Showing 5,581 - 5,600 results of 7,651 for search 'programs computational', query time: 0.11s Refine Results
  1. 5581

    Enumeration, isolation, and identification of bifidobacteria from dairy products by Eva VLKOVÁ, Vojtěch RADA, Iva TROJANOVÁ

    Published 2004-12-01
    “…Subsequently, all strains were identified to the species level using computer program Bacter. The identification was also carried out by PCR method using genus- and species-specific primers. …”
    Get full text
    Article
  2. 5582

    Mathematical Model of an Open Area of Space Sensor by A. A. Jezhora, Y. A. Zavatski, A. V. Kovalenko, A. M. Naumenko

    Published 2020-03-01
    “…It allows you to calculate the electric fi of fl layered media with less time, using less powerful computers. The numerical calculation program is implemented in MAPLE.The program adequacy was checked for a sensor made on one-sided foil Tefl (ε1 = 2,3) with a thickness of b = 1.0 mm. …”
    Get full text
    Article
  3. 5583
  4. 5584
  5. 5585
  6. 5586
  7. 5587

    Information documents of the GPU–OGPU in 1920s: experience of text mining (based on materials from the North Caucasus) by Alexander Yu. Rozhkov, Timofey A. Runaev

    Published 2022-12-01
    “…Based on principles of the discourse-historical approach, authors indicated the possibility of using the RStudio computer program for intellectual analysis of the voluminous corpus of information reports and reviews of the GPU–OGPU of the 1920s on the materials of the North Caucasus. …”
    Get full text
    Article
  8. 5588

    A transformer based generative chemical language AI model for structural elucidation of organic compounds by Xiaofeng Tan

    Published 2025-07-01
    “…Abstract For over half a century, computer-aided structural elucidation systems (CASE) for organic compounds have relied on complex expert systems with explicitly programmed algorithms. …”
    Get full text
    Article
  9. 5589

    The Sea-Based Waste Collection Routing Problem Using a Novel Value Recovery Function by Ricardo C. Alindayu II, Jayne Lois San Juan, Charlle L. Sy

    Published 2024-12-01
    “…Two computer-generated instances with differing node sizes were used to illustrate the functionalities of the SB-WCRP. …”
    Get full text
    Article
  10. 5590

    Transit ridership survey by analysis validation of electronic pass tickets by A. I. Fadeev, S. Alhusseini

    Published 2021-03-01
    “…The algorithm for calculating passenger correspondence is implemented in a computer program using the relational DBMS MS SQL Server. …”
    Get full text
    Article
  11. 5591

    Microzonation Study Based on Ground Amplification for Erzincan City by Mehmet Özyazıcıoğlu, Kemal Dönmezçelik, Süleyman N. Orhan, M. Yener Özkan

    Published 2019-07-01
    “…The amplification ratios for each period are computed by dividing surface PSA to bedrock outcrop PSA. …”
    Get full text
    Article
  12. 5592

    Optimizing High-Speed Railroad Timetable with Passenger and Station Service Demands: A Case Study in the Wuhan-Guangzhou Corridor by Jin Wang, Leishan Zhou, Yixiang Yue, Jinjin Tang, Zixi Bai

    Published 2018-01-01
    “…We propose an integer programming model using a time-space network-based approach to consider passenger service demands, train scheduling, and station service demands simultaneously. …”
    Get full text
    Article
  13. 5593

    AN ASSESSMENT OF THE DISPLACEMENT OF A CAM FOLLOWER USING REGULA FALSI METHOD by KOLAWOLE ADESOLA OLADEJO, DARE ADERIBIGBE ADETAN, ADEKOLA OLAYINKA OKE, RAHAMAN ABU, GANIU AYOOLA LAMID

    Published 2021-06-01
    “…The analysis was done using a computer programming that enables verification of the results obtained and ascertaining whether the inputs are correct or not for the displacement in cam follower system. …”
    Get full text
    Article
  14. 5594

    Pengembangan Media Pembelajaran Berbasis IT dalam Pembelajaran PAI PAUD pada Era Society 5.0 by Budi Cahyono, Fauzi Fauzi

    Published 2021-05-01
    “…With IT-based media in delivering teaching materials and students can carry out their activities directly by interacting via computers, laptops and Android phones. For this reason, an interactive learning media application was made to introduce Islam by using one of the applicative programming. …”
    Get full text
    Article
  15. 5595

    Gröbner Basis Cryptanalysis of Ciminion and Hydra by Matthias Johann Steiner

    Published 2025-03-01
    “…For Hydra, with the help of a computer algebra program like SageMath we construct a DRL Gröbner basis for the iterated model via linear transformations and a linear change of coordinates. …”
    Get full text
    Article
  16. 5596

    Parallel Processing Distributed-Memory Approach Influences on Performance of Multicomputer-Multicore Systems Using Single-Process Single-Thread by Dildar Masood Abdulqader, Subhi R. M. Zeebaree, Rizgar R. Zebari, Mohammed A. M.Sadeeq, Umed H. Jader, Mohammed Mahmood Delzy

    Published 2024-01-01
    “…Both of number of the participated computers and number of existed processors for each of these computers, this research was depended with the specific design and its implementation. …”
    Get full text
    Article
  17. 5597

    Hardware, software and organizational means of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks" by A. R. Gazizov

    Published 2022-11-01
    “…To prevent unauthorized access to data by means of "sniffing attacks", the following software and hardware solutions are proposed to minimize the consequences of unauthorized exposure to the personal data information system: the use of the HTTPS protocol, a secure version of the HTTP protocol; the use of a static ARP table generated manually; scanning of the computer network of the personal data information system by the AntiSniff program; encryption of the computer network traffic networks of the personal data information system.Conclusion.The presented hardware and software solutions allow minimizing the consequences of unauthorized impact on personal data information systems.…”
    Get full text
    Article
  18. 5598
  19. 5599
  20. 5600

    A Massive Image Recognition Algorithm Based on Attribute Modelling and Knowledge Acquisition by Guohua Li, An Liu, Huajie Shen

    Published 2021-01-01
    “…Then, an efficient deep neural network mapping algorithm is designed and implemented for the microprocessing architecture and software programming framework of this edge processor, and a layout scheme is proposed to place the input feature maps outside the kernel DDR and the reordered convolutional kernel matrices inside the kernel storage body and to design corresponding efficient vectorization algorithms for the multidimensional matrix convolution computation, multidimensional pooling computation, local linear normalization, etc., which exist in the deep convolutional neural network model. …”
    Get full text
    Article