Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
2841
The Possibility of Including “Inverted” Educational Resources in the Professional Training of Future Teachers of Mathematics and Computer Science
Published 2022-11-01“…Potentially, the inclusion of tasks for the design, development, expertise, practical use and evaluation of “inverted” educational resources in the professional training of future teachers of mathematics and computer science can create conditions conducive to the formation of competencies of future teachers to create a comprehensive educational process in a digital environment. …”
Get full text
Article -
2842
Lipid vesicle shape analysis from populations using light video microscopy and computer vision.
Published 2014-01-01“…We present a method for giant lipid vesicle shape analysis that combines manually guided large-scale video microscopy and computer vision algorithms to enable analyzing vesicle populations. …”
Get full text
Article -
2843
Recognition of underlying surface using a convolutional neural network on a single-board computer
Published 2020-09-01“…The provided information could be useful for engineers and researchers who are developing compact budget mobile systems for processing, analyzing and recognition of images.…”
Get full text
Article -
2844
Incidental Intracranial Aneurysm in a Dog Detected by 16-Multidetector Row Computed Tomography Angiography
Published 2013-01-01“…The clinicopathological analysis revealed leukocytosis, and increased haptoglobin and C-reactive protein consistent with severe flogistic process. Nonenhanced computed tomography of the brain and cervical spine showed a diffuse encephalopathy and moderate cervical syringohydromyelia. …”
Get full text
Article -
2845
The influence of mind mapping on computational thinking skills and self-efficacy in students’ learning of graphical programming
Published 2024-12-01“…This study introduces mind mapping into graphical programming to visualize the cognitive process of computational thinking, aiming to enhance students’ computational thinking skills. …”
Get full text
Article -
2846
Model Based Control System Design Using SysML, Simulink, and Computer Algebra System
Published 2013-01-01“…The authors demonstrate how they can integrate a SysML modeling tool (IBM Rational Rhapsody) with a proprietary simulation tool (MathWorks Simulink) and a Computer Algebra System (CAS) to validate system specification. …”
Get full text
Article -
2847
Flow boiling of R448 A inside mini-channel: an integrated experimental and computational investigation
Published 2025-05-01“…A correlation will be provided as a basis for comparison with Computational data. A new mass transfer model for non-azeotropic mixture was developed and applied to simulate the boiling mechanism of R448A. …”
Get full text
Article -
2848
Research and application of innovative models for public data integration based on secure multi-party computation
Published 2023-11-01“…Secure multi-party computation is widely used in finance, the Internet, and other fields to solve the problem of "data silos", but its application in the field of public data is not yet mature.An innovative model for public data integration based on secure multi-party computation was proposed, and a technical architecture for joint computing using public data from different parties while protecting their private information was presented.The model breaks through institutional constraints through technological innovation, achieving a balance between improving data value and ensuring data security.Three sub-layers of the core system of secure multi-party computation in the proposed model, including the joint computation substructure layer, the secure relational algebra layer, and the basic operator layer of secure multi-party computation were mainly analyzed.Additionally, a general process for implementing the innovative model was presented, and the practical application of the innovative model was also discussed.The results of this study provide a new reference for promoting digital China construction and facilitating the flow of data resources.…”
Get full text
Article -
2849
Computational Modeling of Ganglion Cell Bicolor Opponent Receptive Fields and FPGA Adaptation for Parallel Arrays
Published 2024-08-01“…In this paper, we focus on the K, M and P pathways of visual signal processing from the retina to the lateral geniculate nucleus (LGN). …”
Get full text
Article -
2850
A detailed study of α-relaxation in epoxy/carbon nanoparticles composites using computational analysis
Published 2012-02-01Get full text
Article -
2851
Analysis of Comprehensive Artificial Neural Network Computer Media Aided Construction of Economic Forecasting Model
Published 2022-01-01“…ANN is an abstract model of the human brain neuronal network based on the information-processing perspective and composed of different networks to achieve a specific representation of logical strategies. …”
Get full text
Article -
2852
Advancing Computational Humor: LLaMa-3 Based Generation with DistilBert Evaluation Framework
Published 2025-01-01“…Humor generation presents significant challenges in the field of natural language processing, primarily due to its reliance on cultural backgrounds and subjective interpretations. …”
Get full text
Article -
2853
-
2854
Learner Use of Holistic Language Units in Multimodal, Task-Based Synchronous Computer-Mediated Communication
Published 2009-06-01“…Implications explain how tasks might mitigate the potential processing overload that multimodal materials could incur.…”
Get full text
Article -
2855
-
2856
Regenerative Endodontic Treatment of an Infected Immature Dens Invaginatus with the Aid of Cone-Beam Computed Tomography
Published 2014-01-01“…A diagnosis of dens invaginatus (Oehler’s type III) and a large periapical lesion was established with the aid of cone-beam computed tomography (CBCT). In the presented case contrary to the classic revascularization protocol, mechanical instrumentation was performed which apparently did not interfere with the regeneration process. …”
Get full text
Article -
2857
Reproducibility Experimentation among Computer-Aided Inspection Software from a Single Point Cloud
Published 2019-01-01“…A benchmark was therefore developed to compare the algorithm performance of three computer-aided inspection (CAI) software programs. …”
Get full text
Article -
2858
Microstructural X-Ray Computed Tomography Investigation of the Defect Evolution in Refractory Castings Based on Andalusite
Published 2024-12-01“…X-ray computed tomography (XRT) has gradually established its position as a non-destructive and, therefore, reproducible three-dimensional (3D) investigation technique, allowing for material- and geometry-independent applications. …”
Get full text
Article -
2859
Move Over Law Compliance Analysis Utilizing a Deep Learning Computer Vision Approach
Published 2025-02-01Get full text
Article -
2860
A full-stack memristor-based computation-in-memory system with software-hardware co-development
Published 2025-03-01“…Abstract The practicality of memristor-based computation-in-memory (CIM) systems is limited by the specific hardware design and the manual parameters tuning process. …”
Get full text
Article