intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Digital computers

Xem 1-20 trên 843 kết quả Digital computers
  • Programmed death-1 (PD-1) and programmed death-ligand 1 (PD-L1) are the two most common immune checkpoints targeted in triple-negative breast cancer (BC). Refining patient selection for immunotherapy is non-trivial and finding an appropriate digital pathology framework for spatial analysis of theranostic biomarkers for PD-1/PD-L1 inhibitors remains an unmet clinical need.

    pdf11p vishanshan 27-06-2024 1 1   Download

  • Orthodontic archwire materials are changing rapidly in our time. Because an ideal archwire material has not yet been found, assessment of the most effectual properties of different archwires including working range and its effect on root resorption is still an unmet clinical need. Unfortunately, most clinical studies lack standardization of subjects and force.

    pdf7p visergeyne 18-06-2024 0 0   Download

  • The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was sponsored and organized by ICISA (the International Communications and Information Security Association). It was held in Yellow Mountain, China, June 8–11, 2004. The conference proceedings, representing papers from the academic track, are published in this volume of the Lecture Notes in Computer Science (LNCS) of Springer-Verlag.

    pdf525p zizaybay1103 29-05-2024 1 1   Download

  • Ebook "Complexity & cryptography: An introduction" provides that knowledge, combining an informal style with rigorous proofs of the key results to give an accessible introduction. It comes with plenty of examples and exercises (many with hints and solutions), and is based on a highly successful course developed and taught over many years to undergraduate and graduate students in mathematics and computer science.

    pdf305p zizaybay1103 29-05-2024 5 2   Download

  • The rapid growth of electronic communication means that issues in information security are of increasing practical importance. Messages exchanged over worldwide publicly accessible computer networks must be kept confidential and protected against manipulation. Electronic business requires digital signatures that are valid in law, and secure payment protocols. Modern cryptography provides solutions to all these problems. This book originates from courses given for students in computer science at the Georg-Simon-Ohm University of Applied Sciences, Nurnberg.

    pdf372p zizaybay1103 29-05-2024 5 2   Download

  • Ebook Human attention in digital environments (2011) is organized as follows: Chapter 1 introduction; chapter 2 human attention and its implications for human–computer interaction; chapter 3 the management of visual attention in graphic displays; chapter 4 cognitive load theory, attentional processes and optimized learning outcomes in a digital environment; chapter 5 salience sensitive control, temporal attention and stimulus-rich reactive interfaces;...

    pdf361p zizaybay1103 29-05-2024 3 2   Download

  • The purpose of this Encyclopedia of Multimedia Technology and Networking is to offer a written compendium of human knowledge related to the emerging multimedia digital metamarket. Multimedia technology, networks and online interactive multimedia services are taking advantage of a series of radical innovations in converging fields, such as the digitization of signals, satellite and fibre optic based transmission systems, algorithms for signal compression and control, switching and storage devices, and others, whose combination has a supra-additive synergistic effect.

    pdf1637p zizaybay1103 29-05-2024 2 2   Download

  • "Multimedia security technologies for digital rights management" comprises 18 chapters, and divides into four parts: Overview (Part A), Fundamentals of Multimedia Security (Part B), Advanced topics (Part C), and Standards and Legal issues (Part D). The first three chapters in Part A contain background materials and an overview of the DRM system architecture and deployment issues. Chapters 4 through 8 in Part B describe the fundamental security techniques for multimedia protection. Chapters 9 through 16 in Part C introduce the latest development in multimedia security and DRM.

    pdf518p zizaybay1103 29-05-2024 2 2   Download

  • Ebook Practical information security management: A complete guide to planning and implementation is organized as follows: Chapter 1: evolution of a profession; chapter 2: threats and vulnerabilities; chapter 3: the information security manager; chapter 4: organizational security; chapter 5: information security implementation; chapter 6: standards, frameworks, guidelines, and legislation; chapter 7: protection of information; chapter 8: protection of people; chapter 9: protection of premises; chapter 10: protection of systems; chapter 11: digital evidence and incident response; chapter 12: ...

    pdf253p zizaybay1103 29-05-2024 5 2   Download

  • Probability and Computer science - Lecture 5: More applications with probabilistic analysis, bins and balls. This lecture provides students with content including: review coupon collector’s problem and packet sampling; analysis of quick-sort; birthday paradox and applications; the bins and balls model;... Please refer to the detailed content of the lecture!

    pdf30p codabach1016 03-05-2024 3 0   Download

  • The aim of this study is to investigate the attitudes of music teacher candidates on computer self-efficacy perceptions and digital technology according to different variables. In this research, correlational survey model is used as a general survey model and also during data collection process of the research, criterion sampling is used as purposive sampling.

    pdf14p viarnault 25-04-2024 3 3   Download

  • Studies have acknowledged computational thinking (CT) as an efficient approach for problem-solving particularly required in digital workplaces. This research aims to identify indicators for a holistic CT assessment instrument for undergraduate students.

    pdf18p viarnault 25-04-2024 3 1   Download

  • Online counseling is a mental health intervention between the counselee and the counselor using digital technologies computers or smartphones. A growing number of counselors have been providing counseling via the Internet. However, there are mixed findings regarding the effectiveness of online counseling when compared traditional face-to-face counseling and other modalities.

    pdf10p viarnault 25-04-2024 1 1   Download

  • This study compares the effectiveness of a digital and a paper-based dichotomous identification key for teaching pre-service teachers about plant species diversity. Twenty-four Slovenian teachers in pre-service training used a digital version of the key on tablet computers and twenty-nine used a paper-based version to identify woody species in the garden near their university faculty.

    pdf9p viarnault 25-04-2024 3 1   Download

  • Part 2 book "Principles of computer architecture" includes content: Memory, input and output, communication, trends in computer architecture, digital logic, reduction of digital logic, solutions to problems.

    pdf380p muasambanhan10 11-04-2024 3 1   Download

  • The article presents various approaches to the concept of "digital economy" and trends that put an effect on formation of competitiveness. It is concluded that the digital economy is a "digital" system of economic relations based on the use of information and communication technologies. Digital companies are becoming economic agents of the digital economy. The basic elements of a digital company are infrastructure (Internet access, SOFTWARE, telecommunications), e-business (conducting business through computer networks), e-Commerce (distribution of goods via the Internet).

    pdf5p longtimenosee09 08-04-2024 1 0   Download

  • The article traces the transformation of the socio-cultural paradigm of button accordion performing as a dichotomy of traditional and innovative cultural directions.

    pdf10p longtimenosee09 08-04-2024 3 2   Download

  • As a consensus network, Bitcoin enables new payment systems and money that are entirely digital or can be interpreted as a virtual currency that uses open source user-to-peer network systems. It offers easier way of payment without the need for a bank account, credit card or intermediary. Bitcoin is cash stored in a computer that can be used to replace cash in an online sale transaction.

    pdf4p longtimenosee09 08-04-2024 2 1   Download

  • The process of preparing programs for a digital computer is especially attractive, not only because it can be economically and scientifically rewarding, but also because it can be an aesthetic experience much like composing poetry or music. This book is the first volume of a multi-volume set of books that has been designed to train the reader in various skills that go into a programmer's craft. The following chapters are not meant to serve as an introduction to computer programming; the reader is supposed to have had some previous experience.

    pdf666p longtimenosee08 31-03-2024 4 1   Download

  • This is the first of a series of updates that I plan to make available at regular intervals as I ontinue working toward the ultimate editions of The Art of Computer Programming. The good news is that programming for MMIX is pleasant and simple. This fas i le presents 1) a programmer's introdu tion to the ma hine (repla ing Se tion 1.3.1 of Volume 1); 2) the MMIX assembly language (repla ing Se tion 1.3.2); 3) new material on subroutines, oroutines, and interpretive routines (repla ing Se tions 1.4.1, 1.4.2, and 1.4.3).

    pdf141p longtimenosee08 31-03-2024 6 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2