-
1
-
2
-
3
«Moral depreciation» of personal computer software as one of factors in reducing labor productivity at enterprise
Published 2021-02-01“…In this article, the author examines the issue of «moral depreciation» of personal computer software and shows how it can affect the productivity of an organization. …”
Get full text
Article -
4
COMPUTER SOFTWARE AIDED PHOTOCATALYTIC DEGRADATION OF VAT YELLOW DYE USED IN LEATHER AND TEXTILE INDUSTRIES
Published 2023-11-01“…Analysis of these results was carried out using minitab18 computer software. The result revealed the best conditions for the photodegredation as (20mg/l) (dye concentration), 2(mg/L) (catalyst dosage), 3.39 pH and 45 minutes (time of exposure). …”
Get full text
Article -
5
A Computational Model of Attention-Guided Visual Learning in a High-Performance Computing Software System
Published 2024-12-01Get full text
Article -
6
-
7
USAGE OF COMPUTERISED MEANS IN VOCAL ASSESSMENT
Published 2012-12-01Subjects: “…computer software…”
Get full text
Article -
8
Exploratory study to examine the neuroendocrinological changes in typically developing adults during a music-related participatory practice using computer software
Published 2025-01-01“…The emergence of computer software to create music (CSCM) has lowered the barriers to musical technical skills and theory, making music composition more accessible. …”
Get full text
Article -
9
Role-based fine-grained delegation constraint framework in collaborative environments
Published 2008-01-01Subjects: “…computer software…”
Get full text
Article -
10
Development of Machine Setting Calculation and Meshing Simulation Software for Oerlikon Cycloid Bevel Gear
Published 2016-01-01Subjects: Get full text
Article -
11
MODELING OF POWER SYSTEMS AND TESTING OF RELAY PROTECTION DEVICES IN REAL AND MODEL TIME
Published 2017-05-01Subjects: Get full text
Article -
12
-
13
-
14
-
15
Real-time predication and navigation on traffic congestion model with equilibrium Markov chain
Published 2018-04-01Get full text
Article -
16
Overview of control-flow hijacking attack and defense techniques for process
Published 2019-12-01“…Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized.…”
Get full text
Article -
17
Determination of Energy Capacity and Suitable Location Selection Criteria in Flexible Rock Barriers Against Rockfall Risks
Published 2025-01-01“…During the determination of these criteria, calculated energy, speed, bounce height values and trajectories were compared with the computer software results. As a result of the comparisons, it was seen that there were no significant differences in the block bounce heights and surface contact points, but the kinetic energy values obtained in the calculations (2515 kJ) were higher than the kinetic energy result given by the computer software (1600 kJ). …”
Get full text
Article -
18
-
19
A Novel Reliability Assurance Method for Cyberphysical System Components Substitution
Published 2012-11-01Get full text
Article -
20
l0 Sparsity for Image Denoising with Local and Global Priors
Published 2015-01-01Get full text
Article