Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
941
Diagnostic criteria for asthenic accommodative asthenopia in patients with computer vision syndrome
Published 2020-11-01“…</i> </p> <p> <i><b>Keywords</b>: asthenopia, computer vision syndrome, accommodation, objective accommodography.…”
Get full text
Article -
942
Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network
Published 2014-01-01“…An SEIQRS model for the transmission of malicious objects in computer network with two delays is investigated in this paper. …”
Get full text
Article -
943
The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures
Published 2013-01-01“…The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). …”
Get full text
Article -
944
Enhancing Railway Maintenance Safety Using Open-Source Computer Vision
Published 2021-01-01“…Images of railway signs, tracks, and maintenance workers on the tracks were recorded through image data. The Computer Vision OpenCV library was utilized to extract the image data. …”
Get full text
Article -
945
Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations
Published 2014-01-01“…A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first. …”
Get full text
Article -
946
Measurements and Analytical Computer-Based Study of CMOS Inverters and Schmitt Triggers
Published 1996-01-01“…Complete detailed theoretical, experimental and computer based results are derived and exhibited.…”
Get full text
Article -
947
Algorithm design on energy efficiency maximization for UAV-assisted edge computing
Published 2020-10-01Subjects: Get full text
Article -
948
On Computation and Analysis of Topological Index-Based Invariants for Complex Coronoid Systems
Published 2021-01-01“…Explicitly, this tremendous improvement has been outstanding in the field of soft computing, molecular biology, and information technology. …”
Get full text
Article -
949
Identification of Levothyroxine Antichagasic Activity through Computer-Aided Drug Repurposing
Published 2014-01-01Get full text
Article -
950
First-order phase transition of the Schwinger model with a quantum computer
Published 2025-01-01Get full text
Article -
951
Multi-camera video collaborative analysis method based on edge computing
Published 2023-08-01Subjects: “…edge computing…”
Get full text
Article -
952
An Efficient Computation of Effective Ground Range Using an Oblate Earth Model
Published 2014-01-01Get full text
Article -
953
Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity
Published 2022-09-01Subjects: “…algorithm, combinatorics, computation, multinomial coefficient…”
Get full text
Article -
954
Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment
Published 2021-01-01“…Finally, based on the impact of cloud computing, mobile e-commerce is analyzed, including relevant theories, service mode, architecture, core technology, and the application in e-commerce, which can realize e-commerce precision marketing, find the optimal path of logistics, and take effective security measures to avoid transaction risks. …”
Get full text
Article -
955
Computer-Aided Modelling and Analysis of PV Systems: A Comparative Study
Published 2014-01-01“…The work presented in this paper aims on a first level at the performance analysis of various configurations of photovoltaic systems through computer-aided modelling. On a second level, it provides a comparative evaluation of the credibility of two of the most advanced graphical programming environments, namely, Simulink and LabVIEW, with regard to their application in photovoltaic systems.…”
Get full text
Article -
956
Multi-Tier Blockchain-Based Land Registry Using Fog Computing
Published 2025-01-01Subjects: Get full text
Article -
957
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01“…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
Get full text
Article -
958
Similarity Learning and Generalization with Limited Data: A Reservoir Computing Approach
Published 2018-01-01“…We present two Reservoir Computing architectures, which loosely resemble neural dynamics, and show that a Reservoir Computer (RC) trained to identify relationships between image pairs drawn from a subset of training classes generalizes the learned relationships to substantially different classes unseen during training. …”
Get full text
Article -
959
Usability of Computer-Aided Translation Software Based on Deep Learning Algorithms
Published 2022-01-01“…In recent years, due to the development of computer technology and information technology, web technology has changed the mode of translation at an alarming rate. …”
Get full text
Article -
960
Perancangan Aplikasi Computer based Test (CBT) Psikotes Berbasis Website
Published 2022-10-01“…Maka, perlu dibangun aplikasi Computer Based Test (CBT) psikotes. Aplikasi ini dapat diikuti oleh peserta umum maupun pelajar. …”
Get full text
Article