Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
1261
A Computational Complexity-Based Method for Predicting Scholars’ Ages through Articles’ Information
Published 2021-01-01“…Our method first classifies factors that affect scholars’ ages into intuitive and complex types according to their computational complexity and then apply machine learning algorithms to predict the ages of scholars based on these factors. …”
Get full text
Article -
1262
A privacy budget adaptive optimization scheme for federated computing power Internet of things
Published 2024-12-01Subjects: “…federated computing power IoT…”
Get full text
Article -
1263
Stability and computational analysis of Influenza-A epidemic model through double time delay
Published 2025-01-01Subjects: Get full text
Article -
1264
Cone Beam Computed Tomographic Evaluation and Diagnosis of Mandibular First Molar with 6 Canals
Published 2016-01-01“…This case report presents the management of a mandibular first molar with six root canals, four in mesial and two in distal root, and also emphasizes the use and importance of Cone Beam Computed Tomography (CBCT) as a diagnostic tool in endodontics.…”
Get full text
Article -
1265
Mathematical Analysis of the Prey-Predator System with Immigrant Prey Using the Soft Computing Technique
Published 2022-01-01“…Furthermore, we present a novel soft computing technique named LeNN-WOA-NM algorithm for solving the mathematical model of the prey-predator system with immigrant prey. …”
Get full text
Article -
1266
Discriminating neural ensemble patterns through dendritic computations in randomly connected feedforward networks
Published 2025-01-01Subjects: Get full text
Article -
1267
New Method of Sensitivity Computation Based on Markov Models with Its Application for Risk Management
Published 2022-01-01“…Sensitivity analysis is at the core of risk management for financial engineering; to calculate the sensitivity with respect to parameters in models with probability expectation, the most traditional approach applies the finite difference method, whereafter integration by parts formula was developed based on the Brownian environment and applied in sensitivity analysis for better computational efficiency than that of finite difference. …”
Get full text
Article -
1268
Methods, algorithms and programs of computer algebra in problems of registration and analysis of random point structures
Published 2023-12-01Subjects: “…methods of computer algebra…”
Get full text
Article -
1269
Possibility of critical practice in computational design: applications on boundaries between public and private space
Published 2018-02-01Subjects: Get full text
Article -
1270
Construction of Mental Health Education Model Based on Computer Multimedia Group Psychological Measurement
Published 2021-01-01“…Modern people's concept of health is more comprehensive; in addition to physical health, they focus on mental health even more. Computer multimedia group psychological measurement is introduced, and a mental health education model is constructed in this paper. …”
Get full text
Article -
1271
Data Analysis and Results of the Radiation-Tolerant Collaborative Computer On-Board OPTOS CubeSat
Published 2019-01-01“…The current evolution of the space missions demands to increase the computing capacities of the on-board computer while reducing its power consumption. …”
Get full text
Article -
1272
Confocal 3D DNA Cytometry: Assessment of Required Coefficient of Variation by Computer Simulation
Published 2006-01-01Get full text
Article -
1273
Computing ionization free energies of indicator dyes in micelles with fast growth alchemical transformation
Published 2024-06-01Get full text
Article -
1274
-
1275
Blockchain-based computing and wireless communication resource joint management double auction model
Published 2022-11-01Subjects: “…edge computing…”
Get full text
Article -
1276
Edge computing offloading policies and resource allocation considering system fairness in trusted environments
Published 2024-03-01Subjects: “…edge computing…”
Get full text
Article -
1277
Stability and Hopf Bifurcation for a Delayed Computer Virus Model with Antidote in Vulnerable System
Published 2017-01-01“…A delayed computer virus model with antidote in vulnerable system is investigated. …”
Get full text
Article -
1278
Anonymous authentication scheme based on one-off public key in pervasive computing environments
Published 2012-02-01Subjects: “…pervasive computing…”
Get full text
Article -
1279
-
1280
Advanced decision analytics with fuzzy logic integrating AI and computational thinking for personnel selection
Published 2024-12-01“…Advanced decision analytics, fuzzy logic, artificial intelligence, and computational thinking may be used to improve personnel selection in today's dynamic industry. …”
Get full text
Article