Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
181
Privacy-preserving trajectory similarity computation method
Published 2022-11-01Subjects: Get full text
Article -
182
Interdisciplinary relations in teaching computer technologies in gymnasium
Published 2002-12-01“… In the article discuss about teaching of computers technology in the secondary school. Analysis relationships between this thing and others disciplines which is teaching. …”
Get full text
Article -
183
Novel kernel function for computing the similarity of text
Published 2012-12-01“…To enhance the performance of detecting similar documents,a novel kernel function named S_Wang kernel was constructed.Based on the actual situation of computing text similarity,the S_Wang kernel was newly bu lt with consideration of the Euclidean distance and angle between vectors that represented the text documents to be compared.It was proved that the function could be constructed as a kernel function according to Mercer theorem.Experimental verification of the performance of the kernels in the text document similarity calculation was provided.The results show that the S_Wang kernel is significantly better than the precision and F1 performance of other kernels like Cauchy kernel,Latent Semantic Kernel (LSK) and CLA kernel.S_Wang kernel is suitable for text similarity computation.…”
Get full text
Article -
184
-
185
Computer-Assisted Technique for Surgical Tooth Extraction
Published 2016-01-01“…In this work, the author presents a new technique for surgical tooth extraction based on 3D imaging, computer planning, and a new concept of computer-assisted manufacturing. …”
Get full text
Article -
186
Analytical Computation of Information Rate for MIMO Channels
Published 2017-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
187
Private-preserving scientific computation of the rational numbers
Published 2022-06-01Subjects: “…secure multiparty computation…”
Get full text
Article -
188
Constructing fair-exchange protocols for cloud computing
Published 2013-03-01Subjects: “…cloud computing…”
Get full text
Article -
189
Survey on open source edge computing platforms
Published 2021-04-01Subjects: “…edge computing…”
Get full text
Article -
190
Global Stability of an Epidemic Model of Computer Virus
Published 2014-01-01“…With the rapid popularization of the Internet, computers can enter or leave the Internet increasingly frequently. …”
Get full text
Article -
191
Computer simulations of the glass transition and glassy materials
Published 2023-04-01Subjects: Get full text
Article -
192
Privacy-preserving image processing in cloud computing
Published 2016-01-01Subjects: “…cloud computing…”
Get full text
Article -
193
Animal Welfare, Agency, and Animal–Computer Interaction
Published 2025-01-01Subjects: Get full text
Article -
194
Computing Topological Indices and Polynomials of the Rhenium Trioxide
Published 2022-01-01“…These topological indices are used to model quantitative structure relationships QSARs, which are connections between the work of biological or other molecular structures and the chemical structures. This study computed the first, second, and Hyper Zagreb indices, as well as Zagreb polynomials, Redefined Zagreb indices, Randic index, ABC index, and GA index of chemical structure of Rhenium Trioxide.…”
Get full text
Article -
195
Analysis and Practice of Cloud Computing Information Security
Published 2013-02-01Subjects: “…cloud computing…”
Get full text
Article -
196
-
197
Scalable Full-Stack Benchmarks for Quantum Computers
Published 2024-01-01Subjects: Get full text
Article -
198
Human–computer interaction in healthcare: Comprehensive review
Published 2024-10-01Subjects: “…human–computer interaction…”
Get full text
Article -
199
Provably secure rational delegation computation protocol
Published 2019-07-01Subjects: “…rational delegate computation…”
Get full text
Article -
200
Survey on research progress for compute first networking
Published 2021-10-01Subjects: “…edge computing…”
Get full text
Article