Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
601
Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing
Published 2025-01-01Subjects: Get full text
Article -
602
Colour analysis of children's drawings of gods using computer vision
Published 2025-01-01“…In our experimental study, we use computer vision to identify the colours of drawings of God in Catholic school children (N = 360) and compare the process and results of analysis using K-means clustering and a classification approach. …”
Get full text
Article -
603
PARALLEL COMPUTING IN THE HEAT AND MOISTURE TRANSFER USING SPS SOFTWARE
Published 2016-09-01Get full text
Article -
604
5G edge computing development and application for industrial internet
Published 2021-01-01Subjects: Get full text
Article -
605
Blind signature scheme based on trusted platform computation module
Published 2013-08-01“…Compared with the traditional scheme, the proposed scheme has better computational efficiency.…”
Get full text
Article -
606
Scientific and Technical Texts: Translation Aspects in Electrical and Computer Engineering
Published 2024-11-01Subjects: Get full text
Article -
607
Mutual authentication scheme based on the TPM cloud computing platform
Published 2012-11-01Subjects: “…cloud computing…”
Get full text
Article -
608
Data management based on blockchain and edge computing for Internet of things
Published 2020-06-01Subjects: Get full text
Article -
609
Study on virtual computing resource scheduling for network performance optimization
Published 2016-08-01Subjects: “…cloud computing…”
Get full text
Article -
610
Application of computational modeling to the kinetics of precipitation of aluminum nitride in steels
Published 2012-01-01“…The precise knowledge of the precipitation-dissolution behavior of AlN in special in these two latter classes of steels is of great importance to their correct processing. In this work, a computational tool for simulating multiparticle precipitation kinetics of diffusion-controlled processes in multi-component and multi-phase alloy systems is employed in an attempt to describe these precipitation processes. …”
Get full text
Article -
611
Improving of computed tomography images for effective diagnosis of gunshot wounds
Published 2024-11-01Subjects: “…computed tomography…”
Get full text
Article -
612
Multi-objective task offloading algorithm for mobile cloud computing
Published 2019-09-01Subjects: “…mobile cloud computing…”
Get full text
Article -
613
Mechanism of Substrate Activation by Tryptophan Hydroxylase: A Computational Study
Published 2025-01-01“…In this work, we present a computational study ranging from molecular dynamics (MD) to quantum mechanics (QM) methods, focused on the mechanism of tryptophan hydroxylase. …”
Get full text
Article -
614
Approach of service evaluation based on trust reasoning for cloud computing
Published 2011-01-01“…The credibility reasoning and deducing of SC and SP were proposed,which were mainly in the direct trust re-lationship established in interactive process among service entities,the public credibility of the feedback system as a sup-plement.The model used probability density function to represents the credibility of entities based on probability theory,which systematically proposed the reasoning and deducing methods of computing,reasoning and merging based on trust relationship in probability density.Then a new method of correcting QoS of SP entities was provided.Finally,the algo-rithm based on trust reasoning and correcting of QoS service was provided.This model can effectively evaluate the credi-bility of service participants,weakening the influence of unreliable entities in service evaluation and enhancing the quali-ties and accuracy of result in service selection through simulated experiment.…”
Get full text
Article -
615
Application of the Logistics Management System Based on Cloud Computing Technology
Published 2022-01-01“…In order to solve the vehicle routing optimization problem of cold chain logistics distribution, this paper proposes a vehicle routing optimization method of cold chain logistics distribution based on cloud computing technology. This paper analyzes the advantages of processing the real-time routing of distribution vehicles under the cloud computing mode and establishes the application service architecture of vehicle routing optimization in cold chain logistics; under this architecture, multisource real-time traffic information is obtained, the vehicle distribution time and comprehensive cost are analyzed, the vehicle routing optimization model of cold chain logistics distribution is constructed, and the coarse-grained parallel genetic algorithm is used to solve the model in the cloud computing environment. …”
Get full text
Article -
616
An SLBRS Model with Vertical Transmission of Computer Virus over the Internet
Published 2012-01-01Get full text
Article -
617
Computational frameworks transform antagonism to synergy in optimizing combination therapies
Published 2025-01-01“…This review systematically analyzes computational methods for predicting drug combination effects through multi-omics data integration. …”
Get full text
Article -
618
Secure OpenID Authentication Model by Using Trusted Computing
Published 2014-01-01“…Trusted Platform Module (TPM) and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. …”
Get full text
Article -
619
STUDY OF WORKING CONDITIONS ON WORKING PLACES OF ELECTRONIC COMPUTERS USERS
Published 2009-08-01“…The results of investigations of parameters of industrial environment of the personal computers users and recommendations on decrease of influence on the organism of workers are given.…”
Get full text
Article -
620
Construction and optimization of a smart classroom system for emotional computing
Published 2024-06-01Subjects: “…emotional computing…”
Get full text
Article