Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 2
- Internet in public administration 2
- Moral and ethical aspects 2
- Public administration 2
- Communication policy 1
- Government policy 1
- Internet 1
- Photography 1
- Prevention 1
- Psychological aspects 1
- Psychology 1
- Social aspects 1
- Technological innovations 1
- Telecommunication policy 1
- Terrorism 1
- Terrorists 1
- Visual communication 1
-
321
-
322
A comprehensive framework for designing behavior of UAV swarms
Published 2022-09-01Get full text
Article -
323
Integrating Computational Design and Experimental Approaches for Next-Generation Biologics
Published 2024-08-01“…Addressing these challenges will require continued integration of computational and experimental methods, as well as a deeper understanding of protein behavior in complex physiological environments. …”
Get full text
Article -
324
Understanding Beliefs, Teachers’ Beliefs and Their Impact on the Use of Computer Technology
Published 2012-07-01“…Additional information on models attempting to explain human behavior and the use of computers will be presented as well in order to discuss these research results in light of local efforts made to solve the gap of integrating technology through the Computadores para Educar Program in Colombian public schools.…”
Get full text
Article -
325
-
326
A Computational Framework for Automated Puncture Trajectory Planning in Hemorrhagic Stroke Surgery
Published 2025-04-01Get full text
Article -
327
Computation of The Efficiency ofHarmonic Generation Using Cascading Configuration.
Published 2004-03-01Get full text
Article -
328
Assessment of the Fatigue Behavior of Wings with Distributed Propulsion
Published 2025-03-01“…As this might significantly increase the stress levels and number of load cycles, this paper assesses the impact of wing-integrated distributed propulsion on the fatigue behavior of the wing structure. This assessment is conducted based on a retrofit scenario of a conventional 19-seater commuter aircraft of the CS-23 category retrofitted with distributed electric propulsion. …”
Get full text
Article -
329
Computational Study of the Structure of a Sepiolite/Thioindigo Mayan Pigment
Published 2012-01-01“…Future computational studies will look at the interaction of indigo with sepiolite.…”
Get full text
Article -
330
Computational Analysis of Parallel Techniques for Nonlinear Biomedical Engineering Problems
Published 2024-12-01“…Overall, detailed analyses of convergence behavior, memory utilization, computational time, and percentage computational efficiency show that the novel parallel techniques outperform the traditional methods. …”
Get full text
Article -
331
Improving residential environments: analyzing factors influencing individual travel and neighborhood environment
Published 2025-07-01“…A multiple regression analysis was conducted to evaluate the effects of individual, household, and land-use characteristics on travel behavior. The findings indicated that variables such as occupation, travel area, mode of transport, and total commercial floor area significantly influenced both commuting and leisure trips. …”
Get full text
Article -
332
Coronary Computed Tomography Angiogram in Patients with Stable Chest Pain
Published 2022-11-01Get full text
Article -
333
Block-based fair payment scheme under delegation computation
Published 2020-03-01“…In the traditional delegation computation,due to the self-interested behavior of both participants,there were some problems such as the denial of the principal and the dishonest calculation by the computing party.In the payment phase,a third party was required to ensure the fairness of the payment,which led to extra costs and risks of disclosure of participants' privacy.Game theory was used to analyze the Nash equilibrium solution between the two parties in the payment process,and a fair payment protocol based on time commitment of bitcoin was proposed.Firstly,the bitcoin time commitment technology was used to ensure the fairness of payment.Secondly,the decentralized feature of block chain was used to replace the third-party service to protect the privacy of all parties and realize the source of responsibility.Finally,the scheme was analyzed from the perspective of security and correctness,which proved that the participants choose behavioral strategies honestly in the payment process.The scheme proposed in this paper not only solved the problem of fair payment in traditional delegation computation,but also protected the privacy of participants.…”
Get full text
Article -
334
Computational Investigation: CFD guide for the Evaporation process in Heat Pipe
Published 2025-06-01“…ANSYS Fluent is employed to create the 2D heat pipe shape and produce an optimal computational mesh. A k-ɛ turbulence model is utilized to characterize fluid flow behavior, and nanorefrigerant (Al2O3/R11) is designated as the working fluid. …”
Get full text
Article -
335
Orthogonal intercellular signaling for programmed spatial behavior
Published 2016-01-01Get full text
Article -
336
Enhanced Learning Behaviors and Ability Knowledge Tracing
Published 2025-01-01Get full text
Article -
337
Dynamic Mixture of Experts for Adaptive Computation in Character-Level Transformers
Published 2025-06-01“…Analysis of routing behavior shows that even with load-balancing techniques, expert utilization remains unevenly distributed. …”
Get full text
Article -
338
On the Bifurcation Behavior of Decoupled Systems of Difference Equations
Published 2025-05-01Get full text
Article -
339
A Comparative Study on the Integration of Eye-Tracking in Recommender Systems
Published 2025-04-01Subjects: Get full text
Article -
340