Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
661
Evolutionary Algorithms and Quantum Computing: Recent Advances, Opportunities, and Challenges
Published 2025-01-01Subjects: Get full text
Article -
662
Optimization strategies in NOMA-based vehicle edge computing network
Published 2021-03-01Subjects: “…edge computing…”
Get full text
Article -
663
-
664
Evaluating the Utilization of the National Cancer Institute Computed Tomography Program for Calculating Size-specific Dose Estimate and Effective Dose in Computed Tomography in Thai Pediatric Patients
Published 2024-12-01Subjects: “…national cancer institute computed tomography…”
Get full text
Article -
665
Folate Receptor–Targeted Single-Photon Emission Computed Tomography/Computed Tomography to Detect Activated Macrophages in Atherosclerosis: Can It Distinguish Vulnerable from Stable Atherosclerotic Plaques?
Published 2014-01-01“…We investigated the feasibility of a folate-based radiopharmaceutical ( 111 In-EC0800) with high-resolution animal single-photon emission computed tomography/computed tomography (SPECT/CT) to differentiate between stable and vulnerable atherosclerotic plaques in apolipoprotein E 7 mice in which we can induce plaques with the characteristics of stable and vulnerable plaques by placing a flow-modifying cast around the common carotid artery. …”
Get full text
Article -
666
-
667
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection
Published 2019-01-01“…The feasibility of utilizing Granular Computing (GC) as a solution to the most current challenges in cybersecurity is researched. …”
Get full text
Article -
668
A Dynamic Bayesian Approach to Computational Laban Shape Quality Analysis
Published 2009-01-01“…Advances in Human-Computer Interaction…”
Get full text
Article -
669
Real-Time Evaluation of Breast Self-Examination Using Computer Vision
Published 2014-01-01“…The general objective of this paper is to design and develop a computer vision algorithm to evaluate the BSE performance in real-time. …”
Get full text
Article -
670
The Assessment of Spinal Alignment Based on a Computer-Assisted Electromechanical Device
Published 2024-12-01“…Subsequently, the data was transmitted to a computer over a Bluetooth module connection, following processing by the Arduino Nano microcontroller. …”
Get full text
Article -
671
Post-processing methods for delay embedding and feature scaling of reservoir computers
Published 2025-01-01“…Abstract Reservoir computing is a machine learning method that is well-suited for complex time series prediction tasks. …”
Get full text
Article -
672
Efficient Online Dynamic Allocation Algoritbm of Virtual Macbine in Cloud Computing
Published 2015-04-01Subjects: “…cloud computing…”
Get full text
Article -
673
CLOUD COMPUTING AND FINANCIAL PERFORMANCE OF LISTED DEPOSIT MONEY BANKS IN NIGERIA
Published 2024-12-01Subjects: Get full text
Article -
674
Correlation of Image Quality Metrics with Expert Perception for Industrial Computed Tomography
Published 2025-02-01“…This study contributes to a deeper understanding of the relationship between objective image quality metrics and subjective human perception in the context of industrial computed tomography. …”
Get full text
Article -
675
Computation of the topological entropy in chaotic biophysical bursting models for excitable cells
Published 2006-01-01Get full text
Article -
676
Identity-based cross-domain authentication scheme in pervasive computing environments
Published 2011-01-01Subjects: “…pervasive computing…”
Get full text
Article -
677
Unveiling the startup characteristics of pump as turbine using computational and experimental techniques
Published 2025-03-01Subjects: Get full text
Article -
678
Computationally Efficient Minimum-Time Motion Primitives for Vehicle Trajectory Planning
Published 2024-01-01“…In autonomous racing, motion primitives have been used as computationally faster alternatives to model predictive control, for online obstacle avoidance. …”
Get full text
Article -
679
Computer modeling of Vilnius University finance management in a process of studies
Published 2023-09-01“… In this work a computer simulation of Vilnius University financial management is completed. …”
Get full text
Article -
680
Empowering drones in vehicular network through fog computing and blockchain technology.
Published 2025-01-01“…Fog nodes strategically placed near IoT devices serve as computational resources for drones, ensuring quick service responses for deadline-driven tasks. …”
Get full text
Article