Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
761
A Data Quality Control Program for Computer-Assisted Personal Interviews
Published 2012-01-01“…We utilize data collected annually for two years from computer-assisted personal interviews with 3004 healthcare aides. …”
Get full text
Article -
762
Diagnostic Potential of Multidetector Computed Tomography for Characterizing Small Renal Masses
Published 2015-01-01Get full text
Article -
763
Analysis of Hydrologic and Hydraulic Computation of Drainage Plan for Fuchong Industrial Zone
Published 2005-01-01Get full text
Article -
764
Heterogeneous resource cooperative game in space-ground computing power network
Published 2023-12-01Subjects: “…space-ground computing power network…”
Get full text
Article -
765
Application of Motor Imagery Brain-Computer Interface in Rehabilitation of Neurological Diseases
Published 2023-12-01Subjects: “…motor imagery brain-computer interface…”
Get full text
Article -
766
Data comparable encryption scheme based on cloud computing in Internet of things
Published 2018-04-01“…The previously proposed short comparable encryption (SCE) scheme can infer the plaintext relationship by comparing the ciphertexts relationship as well as ensuring data security in Internet of things.Unfortunately,it will incur high storage and computational burden during the process of comparing ciphertexts and generating tokens.To this end,an efficient short comparable encryption scheme called SCESW was proposed,which was utilizing the sliding window method with the same size window.Formal security analysis shows that the scheme can guarantee weak indistinguishability in standard model as well as data security and integrity.The experimental results demonstrate that the storage of the SCESW scheme is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mi>t</mi> </mfrac> <mo stretchy="false">(</mo><mi>t</mi><mi>></mi><mn>1</mn><mo stretchy="false">)</mo></math></inline-formula> times shorter than that of the SCE scheme and the efficiency of the SCESW scheme is superior to that of the SCE scheme.…”
Get full text
Article -
767
Cosmic Reionization on Computers: The Evolution of the Ionizing Background and Mean Free Path
Published 2025-01-01“…In this study, we utilize the Cosmic Reionization on Computers (CROC) simulations, which have both sufficient spatial resolution to resolve galaxy formation and LLSs alongside a fully coupled radiative transfer, to simulate the reionization processes. …”
Get full text
Article -
768
Optoelectronic array of photodiodes integrated with RRAMs for energy-efficient in-sensor computing
Published 2025-01-01“…Abstract The rapid development of internet of things (IoT) urgently needs edge miniaturized computing devices with high efficiency and low-power consumption. …”
Get full text
Article -
769
Uncovering the Binding Mechanism of Mutated Omicron Variants via Computational Strategies
Published 2025-01-01Get full text
Article -
770
Computation of displacements for nonlinear elastic beam models using monotone iterations
Published 1988-01-01“…Using monotone methods, we discuss stability and instability of solutions. We present computations, which suggest efficiency of monotone methods for fourth order boundary value problems.…”
Get full text
Article -
771
Recent Advances in Thoracic X-Ray Computed Tomography for Pulmonary Imaging
Published 2014-01-01“…The present article reviews recent advances in pulmonary computed tomography (CT) imaging, focusing on the application of dual-energy CT and the use of iterative reconstruction. …”
Get full text
Article -
772
The Transcriptional Network Structure of a Myeloid Cell: A Computational Approach
Published 2017-01-01Get full text
Article -
773
Computer-Aided Design of Elliptically Focused Bootlace Lens for Multiple Beams
Published 2007-01-01Get full text
Article -
774
Qualitative and Computational Analysis of a Mathematical Model for Tumor-Immune Interactions
Published 2012-01-01Get full text
Article -
775
The “Chimera”: An Off-The-Shelf CPU/GPGPU/FPGA Hybrid Computing Platform
Published 2012-01-01“…International Journal of Reconfigurable Computing…”
Get full text
Article -
776
Influence of partitioning methods on computational cost of cfd simulations applied to hydrocyclones
Published 2020-10-01“… In simulations, when using multipartitioned computers, the way in which the mesh is partitioned directly affects the average time per iteration, and therefore, the computational cost. …”
Get full text
Article -
777
Inversion Free Algorithms for Computing the Principal Square Root of a Matrix
Published 2014-01-01Get full text
Article -
778
Deep gradient reinforcement learning for music improvisation in cloud computing framework
Published 2025-01-01“…PeerJ Computer Science…”
Get full text
Article -
779
A System for Sentiment Analysis of Colloquial Arabic Using Human Computation
Published 2014-01-01Get full text
Article -
780
RETRACTED: Methods of using STEAM technologies in the development of pupils’ computational thinking
Published 2024-01-01Get full text
Article