Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Business 6
- Computer security 4
- Design and construction 4
- Human-computer interaction 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Data processing 3
- Design 3
- Management 3
- Web sites 3
- BASIC (Computer program language) 2
- Cloud computing 2
- Computer simulation 2
- Data protection 2
- Digital techniques 2
- Education, Elementary 2
- Educational technology 2
- Handbooks, manuals, etc 2
- Internet 2
- Internet in education 2
- Java (Computer program language) 2
- Mass media 2
-
1501
Methods for Determining the Size of three-Dimensional Objects in Images
Published 2021-04-01Subjects: Get full text
Article -
1502
WLAN Mesh security association scheme in trusted computing environment
Published 2014-07-01Subjects: Get full text
Article -
1503
Examining Emphysematous Pyelonephritis: A Case Study on Diagnosis and Outcomes
Published 2024-12-01Subjects: Get full text
Article -
1504
-
1505
-
1506
Research on energy management of multi-user mobile edge computing offloading
Published 2019-03-01Subjects: Get full text
Article -
1507
-
1508
Application of Phi (<italic>Φ</italic>), the Golden Ratio, in Computing: A Systematic Review
Published 2025-01-01Subjects: Get full text
Article -
1509
Computation Simulation Research of Bushen Zhuangjin Decoction on Multi-target Effects in Delaying Cataplasia of Articular Cartilage
Published 2018-04-01Subjects: Get full text
Article -
1510
-
1511
Automated Blood Cell Detection and Classification in Microscopic Images Using YOLOv11 and Optimized Weights
Published 2024-12-01Subjects: Get full text
Article -
1512
DEVELOPMENT AND ADAPTATION OF VORTEX REALIZABLE MEASUREMENT SYSTEM FOR BENCHMARK TEST WITH LARGE SCALE MODEL OF NUCLEAR REACTOR
Published 2017-09-01Subjects: Get full text
Article -
1513
-
1514
Secure and verifiable multi-keyword searchable encryption scheme in cloud
Published 2021-04-01Subjects: “…cloud computing…”
Get full text
Article -
1515
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
Published 2021-03-01Subjects: Get full text
Article -
1516
Development of an autonomous chess robot system using computer vision and deep learning
Published 2025-03-01Subjects: Get full text
Article -
1517
Design of a small-scale and failure-resistant IaaS cloud using OpenStack
Published 2025-01-01Subjects: Get full text
Article -
1518
Research on security multi-party computing based on game theory
Published 2018-01-01Subjects: Get full text
Article -
1519
-
1520
Identity-based ring signature scheme under standard model
Published 2008-01-01Subjects: Get full text
Article