Showing 781 - 800 results of 8,109 for search 'computing patterns', query time: 0.17s Refine Results
  1. 781

    BEST PRACTICE IN ENHANCING SOCIO-EMOTIONAL LEARNING IN PRIMARY SCHOOL THROUGH COMPUTATIONAL THINKING by Antoaneta-Firuţa TACEA, Anişoara DUMITRACHE, Beatrice ALMĂŞAN, Dana MANOLACHE

    Published 2025-07-01
    “…Computational thinking is a structured, cognitive process centered on decomposition, pattern recognition, and algorithm development, which is used for problem solving in a logical and organized manner. …”
    Get full text
    Article
  2. 782
  3. 783
  4. 784
  5. 785

    Variations in the Origins of Inferior Phrenic Arteries—An Evaluation with 256 Slice Multidetector Computed Tomography by Chinmay Bhimaji Kulkarni, Sreekumar Karumathil Pullara, Nirmal Kumar Prabhu, Minnie Pillay, Srikanth Moorthy

    Published 2020-07-01
    “…Aim To evaluate the frequency and pattern of variations in the origins of right inferior phrenic artery (RIPA) and left inferior phrenic artery (LIPA) on 256 slice multidetector computed tomography (MDCT). …”
    Get full text
    Article
  6. 786
  7. 787

    CHARACTERISTICS OF LUNG FOCI REVEALED BY COMPUTED TOMOGRAPHY IN HIGH-RISK CHILDREN AND ADOLESCENTS FOR TUBERCULOSIS by L. P. Shepeleva, V. A. Aksenova, I. E. Tyurin

    Published 2016-06-01
    “…Objective: to give an X-ray pattern of single lung foci revealed by computed tomography (CT) in children and adolescents examined for tuberculosis. …”
    Get full text
    Article
  8. 788

    Confocal 3D DNA Cytometry: Assessment of Required Coefficient of Variation by Computer Simulation by Lennert S. Ploeger, Jeroen A.M. Beliën, Neal M. Poulin, William Grizzle, Paul J. van Diest

    Published 2004-01-01
    “…For CVs of 15% and lower, a clearly bimodal peak pattern with well distinguishable G0/1 and G2/M peaks were still seen at a sample size of 273 cells, which is our current average sample size with 3D CLSM DNA cytometry. …”
    Get full text
    Article
  9. 789

    Advancing Understanding of Anorectal Malformations Through Microfocus Computed Tomography Imaging of Resected Material by Daniël Docter, Bernadette S. de Bakker, Jaco Hagoort, Joris J.T.H. Roelofs, Sjoerd de Beer, Ernst van Heurn, Joep Derikx, Marc A. Benninga, Justin de Jong, Ramon R. Gorter

    Published 2025-01-01
    “…Muscle fibers were present, arranged in circular pattern that expanded toward the distal end, becoming the intrinsic sphincter (IAS). …”
    Get full text
    Article
  10. 790
  11. 791
  12. 792
  13. 793

    Binge-Watching Netflix? Insights From Data Donations by Karin van Es, Dennis Nguyen

    Published 2025-02-01
    “…This article provides unique empirical insights into Netflix viewing patterns in the Netherlands, based on a pilot study involving data donated by 126 subscribers. …”
    Get full text
    Article
  14. 794

    Carbon Steel A36 Planar Coupons Exposed to a Turbulent Flow Inside a 90° Pipe Elbow in a Testing Rack: Hydrodynamic Simulation and Corrosion Studies by Luis Cáceres, Genny Leinenweber, Alvaro Soliz, Esteban Landaeta

    Published 2025-05-01
    “…The dissimilar fluid flow distribution on intrados and extrados generates irregular corrosion patterns, depending on the angular position of the coupon inside the corrosion compartment. …”
    Get full text
    Article
  15. 795
  16. 796
  17. 797

    HammingVis: A visual analytics approach for understanding erroneous outcomes of quantum computing in hamming space by Jieyi Chen, Zhen Wen, Li Zheng, Jiaying Lu, Hui Lu, Yiwen Ren, Wei Chen

    Published 2024-12-01
    “…Advanced quantum computers have the capability to perform practical quantum computing to address specific problems that are intractable for classical computers. …”
    Get full text
    Article
  18. 798
  19. 799
  20. 800

    Enhancing DDoS Attacks Mitigation Using Machine Learning and Blockchain-Based Mobile Edge Computing in IoT by Mahmoud Chaira, Abdelkader Belhenniche, Roman Chertovskih

    Published 2025-07-01
    “…This integrated approach significantly enhances detection accuracy and mitigation effectiveness compared to existing methods, providing a robust and adaptive mechanism for identifying and mitigating malicious traffic patterns in IoT environments.…”
    Get full text
    Article