Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
1441
Convex Optimization of Markov Decision Processes Based on Z Transform: A Theoretical Framework for Two-Space Decomposition and Linear Programming Reconstruction
Published 2025-05-01“…This study establishes a novel mathematical framework for stochastic maintenance optimization in production systems by integrating Markov decision processes (MDPs) with convex programming theory. We develop a Z-transformation-based dual-space decomposition method to reconstruct MDPs into a solvable linear programming form, resolving the inherent instability of traditional models caused by uncertain initial conditions and non-stationary state transitions. …”
Get full text
Article -
1442
-
1443
A Mixed-Integer Linear Programming Model for Addressing Efficient Flexible Flow Shop Scheduling Problem with Automatic Guided Vehicles Consideration
Published 2025-03-01“…By using the adjacent sequence modeling idea, a mixed-integer linear programming (MILP) model is established, which takes into account the constraints of the production process and AGV transportation task conflicts with the aim of minimizing the makespan and improving overall operational efficiency. …”
Get full text
Article -
1444
From Breakers to Builders: The Role of Bug Bounty Hunters in Strengthening Organizational Cybersecurity
Published 2025-03-01Get full text
Article -
1445
Virtual Node-Driven Cloud–Edge Collaborative Resource Scheduling for Surveillance with Visual Sensors
Published 2025-01-01“…These systems comprise visual sensors, edge computing boxes, and cloud servers. Resource scheduling algorithms are critical to ensure such systems’ robustness and efficiency. …”
Get full text
Article -
1446
COMMENTARY: LEARNER-BASED LISTENING AND TECHNOLOGICAL AUTHENTICITY
Published 2007-02-01Get full text
Article -
1447
Internet Use for Creative Purposes and Its Correlation with Perceived Usefulness, Computer Anxiety, and Emotional Intelligence: The Intermediary Effect of the Perceived Ease of Use
Published 2025-02-01“…This study aims to empirically examine teachers’ use of the internet for creative purposes and explores its relationship with emotional intelligence, computer anxiety, and the perceived ease of use of the internet. …”
Get full text
Article -
1448
SET-THEORETIC OPERATION OF INTERSECTION OF TOPOLOGICAL OBJECTS-POLYGONS ON THE PLANE
Published 2019-12-01“…Creating a control program for image generation generates a large number of problems, many of which are solved by methods of computational geometry and usually operate with geometric objects such as polygon or rectangle. …”
Get full text
Article -
1449
-
1450
Investigation of structural frustration in symmetric diblock copolymers confined in polar discs through cell dynamic simulation
Published 2024-10-01“…Comparison of computational results with existing studies validates this study and identifies defects and new patterns.…”
Get full text
Article -
1451
CircPac: A web-based analysis toolset for exploring circular RNA dataGitHub
Published 2025-08-01Get full text
Article -
1452
A Normal Mode Model Based on the Spectral Element Method for Simulating Horizontally Layered Acoustic Waveguides
Published 2024-08-01“…Based on these algorithms, we have developed a numerical program (SEM). This research verifies the accuracy of the spectral element model through three different types of numerical experiments.…”
Get full text
Article -
1453
An Analysis of the Visual Complexity on Academic Library Websites Based on Berlyne’s Complexity Theory
Published 2023-07-01“…Computational aesthetics is a field that combines science and art to explore aesthetic measurement, generative art, and design generation using computational methods. …”
Get full text
Article -
1454
-
1455
Exploring mechanical performance in Al-Pt binary alloys through molecular dynamics simulations
Published 2025-12-01Get full text
Article -
1456
-
1457
Comprehensive Bioactive Compound Profiling of Artocarpus heterophyllus Leaves: LC-MS/MS Analysis, Antioxidant Potential, and Molecular Insights
Published 2025-02-01“…Tamansari, Bandung, 40116, Indonesia; 5Study Program in Skin Aging and Medical Aesthetics, Faculty of Medicine, Universitas Jenderal Achmad Yani, Jl. …”
Get full text
Article -
1458
Effects of Computer-Assisted Working Memory Training Programme on Working Memory Ability and Mathematical Performance of Children at Risk of Mathematical Learning Difficulties
Published 2024-08-01“…The purpose of this study was to investigate the effect of a computer-assisted working memory training programme on the working memory ability and mathematical performance of children at risk of mathematical learning difficulties. …”
Get full text
Article -
1459
Development of a 3D-Printed Chest Phantom with Simulation of Lung Nodules for Studying Ultra-Low-Dose Computed Tomography Protocols
Published 2024-12-01“…This study aimed to 3D print a patient-specific chest phantom simulating multiple lung nodules to optimise low-dose Computed Tomography (CT) protocols for lung cancer screening. …”
Get full text
Article -
1460
Pattern-Based Test Suite Reduction Method for Smart Contracts
Published 2025-01-01Get full text
Article