Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
741
A Coscaling Grid for Athena++. II. Magnetohydrodynamics
Published 2025-01-01Subjects: “…Computational methods…”
Get full text
Article -
742
Playing hide and seek with primates: A comparative study of Theory of Mind
Published 2015-03-01Subjects: Get full text
Article -
743
Time-Efficient Contact Consistent Whole-Body Control Framework via Reduced-Dimension Dynamics Construction
Published 2025-01-01Subjects: Get full text
Article -
744
High-throughput tracking enables systematic phenotyping and drug repurposing in C. elegans disease models
Published 2025-01-01Subjects: “…computational ethology…”
Get full text
Article -
745
-
746
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection
Published 2019-01-01“…The feasibility of utilizing Granular Computing (GC) as a solution to the most current challenges in cybersecurity is researched. …”
Get full text
Article -
747
Real-Time Evaluation of Breast Self-Examination Using Computer Vision
Published 2014-01-01“…The general objective of this paper is to design and develop a computer vision algorithm to evaluate the BSE performance in real-time. …”
Get full text
Article -
748
The Assessment of Spinal Alignment Based on a Computer-Assisted Electromechanical Device
Published 2024-12-01“…Subsequently, the data was transmitted to a computer over a Bluetooth module connection, following processing by the Arduino Nano microcontroller. …”
Get full text
Article -
749
Post-processing methods for delay embedding and feature scaling of reservoir computers
Published 2025-01-01“…Abstract Reservoir computing is a machine learning method that is well-suited for complex time series prediction tasks. …”
Get full text
Article -
750
Efficient Online Dynamic Allocation Algoritbm of Virtual Macbine in Cloud Computing
Published 2015-04-01Subjects: “…cloud computing…”
Get full text
Article -
751
CLOUD COMPUTING AND FINANCIAL PERFORMANCE OF LISTED DEPOSIT MONEY BANKS IN NIGERIA
Published 2024-12-01Subjects: Get full text
Article -
752
Correlation of Image Quality Metrics with Expert Perception for Industrial Computed Tomography
Published 2025-02-01“…This study contributes to a deeper understanding of the relationship between objective image quality metrics and subjective human perception in the context of industrial computed tomography. …”
Get full text
Article -
753
Computation of the topological entropy in chaotic biophysical bursting models for excitable cells
Published 2006-01-01Get full text
Article -
754
Identity-based cross-domain authentication scheme in pervasive computing environments
Published 2011-01-01Subjects: “…pervasive computing…”
Get full text
Article -
755
Computationally Efficient Minimum-Time Motion Primitives for Vehicle Trajectory Planning
Published 2024-01-01“…In autonomous racing, motion primitives have been used as computationally faster alternatives to model predictive control, for online obstacle avoidance. …”
Get full text
Article -
756
Computer modeling of Vilnius University finance management in a process of studies
Published 2023-09-01“… In this work a computer simulation of Vilnius University financial management is completed. …”
Get full text
Article -
757
Empowering drones in vehicular network through fog computing and blockchain technology.
Published 2025-01-01“…Fog nodes strategically placed near IoT devices serve as computational resources for drones, ensuring quick service responses for deadline-driven tasks. …”
Get full text
Article -
758
Improved Harmony Search Algorithm to Compute the Underfrequency Load Shedding Parameters
Published 2022-01-01“…This paper introduces a novel method to compute an optimally parametrized conventional UFLS scheme in specific given operating conditions by formulating it as a constrained problem and using the Improved Harmony Search (IHS) algorithm to solve it. …”
Get full text
Article -
759
Comparative analysis of computing platforms for onboard micromodule of provisional image recognition
Published 2018-09-01“…This paper is devoted to the analysis of basic hardware and software of recent cheap and commercially available computing microplatforms for selecting an appropriate solution for development of an onboard micromodule for preliminary recognition and selection of images of underlying surface of given types. …”
Get full text
Article -
760
Secure outsource computing scheme of modular exponentiation based on single server
Published 2018-01-01Subjects: “…cloud computing…”
Get full text
Article