Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
2141
Self-checking principle and design of ternary Berger code
Published 2025-04-01“…Abstract With the gradual maturity of the hardware and programming platform of Ternary optical computer (TOC), TOC gradually enters the practical application stage. …”
Get full text
Article -
2142
Competence analysis of artificial intelligence professionals
Published 2022-06-01Get full text
Article -
2143
An Analysis of the Lie Symmetry and Conservation Law of a Variable-Coefficient Generalized Calogero–Bogoyavlenskii–Schiff Equation in Nonlinear Optics and Plasma Physics
Published 2024-11-01“…Under the compatibility condition (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>a</mi><mn>1</mn></msub><mrow><mo>(</mo><mi>t</mi><mo>)</mo></mrow><mo>=</mo><msub><mi>a</mi><mn>2</mn></msub><mrow><mo>(</mo><mi>t</mi><mo>)</mo></mrow></mrow></semantics></math></inline-formula>), infinitesimal generators and a symmetry analysis are presented via the symbolic computation program designed. With the Lagrangian, the adjoint equation is analyzed, and the vcGCBS equation is shown to possess nonlinear self-adjointness. …”
Get full text
Article -
2144
CHERI-Crypt: Transparent Memory Encryption on Capability Architectures
Published 2025-03-01“…We show that our CHERI-Crypt design can run an enclave test program within an encrypted CHERI seal and invoke process, requiring 626 additional clock cycles with a batch size of 32 bytes. …”
Get full text
Article -
2145
-
2146
-
2147
-
2148
Um modelo de otimização inteira mista e heurísticas relax and fix para a programação da produção de fábricas de refrigerantes de pequeno porte A mixed integer programming model and...
Published 2008-01-01“…<br>In this paper we propose a mixed integer programming model to the lot sizing and sequencing problem of a soft drink plant with sequence-dependent set up costs and times. …”
Get full text
Article -
2149
BTCP: Binary Temporal Convolutional Network-Based Data Prefetcher for Low Inference Latency and Storage Overhead
Published 2025-01-01“…BTCP aids in detecting memory patterns by processing addresses and program counters through bitwise XOR operations and feeding them into a neural network. …”
Get full text
Article -
2150
Updating parameters of an information model for road construction flow in work development project
Published 2023-01-01“…An example of the implementation of this method is considered when designing a specialized flow, first as part of a COP, with the subsequent updating of this model in the MS Project program when developing a PPW based on a typical flow chart.Conclusion. …”
Get full text
Article -
2151
-
2152
-
2153
Deteksi Detak Jantung Menggunakan Remote Photoplethysmograph dengan Perubahan Jarak dan Jenis Kamera Secara Dinamis
Published 2024-08-01“…Pada penelitian ini menerapkan proses deteksi sinyal PPG untuk pembacaan detak jantung melalui dahi secara dinamis menggunakan computer vision secara realtime tanpa diperlukan kontak fisik, konsep tersebut disebut dengan istilah remote PhotoPlethysmoGraph (rPPG). …”
Get full text
Article -
2154
Noninvasive assessment of the fractional reserve of coronary blood flow with a one-dimensional mathematical model. Preliminary results of the pilot study
Published 2019-04-01“…Statistical analysis was performed using R programming language packages (cran-r.project.com). …”
Get full text
Article -
2155
-
2156
Image dataset for foreign object detection in iron ore conveyor belt systemsMendeley Data
Published 2025-06-01Get full text
Article -
2157
-
2158
The Advancement of Software Technology and the Evolution of Transcription Protocols in the Field of Genetic Studies
Published 2024-12-01“…This paper explores how developments in software programs and digital technology have revolutionized research protocols and methods for transcribing and analysing literary manuscripts. …”
Get full text
Article -
2159
-
2160
On the Challenges of Quantum Circuit Encoding Using Deep and Reinforcement Learning
Published 2025-01-01“…Quantum computers may solve some computing tasks more efficiently than classical com- puters, but to do so requires the design of appropriate quantum circuits. …”
Get full text
Article