Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
841
Safety of electromagnetic factors for the workplace equipped with personal computers in residential premises
Published 2022-04-01“…The aim of this paper is to analyze the electromagnetic safety of 50Hz industrial frequency electrical networks in residential buildings when using workplaces equipped with personal computers (PCs), as well as to develop recommendations on reducing the impact of levels of industrial frequency electromagnetic fields on human health in residential premises.Methods. …”
Get full text
Article -
842
Trend of next generation network architecture:computing and networking convergence evolution
Published 2019-09-01Subjects: “…computing and networking convergence…”
Get full text
Article -
843
-
844
Corrigendum to “Computed Tomography Enterography: Quantitative Evaluation on Crohn’s Disease Activity”
Published 2018-01-01Get full text
Article -
845
Computational Screening of Glyme-Based Room-Temperature Aluminum Plating Solutions
Published 2025-01-01Get full text
Article -
846
Modeling the Hemodynamic Characteristics of the Carrotic Care Blood Based on Computer Tomography
Published 2021-10-01“…The purpose of the work was to conduct modeling of hemodynamics of blood flow and study the hemodynamic characteristics of blood vessels. 3D models of the carotid artery were constructed based on images of a computer tomography in the 3D SLICER software package. …”
Get full text
Article -
847
Swarming Computational Procedures for the Coronavirus-Based Mathematical SEIR-NDC Model
Published 2022-01-01“…The numerical solutions of the SEIR-NDC model are presented by using the computational framework of artificial neural networks (ANNs) together with the swarming optimization procedures aided with the sequential quadratic programming. …”
Get full text
Article -
848
Computer assisted language learning in English language classrooms in Bosnia and Herzegovina
Published 2020-12-01Subjects: “…computer-assisted language learning…”
Get full text
Article -
849
One Kind New Hybrid Power Mean and Its Computational Formulae
Published 2022-01-01“…The main purpose of this study is to use the elementary and analytic methods and the properties of the classical Gauss sums to study the calculation problems of one kind of hybrid power mean involving the quadratic character sums and the two-term exponential sums and give an exact computational formula for it.…”
Get full text
Article -
850
A New Model for Capturing the Spread of Computer Viruses on Complex-Networks
Published 2013-01-01“…Based on complex network, this paper proposes a novel computer virus propagation model which is motivated by the traditional SEIRQ model. …”
Get full text
Article -
851
Computing the Fixed Points of Strictly Pseudocontractive Mappings by the Implicit and Explicit Iterations
Published 2012-01-01“…In this paper, we devote to study computing the fixed points of strictly pseudocontractive mappings by the iterations. …”
Get full text
Article -
852
Demystifying early childhood computational thinking: An umbrella review to upgrade the field
Published 2024-12-01Subjects: “…computational thinking…”
Get full text
Article -
853
Edge computing business model and key solutions for its landing and deployment
Published 2020-09-01“…Edge computing is an innovation of network architecture and business model for operators.5G edge computing node is composed of 5G UPF and edge computing platform.It can be deployed at different levels of the network based on the demand for bandwidth,delay and local streaming.In the perspective of 5G application scenarios,depending on edge computing can meet the customer needs of differentiated vertical industries and seize the market opportunities,which is a sharp tool for operators to enter the vertical industry.The business model,billing scheme,landing deployment strategy and scheme of edge computing deployment were mainly studied,including business scenario,infrastructure,hardware system,site selection methodology,construction scheme,peripheral networking scheme,etc.…”
Get full text
Article -
854
Computing Assortative Mixing by Degree with the s-Metric in Networks Using Linear Programming
Published 2015-01-01“…The s-metric is normalized with respect to the class of networks without self-loops, multiple edges, and multiple components, while degree correlation is always normalized with respect to unrestricted networks, where self-loops, multiple edges, and multiple components are allowed. The challenge in computing the normalized s-metric is in obtaining the minimum and maximum value within a specific class of networks. …”
Get full text
Article -
855
Pseudo-Random Number Generators for Stochastic Computing (SC): Design and Analysis
Published 2024-01-01Subjects: Get full text
Article -
856
Quantum Vulnerability Analysis to Guide Robust Quantum Computing System Design
Published 2024-01-01Subjects: “…Quantum computing…”
Get full text
Article -
857
A Novel Cost Based Model for Energy Consumption in Cloud Computing
Published 2015-01-01“…To support green cloud computing, providers also need to minimize cloud infrastructure energy consumption while conducting the QoS. …”
Get full text
Article -
858
Computer analysis of regulation of hepatocarcinoma marker genes hypermethylated by HCV proteins
Published 2023-01-01Get full text
Article -
859
Estimated Interval-Based Checkpointing (EIC) on Spot Instances in Cloud Computing
Published 2014-01-01“…In cloud computing, users can rent computing resources from service providers according to their demand. …”
Get full text
Article -
860
Distributed, layered and reliable computing nets to represent neuronal receptive fields
Published 2013-09-01Subjects: “…layered and distributed computation…”
Get full text
Article