Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
961
Fault-tolerant and mobility-aware loading via Markov chain in mobile cloud computing
Published 2025-05-01“…However, mobile devices’ limited memory, computing power, and battery life pose significant challenges to their widespread use. …”
Get full text
Article -
962
Intelligent End-Edge Computation Offloading Based on Lyapunov-Guided Deep Reinforcement Learning
Published 2024-11-01“…To address the end-edge computation offloading challenge in the multi-terminal and multi-server environment, this paper proposes an intelligent computation offloading algorithm based on Lyapunov optimization and deep reinforcement learning. …”
Get full text
Article -
963
The computer model of a neutron fluxes forming system on a linear electron accelerator
Published 2023-12-01“…A computer model of the system for generating neutron fluxes at the output of a linear electron accelerator has been developed in the Geant4 and PhysList QGSP BIC HP programming environment. …”
Get full text
Article -
964
COMPUTED TOMOGRAPHY PATTERN OF UNCHANGED MEDIASTINAL LYMPH NODES IN CHILDREN WITH UNINFECTED MYCOBACTERIUM TUBERCULOSIS
Published 2016-02-01“…Objective: to provide X-ray characteristics of mediastinal lymph nodes revealed by computed tomography (CT) in children and adolescents with uninfected Mycobacterium tuberculosis.Material and methods. …”
Get full text
Article -
965
Joint Demand Response and Task Offloading Strategy for 5G Edge Computing Network
Published 2022-10-01“…Along with the dramatic increase in demand for IoT communication computing, the 5G communication and edge computing network gradually become the emerging high energy consumption load. …”
Get full text
Article -
966
Assessment of Potential Live Kidney Donors and Computed Tomographic Renal Angiograms at Christchurch Hospital
Published 2016-01-01“…To examine the outcome of potential live kidney donors (PLKD) assessment program at Christchurch Hospital and, also, to review findings of Computed Tomographic (CT) renal angiograms that led to exclusion in the surgical assessment. …”
Get full text
Article -
967
Designing a Monitoring Tool for Mosul University Network to Detect Worm Infected Computers
Published 2013-07-01“…The present study tackles the problem of computers' vulnerability to malware such as worm: a self-replicate computer program that spontaneously copies itself to the vulnerable systems and spreads through the web exploiting security gaps and posing a great danger to the web community. …”
Get full text
Article -
968
New Strategies Based on Hierarchical Matrices for Matrix Polynomial Evaluation in Exascale Computing Era
Published 2025-04-01“…These include but are not limited to massive parallelism, effective exploitation, and high complexity in programming, such as heterogeneous computing facilities. …”
Get full text
Article -
969
Water temperature prediction in a subtropical subalpine lake using soft computing techniques
Published 2016-04-01“…In this paper, the performance of soft computing techniques including gene expression programming (GEP), which is a variant of genetic programming (GP), adaptive neuro fuzzy inference system (ANFIS) and artificial neural networks (ANNs) to predict hourly water temperature at a buoy station in the Yuan-Yang Lake (YYL) in north-central Taiwan at various measured depths was evaluated. …”
Get full text
Article -
970
A Survey on Privacy and Security in Distributed Cloud Computing: Exploring Federated Learning and Beyond
Published 2025-01-01“…These servers provide cost-effective solutions that make storage and computing accessible to ordinary users. However, they might face significant vulnerabilities, including data leakage, metadata spoofing, insecure programming interfaces, malicious insiders, and denial of service. …”
Get full text
Article -
971
Closed-Loop Control of Extrusion-Based Bioprinting Through Real-Time Computer Vision
Published 2025-06-01“…A critical aspect of print quality is maintaining a consistent and predictable line width, as pre-programmed trajectories and design fidelity rely on this parameter being well controlled. …”
Get full text
Article -
972
University proceedings. Volga region. Technical sciences
Published 2025-05-01Subjects: “…multiversion programming…”
Article -
973
Cyberattack Risk Assessment in Electronic banking Technologies (the Case of Software Implementation)
Published 2020-12-01Subjects: Get full text
Article -
974
Anti‐Angiogenic Agents for Advanced Hepatocellular Carcinoma Induce Liver Atrophy
Published 2025-08-01Subjects: “…anti‐programmed cell death ligand 1…”
Get full text
Article -
975
The task of developing a decision support system for calculating departmental assessment of police administrative activities
Published 2024-04-01Subjects: Get full text
Article -
976
Revolutionizing Sperm Analysis with AI: A Review of Computer-Aided Sperm Analysis Systems
Published 2025-06-01Get full text
Article -
977
Carrying out entrance control of “Informatics” students’ knowledge with use of specialized computer system
Published 2017-05-01“…Nowadays the creation and the use of computer testing systems is one of perspective directions in the field of control of knowledge. …”
Get full text
Article -
978
Automatic morphology phenotyping of tetra- and hexaploid wheat spike using computer vision methods
Published 2021-03-01“…Thus, it has been shown that the morphological characteristics of spikes for hexaploid and tetraploid wheat species, obtained on the basis of computer analysis of images, include differences, which are further used to develop methods for plant classifications by ploidy level and their species in an automatic mode.…”
Get full text
Article -
979
Novel Application of Quantum Computing for Routing and Spectrum Assignment in Flexi-Grid Optical Networks
Published 2024-10-01“…This work lays the foundation for future exploration of quantum computing in solving large-scale RSA problems in EONs, with the prospect of achieving quantum advantage as quantum technology continues to advance.…”
Get full text
Article -
980