Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
1461
STUDY ON HEAT TRANSFER PERFORMANCE OF PLATE-FIN RADIATOR BASED ON COMPUTATIONAL FLUID DYNAMICS
Published 2016-01-01Get full text
Article -
1462
Computing of Transmission Ratio for ZF8HP 8-speed AT based on Lever Method
Published 2020-05-01Get full text
Article -
1463
-
1464
Moroccan natural products for multitarget-based treatment of Alzheimer's disease: A computational study.
Published 2025-01-01“…This study investigates the potential of phytochemical compounds from Moroccan medicinal plants as multi-target agents against Alzheimer's disease, employing computational approaches. A virtual screening of 386 phytochemical compounds, followed by an assessment of pharmacokinetic properties and ADMET profiles, led to the identification of two promising compounds, naringenin (C23) and hesperetin (C24), derived from Anabasis aretioides. …”
Get full text
Article -
1465
Experimental and computational investigation of the effect of machining parameters on the turning process of C45 steel
Published 2025-02-01“…The validity of the computational results was confirmed by comparing them with experimental findings on chip morphology and temperature rise during cutting. …”
Get full text
Article -
1466
Retracted: Behavior of Sports Tourism Consumers Based on Cloud Computing and Mobile Big Data
Published 2023-01-01“…Journal of Electrical and Computer Engineering…”
Get full text
Article -
1467
NON-KEYNESIAN EFFECTS OF FISCAL DISCIPLINE: A COMPUTABLE GENERAL EQUILIBRIUM ANALYSIS FOR TURKEY
Published 2005-06-01Get full text
Article -
1468
Two-Step Root-MUSIC for Direction of Arrival Estimation without EVD/SVD Computation
Published 2018-01-01“…Most popular techniques for super-resolution direction of arrival (DOA) estimation rely on an eigen-decomposition (EVD) or a singular value decomposition (SVD) computation to determine the signal/noise subspace, which is computationally expensive for real-time applications. …”
Get full text
Article -
1469
-
1470
Efficient Computation of Shortest Paths in Networks Using Particle Swarm Optimization and Noising Metaheuristics
Published 2007-01-01“…Simulation results on several networks with random topologies are used to illustrate the efficiency of the proposed hybrid algorithm for shortest-path computation. The proposed algorithm can be used as a platform for solving other NP-hard SPPs.…”
Get full text
Article -
1471
Hardware-efficient preparation of architecture-specific graph states on near-term quantum computers
Published 2025-01-01“…Abstract Highly entangled quantum states are an ingredient in numerous applications in quantum computing. However, preparing these highly entangled quantum states on currently available quantum computers at high fidelity is limited by ubiquitous errors. …”
Get full text
Article -
1472
Automatic morphology phenotyping of tetra- and hexaploid wheat spike using computer vision methods
Published 2021-03-01Subjects: Get full text
Article -
1473
Hardware Architecture for Real-Time Computation of Image Component Feature Descriptors on a FPGA
Published 2014-01-01“…This paper describes a hardware architecture for real-time image component labeling and the computation of image component feature descriptors. …”
Get full text
Article -
1474
Indications for Laparotomy in Patients with Abdominal Penetrating Injuries Presenting with Ambiguous Computed Tomography Findings
Published 2021-06-01“…Purpose Negative laparotomy in patients with abdominal penetrating injuries (APIs) is associated with deleterious outcomes and unnecessary expense; however, the indications for laparotomy in hemodynamically stable patients with ambiguous computed tomography (CT) findings remain unclear. This study aimed to identify the factors associated with negative laparotomy. findings Methods Data of patients who underwent laparotomy for APIs between 2011 and 2019 were retrospectively reviewed. …”
Get full text
Article -
1475
Promoting Computational Access to Digital Collections in the Nordic and Baltic Countries: An Icelandic Use Case
Published 2025-01-01Subjects: Get full text
Article -
1476
A Deep Learning Algorithm to Identify Anatomical Landmarks on Computed Tomography of the Temporal Bone
Published 2023-09-01Get full text
Article -
1477
EgoSep: Egocentric On-Screen Sound Source Separation for Real-Time Edge Computing
Published 2025-01-01Subjects: Get full text
Article -
1478
Unilateral Fusion of Maxillary Lateral Incisor: Diagnosis Using Cone Beam Computed Tomography
Published 2014-01-01“…To report a case of right maxillary lateral incisor fusion and a supernumerary tooth, the anatomy of the root canal and dental united portion were assessed by cone beam computed tomography (CBCT). Results. The clinical examination showed dental juxtaposition with the absence of interdental papilla and esthetic impairment in the right maxillary lateral incisor region. …”
Get full text
Article -
1479
Computational Modelling Strategies for Nonlinear Response Prediction of Corroded Circular RC Bridge Piers
Published 2016-01-01Get full text
Article -
1480
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Published 2022-01-01“…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
Get full text
Article