Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
3221
An interpretable machine learning model based on computed tomography radiomics for predicting programmed death ligand 1 expression status in gastric cancer
Published 2025-03-01“…Here, we developed and validated an interpretable machine learning (ML) model based on contrast-enhanced computed tomography (CECT) radiomics for preoperatively predicting PD-L1 expression status in patients with gastric cancer (GC). …”
Get full text
Article -
3222
-
3223
Effects of Computer-Assisted Working Memory Training Programme on Working Memory Ability and Mathematical Performance of Children at Risk of Mathematical Learning Difficulties
Published 2024-08-01“…The purpose of this study was to investigate the effect of a computer-assisted working memory training programme on the working memory ability and mathematical performance of children at risk of mathematical learning difficulties. …”
Get full text
Article -
3224
-
3225
Construction and Evaluation of Scenarios as a Learning Strategy through Modelling-Simulation
Published 2014-12-01“…The inclusion of new computing and communication resources to the learning process turns them into teaching tools, which makes it possible to organize the teaching and learning process in a different way. …”
Get full text
Article -
3226
Comparative Study on Performance Evaluation of Eager versus Lazy Learning Methods
Published 2024-12-01Get full text
Article -
3227
Evaluating the Power Systems Reliability by Developing Reliability Network Equivalent Techniques
Published 2024-02-01“…Finally, RTS IEEE is used as the sample network in order to evaluate the efficiency of the proposed algorithm. …”
Get full text
Article -
3228
Comprehensive dataset for performance evaluation of SCM-blended concreteMendeley Data
Published 2025-06-01Get full text
Article -
3229
Bit‐level evaluation of piccolo block cipher by satisfiability problem solver
Published 2023-07-01“…Designers have undergone a rough security evaluation against differential, impossible differential, and related‐key differential attacks, based on nibble‐wise estimations due to the limitation of computational resource. …”
Get full text
Article -
3230
Evaluation of microplate handling accuracy for applying robotic arms in laboratory automation
Published 2024-12-01Get full text
Article -
3231
Efficiency Evaluation in Indonesia's Quarrying Industry Using Variable Combinations DEA
Published 2024-10-01“…DEA and variable selection are important in performance evaluation because DEA aids in determining relative efficiency, whereas variable selection guarantees that the evaluation is based on the most relevant and significant aspects. …”
Get full text
Article -
3232
Exploration of the Efficiency of SLM-Enabled Platforms for Everyday Tasks
Published 2025-04-01“…The study concludes that SLMs offer an optimal trade-off between performance and computational efficiency, particularly in environments where data security and resource constraints are critical. …”
Get full text
Article -
3233
Scheme of Attribute-Based Disclosure Mobile Trust Negotiation
Published 2013-10-01“…For it is difficult to use traditional trust negotiation on the mobile environment,which has large communication overhead,storage overhead and computational overhead,an attribute-based disclosure mobile trust negotiation scheme was proposed.In the negotiation process,two sides in trust negotiation exchange certificate which contains encrypted credential attributes firstly,then,one side in trust negotiation can selectively dispose the sensitive attributes to the other side in trust negotiation procedure based on the trust evaluation result of the other,next,two sides in trust negotiation exchange attribute encryption key based on personal security policy until the trust negotiation was completed.The implementation procedure was given in concrete application instances and the scheme was analyzed.…”
Get full text
Article -
3234
-
3235
-
3236
Study of the Acoustic Suitability of an Open Plan Office Based on STI and DL2 Simulations
Published 2013-10-01“…This evaluation was performed through a computational model calibrated from a real office. …”
Get full text
Article -
3237
-
3238
Development of Land Consolidation Studies in Türkiye (1961-2004)
Published 2025-03-01“…This study aims to comprehensively evaluate land consolidation studies carried out in Türkiye between 1961 and 2004. …”
Get full text
Article -
3239
Frozen semen quality of Pasundan bulls with different individual variations
Published 2025-01-01“…Sperm motility was assessed using computer-assisted sperm analysis (CASA; SpermVision®, Germany). …”
Get full text
Article -
3240
Congestion control strategy of VANET channel based on load prediction
Published 2022-03-01Get full text
Article