Showing 1,501 - 1,520 results of 28,739 for search '"computing"', query time: 0.10s Refine Results
  1. 1501

    Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology by Xiaokun Zheng

    Published 2022-01-01
    “…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
    Get full text
    Article
  2. 1502

    Effects of Resource Limitations and Cost Influences on Computer Virus Epidemic Dynamics and Tipping Points by Chung-Yuan Huang, Chuen-Tsai Sun

    Published 2012-01-01
    “…One of the most important assessment indicators of computer virus infections is epidemic tipping point. …”
    Get full text
    Article
  3. 1503
  4. 1504

    Feasibility and appropriateness of using electronic hierarchical structures in teaching computer science in primary school by Esen Y. Bidaibekov, Baglan B. Kaldanov

    Published 2024-12-01
    “…Modern requirements for teaching computer science in primary schools demonstrate the necessity of using innovative educational technologies. …”
    Get full text
    Article
  5. 1505

    Computationally Inexpensive Approach for Pitch Control of Offshore Wind Turbine on Barge Floating Platform by Shan Zuo, Y. D. Song, Lei Wang, Qing-wang Song

    Published 2013-01-01
    “…In allusion to the external disturbances and uncertain system parameters of OFWT due to the proximity to load centers and strong wave coupling, this paper proposes a computationally inexpensive robust adaptive control approach with memory-based compensation for blade pitch control. …”
    Get full text
    Article
  6. 1506

    Computer Vision-Based Structural Displacement Monitoring and Modal Identification with Subpixel Localization Refinement by Tao Liu, Yu Lei, Yibing Mao

    Published 2022-01-01
    “…In order to overcome these shortcomings, the computer vision- (CV-) based method has been introduced into SHM, and its practical applications are increasing. …”
    Get full text
    Article
  7. 1507

    Computational Chemistry Study of pH-Responsive Fluorescent Probes and Development of Supporting Software by Ximeng Zhu, Yongchun Wei, Xiaogang Liu

    Published 2025-01-01
    “…This study employs quantum chemical computational methods to predict the spectroscopic properties of fluorescent probes 2,6-bis(2-benzimidazolyl)pyridine (BBP) and (<i>E</i>)-3-(2-(1<i>H</i>-benzo[<i>d</i>]imidazol-2-yl)vinyl)-9-(2-(2-methoxyethoxy)ethyl)-9<i>H</i>-carbazole (BIMC). …”
    Get full text
    Article
  8. 1508

    Computationally expensive constrained problems via surrogate-assisted dynamic population evolutionary optimization by Zan Yang, Chen Jiang, Jiansheng Liu

    Published 2025-01-01
    “…Abstract This paper proposes a surrogate-assisted dynamic population optimization algorithm (SDPOA) for the purpose of solving computationally expensive constrained optimization problems, in which the population is dynamically updated based on the real-time iteration information to achieve targeted searches for solutions with different qualities. …”
    Get full text
    Article
  9. 1509
  10. 1510
  11. 1511
  12. 1512

    Research and application of big data platform technology based on multi-centre collaborative computing by RUAN Yilong, XU Xueling, FA Hu, DONG Silun, JIANG Lei, YANG Lei, YAN Yuanyuan

    Published 2024-05-01
    “…At present, the cloud edge computing big data platform has been applied in a variety of application scenes. …”
    Get full text
    Article
  13. 1513

    Computer simulation of stress-strain states in zygomatic bones after complex installation of implants by Timur Dibirov, Aleksey Drobyshev, Eduard Kharazyan, Nikolay Redko, Egor Pankov, Alexander Kozulin, Sergey Panin, Sergey Arutyunov

    Published 2024-01-01
    “…Based on the results of the FEM-based computer simulation, the algorithm was proposed for planning prosthetic treatment, which involves the iterative method for selecting both size and location of installing zygomatic implants depending on the results of the SSS calculation and the onset of a critical condition (primarily in bone tissue at the contact area with zygomatic implants).…”
    Get full text
    Article
  14. 1514
  15. 1515
  16. 1516

    OK Computer ou l’émergence d’un rock syncrétique chez Radiohead by Benjamin Lassauzet

    Published 2019-11-01
    “…At their very start, Radiohead have drawn inspiration from two supposedly antagonistic genres that were in-vogue in the early 1990s: grunge and Britpop. But with OK Computer , their influences became more complex and kaleidoscopic, with references not only to various musical genres, but also to literature, cinema, advertising or humanities. …”
    Get full text
    Article
  17. 1517
  18. 1518

    Agricultural Information Management Data Model Construction Based on Cloud Computing and Semantic Technology by Chunhang Wang, Zhe An

    Published 2022-01-01
    “…The registration rate improves than the traditional method by 12.46% and computational cost by 23.76%. This method has higher accuracy in storage data mining and retrieval for large information management systems and superior performance than the traditional method. …”
    Get full text
    Article
  19. 1519

    CARPAL TUNNEL SYNDROME (CTS) FOR WORKERS USING COMPUTER IN THE FINANCE DIVISION OF PROPERTY INDUSTRY by Nevi Sulistika, Devi Angeliana Kusumaningtiar, Putri Handayani, Decy Situngkir, Taufik Rendi Anggara

    Published 2022-11-01
    “…Jobs that are at risk of CTS involve doing repetitive movements, working with awkward postures, working in a motorized vehicle production or working using computers. Purpose: To determine the factors associated with the incidence of CTS in workers that used computers in the finance division of Property Industry. …”
    Get full text
    Article
  20. 1520