Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
1101
DSML4JaCaMo: A Modelling tool for Multi-agent Programming with JaCaMo
Published 2024-10-01Get full text
Article -
1102
-
1103
Digital Inequality and Access by Low-Income Individuals to Public Benefits
Published 2025-04-01Get full text
Article -
1104
Scientific mapping of digitalization in architectural education for sustainability
Published 2025-02-01Get full text
Article -
1105
-
1106
AC Optimal Power Flow: a Conic Programming relaxation and an iterative MILP scheme for Global Optimization
Published 2022-11-01“…We address the issue of computing a global minimizer of the AC Optimal Power Flow problem. …”
Get full text
Article -
1107
Yield, Protein, and Starch Equilibrium of Indigenous Varieties: An Open Door for Computational Breeding in Enhancing Selection Strategies
Published 2025-05-01“…Furthermore, integrating an equilibrium model into computational breeding could provide a framework for enabling breeding programs to optimize yield and grain composition while eliminating low-potential varieties.…”
Get full text
Article -
1108
An Exact Algorithm Based on the Kuhn–Tucker Conditions for Solving Linear Generalized Semi-Infinite Programming Problems
Published 2022-01-01“…The resulting reformulation allows us to employ a branch and bound scheme to optimally solve the problem. Computational experimentation over well-known instances shows the effectiveness of the developed method concluding that it is able to effectively solve linear semi-infinite programming problems. …”
Get full text
Article -
1109
A mixed-integer linear programming method for time-dependent line planning in passenger railway systems.
Published 2025-01-01“…Additionally, a set of simplification strategies is introduced to reduce the computational complexity while ensuring the global optimality of the linear model. …”
Get full text
Article -
1110
Optimal Positioning of Unmanned Aerial Vehicle (UAV) Base Stations Using Mixed-Integer Linear Programming
Published 2025-01-01“…This approach introduces a trade-off between computational time efficiency and optimality, which can be tuned by adjusting the number of clusters. …”
Get full text
Article -
1111
Interior Point Method for Solving Fuzzy Number Linear Programming Problems Using Linear Ranking Function
Published 2013-01-01“…But their computational complexities are exponential, which is not satisfactory for solving large-scale fuzzy linear programming problems, especially in the engineering field. …”
Get full text
Article -
1112
Entry Guidance for Hypersonic Glide Vehicles via Two-Phase hp-Adaptive Sequential Convex Programming
Published 2025-06-01“…Compared to pseudospectral solvers, the method achieves over 12× computational speed-up while maintaining kilometer-level accuracy. …”
Get full text
Article -
1113
PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES
Published 2024-05-01“…The adoption, in 2001, in Budapest, of the Council of Europe Convention on Cybercrime brought an important step forward in the prevention and combatting cyber-related crimes, through the creation of a special indictment (art. 6) against the production, sale, procurement for use, import, distribution, import or making available of devices, computer programs, passwords or any other such data with the scope to further illegal access to a computer system, interception without right of a computer data transmission, an illegal data interference or an illegal system interference, offences comprised in the art. 2 to 5 of the Convention. …”
Get full text
Article -
1114
Effects of a Computer Vision–Based Exercise Application for People With Knee Osteoarthritis: Randomized Controlled Trial
Published 2025-05-01“…In recent years, digital health applications have emerged as innovative tools for supervising and facilitating rehabilitation programs. Leveraging computer vision (CV) technology, these applications offer the potential to provide precise feedback and support personalized exercise interventions for patients with KOA in a scalable and accessible manner. …”
Get full text
Article -
1115
Evaluating Curriculum Alignment in University-Level Organic Chemistry Programs using N-Valued Neutrosophic Trapezoidal Numbers
Published 2025-07-01“…Curriculum alignment serves as a fundamental cornerstone in ensuring that educational programs meet both academic expectations and industry demands. …”
Get full text
Article -
1116
Predicting pile bearing capacity using gene expression programming with SHapley Additive exPlanation interpretation
Published 2025-03-01“…GEP is a computational technique that mimics biological gene expression processes to evolve computer programs or models capable of solving complex problems through the iterative generation, selection, and recombination of code segments. …”
Get full text
Article -
1117
A computational grounded theory based analysis of research on China’s old-age social welfare system
Published 2025-04-01“…This study applies Nelson’s computational grounded theory to systematically analyze China’s old-age social welfare research and propose targeted policy priorities.MethodsWe searched Chinese literature (2014–2024) from the Wanfang, CNKI, and CQVIP databases. …”
Get full text
Article -
1118
-
1119
-
1120