Showing 5,701 - 5,720 results of 7,728 for search '(programa OR programs) computational', query time: 0.16s Refine Results
  1. 5701

    Pengembangan Media Pembelajaran Berbasis IT dalam Pembelajaran PAI PAUD pada Era Society 5.0 by Budi Cahyono, Fauzi Fauzi

    Published 2021-05-01
    “…With IT-based media in delivering teaching materials and students can carry out their activities directly by interacting via computers, laptops and Android phones. For this reason, an interactive learning media application was made to introduce Islam by using one of the applicative programming. …”
    Get full text
    Article
  2. 5702

    Gröbner Basis Cryptanalysis of Ciminion and Hydra by Matthias Johann Steiner

    Published 2025-03-01
    “…For Hydra, with the help of a computer algebra program like SageMath we construct a DRL Gröbner basis for the iterated model via linear transformations and a linear change of coordinates. …”
    Get full text
    Article
  3. 5703

    Parallel Processing Distributed-Memory Approach Influences on Performance of Multicomputer-Multicore Systems Using Single-Process Single-Thread by Dildar Masood Abdulqader, Subhi R. M. Zeebaree, Rizgar R. Zebari, Mohammed A. M.Sadeeq, Umed H. Jader, Mohammed Mahmood Delzy

    Published 2024-01-01
    “…Both of number of the participated computers and number of existed processors for each of these computers, this research was depended with the specific design and its implementation. …”
    Get full text
    Article
  4. 5704

    Hardware, software and organizational means of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks" by A. R. Gazizov

    Published 2022-11-01
    “…To prevent unauthorized access to data by means of "sniffing attacks", the following software and hardware solutions are proposed to minimize the consequences of unauthorized exposure to the personal data information system: the use of the HTTPS protocol, a secure version of the HTTP protocol; the use of a static ARP table generated manually; scanning of the computer network of the personal data information system by the AntiSniff program; encryption of the computer network traffic networks of the personal data information system.Conclusion.The presented hardware and software solutions allow minimizing the consequences of unauthorized impact on personal data information systems.…”
    Get full text
    Article
  5. 5705
  6. 5706
  7. 5707

    A Massive Image Recognition Algorithm Based on Attribute Modelling and Knowledge Acquisition by Guohua Li, An Liu, Huajie Shen

    Published 2021-01-01
    “…Then, an efficient deep neural network mapping algorithm is designed and implemented for the microprocessing architecture and software programming framework of this edge processor, and a layout scheme is proposed to place the input feature maps outside the kernel DDR and the reordered convolutional kernel matrices inside the kernel storage body and to design corresponding efficient vectorization algorithms for the multidimensional matrix convolution computation, multidimensional pooling computation, local linear normalization, etc., which exist in the deep convolutional neural network model. …”
    Get full text
    Article
  8. 5708
  9. 5709
  10. 5710

    Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology by Rana F. Ghani, Asia Ali Salman Al-Karkhi, Shakir Mahmood Mahdi

    Published 2022-12-01
    “… Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. …”
    Get full text
    Article
  11. 5711
  12. 5712
  13. 5713

    Investigating an Approximate Solution for a Fractional-Order Bagley–Torvik Equation by Applying the Hermite Wavelet Method by Yimiao Zhang, Muhammad Idrees Afridi, Muhammad Samad Khan, Amanullah

    Published 2025-02-01
    “…The proposed methodology is computationally efficient and produces more accurate findings than earlier numerical approaches.…”
    Get full text
    Article
  14. 5714

    Multi-criteria and econometric evaluation of dairy products by Karmen Pažek, Jernej Turk, Sebjan Hari, Črtomir Rozman, Jernej Prišenk

    Published 2014-05-01
    “…The research was executed by using a multi-criteria methodology, DEX, which was complemented by an econometric analysis for light milk to estimate the trends in production and consumption before analyzed dairy products were implemented on the market. DEXi computer program results indicated that all analyzed milk products were ‘above average’. …”
    Get full text
    Article
  15. 5715

    Entre fidélité et libertés interprétatives : l’adaptation numérique à la lumière du programme Collecta by Sophie Fétro

    Published 2020-06-01
    “…Drawing from the research program “Collecta. Digital Archive of the Gaignières Collection (1642-1715)”, based on the interaction of art history, computer science and design, this article proposes to study the adaptation processes that take place during such a transfer. …”
    Get full text
    Article
  16. 5716

    Radiofrequency generator and programmer of pulse sequences for PMR relaxometer by Tran Van Tung, R. S. Kashaev

    Published 2020-09-01
    “…Realized the testing of the generato r by method of computer modelling in the program Quartus II 12.1 and was shown the opportunities of synthesis of RF-pulses sequences with the phases 0, π/2, π, 3π/2 with resonance frequency tuning.…”
    Get full text
    Article
  17. 5717

    Derivation Power Sums of Even Integer Number Formula by Baghdad Science Journal

    Published 2013-06-01
    “…This paper included derivative method for the even r power sums of even integer numbers formula to approach high even (r+2) power sums of even integer numbers formula so on we can approach from derivative odd r power sums of even integer numbers formula to high odd (r+2) power sums of even integer numbers formula this derivative excellence have ability to used by computer programming language or any application like Microsoft Office Excel. …”
    Get full text
    Article
  18. 5718

    Resummed jet mass distribution with trimming in Z+jet events at the LHC by Safa Gaid, Yazid Delenda, Rachik Soualah

    Published 2024-12-01
    “…We conduct phenomenological studies at O α s $$ \mathcal{O}\left({\alpha}_s\right) $$ , validating our results by comparing them with the fixed-order Monte Carlo program MCFM, which provides NLO predictions for hadron colliders. …”
    Get full text
    Article
  19. 5719

    A study of artificial intelligence and its role in human resource management by Gaddihalli Jayaraj, Shaikh Arif, Harti Rashmi

    Published 2024-01-01
    “…From mechanization of ordinary and time-consuming assignments, to the expansion and enhancement of human capabilities, Computer based program has changed the way work. This may not be a fair time for HR, but it can be a dangerous time that needs to be reformed and supported. …”
    Get full text
    Article
  20. 5720

    Perception of pregnant women about self-care and maternal care by Rosimeire Aparecida Monteiro Silveira, Rute Grossi Milani, Ana Paula Machado Velho, Andréa Grano Marques

    Published 2016-12-01
    “…The technique of content analysis, associated with the computer program Atlas TI, was used. Results: two analytical categories were identified, self-care: taking care of one’s own body and maternal care. …”
    Get full text
    Article