Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
1221
Reliable and robust robotic handling of microplates via computer vision and touch feedback
Published 2025-01-01Subjects: Get full text
Article -
1222
Computer Axial Tomography and evoked potentials as predictors of clinical improvement in cranioencephalic trauma.
Published 2009-03-01“…<br /><strong>Objective: </strong>To assess the effectiveness of Computer Axial Tomography and evoked potentials to predict clinical improvement six moths after cranioencephalic trauma. …”
Get full text
Article -
1223
Bifid Mandibular Canal: A Proportional Meta-Analysis of Computed Tomography Studies
Published 2023-01-01“…In vivo, computed tomography, and cross-sectional studies were eligible. …”
Get full text
Article -
1224
Research on heterogeneous radio access and resource allocation algorithm in vehicular fog computing
Published 2019-06-01“…With the development of intelligent transportation and the constant emergence of new vehicular on-board applications,such as automatic driving,intelligent vehicular interaction and safety driving.It is difficult for an independent vehicle to run a wide variety of applications with a large number of computing needs and time delay needs relying on its own limited computing resources.By distributing computing tasks in devices on the edge of the network,fog computing applies virtualization technology,distributed computing technology and parallel computing technology to enable users to dynamically obtain computing power,storage space and other services on demand.Applying fog computing architecture to Internet of vehicles can effectively alleviate the contradiction between the large computing-low delay demands and limited vehicular resources.By analyzing the channel capacity of vehicle-to-vehicle communication,vehicle-infrastructure communication and vehicle-time-delay tolerant network communication,an optimization model of heterogeneous access to multi-service resources for the Internet of vehicles was established,and various vehicle-to-fog resources were jointly dispatched to realize efficient processing of intelligent transportation applications.The simulation results show that the proposed reinforcement learning algorithm can effectively deal with the resource allocation in the heterogeneous vehicular fog architecture.…”
Get full text
Article -
1225
James E. Dobson, The Birth of Computer Vision, University of Minnesota Press, 2023
Published 2025-02-01Get full text
Article -
1226
Research on asynchronous robust federated learning method in vehicle computing power network
Published 2024-12-01Subjects: “…vehicle computing power network…”
Get full text
Article -
1227
Three-Dimensional Measurement of TRISO Coated Particle Using Micro Computed Tomography
Published 2019-01-01“…The fuel safety and performance of high-temperature gas-cooled reactor (HTGR) are dependent on the integrity and geometric parameter of Tri-structural Isotropic (TRISO) coated particle. Micro X-ray computed tomography (CT) was used for nondestructive testing and three-dimensional measurement of the particle components which are composed of kernel, buffer layer, inner pyrolytic carbon layer (IPyC), silicon carbide (SiC) layer, and outer pyrolytic carbon (OPyC) layer. …”
Get full text
Article -
1228
Data outsourcing authentication model based on authenticated data structures for cloud computing
Published 2011-01-01Subjects: “…cloud computing…”
Get full text
Article -
1229
Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme
Published 2016-11-01Subjects: “…outsourcing cloud computing…”
Get full text
Article -
1230
Edge computing smart grid resource scheduling algorithm based on reinforcement learning
Published 2024-01-01Subjects: Get full text
Article -
1231
Intelligent information systems for power grid fault analysis by computer communication technology
Published 2025-01-01Subjects: Get full text
Article -
1232
Multi-authority attribute-based encryption with efficient user revocation in cloud computing
Published 2016-02-01Subjects: “…cloud computing…”
Get full text
Article -
1233
Space-Air-Ground Integrated Network Architecture Based on Mobile Edge Computing
Published 2024-03-01Subjects: Get full text
Article -
1234
Young Consumers’ Usability Preferences for Mobile and Computer Screens for Online Shopping Activities
Published 2023-01-01Get full text
Article -
1235
Fast and low‐power leading‐one detectors for energy‐efficient logarithmic computing
Published 2021-07-01“…IET Computers & Digital Techniques…”
Get full text
Article -
1236
The role of computer-mediated communication in the research process of music Sscholars: an exploratory investigation
Published 2001-01-01Subjects: Get full text
Article -
1237
An Efficient Policy-Based Scheduling and Allocation of Virtual Machines in Cloud Computing Environment
Published 2022-01-01“…Journal of Electrical and Computer Engineering…”
Get full text
Article -
1238
Retracted: Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment
Published 2024-01-01Get full text
Article -
1239
Investigation on Computing Method of Martian Dust Fluid Based on the Energy Dissipation Method
Published 2020-01-01“…The results verified the accuracy of the energy dissipation model and the stochastic model, which could also verify the feasibility and effectiveness of the computing method of Martian dust fluid based on the DEM-CFD technology.…”
Get full text
Article -
1240
Nested derivatives: a simple method for computing series expansions of inverse functions
Published 2003-01-01“…We give an algorithm to compute the series expansion for the inverse of a given function. …”
Get full text
Article