Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
6861
-
6862
-
6863
Solar Potential assessment of 600 MW Grid connected Photovoltaic System for Remote area in South Punjab
Published 2024-12-01Get full text
Article -
6864
Communicating Risks with Interactive Visualisations and Reflective Tasks
Published 2025-01-01Get full text
Article -
6865
Offshore wind farm layout optimization with alignment constraints
Published 2025-08-01Get full text
Article -
6866
Selección de cadenas para equipos de transporte continuo. // Chain selection software for continuous conveyors.
Published 2003-01-01“…Therefore the SELCAD computation program is conceived for the<br />use by non experts in design and selection of continuous conveyors equipments. …”
Get full text
Article -
6867
Utilizing brown mushroom stem waste as an eco-friendly alternative to soybean meal in layer chick nutrition
Published 2025-08-01Get full text
Article -
6868
-
6869
-
6870
Hybrid nanofluid flow around a circular cylinder: A coupled ANN and numerical study of MHD, bioconvection, and thermal radiation
Published 2025-06-01“…The algorithm bvp4c is used to assess the simplified mathematical model computationally in the MATLAB software program. The results, such as velocity, temperature, concentration, and bioconvection, are obtained graphically. …”
Get full text
Article -
6871
Radiological and Clinical Prognostic Factors of Recurrence of Subacute and Chronic Subdural Hematomas
Published 2023-11-01“…Based on recurrence rate, patients were divided into different subtypes based on computer tomography (CT) imaging. Descriptive analysis, hypothesis testing and correlation matrix were performed using Excel spreadsheet and R programming language with the significance at p-value < 0.05. …”
Get full text
Article -
6872
An EPIQ Mass Shelter Training for Public Health Nurses in Georgia to Improve Core Competencies in Disaster Preparedness: A Pilot Study
Published 2025-01-01“…In addition, an overall familiarity score was computed as the sum of responses for each participant in the EPIQ survey (max of 90) and compared using a pre to post paired t-test to determine if there was an overall statistical change. …”
Get full text
Article -
6873
Abstract 256: Proposal of multimodal CT‐based scoring system in prediction of hemorrhagic transformation in acute ischemic stroke
Published 2023-11-01“…Introduction The routinely used computed tomography (CT)‐based workup in the setting of acute ischemic stroke (AIS) includes non‐contrast brain CT, CT angiography (CTA), and CT perfusion. …”
Get full text
Article -
6874
Tensionless string limits in 4d conformal manifolds
Published 2025-08-01“…Abstract Drawing on insights from the Swampland program, we initiate a classification of infinite distance limits in the conformal manifolds of 4d SCFTs. …”
Get full text
Article -
6875
Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range
Published 2023-02-01“…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
Get full text
Article -
6876
Comparison of algorithms for multi-objective optimization of radio technical device characteristics
Published 2022-12-01“…The computer experiments demonstrated the capability of GDE3 to solve all considered problems. …”
Get full text
Article -
6877
Population Estimate of Anubis Baboon (Papio anubis) and Its Conflict With Farmers Around Kelebet Wonber Monastery, Antsokia Gemza District, North Shewa Zone, Amhara, Ethiopia
Published 2025-01-01“…All data were analyzed by using the SPSS version 26 computer software program. A total of 448 and 432 baboons were counted during the dry and wet seasons, respectively. …”
Get full text
Article -
6878
ABOUT LEGALIZATION OF EXHAUST (MAINING) CRYPTOCURRENCY BY THE TYPE OF ECONOMIC ACTIVITY
Published 2018-05-01“…Three ways of determining the amount of taxes are proposed: 1) granting access to representatives of the fiscal body to the computer program and purses of the cryptocurrency; 2) through the calculation by the representatives of the fiscal body of the average monthly volume of production of units of crypto currency for a certain equipment and, accordingly, in proportion to it, the amount of tax; 3) in proportion to the amount of electricity spent. …”
Get full text
Article -
6879
Formation of a database of auxiliary information for positioning in an environment with heterogeneous radio transparency
Published 2025-02-01“…The aim of the work is to improve this algorithm by automating the stage of preparing information about the grouping of stations.Methods. A computer simulation method was used, in order to confirm the operability of the algorithm to divide the stations of the positioning system into overlapping groups.Results. …”
Get full text
Article -
6880
Implementation of Image Enhancement and Edge Detection Algorithm on Diabetic Retinopathy (DR) Image Using FPGA
Published 2023-01-01“…The proposed model is utilized to articulate a proficient model for the design and execution of field programable gate array (FPGA)-based image enhancement processes along with the Sobel edge detection algorithm upon DR images. …”
Get full text
Article