 2021-01-01“…The interface program of finite element software based on surface spline interpolation is developed by using MATLAB software. …”
Get full text
Article -
1234
CMTG: A Content-Based Mobile Tendency Geocast Routing Protocol in Urban Vehicular Networks
Published 2015-03-01Get full text
Article -
1235
Quantum GIS (QGIS): An introduction to a free alternative to more costly GIS platforms
Published 2020-03-01“… Geographic information system (GIS) software packages can be prohibitively expensive, causing many to shy away from mapping and spatial analysis. …”
Get full text
Article -
1236
Study on Chaotic Fault Tolerant Synchronization Control Based on Adaptive Observer
Published 2014-01-01Get full text
Article -
1237
G-O vulnerability forecasting model and its improvement based on loss
Published 2015-12-01“…Each index to measure the vulnerability was analyzed.A mathematical definition of strong security was proposed,and the loss measurement and forecasting of vulnerability were used to solve the problem of software dependability uniform dimension.At the same time,loss occurrence law and the number of vulnerabilities found similarities between the law were discussed,to determine whether the use of software defect prediction model to predict the amount of loss.By referring to the classical G-O model,the predictive model of software loss was established,namely model was developed to predict the loss of G-O based vulnerabilities,and the accuracy of the model and the practicability of the test by using the actual data in the vulnerability database.…”
Get full text
Article -
1238
Comparison of the Wiener and Kirchhoff Indices of Random Pentachains
Published 2021-01-01Get full text
Article -
1239
Penerapan Mekanisme Continuous Deployment dalam Pengembangan dan Pembaruan Perangkat Lunak Sistem Benam Berbasis Internet of Things
Published 2022-06-01“…Dari permasalahan tersebut, maka dibuatlah penelitian ini mengenai pembaruan software pada perangkat IoT menggunakan continuous deployment yang dilakukan di cloud. …”
Get full text
Article -
1240
تشریعات الملکیة الفکریة فى حمایة البرمجیات فى الجمهوریة الیمنیة :دراسة میدانیة
Published 2016-07-01“…This study deals with the legislation on intellectual property rights inthe Republic of Yemen, with a focus on the development of legislation toprotect software, and the position of the Republic of Yemen of internationalconventions relating to the protection of intellectual property rights .This,as well as to identify the types of software that guaranteed by the Yemenilaw protection, And pictures of the attack on the Rights of the author insoftware, And what are the penalties, In addition the paper try todetermining the bodies responsible for the protection of copyright . …”
Get full text
Article