Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
41
The Technique of MIEELDLD in Computational Aeroacoustics
Published 2012-01-01“…A technique has recently been devised in a Computational Fluid Dynamics framework which enables optimal parameters to be chosen so as to better control the grade and balance of dispersion and dissipation in numerical schemes (Appadu and Dauhoo, 2011; Appadu, 2012a; Appadu, 2012b; Appadu, 2012c). …”
Get full text
Article -
42
Fine-grained attribute update and outsourcing computing access control scheme in fog computing
Published 2021-03-01Subjects: Get full text
Article -
43
Research on intelligent computing offloading model based on reputation value in mobile edge computing
Published 2020-07-01Subjects: “…mobile edge computing…”
Get full text
Article -
44
Partial computation offloading method based on joint resource allocation for mobile edge computing
Published 2023-03-01Subjects: “…mobile edge computing…”
Get full text
Article -
45
Modeling the Effect of External Computers and Removable Devices on a Computer Network with Heterogeneous Immunity
Published 2021-01-01“…This paper intends to investigate the impact of external computers and removable devices on virus spread in a network with heterogeneous immunity. …”
Get full text
Article -
46
Computer Security Lab Manual /
Published 2006Subjects: “…Computer security Management Handbooks, manuals, etc. 3242…”
View in OPAC
Book -
47
Introduction to Computer Software Applications /
Published 2008Subjects: “…computer 6806…”
View in OPAC
Book -
48
Computer Applications for Data Analysis : a step by step hand book /
Published 2009Subjects: “…computer 6806…”
View in OPAC
Book -
49
Computer Organization and Embedded Systems /
Published 2002Subjects: “…computer 6806…”
View in OPAC
Book -
50
Introduction to Computer Software Aplplications/
Published 2008Subjects: “…computer 6806…”
View in OPAC
Book -
51
Computer Applications for Data Analysis: astep by step hand book /
Published 2009Subjects: “…computer 6806…”
View in OPAC
Book -
52
Computer security lab manual /
Table of contents only
Contributor biographical information
View in OPAC
Book -
53
Computer Security Lab Manual/
Published 2006Subjects: “…computer security 11095…”
View in OPAC
Book -
54
-
55
-
56
-
57
-
58
-
59
Cloud computing forensic model
Published 2017-09-01Subjects: “…cloud computing…”
Get full text
Article -
60
Problems on the computer literacy of educators
Published 2002-12-01“…The main attention should be paid to the constant in-service teachers' training. The Standard of computer literacy for educators has been developed. …”
Get full text
Article