Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
661
Retraction: Assisting smart construction with reliable edge computing technology
Published 2025-01-01Get full text
Article -
662
Musical Expectancy. Bridging Music Theory, Cognitive and Computational Approaches
Published 2013-01-01Subjects: Get full text
Article -
663
A Computational Approach to the Perimeter-Area Inequality in a Triangle
Published 2025-01-01Subjects: Get full text
Article -
664
Computer vision syndrome: neuro- and pathophysiological aspects (analytical review)
Published 2024-03-01“…</p> <p> <b>Keywords: </b>computer vision syndrome, dry eye disease, accommodation, pathogenesis, neurophysiology, visual motor integration. …”
Get full text
Article -
665
DYNAMICS OF DETECTED FIRE FACTORS IN CLOSED COMPARTMENT: COMPUTER SIMULATION
Published 2015-12-01“…Computer simulation of the initial fire stages in closed compartment with the volume of ≈ 60 m3 and with a burner on a floor and 2 m above floor have been carried using FDS software. …”
Get full text
Article -
666
Computer-Aided Rapid Establishment of Fingerprint of Xiaojin Capsule by HPLC
Published 2021-01-01“…In this study, we used Xiaojin capsule (XJC) as a case and developed a rapid fingerprint method based on increasing the column temperature and flow rate simultaneously combined with computer-aided. First, the elution gradient was optimized based on the retention parameters and peak shape parameters of the four linear gradients, and then, the column temperature and flow rate were increased simultaneously to shorten the analysis time. …”
Get full text
Article -
667
Approach to remote routing computation and lookup in parallel network simulation
Published 2007-01-01“…A new method which computes remote routing based on the border routers,was presented and finds the appropriate route by comparing the length of routing.It effectively reduces the size of remote routing table,and improves the efficiency of network simulation.Compared with PDNS,it reduces 90 percent of the size of the remote routing table,saves 20 percent of the memory needed during the initialization,and 25 percent of the simulation time.…”
Get full text
Article -
668
RETRACTED: Assisting Smart Construction With Reliable Edge Computing Technology
Published 2022-05-01Subjects: Get full text
Article -
669
Shaping the future of commercial quantum computer and the challenge for information security
Published 2016-03-01Subjects: “…Canadian quantum computer…”
Get full text
Article -
670
Improved Algorithm for ODCT Computation of a Running Data Sequence
Published 2012-01-01“…Journal of Electrical and Computer Engineering…”
Get full text
Article -
671
Evolutionary Algorithms and Quantum Computing: Recent Advances, Opportunities, and Challenges
Published 2025-01-01Subjects: Get full text
Article -
672
Optimization strategies in NOMA-based vehicle edge computing network
Published 2021-03-01Subjects: “…edge computing…”
Get full text
Article -
673
-
674
Evaluating the Utilization of the National Cancer Institute Computed Tomography Program for Calculating Size-specific Dose Estimate and Effective Dose in Computed Tomography in Thai Pediatric Patients
Published 2024-12-01Subjects: “…national cancer institute computed tomography…”
Get full text
Article -
675
Maritime mobile edge computing offloading method based on deep reinforcement learning
Published 2022-10-01Subjects: Get full text
Article -
676
Optimizing strategy of computing off loading energy consumption based on Lagrangian method
Published 2018-12-01Subjects: “…edge computing…”
Get full text
Article -
677
Scheme of virtual machine trusted migration in cloud environment
Published 2018-01-01Subjects: “…trusted computing…”
Get full text
Article -
678
Approach for distributed BPEL engine placement using K-means
Published 2014-05-01Subjects: Get full text
Article -
679
Method of ciphertext retrieval in mobile edge computing based on block segmentation
Published 2020-07-01Subjects: “…cloud computing…”
Get full text
Article -
680
Research on two-phase grid task scheduling based on Petri nets
Published 2009-01-01Subjects: “…grid computing…”
Get full text
Article