Showing 6,961 - 6,980 results of 7,728 for search '(programa OR programs) computational', query time: 0.15s Refine Results
  1. 6961
  2. 6962

    Hybrid nanofluid flow around a circular cylinder: A coupled ANN and numerical study of MHD, bioconvection, and thermal radiation by Muhammad Fawad Malik

    Published 2025-06-01
    “…The algorithm bvp4c is used to assess the simplified mathematical model computationally in the MATLAB software program. The results, such as velocity, temperature, concentration, and bioconvection, are obtained graphically. …”
    Get full text
    Article
  3. 6963

    Radiological and Clinical Prognostic Factors of Recurrence of Subacute and Chronic Subdural Hematomas by Milda Paliulytė, Gytis Šustickas

    Published 2023-11-01
    “…Based on recurrence rate, patients were divided into different subtypes based on computer tomography (CT) imaging. Descriptive analysis, hypothesis testing and correlation matrix were performed using Excel spreadsheet and R programming language with the significance at p-value < 0.05. …”
    Get full text
    Article
  4. 6964

    An EPIQ Mass Shelter Training for Public Health Nurses in Georgia to Improve Core Competencies in Disaster Preparedness: A Pilot Study by Ashlie L. Pullen, Sonya Shinhoster

    Published 2025-01-01
    “…In addition, an overall familiarity score was computed as the sum of responses for each participant in the EPIQ survey (max of 90) and compared using a pre to post paired t-test to determine if there was an overall statistical change. …”
    Get full text
    Article
  5. 6965

    Abstract 256: Proposal of multimodal CT‐based scoring system in prediction of hemorrhagic transformation in acute ischemic stroke by Nada Elsaid

    Published 2023-11-01
    “…Introduction The routinely used computed tomography (CT)‐based workup in the setting of acute ischemic stroke (AIS) includes non‐contrast brain CT, CT angiography (CTA), and CT perfusion. …”
    Get full text
    Article
  6. 6966

    Tensionless string limits in 4d conformal manifolds by José Calderón-Infante, Irene Valenzuela

    Published 2025-08-01
    “…Abstract Drawing on insights from the Swampland program, we initiate a classification of infinite distance limits in the conformal manifolds of 4d SCFTs. …”
    Get full text
    Article
  7. 6967

    Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range by Zhe SUN, Hong NING, Lihua YIN, Binxing FANG

    Published 2023-02-01
    “…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
    Get full text
    Article
  8. 6968

    Comparison of algorithms for multi-objective optimization of radio technical device characteristics by A. V. Smirnov

    Published 2022-12-01
    “…The computer experiments demonstrated the capability of GDE3 to solve all considered problems. …”
    Get full text
    Article
  9. 6969

    Population Estimate of Anubis Baboon (Papio anubis) and Its Conflict With Farmers Around Kelebet Wonber Monastery, Antsokia Gemza District, North Shewa Zone, Amhara, Ethiopia by Destaw Gashaw, Dereje Yazezew

    Published 2025-01-01
    “…All data were analyzed by using the SPSS version 26 computer software program. A total of 448 and 432 baboons were counted during the dry and wet seasons, respectively. …”
    Get full text
    Article
  10. 6970

    ABOUT LEGALIZATION OF EXHAUST (MAINING) CRYPTOCURRENCY BY THE TYPE OF ECONOMIC ACTIVITY by B.V. Derevyanko, O.A. Turkot

    Published 2018-05-01
    “…Three ways of determining the amount of taxes are proposed: 1) granting access to representatives of the fiscal body to the computer program and purses of the cryptocurrency; 2) through the calculation by the representatives of the fiscal body of the average monthly volume of production of units of crypto currency for a certain equipment and, accordingly, in proportion to it, the amount of tax; 3) in proportion to the amount of electricity spent. …”
    Get full text
    Article
  11. 6971

    Formation of a database of auxiliary information for positioning in an environment with heterogeneous radio transparency by Mikhail N. Krizhanovsky, Olga V. Tikhonova

    Published 2025-02-01
    “…The aim of the work is to improve this algorithm by automating the stage of preparing information about the grouping of stations.Methods. A computer simulation method was used, in order to confirm the operability of the algorithm to divide the stations of the positioning system into overlapping groups.Results. …”
    Get full text
    Article
  12. 6972

    Implementation of Image Enhancement and Edge Detection Algorithm on Diabetic Retinopathy (DR) Image Using FPGA by Mumtahina Orthy, Sheikh Md. Rabiul Islam, Faijah Rashid, Md. Asif Hasan

    Published 2023-01-01
    “…The proposed model is utilized to articulate a proficient model for the design and execution of field programable gate array (FPGA)-based image enhancement processes along with the Sobel edge detection algorithm upon DR images. …”
    Get full text
    Article
  13. 6973
  14. 6974

    Development of internet of things-based petroleum pipeline topology leak monitoring and detection system using sensors by Paul Bukie, Idongesit Eteng, Eyo Essien

    Published 2025-07-01
    “…This data is received in a computer and an Android phone. A prototype was used to study the setup's workings. …”
    Get full text
    Article
  15. 6975

    HUMAN BODY ANTHROPOMORPHIC PHANTOM UTILISATION FOR THE COMPLEX TESTING OF RADIATION THERAPY TECHNOLOGICAL PROCESS by Y. I. Holdman, E. V. Titovich

    Published 2019-12-01
    “…The result of this work is the creation of the modified anthropomorphic phantom for precision dosimetric measurements, designed for testing the following technological procedures of the radiation therapy process: a computer tomography acquisition; a computerized treatment planning system, including a contouring module and dose distribution calculation algorithm; imaging systems integrated with radiation treatment units; dosimetric and technical characteristics of the radiation treatment units. …”
    Get full text
    Article
  16. 6976

    Do Chatbots Exhibit Personality Traits? A Comparison of ChatGPT and Gemini Through Self-Assessment by W. Wiktor Jedrzejczak, Joanna Kobosko

    Published 2025-06-01
    “…Appreciating these philosophical subtleties is important for enhancing human–computer interactions and perhaps building more relatable, trustworthy AI systems.…”
    Get full text
    Article
  17. 6977

    Knowledge of Periodontal Diseases, Oral Hygiene Practices, and Self-Reported Periodontal Problems among Pregnant Women and Postnatal Mothers Attending Reproductive and Child Health... by T. M. Kabali, E. G. Mumghamba

    Published 2018-01-01
    “…Data were analyzed using SPSS v19.0 computer program. Results. Participants knowledgeable of periodontal diseases were 62%; gingivitis signs included gum swelling (87.4%) and bleeding (93.3%). …”
    Get full text
    Article
  18. 6978

    The fish helminth fauna of Lake Sevan during a period of water level change by R. L. Hovhannisyan, M. Ya. Rukhkyan, L. D. Harutyunova, M. Z. Magomedova, P. D. Magomedova

    Published 2023-11-01
    “…Statistical processing of the material was carried out using the BioStat 2009 computer program. 124 specimens of molluscs were examined from the littoral of the Lake Sevan. …”
    Get full text
    Article
  19. 6979

    Construction of a model of subsoil moisture movement in cultivated slope lands by Andrey A. Mikhaylin

    Published 2025-02-01
    “…At the same time, a computer program was developed to solve the boundary value problem of dynamics – subsoil moisture transfer on a slope, taking into account the heterogeneous structures obtained during soil treatment using a new method.…”
    Get full text
    Article
  20. 6980

    IEA-R1 Renewed Primary System Pump B1-B Nozzles Stress Analysis by A. A. Faloppa, G. Fainer, C. D. R. Figueiredo, D. S. M. Carvalho, M. Mattar Neto

    Published 2023-01-01
    “…The present report is a summary of the structural analysis of the pump nozzles applying the finite element method by using the Ansys computer program. The IEA-R1 RR is an open pool-type moderated and cooled by light water using beryllium/graphite as a reflector. …”
    Get full text
    Article