Results 11 to 20 of about 8,285,954 (300)

Computational Psychiatry for Computers [PDF]

open access: yesiScience, 2020
Computational psychiatry is a nascent field that attempts to use multi-level analyses of the underlying computational problems that we face in navigating a complex, uncertain and changing world to illuminate mental dysfunction and disease. Two particular foci of the field are the costs and benefits of environmental adaptivity and the danger and ...
Eric Schulz, Peter Dayan
openaire   +4 more sources

The Internet: a Resource and a Moral Test [PDF]

open access: yesГуманитарный вектор, 2020
The author considers the moral aspects of using the Internet, in relation to the situation when due to the threat of coronavirus, a self-restriction regime is introduced everywhere in our country, and study switches to the so-called “udalenka ...
Andrey E. Zimbuli
doaj   +1 more source

Computer vision syndrome: Symptoms, risk factors, and practices

open access: yesJournal of Family Medicine and Primary Care, 2022
Background: According to computer vision syndrome (CVS). Due to constant use of computers by the students, it has become one of the growing health risks associated with technology (cell phones and tablets).
Abdulrahman Alamri   +8 more
doaj   +1 more source

Axonal Computations [PDF]

open access: yesFrontiers in Cellular Neuroscience, 2019
25 pages, 6 ...
Pepe Alcami   +3 more
openaire   +6 more sources

Computational epigenetics [PDF]

open access: yesBioinformatics, 2007
Abstract Epigenetic research aims to understand heritable gene regulation that is not directly encoded in the DNA sequence. Epigenetic mechanisms such as DNA methylation and histone modifications modulate the packaging of the DNA in the nucleus and thereby influence gene expression.
Bock, C., Lengauer, T.
openaire   +3 more sources

An 00 visual language definition approach supporting multiple views [PDF]

open access: yes, 2000
The formal approach to visual language definition is to use graph grammars and/or graph transformation techniques. These techniques focus on specifying the syntax and manipulation rules of the concrete representation. This paper presents a constraint and
Akehurst, David H.   +1 more
core   +1 more source

The WELL and Usenet alternative newsgroups: revisiting the free speech revolution on the electronic frontier of the 1980s and 1990s

open access: yesNew Horizons in English Studies, 2021
The democratization of personal computers and their increasing role as tools of individual empowerment, starting in the second half of the 1980s, brought along new ways of interpersonal communication on what was about to be known as cyberspace (Barlow ...
Julie Momméja
doaj   +1 more source

Nightly use of computer by adolescents: its effect on quality of sleep Uso noturno de computador por adolescentes: seu efeito na qualidade de sono

open access: yesArquivos de Neuro-Psiquiatria, 2007
OBJECTIVE: To analyze the influence of nocturnal use of computer and their effect on sleep quality, in a group of adolescents. METHOD: Two middle schools were chosen for the research.
Gema Mesquita, Rubens Reimão
doaj   +1 more source

Electronic blackmail,( its causes and treatment in light of the Islamic approach), Anbar Governorate as _an example [PDF]

open access: yesمجلة جامعة الأنبار للعلوم الإسلامية
  The rapid development in information technology has led to the spread of several previously unknown phenomena, the most important of which is the phenomenon of electronic blackmail.
Redab yousif moslah -   +1 more
doaj   +1 more source

Computer memories: the history of computer form [PDF]

open access: yes, 2008
This paper looks at the computer as a truly global form. The similar beige boxes found in offices across the world are analysed from the perspective of design history rather than that of the history of science and technology.
Ashitomi Takashi   +17 more
core   +1 more source

Home - About - Disclaimer - Privacy