Showing 1 - 20 results of 104 for search '"Computer software"', query time: 0.16s Refine Results
  1. 1

    Introduction to Computer Software Applications / by Kurobuza ,Eddy Tukamushaba

    Published 2008
    View in OPAC
    Book
  2. 2
  3. 3

    «Moral depreciation» of personal computer software as one of factors in reducing labor productivity at enterprise by E. V. Medvedev

    Published 2021-02-01
    “…In this article, the author examines the issue of «moral depreciation» of personal computer software and shows how it can affect the productivity of an organization. …”
    Get full text
    Article
  4. 4

    COMPUTER SOFTWARE AIDED PHOTOCATALYTIC DEGRADATION OF VAT YELLOW DYE USED IN LEATHER AND TEXTILE INDUSTRIES by Olabode Victor O., Alogala J.A., Jinaidu Haruna M., Okon U.E, Jahkeng Williams E

    Published 2023-11-01
    “…Analysis of these results was carried out using minitab18 computer software. The result revealed the best conditions for the photodegredation as (20mg/l) (dye concentration), 2(mg/L) (catalyst dosage), 3.39 pH and 45 minutes (time of exposure). …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    USAGE OF COMPUTERISED MEANS IN VOCAL ASSESSMENT by Ana RUSU

    Published 2012-12-01
    Subjects: “…computer software…”
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    A practical Guide to Internet Filters / by Schneider, Karen G.

    Published 1997
    Subjects:
    View in OPAC
    Book
  14. 14
  15. 15
  16. 16

    Overview of control-flow hijacking attack and defense techniques for process by Fengfeng WANG, Tao ZHANG, Weiguang XU, Meng SUN

    Published 2019-12-01
    “…Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized.…”
    Get full text
    Article
  17. 17

    Determination of Energy Capacity and Suitable Location Selection Criteria in Flexible Rock Barriers Against Rockfall Risks by Eroltan Durmuş, Özkan Coruk, Ahmet Karakaş

    Published 2025-01-01
    “…During the determination of these criteria, calculated energy, speed, bounce height values and trajectories were compared with the computer software results. As a result of the comparisons, it was seen that there were no significant differences in the block bounce heights and surface contact points, but the kinetic energy values obtained in the calculations (2515 kJ) were higher than the kinetic energy result given by the computer software (1600 kJ). …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20