Academic literature on the topic 'Applied computing not elsewhere classified'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Applied computing not elsewhere classified.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Applied computing not elsewhere classified"
CSG-Ed team. "Global issues." ACM SIGCAS Computers and Society 49, no. 2 (January 22, 2021): 9. http://dx.doi.org/10.1145/3447903.3447906.
Full textDas, D., and S. Santhakumar. "An Euler correction method for computing two-dimensional unsteady transonic flows." Aeronautical Journal 103, no. 1020 (February 1999): 85–94. http://dx.doi.org/10.1017/s0001924000027780.
Full textWu, Yusen, Hongwei Li, and Ahmed Alsaedi. "Center Conditions and Bifurcation of Limit Cycles Created from a Class of Second-Order ODEs." International Journal of Bifurcation and Chaos 29, no. 01 (January 2019): 1950003. http://dx.doi.org/10.1142/s0218127419500032.
Full textHan, Daoqi, Songqi Wu, Zhuoer Hu, Hui Gao, Enjie Liu, and Yueming Lu. "A Novel Classified Ledger Framework for Data Flow Protection in AIoT Networks." Security and Communication Networks 2021 (February 19, 2021): 1–11. http://dx.doi.org/10.1155/2021/6671132.
Full textRodriguez, Diego, Diego Gomez, David Alvarez, and Sergio Rivera. "A Review of Parallel Heterogeneous Computing Algorithms in Power Systems." Algorithms 14, no. 10 (September 23, 2021): 275. http://dx.doi.org/10.3390/a14100275.
Full textÇakır, Mustafa, Akhan Akbulut, and Yusuf Hatay Önen. "Analysis of the use of computational intelligence techniques for air-conditioning systems: A systematic mapping study." Measurement and Control 52, no. 7-8 (June 28, 2019): 1084–94. http://dx.doi.org/10.1177/0020294019858108.
Full textChoi, Yoonjo, Namhun Kim, Seunghwan Hong, Junsu Bae, Ilsuk Park, and Hong-Gyoo Sohn. "Critical Image Identification via Incident-Type Definition Using Smartphone Data during an Emergency: A Case Study of the 2020 Heavy Rainfall Event in Korea." Sensors 21, no. 10 (May 20, 2021): 3562. http://dx.doi.org/10.3390/s21103562.
Full textel-Yazigi, A., K. Chaleby, and C. R. Martin. "A simplified and rapid test for acetylator phenotyping by use of the peak height ratio of two urinary caffeine metabolites." Clinical Chemistry 35, no. 5 (May 1, 1989): 848–51. http://dx.doi.org/10.1093/clinchem/35.5.848.
Full textConesa, Francesc C., Hector A. Orengo, Agustín Lobo, and Cameron A. Petrie. "An Algorithm to Detect Endangered Cultural Heritage by Agricultural Expansion in Drylands at a Global Scale." Remote Sensing 15, no. 1 (December 22, 2022): 53. http://dx.doi.org/10.3390/rs15010053.
Full textLIN, SONG-SUN, and TZI-SHENG YANG. "ON THE SPATIAL ENTROPY AND PATTERNS OF TWO-DIMENSIONAL CELLULAR NEURAL NETWORKS." International Journal of Bifurcation and Chaos 12, no. 01 (January 2002): 115–28. http://dx.doi.org/10.1142/s0218127402004206.
Full textDissertations / Theses on the topic "Applied computing not elsewhere classified"
Jones, Christopher Charles Rawlinson. "A study of novel computing methods for solving large electromagnetic hazards problems." Thesis, University of Central Lancashire, 2002. http://clok.uclan.ac.uk/18842/.
Full textBratton, Daniel. "Simple and adaptive particle swarms." Thesis, Goldsmiths College (University of London), 2010. http://research.gold.ac.uk/4752/.
Full textJenkins, David William. "Risk assessment applied to consumer products with reference to CE marking machines for use at work." Thesis, Aston University, 2004. http://publications.aston.ac.uk/12230/.
Full textTimperley, Matthew. "The integration of explanation-based learning and fuzzy control in the context of software assurance as applied to modular avionics." Thesis, University of Central Lancashire, 2015. http://clok.uclan.ac.uk/16726/.
Full textZhu, Huaiyu. "Neural networks and adaptive computers : theory and methods of stochastic adaptive computation." Thesis, University of Liverpool, 1993. http://eprints.aston.ac.uk/365/.
Full textRattray, Magnus. "Modelling the dynamics of genetic algorithms using statistical mechanics." Thesis, University of Manchester, 1996. http://publications.aston.ac.uk/598/.
Full textSvénsen, Johan F. M. "GTM: the generative topographic mapping." Thesis, Aston University, 1998. http://publications.aston.ac.uk/1245/.
Full textCsató, Lehel. "Gaussian processes : iterative sparse approximations." Thesis, Aston University, 2002. http://publications.aston.ac.uk/1327/.
Full textGoldingay, Harry J. "Agent Based Models of Competition and Collaboration." Thesis, Aston University, 2010. http://publications.aston.ac.uk/15212/.
Full textDas, Gupta Jishu. "Performance issues for VOIP in Access Networks." Thesis, University of Southern Queensland, 2005. https://eprints.qut.edu.au/12724/1/Das_Gupta_MComputing_Dissertation.pdf.
Full textBook chapters on the topic "Applied computing not elsewhere classified"
SheelaS, R. Prema, S. Ramya, and B. Thirumahal. "Brain Tumor Detection Using Gray Level Co-Occurrence Matrix Feature Extraction Technique." In Advances in Parallel Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210106.
Full textAravind Prakash M, Indra Gandhi K, Sriram R, and Amaysingh. "An Effective Comparative Analysis of Data Preprocessing Techniques in Network Intrusion Detection System Using Deep Neural Networks." In Advances in Parallel Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210005.
Full textAndreotti, Daniele, Armando Fella, and Eleonora Luppi. "Simulated Events Production on the Grid for the BaBar Experiment." In Handbook of Research on Grid Technologies and Utility Computing, 226–34. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-184-1.ch022.
Full textWang, Miao-Ling, and Hsiao-Fan Wang. "Web Mining System for Mobile-Phone Marketing." In Mobile Computing, 2924–35. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch220.
Full textKarthikeyan P., Karunakaran Velswamy, Pon Harshavardhanan, Rajagopal R., JeyaKrishnan V., and Velliangiri S. "Machine Learning Techniques Application." In Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, 1396–417. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5339-8.ch068.
Full textS., Sivakumar, Sreedevi E., PremaLatha V., and Haritha D. "Parallel Defect Detection Model on Uncertain Data for GPUs Computing by a Novel Ensemble Learning." In Applications of Artificial Intelligence for Smart Technology, 146–63. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3335-2.ch010.
Full textCruz-Chávez, Marco Antonio, Abelardo Rodríguez-León, Rafael Rivera-López, Fredy Juárez-Pérez, Carmen Peralta-Abarca, and Alina Martínez-Oropeza. "Grid Platform Applied to the Vehicle Routing Problem with Time Windows for the Distribution of Products." In Logistics Management and Optimization through Hybrid Artificial Intelligence Systems, 52–81. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0297-7.ch003.
Full textJiménez-Ruano, Adrián, Pere Joan Gelabert, Victor Resco de Dios, Cristina Vega-García, Luis Torres, Jaime Ribalaygua, and Marcos Rodrigues. "Modeling daily natural-caused ignition probability in the Iberian Peninsula." In Advances in Forest Fire Research 2022, 1214–19. Imprensa da Universidade de Coimbra, 2022. http://dx.doi.org/10.14195/978-989-26-2298-9_184.
Full textSahu, Tirath Prasad, and Sarang Khandekar. "A Machine Learning-Based Lexicon Approach for Sentiment Analysis." In Research Anthology on Implementing Sentiment Analysis Across Multiple Disciplines, 836–51. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-6303-1.ch044.
Full textMcElroy, Michael B. "Power from the Sun Abundant But Expensive." In Energy and Climate. Oxford University Press, 2016. http://dx.doi.org/10.1093/oso/9780190490331.003.0015.
Full textConference papers on the topic "Applied computing not elsewhere classified"
Siebra, Clauirton, Denise Alencar, Ana Paula Guimarães, and Jefferson Silva. "An Empirical Study about the Vision of a Tutoring Team on the Distance Learning Process." In Workshop sobre Educação em Computação. Sociedade Brasileira de Computação - SBC, 2015. http://dx.doi.org/10.5753/wei.2015.10223.
Full textSeong, Bo-Ok, Jimin Ahn, Myeongjun Son, and Hyeongok Lee. "Three-degree graph and design of an optimal routing algorithm." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001466.
Full textFelipe Duarte Alves, Luiz, Almir d. De Oliveira Costa Junior, and Jose Anglada Rivera. "Avaliação de Usabilidade do Aplicativo Be a Maker com Alunos de Licenciatura em Computação." In Computer on the Beach. Itajaí: Universidade do Vale do Itajaí, 2022. http://dx.doi.org/10.14210/cotb.v13.p014-020.
Full textGOWDRIDGE, T., N. DERVILIS, and K. WORDEN. "ON THE APPLICATION OF TOPOLOGICAL DATA ANALYSIS: A Z24 BRIDGE CASE STUDY." In Structural Health Monitoring 2021. Destech Publications, Inc., 2022. http://dx.doi.org/10.12783/shm2021/36304.
Full textAhmed, Rizwan, Gyunyoung Heo, Dong-Keun Cho, and Jongwon Choi. "Characterization of Radioactive Waste From Side Structural Components of a CANDU Reactor for Decommissioning Applications in Korea." In ASME 2010 13th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2010. http://dx.doi.org/10.1115/icem2010-40201.
Full textElapolu, Phani Ganesh, Pradip Majumdar, Steven A. Lottes, and Milivoje Kostic. "Development of a Three-Dimensional Iterative Methodology Using a Commercial CFD Code for Flow Scouring Around Bridge Piers." In ASME 2012 Heat Transfer Summer Conference collocated with the ASME 2012 Fluids Engineering Division Summer Meeting and the ASME 2012 10th International Conference on Nanochannels, Microchannels, and Minichannels. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/ht2012-58491.
Full textHe, Qin, Rubin Wang, and Xiaochuan Pan. "This paper presents a two-dimensional histogram shifting technique for reversible data hiding algorithm. In order to avoid the distortion drift caused by hiding data into stereo H.264 video, we choose arbitrary embeddable blocks from 4×4 quantized discrete cosine transform luminance blocks which will not affect their adjacent blocks. Two coefficients in each embeddable block are chosen as a hiding coefficient pair. The selected coefficient pairs are classified into different sets on the basis of their values. Data could be hidden according to the set which the value of the coefficient pair belongs to. When the value of one coefficient may be changed by adding or subtracting 1, two data bits could be hidden by using the proposed method, whereas only one data bit could be embedded by employing the conventional histogram shifting. Experiments show that this two-dimensional histogram shifting method can be used to improve the hiding performance." In 10th International Conference on Software Engineering and Applications (SEAS 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110205.
Full text