Showing 21 - 40 results of 212 for search 'Instruction (computing)', query time: 0.05s Refine Results
  1. 21
  2. 22

    Problematic issues of using modern information and other technologies in the implementation of investigator’s and interrogator’s instructions by operational units by O. O. Zahumennyi

    Published 2022-03-01
    “…In the conduct of any investigative (searching) activities in practice, in fact, either technical devices and tools or information technology are used in the sense in which they are proposed in the Code and which cause difficulties in use, especially modern latest information technology in the form of computing hardware and software. It is concluded that the appropriate use of modern information technology, open network resources, government or commercial databases, as well as modern approaches to the implementation of the instructions of investigators and interrogators significantly speed up the pre-trial investigation, as operational units have the opportunity to obtain information in a short period of time, using the capabilities of innovative modern technologies. …”
    Get full text
    Article
  3. 23
  4. 24
  5. 25
  6. 26
  7. 27

    Computer literacy of primary school teachers by Orinta Kiseliova

    Published 2003-12-01
    “…Today limited use of computers and lack of instruction programmes. …”
    Get full text
    Article
  8. 28
  9. 29
  10. 30

    TEMPLATE JCEC by Editorial Team/Equipe Editorial JCEC

    Published 2019-03-01
    “…The complete set of instructions for contributors can be downloaded here as a WORD file  updated in Jan. 2019.  …”
    Get full text
    Article
  11. 31

    Matrix computation over homomorphic plaintext-ciphertext and its application by Yang LIU, Linhan YANG, Jingwei CHEN, Wenyuan WU, Yong FENG

    Published 2024-02-01
    “…Those homomorphic encryption schemes supporting single instruction multiple data (SIMD) operations effectively enhance the amortized efficiency of ciphertext computations, yet the structure of ciphertexts leads to high complexity in matrix operations.In many applications, employing plaintext-ciphertext matrix operations can achieve privacy-preserving computing.Based on this, a plaintext-ciphertext matrix multiplication scheme for matrices of arbitrary dimension was proposed.The resulting ciphertext was computed through steps such as encoding the plaintext matrix, transforming the dimensions of the encrypted matrix, etc.Compared to the best-known encrypted matrix multiplication algorithm for square matrices proposed by Jiang et al., the proposed scheme supported matrix multiplication of arbitrary dimension, and consecutive matrix multiplications.Both theoretical analysis and experimental results show that the proposed scheme requires less rotations on ciphertexts and hence features higher efficiency.When applied to a privacy-preserving Bayesian classifier, the proposed scheme can complete classification tasks with higher security parameters and reduced running time.…”
    Get full text
    Article
  12. 32

    Computational Thinking for Science Positions Youth to Be Better Science Learners by Matthew A. Cannady, Melissa A. Collins, Timothy Hurt, Ryan Montgomery, Eric Greenwald, Rena Dorph

    Published 2025-01-01
    “…Computational thinking plays a central and ubiquitous role in many science disciplines and is increasingly prevalent in science instruction and learning experiences. …”
    Get full text
    Article
  13. 33
  14. 34

    Classroom Behavior Recognition Using Computer Vision: A Systematic Review by Qingtang Liu, Xinyu Jiang, Ruyi Jiang

    Published 2025-01-01
    “…Physical actions and learning engagement have been the primary recognition targets; (2) behavioral categorizations have been defined in various ways and lack connections to instructional content and events; (3) existing studies have focused on college students, especially in a natural classical classroom; (4) deep learning was the main recognition method, and the YOLO series was applicable for multiple behavioral purposes; (5) moreover, we identified challenges in experimental design, recognition methods, practical applications, and pedagogical research in computer vision. …”
    Get full text
    Article
  15. 35

    Demystifying early childhood computational thinking: An umbrella review to upgrade the field by Weipeng Yang, Jiahong Su, Hui Li

    Published 2024-12-01
    “…Abstract By transforming abstract problems into tangible solutions, computational thinking (CT) emerges as a foundational competency. …”
    Get full text
    Article
  16. 36

    Detecting Silent Data Corruptions in Aerospace-Based Computing Using Program Invariants by Junchi Ma, Dengyun Yu, Yun Wang, Zhenbo Cai, Qingxiang Zhang, Cheng Hu

    Published 2016-01-01
    “…Soft error caused by single event upset has been a severe challenge to aerospace-based computing. Silent data corruption (SDC) is one of the results incurred by soft error. …”
    Get full text
    Article
  17. 37

    The impact of computer-assisted pronunciation on Saudi students’ production of English vowel sounds by Abdulmohsin A. Alshehri

    Published 2025-01-01
    “… This study aimed to investigate the extent to which computer-assisted pronunciation (CAP) is influential in helping Hijazi students to develop their pronunciation of English vowels within a Saudi English as a foreign language (EFL) context. …”
    Get full text
    Article
  18. 38
  19. 39

    Mining and utilization of network protocol’s stealth attack behavior by Yan-jing HU, Qing-qi PEI

    Published 2017-10-01
    “…The survivability,concealment and aggression of network protocol’s stealth attack behaviors were very strong,and they were not easy to be detected by the existing security measures.In order to compensate for the shortcomings of existing protocol analysis methods,starting from the instructions to implement the protocol program,the normal behavior instruction sequences of the protocol were captured by dynamic binary analysis.Then,the potential stealth attack behavior instruction sequences were mined by means of instruction clustering and feature distance computation.The mined stealth attack behavior instruction sequences were loaded into the general executing framework for inline assembly.Dynamic analysis was implemented on the self-developed virtual analysis platform HiddenDisc,and the security of stealth attack behaviors were evaluated.Excepting to mining analysis and targeted defensive the stealth attack behaviors,the stealth attack behaviors were also formally transformed by the self-designed stealth transformation method,by using the stealth attack behaviors after transformation,the virtual target machine were successfully attacked and were not detected.Experimental results show that,the mining of protocol stealth attack behaviors is accurate,the transformation and use of them to increase information offensive and defensive ability is also feasible.…”
    Get full text
    Article
  20. 40

    Technology Leadership for Pandemic STEMgagement in Computer Science: A PK12 Case Study by Devery J. Rodgers

    Published 2024-12-01
    “…Using an online engagement framework, an ethnographic lens was used with document review, to conduct a content analysis of projects, programs, and services set up through the central office for nearly 20,000 students at the primary, middle grades, and secondary levels in computer sciences. Findings acknowledge leadership’s planning for student engagement in STEM+C (science, technology, engineering, math and computer science) for virtual instruction. …”
    Get full text
    Article