Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
1501
Retracted: A Microgrid Security Defense Method Based on Cooperation in an Edge-Computing Environment
Published 2023-01-01“…Journal of Electrical and Computer Engineering…”
Get full text
Article -
1502
Bilateral Obturator Hernia Diagnosed by Computed Tomography: A Case Report with Review of the Literature
Published 2014-01-01“…It is mistakenly diagnosed as femoral or inguinal hernia on USG. Computed tomography is diagnostic and is a valuable tool for preoperative diagnosis. …”
Get full text
Article -
1503
Silymarin as a Therapeutic Agent for Hepatocellular Carcinoma: A Multi-Approach Computational Study
Published 2025-01-01Get full text
Article -
1504
Parallel remote state preparation for fully device-independent verifiable blind quantum computation
Published 2025-01-01“…We introduce a device-independent two-prover scheme in which a classical verifier can use a simple untrusted quantum measurement device (the client device) to securely delegate a quantum computation to an untrusted quantum server. To do this, we construct a parallel self-testing protocol to perform device-independent remote state preparation of n qubits and compose this with the unconditionally secure universal verifiable blind quantum computation (VBQC) scheme of Fitzsimons and Kashefi [Phys. …”
Get full text
Article -
1505
Computational Insights in DNA Methylation: Catalytic and Mechanistic Elucidations for Forming 3-Methyl Cytosine
Published 2022-01-01“…To gain a deeper insight into the formation of 3 mC, we have performed density functional theory (DFT) modeling studies at different levels of theory to clearly map out the mechanistic details for this new methylation approach. Our computed results are in harmony with pertinent experimental observations and shed light on a crucial off-target activity of DNMTs.…”
Get full text
Article -
1506
-
1507
Synthesis and evaluation of nitrochromene derivatives as potential antileishmanial therapeutics through biological and computational studies
Published 2025-01-01“…The dual approach of combining experimental and computational methods aims to provide a robust understanding of the compounds’ mechanisms of action and their potential as effective anti-leishmanial agents. …”
Get full text
Article -
1508
Computational Fluid Dynamics Analysis of Nasal Airway Changes after Treatment with C-Expander
Published 2021-01-01Get full text
Article -
1509
Adept Domestic Energy Load Profile Development Using Computational Intelligence-Based Modelling
Published 2024-01-01“…This research proposes a computational intelligence-based model for household electricity usage profile development as impacted by core input variables—household activities, household financial status, and occupancy presence. …”
Get full text
Article -
1510
Physical unclonable in-memory computing for simultaneous protecting private data and deep learning models
Published 2025-01-01“…Abstract Compute-in-memory based on resistive random-access memory has emerged as a promising technology for accelerating neural networks on edge devices. …”
Get full text
Article -
1511
Fuzzy logic based social trust computation scheme in Flying Ad-hoc network
Published 2025-03-01“…This paper describes a social trust computation scheme for clustered-based FANET, which utilises a reputable methodology to separate malicious UAVs within FANET. …”
Get full text
Article -
1512
Resource-sharing allocation method based on dwarf mongoose optimization algorithm in vehicle computing
Published 2024-12-01Subjects: “…vehicle computing…”
Get full text
Article -
1513
Computer Simulation and Field Experiment for Downlink Multiuser MIMO in Mobile WiMAX System
Published 2015-01-01“…The transmission performance for a downlink mobile WiMAX system with multiuser multiple-input multiple-output (MU-MIMO) systems in a computer simulation and field experiment is described. …”
Get full text
Article -
1514
Examination of Far-Field Mathematical Absorber Reflection Suppression through Computational Electromagnetic Simulation
Published 2012-01-01“…This paper provides an overview of the far-field MARS technique and presents an introduction to the computational electromagnetic range model. Preliminary results of computational electromagnetic range simulations that replicate typical MARS measurement configurations are presented and discussed which, for the first time, confirm through simulation many of the observations that have previously been noted using purely empirical techniques.…”
Get full text
Article -
1515
-
1516
The interaction of metallic ions onto activated carbon surface using computational chemistry software
Published 2020-07-01Get full text
Article -
1517
A COMPUTER PROGRAM FOR ANALYZING CONCRETE MIXTURE EXPERIMENTS BASED ON OSADEBE’S REGRESSION MODEL
Published 2022-06-01“… The Osadebe’s regression model is associated with lots of strenuous mathematical computations. In this research work, a MATLAB based computer program, named MIX-PRE, was formulated for analyzing concrete mixture experiments using the Osadebe’s regression model. …”
Get full text
Article -
1518
Economic effects of livestock disease burden in Ethiopia: A computable general equilibrium analysis.
Published 2024-01-01“…This research investigates the economic effects of livestock disease burden in Ethiopia by employing a computable general equilibrium model in tandem with animal health loss estimates from a compartmental livestock population model. …”
Get full text
Article -
1519
Gaussian-Based Soft Computing Approach to Alternative Banking System for Sustainable Financial Sector
Published 2021-01-01“…There are many novelties of this study. Firstly, computer science has a significant role in the decision-making process. …”
Get full text
Article -
1520
Analog Computing for Nonlinear Shock Tube PDE Models: Test and Measurement of CMOS Chip
Published 2025-01-01Subjects: “…Analog computing…”
Get full text
Article