As we know, the workplace and learning environments have been changed by the global pandemic of 2019. the workforce begins to navigate the new future of work;employers quickly realize that the systems, processes, and ...
详细信息
Accurate analysis of plaque types in blood vessels can not only prevent the occurrence of cardiovascular diseases, but also provide a reliable basis for the treatment of diseases. therefore, in view of the low accurac...
详细信息
the paper proposes the new classification methodology using risk distance (RD). From 553 example students in the Chiang Rai Vocational College, dropout risk factors were chosen. the method was applied to classify the ...
详细信息
Cognitive complexity of a software determines the methodology of comprehending the internal logic of a given software by an individual, quantitatively. the procedure of handling a software by different users is differ...
详细信息
Withthe development of modern science and technology, aviation, aerospace, satellite and other equipment are developing in the direction of high reliability, safety and stability, which puts forward higher requiremen...
详细信息
the rapid development of blockchain application technology promotes continuous exploration in the field of computer application science. Although it is still in the initial stage of development, the technical features...
详细信息
Cosmological data sets are becoming so large as to make optimal statistical analyses of them impossible. Even with approximations made, the computational challenges can be severe. Cholesky Factorization of matrices is...
详细信息
In the process of asset status assessment, the power transmission intelligent Internet of things (IoT) with smart towers as the core IoT nodes faces many problems such as large workload of physical information, poor d...
详细信息
the objective of the study is to develop a methodology to detect drought in Nan province, northern part of thailand using vegetation spectrum in different period of the satellite passing approximately 11,420 ***. the ...
详细信息
Multiple-precision integer operations are key components of many security applications;but unfortunately they are computationally expensive on contemporary CPUs. In this paper, we present our design and implementation...
详细信息
暂无评论