Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
901
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01Subjects: Get full text
Article -
902
Low computational complexity PTS scheme for PAPR reduction in OFDM system
Published 2009-01-01“…Concerning that the main drawback of conventional PTS was the large computational complexity, a new low computational complexity PTS (LCC-PTS) scheme was proposed. …”
Get full text
Article -
903
Predicting Carbon Residual in Biomass Wastes Using Soft Computing Techniques
Published 2022-01-01Get full text
Article -
904
Triple-Phase Computed Tomography and Sonoelastographic Evaluation in Focal Hepatic Lesions
Published 2024-12-01“…This study explores the effectiveness of triple-phase computed tomography (CT) and sonoelastography in evaluating focal hepatic lesions. …”
Get full text
Article -
905
Computational simulation of biaxial fatigue behaviour of lotus-type porous material
Published 2016-06-01“…A computational simulation of low-cycle fatigue behaviour of lotus-type porous material, subjected to biaxial in-phase loading cycles is presented in this paper. …”
Get full text
Article -
906
Developing novel Lin28 inhibitors by computer aided drug design
Published 2025-01-01“…In this contribution, we applied computer-aided drug design (CADD) in combination with quantitative biochemical and biological assays. …”
Get full text
Article -
907
Constructing a Private Cloud Computing Platform Based on OpenStack
Published 2012-09-01Subjects: “…private cloud computing…”
Get full text
Article -
908
Joint resource configuration method for secure fog computing Internet of things
Published 2023-07-01Subjects: “…fog computing…”
Get full text
Article -
909
Preface to the Iberoamerican Human-Computer Interaction Conference 2024 Special Issue
Published 2025-02-01“… Preface to the Iberoamerican Human-Computer Interaction Conference 2024 Special Issue …”
Get full text
Article -
910
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01Subjects: “…edge computing…”
Get full text
Article -
911
A computational deep learning investigation of animacy perception in the human brain
Published 2024-12-01“…These findings provide computational support that the Animal bias for zoomorphic objects is a unique property of human perception yet can be explained by human learning history.…”
Get full text
Article -
912
OK Computer: Analogue Death, Digital Rebirth, and Radiohead’s Electronic Turn
Published 2019-11-01Subjects: Get full text
Article -
913
Diagnostic criteria for asthenic accommodative asthenopia in patients with computer vision syndrome
Published 2020-11-01“…</i> </p> <p> <i><b>Keywords</b>: asthenopia, computer vision syndrome, accommodation, objective accommodography.…”
Get full text
Article -
914
Effects of Robotic Coding on Computational Thinking Skills of Secondary School Students
Published 2025-01-01Subjects: “…computational thinking…”
Get full text
Article -
915
Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network
Published 2014-01-01“…An SEIQRS model for the transmission of malicious objects in computer network with two delays is investigated in this paper. …”
Get full text
Article -
916
The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures
Published 2013-01-01“…The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). …”
Get full text
Article -
917
Enhancing Railway Maintenance Safety Using Open-Source Computer Vision
Published 2021-01-01“…Images of railway signs, tracks, and maintenance workers on the tracks were recorded through image data. The Computer Vision OpenCV library was utilized to extract the image data. …”
Get full text
Article -
918
Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations
Published 2014-01-01“…A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first. …”
Get full text
Article -
919
Computational and dynamic performance of NN-based control in wind energy systems
Published 2024-01-01“…To achieve this, we implement both control strategies on a LAUNCHXL-F28069M DSP board using Processor-In-the-Loop (PIL) techniques, enabling a direct comparison of their dynamic and computational performance. While NNC-based control shows superior adaptability and responsiveness, it consumes more computational resources than SMC, particularly in terms of execution time and power consumption. …”
Get full text
Article -
920
Computational Study of Cold-Formed-Steel X-Braced Shear Walls
Published 2018-01-01Get full text
Article