Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
1101
Interior Point Method for Solving Fuzzy Number Linear Programming Problems Using Linear Ranking Function
Published 2013-01-01“…But their computational complexities are exponential, which is not satisfactory for solving large-scale fuzzy linear programming problems, especially in the engineering field. …”
Get full text
Article -
1102
Entry Guidance for Hypersonic Glide Vehicles via Two-Phase hp-Adaptive Sequential Convex Programming
Published 2025-06-01“…Compared to pseudospectral solvers, the method achieves over 12× computational speed-up while maintaining kilometer-level accuracy. …”
Get full text
Article -
1103
PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES
Published 2024-05-01“…The adoption, in 2001, in Budapest, of the Council of Europe Convention on Cybercrime brought an important step forward in the prevention and combatting cyber-related crimes, through the creation of a special indictment (art. 6) against the production, sale, procurement for use, import, distribution, import or making available of devices, computer programs, passwords or any other such data with the scope to further illegal access to a computer system, interception without right of a computer data transmission, an illegal data interference or an illegal system interference, offences comprised in the art. 2 to 5 of the Convention. …”
Get full text
Article -
1104
Effects of a Computer Vision–Based Exercise Application for People With Knee Osteoarthritis: Randomized Controlled Trial
Published 2025-05-01“…In recent years, digital health applications have emerged as innovative tools for supervising and facilitating rehabilitation programs. Leveraging computer vision (CV) technology, these applications offer the potential to provide precise feedback and support personalized exercise interventions for patients with KOA in a scalable and accessible manner. …”
Get full text
Article -
1105
Evaluating Curriculum Alignment in University-Level Organic Chemistry Programs using N-Valued Neutrosophic Trapezoidal Numbers
Published 2025-07-01“…Curriculum alignment serves as a fundamental cornerstone in ensuring that educational programs meet both academic expectations and industry demands. …”
Get full text
Article -
1106
Predicting pile bearing capacity using gene expression programming with SHapley Additive exPlanation interpretation
Published 2025-03-01“…GEP is a computational technique that mimics biological gene expression processes to evolve computer programs or models capable of solving complex problems through the iterative generation, selection, and recombination of code segments. …”
Get full text
Article -
1107
A computational grounded theory based analysis of research on China’s old-age social welfare system
Published 2025-04-01“…This study applies Nelson’s computational grounded theory to systematically analyze China’s old-age social welfare research and propose targeted policy priorities.MethodsWe searched Chinese literature (2014–2024) from the Wanfang, CNKI, and CQVIP databases. …”
Get full text
Article -
1108
-
1109
-
1110
Lighting Design by Computer Software in Teaching and Practice: A Case Study in Vocational Training of Interior Design
Published 2024-09-01“…Students of the two-year vocational training program participated in this study to improve the quality of lighting design and understand lighting simulation programs. …”
Get full text
Article -
1111
A model study of teaching method reform of computer laboratory course integrating internet of things technology.
Published 2024-01-01“…In addition, the service deployment method based on edge computing is proposed in this paper to obtain the best deployment strategy and reduce the latency of the algorithm. …”
Get full text
Article -
1112
Orbit simulations with Maxima software
Published 2025-08-01“…Abstract The computational algebra system Maxima is used together with the fourth order Runge-Kutta method to generate simulations of orbits caused by the newtonian gravitational interaction. …”
Get full text
Article -
1113
Automatic differential kinematics of serial manipulator robots through dual numbers
Published 2024-10-01“…Also, Differential Kinematics of robots involves the computation of the Jacobian, which is a matrix of partial derivatives of the Forward Kinematic equations with respect to the robot’s joints. …”
Get full text
Article -
1114
THE TECHNIQUE OF ANALYSIS OF SOFTWARE OF ON-BOARD COMPUTERS OF AIR VESSEL TO ABSENCE OF UNDECLARED CAPABILITIES BY SIGNATURE-HEURISTIC WAY
Published 2017-03-01“…Consequently, the author suggests developing the basics of aviation rules and regulations, which allow to analyze the programs of CA aircraft onboard computers. If there are no software source codes the two approaches of code analysis are used: a structural static and dynamic analysis of the source code; signature-heuristic analysis of potentially dangerous operations. …”
Get full text
Article -
1115
Modeling of the electromagnetic field of radiating aperture
Published 2021-08-01“…This paper considers an approach to developing a computational model of a radiating aperture that may be used to calculate the characteristics of electromagnetic field in the intermediate and far zones. …”
Get full text
Article -
1116
Geny: a genotyping tool for allelic decomposition of killer cell immunoglobulin-like receptor genes
Published 2024-12-01“…Thus, specialized genotyping tools are needed to genotype this complex region.MethodsHere, we introduce Geny, a new computational tool for precise genotyping of KIR genes. …”
Get full text
Article -
1117
MLody—Deep Learning–generated Polarized Synchrotron Coefficients
Published 2024-01-01Get full text
Article -
1118
A Holistic Exploration of the Potentially Recoverable Redshift Information of Stage IV Galaxy Surveys
Published 2025-01-01Get full text
Article -
1119
Noninferiority and Equivalence Evaluation of Clinical Performance among Computed Radiography, Film, and Digitized Film for Telemammography Services
Published 2016-01-01“…Our findings suggest that telemammography screening programs may be provided to underserved populations at a low cost, using a film digitizer or a digital camera.…”
Get full text
Article -
1120
Development of optimised protocols for paediatric whole-body computed tomography examinations: a figure-of-merit approach
Published 2025-04-01“…Abstract Background Whole-body computed tomography (WBCT) technique involves higher radiation doses, resulting in increased stochastic health risks, especially when used for paediatric patients. …”
Get full text
Article