Showing 3,321 - 3,340 results of 7,651 for search 'programs computational', query time: 0.16s Refine Results
  1. 3321

    About the Transformation of Accountancy under the Influence of Information Technology by R. P. Bulyga

    Published 2019-01-01
    “…On the basis of the research the authors conclude that the influence of information technology on the accounting and audit functions will result in intellectualization of the profession and the use of larger data arrays compiled by IT tools and programs to make professional judgment.…”
    Get full text
    Article
  2. 3322

    Optimization of fractional composition of the excipient in the elastomeric covering for asphalt highways by E. M. Nurullaev, A. S. Ermilov

    Published 2013-04-01
    “…The computational method of optimum fractional composition of a dispersible filler of polymeric composite on the basis of three-dimensionally linked elastomer is developed according to non-linear programming. …”
    Get full text
    Article
  3. 3323

    Multimedia applications for the hearing impaired by Andrzej CZYŻEWSKI, Henryk SKARŻYŃSKI

    Published 2014-04-01
    “…The system for mass-scale hearing screening is one of multimedia programs for testing communication senses introduced by the authors. …”
    Get full text
    Article
  4. 3324

    Latent Tuberculosis Infection and Residual Post-Tuberculous Changes in Children by Tatyana Y. Tyulkova, Alesya V. Mezentseva

    Published 2018-01-01
    “…It was  noted that with the introduction of new technologies (computer  programs, immunological tests) into the practice of a  phthisiopaediatrician, small calcified foci in the intrathoracic lymph  nodes and lungs, previously invisible with traditional radiation  methods of examination (plan radiography, fluorography), began to  be detected more often. …”
    Get full text
    Article
  5. 3325

    Redefining and solving the digital divide and exclusion to improve healthcare: going beyond access to include availability, adequacy, acceptability, and affordability by Laronda A. Hollimon, Laronda A. Hollimon, Kayla V. Taylor, Kayla V. Taylor, Rachel Fiegenbaum, Rachel Fiegenbaum, Mary Carrasco, Mary Carrasco, Laurent Garchitorena Gomez, Laurent Garchitorena Gomez, Debbie Chung, Azizi A. Seixas, Azizi A. Seixas, Azizi A. Seixas

    Published 2025-04-01
    “…For adequacy, solutions like AI-driven broadband performance monitoring, funding edge computing in remote regions, and treating broadband as a public utility can enhance internet speed and quality Acceptability tackles cultural and social barriers, including digital literacy gaps, language differences, and technophobia, which can be addressed through localized literacy programs and inclusive design practices. …”
    Get full text
    Article
  6. 3326

    Validation of Chromatographic Methods: Checking the Peak Purity and the Specificity of Methods with Diode Array Detectors (Review) by N. A. Epshtein

    Published 2020-08-01
    “…In this regard, we considered the main criteria and key points for assessing the spectral purity of peaks when using computer programs of Agilent's, Shimadzu's, and Waters's chromatographs. …”
    Get full text
    Article
  7. 3327

    Problems for combinatorial numbers satisfying a class of triangular arrays by Igoris Belovas

    Published 2023-11-01
    “…In this work, we derive the general analytic expression of the numbers satisfying a class of triangular arrays and propose problems (both teaching and unsolved ones) for undergraduates studying probability theory and analytical combinatorics subjects in the study programs of the fields of mathematics and computer science. …”
    Get full text
    Article
  8. 3328
  9. 3329

    The Influence of Bores Diameter on the SEM's Objective Lens Properties by Rafa Y. J. Al-Salih

    Published 2023-01-01
    “…An extensive investigation has been done to analyze the magnetic field distribution, magnetic flux density, and optical properties for each model using the finite element method (FEM) with the computer-aided programs. All the analyses have been carried out at the same coil excitation (NI = 10 kA.t). …”
    Get full text
    Article
  10. 3330

    Visual Experiment Results (About the 2021 Nobel Prize in Economic Sciences) by Yu. P. Voronov

    Published 2022-05-01
    “…The methods and results of the laureates’ research on assessing the consequences of state programs and structural decisions are also analysed. …”
    Get full text
    Article
  11. 3331

    Lossy-and-Constrained Extended Non-Local Games with Applications to Quantum Cryptography by Llorenç Escolà-Farràs, Florian Speelman

    Published 2025-04-01
    “…We give applications of this result, and we compute SDPs that show tighter security of protocols for relativistic bit commitment, quantum key distribution, and quantum position verification.…”
    Get full text
    Article
  12. 3332

    Adaptability Evaluation of Vocational Education and Economic Development Under the Bipolar Neutrosophic Sets by Chen Yuan, Yongye Chen

    Published 2025-04-01
    “…The results show that Public Vocational Training Institutions is the best alternative and the Corporate Training and Upskilling Programs is the worst alternative. …”
    Get full text
    Article
  13. 3333
  14. 3334

    Sustainable energy: Advancing wind power forecasting with grey wolf optimization and GRU models by Zainab Al-Ibraheemi, Samaher Al-Janabi

    Published 2024-12-01
    “…This research addresses both programming and application challenges. Programming challenges include high computational demands and the trial-and-error nature of parameter determination in deep learning, mitigated by using GWO. …”
    Get full text
    Article
  15. 3335
  16. 3336

    THE PERSPECTIVES OF INFORMATION AND COMMUNICATION TECHNOLOGY OF EDUCATION OF STUDENTS IN HIGHER EDUCATIONAL INSTITUTIONS OF UKRAINE by Oleksii Voronkin

    Published 2015-10-01
    “…It was determined that the greatest prospects will be: blended learning; research teaching method and heuristic teaching method; student-centered approach; increasing the role of informal education; the formation of students' abilities to independently acquire knowledge; short-term distance learning programs; portable computing devices; the new human machine interfaces; free and open-source software; cloud computing; artificial intelligence technology (search computing with elements of semantics, linguistic systems, decision support system); integrated, multidisciplinary and interdisciplinary training of teachers. …”
    Get full text
    Article
  17. 3337

    Designing and Delivering a Public Health Informatics Course by William Olmstadt, Gale G. Hannigan

    Published 2000-11-01
    “…Public health practitioners now do much of their surveillance, advocacy, reporting, data analysis, and data collection via the web or on a computer. However, students in Master of Public Health programs rarely receive adequate training on the use of information technology. …”
    Get full text
    Article
  18. 3338

    Analysis of electric field in inclined dielectric media by heaviside unit-step function by In-Su Han

    Published 2025-04-01
    “…In general, an electric field for an electric device to be designed is usually calculated using a commercial numerical analysis program. However, numerical analysis programs are very expensive, require high specifications for computers, and are also insufficient to have a physical understanding of the trends in electric fields. …”
    Get full text
    Article
  19. 3339

    Awareness, Knowledge, Attitude, and Skills of Physicians and Nurses Toward Telemedicine in a Low‐ and Middle‐Income Country: A Cross‐Sectional Study by Fatemeh Dahmardeh Kemmak, Parviz Marouzi, Masoumeh Sarbaz, Seyyedeh Fatemeh Mousavi Baigi, Mostafa Sheykhotayefeh, Khalil Kimiafar

    Published 2025-03-01
    “…Furthermore, participants' awareness levels varied significantly based on educational level, computer literacy, telemedicine training, and willingness to engage in training programs (p < 0.05). …”
    Get full text
    Article
  20. 3340

    Experiential Learning Builds Cybersecurity Self-Efficacy in K-12 Students by Abdullah Konak

    Published 2018-07-01
    “…In this paper, we first introduce a weeklong K-12 program focusing on critical thinking, problem-solving, and igniting interest in information security through hands-on activities performed in a state-of-the-art virtual computer laboratory. …”
    Get full text
    Article