Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
621
Improving of computed tomography images for effective diagnosis of gunshot wounds
Published 2024-11-01Subjects: “…computed tomography…”
Get full text
Article -
622
Multi-objective task offloading algorithm for mobile cloud computing
Published 2019-09-01Subjects: “…mobile cloud computing…”
Get full text
Article -
623
Mechanism of Substrate Activation by Tryptophan Hydroxylase: A Computational Study
Published 2025-01-01“…In this work, we present a computational study ranging from molecular dynamics (MD) to quantum mechanics (QM) methods, focused on the mechanism of tryptophan hydroxylase. …”
Get full text
Article -
624
Approach of service evaluation based on trust reasoning for cloud computing
Published 2011-01-01“…The credibility reasoning and deducing of SC and SP were proposed,which were mainly in the direct trust re-lationship established in interactive process among service entities,the public credibility of the feedback system as a sup-plement.The model used probability density function to represents the credibility of entities based on probability theory,which systematically proposed the reasoning and deducing methods of computing,reasoning and merging based on trust relationship in probability density.Then a new method of correcting QoS of SP entities was provided.Finally,the algo-rithm based on trust reasoning and correcting of QoS service was provided.This model can effectively evaluate the credi-bility of service participants,weakening the influence of unreliable entities in service evaluation and enhancing the quali-ties and accuracy of result in service selection through simulated experiment.…”
Get full text
Article -
625
Application of the Logistics Management System Based on Cloud Computing Technology
Published 2022-01-01“…In order to solve the vehicle routing optimization problem of cold chain logistics distribution, this paper proposes a vehicle routing optimization method of cold chain logistics distribution based on cloud computing technology. This paper analyzes the advantages of processing the real-time routing of distribution vehicles under the cloud computing mode and establishes the application service architecture of vehicle routing optimization in cold chain logistics; under this architecture, multisource real-time traffic information is obtained, the vehicle distribution time and comprehensive cost are analyzed, the vehicle routing optimization model of cold chain logistics distribution is constructed, and the coarse-grained parallel genetic algorithm is used to solve the model in the cloud computing environment. …”
Get full text
Article -
626
An SLBRS Model with Vertical Transmission of Computer Virus over the Internet
Published 2012-01-01Get full text
Article -
627
Computational frameworks transform antagonism to synergy in optimizing combination therapies
Published 2025-01-01“…This review systematically analyzes computational methods for predicting drug combination effects through multi-omics data integration. …”
Get full text
Article -
628
Secure OpenID Authentication Model by Using Trusted Computing
Published 2014-01-01“…Trusted Platform Module (TPM) and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. …”
Get full text
Article -
629
STUDY OF WORKING CONDITIONS ON WORKING PLACES OF ELECTRONIC COMPUTERS USERS
Published 2009-08-01“…The results of investigations of parameters of industrial environment of the personal computers users and recommendations on decrease of influence on the organism of workers are given.…”
Get full text
Article -
630
Construction and optimization of a smart classroom system for emotional computing
Published 2024-06-01Subjects: “…emotional computing…”
Get full text
Article -
631
A Computational Model for Biomechanical Effects of Arterial Compliance Mismatch
Published 2015-01-01“…Compliance mismatch is a negative factor and it needs to be considered in arterial bypass grafting. Objective. A computational model was employed to investigate the effects of arterial compliance mismatch on blood flow, wall stress, and deformation. …”
Get full text
Article -
632
SAPA-based approach for defending DoS attacks in cloud computing
Published 2017-04-01Subjects: “…cloud computing…”
Get full text
Article -
633
Research and application of mining AI video edge computing technology
Published 2024-12-01Subjects: Get full text
Article -
634
Accuracy and operation procedure of robotic computer-aided implant surgery
Published 2025-01-01“…Abstract This study assessed the accuracy of robotic computer-aided implant surgery (rCAIS) in partially edentulous patients using a standard operation procedure. …”
Get full text
Article -
635
A Computational Approach towards the Development of Newer Anticancer Agents
Published 2010-01-01“…In silico molecular docking analyses of the novel 1-(2', 4'-dihydroxy-5'-chlorophenyl)-3-aryl-propane-1, 3-diones were performed in the active sites of enzyme cytochrome P450 reductase to obtain new anticancer agents computationally. 1-(2', 4'-dihydroxy-5'-chlorophenyl)-3-(4"-methoxy-phenyl)-propane-1, 3-dione (3f) was found to have maximum affinity for the active sites of enzyme.…”
Get full text
Article -
636
Simple and Efficient Computational Method to Analyze Cylindrical Plasmonic Nanoantennas
Published 2014-01-01Get full text
Article -
637
Context-aware and self-adaptive trust model for pervasive computing
Published 2012-11-01Subjects: “…pervasive computing…”
Get full text
Article -
638
Distance aware route algorithm for cloud computing based on CAN
Published 2011-01-01Subjects: “…cloud computing…”
Get full text
Article -
639
Application of blockchain in urban rail traffic edge computing network
Published 2021-10-01Subjects: Get full text
Article -
640
Digital Twin in Computational Design and Robotic Construction of Wooden Architecture
Published 2021-01-01“…This study proposes a cyber-physical interconnection method for computational design and robotic construction in a wooden architectural realm. …”
Get full text
Article