Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
5701
Pengembangan Media Pembelajaran Berbasis IT dalam Pembelajaran PAI PAUD pada Era Society 5.0
Published 2021-05-01“…With IT-based media in delivering teaching materials and students can carry out their activities directly by interacting via computers, laptops and Android phones. For this reason, an interactive learning media application was made to introduce Islam by using one of the applicative programming. …”
Get full text
Article -
5702
Gröbner Basis Cryptanalysis of Ciminion and Hydra
Published 2025-03-01“…For Hydra, with the help of a computer algebra program like SageMath we construct a DRL Gröbner basis for the iterated model via linear transformations and a linear change of coordinates. …”
Get full text
Article -
5703
Parallel Processing Distributed-Memory Approach Influences on Performance of Multicomputer-Multicore Systems Using Single-Process Single-Thread
Published 2024-01-01“…Both of number of the participated computers and number of existed processors for each of these computers, this research was depended with the specific design and its implementation. …”
Get full text
Article -
5704
Hardware, software and organizational means of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks"
Published 2022-11-01“…To prevent unauthorized access to data by means of "sniffing attacks", the following software and hardware solutions are proposed to minimize the consequences of unauthorized exposure to the personal data information system: the use of the HTTPS protocol, a secure version of the HTTP protocol; the use of a static ARP table generated manually; scanning of the computer network of the personal data information system by the AntiSniff program; encryption of the computer network traffic networks of the personal data information system.Conclusion.The presented hardware and software solutions allow minimizing the consequences of unauthorized impact on personal data information systems.…”
Get full text
Article -
5705
-
5706
-
5707
A Massive Image Recognition Algorithm Based on Attribute Modelling and Knowledge Acquisition
Published 2021-01-01“…Then, an efficient deep neural network mapping algorithm is designed and implemented for the microprocessing architecture and software programming framework of this edge processor, and a layout scheme is proposed to place the input feature maps outside the kernel DDR and the reordered convolutional kernel matrices inside the kernel storage body and to design corresponding efficient vectorization algorithms for the multidimensional matrix convolution computation, multidimensional pooling computation, local linear normalization, etc., which exist in the deep convolutional neural network model. …”
Get full text
Article -
5708
Evaluating masked self-supervised learning frameworks for 3D dental model segmentation tasks
Published 2025-05-01Get full text
Article -
5709
-
5710
Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology
Published 2022-12-01“… Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. …”
Get full text
Article -
5711
Parameter Tuning Method for a Lattice Compensated Wireless Power Transfer System
Published 2024-11-01Get full text
Article -
5712
The origin and properties of higher-order near- and far-field modes in plasmonic metal nano-rods
Published 2025-05-01Get full text
Article -
5713
Investigating an Approximate Solution for a Fractional-Order Bagley–Torvik Equation by Applying the Hermite Wavelet Method
Published 2025-02-01“…The proposed methodology is computationally efficient and produces more accurate findings than earlier numerical approaches.…”
Get full text
Article -
5714
Multi-criteria and econometric evaluation of dairy products
Published 2014-05-01“…The research was executed by using a multi-criteria methodology, DEX, which was complemented by an econometric analysis for light milk to estimate the trends in production and consumption before analyzed dairy products were implemented on the market. DEXi computer program results indicated that all analyzed milk products were ‘above average’. …”
Get full text
Article -
5715
Entre fidélité et libertés interprétatives : l’adaptation numérique à la lumière du programme Collecta
Published 2020-06-01“…Drawing from the research program “Collecta. Digital Archive of the Gaignières Collection (1642-1715)”, based on the interaction of art history, computer science and design, this article proposes to study the adaptation processes that take place during such a transfer. …”
Get full text
Article -
5716
Radiofrequency generator and programmer of pulse sequences for PMR relaxometer
Published 2020-09-01“…Realized the testing of the generato r by method of computer modelling in the program Quartus II 12.1 and was shown the opportunities of synthesis of RF-pulses sequences with the phases 0, π/2, π, 3π/2 with resonance frequency tuning.…”
Get full text
Article -
5717
Derivation Power Sums of Even Integer Number Formula
Published 2013-06-01“…This paper included derivative method for the even r power sums of even integer numbers formula to approach high even (r+2) power sums of even integer numbers formula so on we can approach from derivative odd r power sums of even integer numbers formula to high odd (r+2) power sums of even integer numbers formula this derivative excellence have ability to used by computer programming language or any application like Microsoft Office Excel. …”
Get full text
Article -
5718
Resummed jet mass distribution with trimming in Z+jet events at the LHC
Published 2024-12-01“…We conduct phenomenological studies at O α s $$ \mathcal{O}\left({\alpha}_s\right) $$ , validating our results by comparing them with the fixed-order Monte Carlo program MCFM, which provides NLO predictions for hadron colliders. …”
Get full text
Article -
5719
A study of artificial intelligence and its role in human resource management
Published 2024-01-01“…From mechanization of ordinary and time-consuming assignments, to the expansion and enhancement of human capabilities, Computer based program has changed the way work. This may not be a fair time for HR, but it can be a dangerous time that needs to be reformed and supported. …”
Get full text
Article -
5720
Perception of pregnant women about self-care and maternal care
Published 2016-12-01“…The technique of content analysis, associated with the computer program Atlas TI, was used. Results: two analytical categories were identified, self-care: taking care of one’s own body and maternal care. …”
Get full text
Article