Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
941
-
942
CHARACTERISTICS OF LUNG FOCI REVEALED BY COMPUTED TOMOGRAPHY IN HIGH-RISK CHILDREN AND ADOLESCENTS FOR TUBERCULOSIS
Published 2016-06-01“…Objective: to give an X-ray pattern of single lung foci revealed by computed tomography (CT) in children and adolescents examined for tuberculosis. …”
Get full text
Article -
943
STUDENTS’ PERCEPTION OF COMPUTER-BASED TESTING-EDUBOX– AND ITS IMPACT ON THEIR ENGLISH LEARNING MOTIVATION
Published 2021-06-01Get full text
Article -
944
Effects of computer-assisted learning for removable partial denture design on learning outcomes and satisfaction
Published 2025-01-01“…Abstract Background Computer-assisted learning (CAL) has the potential to enhance learning outcomes and satisfaction. …”
Get full text
Article -
945
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01“…Since FPGAs can be defined as just one mission, computers are superior to them. …”
Get full text
Article -
946
Instant Feedback Rapid Prototyping for GPU-Accelerated Computation, Manipulation, and Visualization of Multidimensional Data
Published 2018-01-01“…A visual graph editor enables the design of processing pipelines without programming. Run-time compiled compute shaders enable prototyping of complex operations in a matter of minutes. …”
Get full text
Article -
947
Influence of Qigong training on reduction of harmful computer habits and their danger for students with weak health
Published 2017-10-01“…Students with weak health were trained by Qigong program (n=129). Results: Qigong training reduces total time of students, which they spent for computer habits. …”
Get full text
Article -
948
Joint Service Caching and Computing Offloading Strategies for Electrical Equipment Intelligent IoT Platform
Published 2022-04-01“…Further more, we proposed a generalized Benders decomposition algorithm combined with particle swarm optimization to solve the mixed integer programming efficiently. The simulation results show that the proposed strategy can effectively improve the task processing efficiency, reduce the computing cost of suppliers, and improve the service revenue of the service providers.…”
Get full text
Article -
949
Promises and breakages of automated grading systems: a qualitative study in computer science education
Published 2025-02-01“…However, their integration into university assessment practice poses challenges, particularly for teachers in computer science seeking to balance their workload while ensuring an adequate and fair assessment of students’ programming skills and knowledge. …”
Get full text
Article -
950
Image Encryption and Decryption Using Vigenere Cipher with Compute Unified Device Architecture (CUDA)
Published 2023-06-01“…Compute Unified Device Architecture (CUDA) adalah Application Programming Interface (API) NVIDIA dan platform yang memungkinkan akses langsung ke set instruksi GPU dan memberi dukungan untuk berinteraksi dengan GPU terkait komputasi paralel. …”
Get full text
Article -
951
Computer-based Simulation of Facial Flap and Cleft Lip Reconstruction Using Multiresolution Physics
Published 2025-06-01“…The dramatic reduction in finite element count results in a surgical simulation program that is quite fast, even on a modest personal computer. …”
Get full text
Article -
952
Fault-tolerant and mobility-aware loading via Markov chain in mobile cloud computing
Published 2025-05-01“…However, mobile devices’ limited memory, computing power, and battery life pose significant challenges to their widespread use. …”
Get full text
Article -
953
Intelligent End-Edge Computation Offloading Based on Lyapunov-Guided Deep Reinforcement Learning
Published 2024-11-01“…To address the end-edge computation offloading challenge in the multi-terminal and multi-server environment, this paper proposes an intelligent computation offloading algorithm based on Lyapunov optimization and deep reinforcement learning. …”
Get full text
Article -
954
The computer model of a neutron fluxes forming system on a linear electron accelerator
Published 2023-12-01“…A computer model of the system for generating neutron fluxes at the output of a linear electron accelerator has been developed in the Geant4 and PhysList QGSP BIC HP programming environment. …”
Get full text
Article -
955
COMPUTED TOMOGRAPHY PATTERN OF UNCHANGED MEDIASTINAL LYMPH NODES IN CHILDREN WITH UNINFECTED MYCOBACTERIUM TUBERCULOSIS
Published 2016-02-01“…Objective: to provide X-ray characteristics of mediastinal lymph nodes revealed by computed tomography (CT) in children and adolescents with uninfected Mycobacterium tuberculosis.Material and methods. …”
Get full text
Article -
956
Joint Demand Response and Task Offloading Strategy for 5G Edge Computing Network
Published 2022-10-01“…Along with the dramatic increase in demand for IoT communication computing, the 5G communication and edge computing network gradually become the emerging high energy consumption load. …”
Get full text
Article -
957
Assessment of Potential Live Kidney Donors and Computed Tomographic Renal Angiograms at Christchurch Hospital
Published 2016-01-01“…To examine the outcome of potential live kidney donors (PLKD) assessment program at Christchurch Hospital and, also, to review findings of Computed Tomographic (CT) renal angiograms that led to exclusion in the surgical assessment. …”
Get full text
Article -
958
Designing a Monitoring Tool for Mosul University Network to Detect Worm Infected Computers
Published 2013-07-01“…The present study tackles the problem of computers' vulnerability to malware such as worm: a self-replicate computer program that spontaneously copies itself to the vulnerable systems and spreads through the web exploiting security gaps and posing a great danger to the web community. …”
Get full text
Article -
959
New Strategies Based on Hierarchical Matrices for Matrix Polynomial Evaluation in Exascale Computing Era
Published 2025-04-01“…These include but are not limited to massive parallelism, effective exploitation, and high complexity in programming, such as heterogeneous computing facilities. …”
Get full text
Article -
960
Water temperature prediction in a subtropical subalpine lake using soft computing techniques
Published 2016-04-01“…In this paper, the performance of soft computing techniques including gene expression programming (GEP), which is a variant of genetic programming (GP), adaptive neuro fuzzy inference system (ANFIS) and artificial neural networks (ANNs) to predict hourly water temperature at a buoy station in the Yuan-Yang Lake (YYL) in north-central Taiwan at various measured depths was evaluated. …”
Get full text
Article