Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
3201
THE MECHANISM FOR CREATION OF EVENT-DRIVEN APPLICATIONS BASED ON WOLFRAM MATHEMATICA AND APACHE KAFKA
Published 2021-03-01“…The article is devoted to the research and development of the mechanism of interaction between Wolfram Mathematica programs and Apache Kafka queue to provide the ability to build event-driven applications based on it. …”
Get full text
Article -
3202
Statistical Study of the Impact of Digitalization of Organizations on Lending Activity: Regional Level
Published 2024-05-01“…It was concluded that the results of the study could be used to develop business lending programs for commercial banks and determine the priorities of regional digital development programs by government bodies.…”
Get full text
Article -
3203
Expression‐based machine learning models for predicting plant tissue identity
Published 2025-01-01Get full text
Article -
3204
-
3205
Differential Cryptanalysis of the Reduced Pointer Authentication Code Function Used in Arm’s FEAT_PACQARMA3 Feature
Published 2025-03-01“… The Pointer Authentication Code (PAC) feature in the Arm architecture is used to enforce the Code Flow Integrity (CFI) of running programs. It does so by generating a short MAC — called the PAC — of the return address and some additional context information upon function entry, and checking it upon exit. …”
Get full text
Article -
3206
-
3207
Achieving inclusive healthcare through integrating education and research with AI and personalized curricula
Published 2025-08-01“…Addressing these needs requires the integration of computational experts, engineers, designers, and healthcare professionals to develop user-friendly systems and shared terminologies. …”
Get full text
Article -
3208
Simulation of daylight in the classroom, using an adaptive shell (a case study of a classroom in the city of Yazd)
Published 2024-02-01“…</span></p> <p class="MsoNormal" style="text-align: justify; text-indent: 14.2pt; line-height: normal; margin: 0in -28.35pt .0001pt -28.35pt;"><span style="font-size: 10.0pt; font-family: 'Times New Roman',serif; mso-bidi-language: FA;">The design process begins with the simulation of a classroom example using Rhino/Grass Hopper computational design software and using the Climate Studio plugin. …”
Get full text
Article -
3209
Sickle Cell Disease in Africa: SickleInAfrica Registry in Ghana, Nigeria and Tanzania
Published 2025-06-01Get full text
Article -
3210
-
3211
-
3212
State-of-the-Art Review of the Simulation of Dynamic Recrystallization
Published 2024-10-01“…Mean field models are used to implicitly describe the DRX process and are embedded into a finite element (FE) program for forming. These models provide recrystallization volume fraction and average grain size in the FE results without requiring extra computational resources. …”
Get full text
Article -
3213
Seabed Geoacoustic Analysis Using Scientific Single Beam Echosounder
Published 2024-08-01Get full text
Article -
3214
-
3215
Binary Decision Support Using AHP: A Model for Alternative Analysis
Published 2025-05-01Get full text
Article -
3216
CBCT Validation Study on Intraclass Correlation for Linear Measurements in Peri-implantitis: an Observational Study
Published 2025-03-01“…Objectives: This retrospective observational study aimed to evaluate the reliability and reproducibility of intra-examiner and inter-examiner bone loss measurements in cone-beam computed tomography images over time, on patients with peri-implant defects using two cone-beam computed tomography software programs: 3D Slicer and Dolphin Imaging. …”
Get full text
Article -
3217
-
3218
-
3219
Artificial intelligence, chess and the risks of modern civilization
Published 2024-12-01“…At the same time, an appeal to chess topics shows that one of the most pressing problems in chess – related to the development of computer technology – is cheating – the use of chess programs to achieve victory dishonestly. …”
Get full text
Article -
3220
A METHOD FOR SOLVING THE CANONICAL PROBLEM OF TRANSPORT LOGISTICS IN CONDITIONS OF UNCERTAINTY
Published 2021-07-01“…In order to accelerate the convergence of the computational procedure to the exact solution, an alternative method is proposed based on the solution of a nontrivial problem of fractional nonlinear programming. …”
Get full text
Article