Showing 6,861 - 6,880 results of 7,651 for search 'programs computational', query time: 0.14s Refine Results
  1. 6861
  2. 6862
  3. 6863
  4. 6864
  5. 6865
  6. 6866

    Selección de cadenas para equipos de transporte continuo. // Chain selection software for continuous conveyors. by F. Aguilar Parés

    Published 2003-01-01
    “…Therefore the SELCAD computation program is conceived for the<br />use by non experts in design and selection of continuous conveyors equipments. …”
    Get full text
    Article
  7. 6867
  8. 6868
  9. 6869
  10. 6870

    Hybrid nanofluid flow around a circular cylinder: A coupled ANN and numerical study of MHD, bioconvection, and thermal radiation by Muhammad Fawad Malik

    Published 2025-06-01
    “…The algorithm bvp4c is used to assess the simplified mathematical model computationally in the MATLAB software program. The results, such as velocity, temperature, concentration, and bioconvection, are obtained graphically. …”
    Get full text
    Article
  11. 6871

    Radiological and Clinical Prognostic Factors of Recurrence of Subacute and Chronic Subdural Hematomas by Milda Paliulytė, Gytis Šustickas

    Published 2023-11-01
    “…Based on recurrence rate, patients were divided into different subtypes based on computer tomography (CT) imaging. Descriptive analysis, hypothesis testing and correlation matrix were performed using Excel spreadsheet and R programming language with the significance at p-value < 0.05. …”
    Get full text
    Article
  12. 6872

    An EPIQ Mass Shelter Training for Public Health Nurses in Georgia to Improve Core Competencies in Disaster Preparedness: A Pilot Study by Ashlie L. Pullen, Sonya Shinhoster

    Published 2025-01-01
    “…In addition, an overall familiarity score was computed as the sum of responses for each participant in the EPIQ survey (max of 90) and compared using a pre to post paired t-test to determine if there was an overall statistical change. …”
    Get full text
    Article
  13. 6873

    Abstract 256: Proposal of multimodal CT‐based scoring system in prediction of hemorrhagic transformation in acute ischemic stroke by Nada Elsaid

    Published 2023-11-01
    “…Introduction The routinely used computed tomography (CT)‐based workup in the setting of acute ischemic stroke (AIS) includes non‐contrast brain CT, CT angiography (CTA), and CT perfusion. …”
    Get full text
    Article
  14. 6874

    Tensionless string limits in 4d conformal manifolds by José Calderón-Infante, Irene Valenzuela

    Published 2025-08-01
    “…Abstract Drawing on insights from the Swampland program, we initiate a classification of infinite distance limits in the conformal manifolds of 4d SCFTs. …”
    Get full text
    Article
  15. 6875

    Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range by Zhe SUN, Hong NING, Lihua YIN, Binxing FANG

    Published 2023-02-01
    “…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
    Get full text
    Article
  16. 6876

    Comparison of algorithms for multi-objective optimization of radio technical device characteristics by A. V. Smirnov

    Published 2022-12-01
    “…The computer experiments demonstrated the capability of GDE3 to solve all considered problems. …”
    Get full text
    Article
  17. 6877

    Population Estimate of Anubis Baboon (Papio anubis) and Its Conflict With Farmers Around Kelebet Wonber Monastery, Antsokia Gemza District, North Shewa Zone, Amhara, Ethiopia by Destaw Gashaw, Dereje Yazezew

    Published 2025-01-01
    “…All data were analyzed by using the SPSS version 26 computer software program. A total of 448 and 432 baboons were counted during the dry and wet seasons, respectively. …”
    Get full text
    Article
  18. 6878

    ABOUT LEGALIZATION OF EXHAUST (MAINING) CRYPTOCURRENCY BY THE TYPE OF ECONOMIC ACTIVITY by B.V. Derevyanko, O.A. Turkot

    Published 2018-05-01
    “…Three ways of determining the amount of taxes are proposed: 1) granting access to representatives of the fiscal body to the computer program and purses of the cryptocurrency; 2) through the calculation by the representatives of the fiscal body of the average monthly volume of production of units of crypto currency for a certain equipment and, accordingly, in proportion to it, the amount of tax; 3) in proportion to the amount of electricity spent. …”
    Get full text
    Article
  19. 6879

    Formation of a database of auxiliary information for positioning in an environment with heterogeneous radio transparency by Mikhail N. Krizhanovsky, Olga V. Tikhonova

    Published 2025-02-01
    “…The aim of the work is to improve this algorithm by automating the stage of preparing information about the grouping of stations.Methods. A computer simulation method was used, in order to confirm the operability of the algorithm to divide the stations of the positioning system into overlapping groups.Results. …”
    Get full text
    Article
  20. 6880

    Implementation of Image Enhancement and Edge Detection Algorithm on Diabetic Retinopathy (DR) Image Using FPGA by Mumtahina Orthy, Sheikh Md. Rabiul Islam, Faijah Rashid, Md. Asif Hasan

    Published 2023-01-01
    “…The proposed model is utilized to articulate a proficient model for the design and execution of field programable gate array (FPGA)-based image enhancement processes along with the Sobel edge detection algorithm upon DR images. …”
    Get full text
    Article