Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
1961
Paroxysmal Compulsion to Handle Keys in a Computer Operator Due To Meningioma in the Left Supplementary Motor Area
Published 1998-01-01“…We describe the case of a computer operator who experienced paroxysmal attacks several times in which she felt a compulsion to handle keys with her right hand or actually her right hand moved involuntarily in a key-handling rhythm. …”
Get full text
Article -
1962
A Reproducible Method for Donor Site Computed Tomography Measurements in Abdominally Based Autologous Breast Reconstruction
Published 2025-01-01“…We present an approach for evaluating abdominal computed tomography (CT) scans that generates reproducible measures relevant to donor site morbidity after abdominally based breast reconstruction. …”
Get full text
Article -
1963
-
1964
Complementary Use of Bioluminescence Imaging and Contrast-Enhanced Micro—Computed Tomography in an Orthotopic Brain Tumor Model
Published 2014-01-01“…Using these models requires noninvasive imaging techniques to monitor disease progression and therapy response. Micro–computed tomography (CT) is less studied for the in vivo monitoring of murine intracranial tumors and traditionally suffers from poor soft tissue contrast, whereas bioluminescence imaging (BLI) is known for its sensitivity but is not frequently employed for quantifying tumor volume. …”
Get full text
Article -
1965
Research on optimal two element exchange algorithm for large scale cloud computing server scheduling problem
Published 2019-05-01Subjects: Get full text
Article -
1966
Computer Based Correlation of the Texture of P63 Expressed Nuclei with Histological Tumour Grade, in Laryngeal Carcinomas
Published 2014-01-01“…P63 positively expressed nuclei were identified, the percentage of P63 expressed nuclei was computed, and 118 textural, morphological, shape, and architectural features were calculated from each one of the 55 laryngeal lesions. …”
Get full text
Article -
1967
Modulating Alkyl Groups in Copolymer to Control Ion Transport in Electrolyte‐Gated Organic Transistors for Neuromorphic Computing
Published 2025-01-01Subjects: Get full text
Article -
1968
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.
Published 2024-01-01“…The introduction of quantum computing has transformed the setting of information technology, bringing both unprecedented opportunities and significant challenges. …”
Get full text
Article -
1969
-
1970
Computing the Electric and Magnetic Matrix Green’s Functions in a Rectangular Parallelepiped with a Perfect Conducting Boundary
Published 2014-01-01“…A method for the approximate computation of frequency-dependent magnetic and electric matrix Green’s functions in a rectangular parallelepiped with a perfect conducting boundary is suggested in the paper. …”
Get full text
Article -
1971
-
1972
A Computation Complexity Reduction of the Size Decision Algorithm in 3D-HEVC Depth Map Intracoding
Published 2022-01-01“…The resulting experiences show that the proposed method can significantly save the computational complexity with a negligible loss of intracoding efficiency.…”
Get full text
Article -
1973
IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing
Published 2015-01-01“…Our proposed authentication mechanism reduces the computational processing by 30% comparing to other authentication mechanism and our lightweight content encryption reduces encryption delay to 0.259 second.…”
Get full text
Article -
1974
-
1975
Meta-EA: a gene-specific combination of available computational tools for predicting missense variant effects
Published 2025-01-01“…Abstract Computational methods for estimating missense variant impact suffer from inconsistent performance across genes, which poses a major challenge for their reliable use in clinical practice. …”
Get full text
Article -
1976
-
1977
Lamb Waves-Based Computation of Impact Echo Thickness Resonant Frequency: Theory Development and Case Study
Published 2024-01-01“…This study derives the equation for resonant frequency computation based on the Rayleigh–Lamb equation. Factors affecting the frequency are systematically examined using a range of Poisson’s ratios, thicknesses, densities, and moduli for concrete plates. …”
Get full text
Article -
1978
Book review: Complexity and real computation, by Lenore Blum, Felipe Cucker, Michael Shub, and Steve Smale
Published 2001-01-01Get full text
Article -
1979
Cone-Beam Computed Tomography Assessment of Quality of Endodontic Treatment and Prevalence of Procedural Errors in Mandibular Molars
Published 2023-01-01“…This study assessed the quality of endodontic treatment and the prevalence of procedural errors in permanent mandibular molars using cone-beam computed tomography (CBCT). Materials and Methods. …”
Get full text
Article -
1980
The Study about Relationship of Direct Form of Topological Indices via M-Polynomial and Computational Analysis of Dexamethasone
Published 2022-01-01“…In this article, the chemical structure of dexamethasone is explored using computational techniques such as topological indices. …”
Get full text
Article