Results 101 to 110 of about 4,143,341 (351)

تكوين المنحنيات والرسوم البيانية بواسطة طريقة احسن توافق

open access: yesIraqi Journal for Computers and Informatics, 1982
مما تقدم يتضح أن طريقة « أحسن توافق » لها فوائد كثيرة فهي بسيطة التطبيق خاصة في برمجة الحاسبات الدقيقة والتي غالبا ما تكون برموز الحاسبة الاساسية حيث أن السرعة المطلوبة لرسم الأشكال المختلفة تحتم كتابة البرامج المساعدة بلغة الحاسبة الأساسية والتي من ...
زهير محمد علي الجلبي   +2 more
doaj   +1 more source

Performance evaluation of windows virtual machines on a Linux host

open access: yesAutomatika, 2020
Virtualization has experienced a dramatic expansion recently and today is ubiquitous in modern IT industry since it provides numerous benefits to companies and individual users.
Josip Balen   +2 more
doaj   +1 more source

Mechanisms of Anode Interfacial Phenomena and Multi‐perspective Optimization in Aqueous Alkaline Zinc‐Air Batteries

open access: yesAdvanced Functional Materials, EarlyView.
Zinc‐air batteries demonstrate great potential for sustainable energy storage but face major anode‐related challenges. This review provides a mechanism‐driven overview of zinc anode interfacial issues, e.g. dendrite formation, passivation, self‐corrosion, and hydrogen evolution; and explores advances in electrode, surface, and electrolyte engineering ...
Hong Zhao   +2 more
wiley   +1 more source

Enhanced Switching Performance in Single‐Crystalline PbTiO3 Ferroelectric Memristors for Replicating Synaptic Plasticity

open access: yesAdvanced Functional Materials, EarlyView.
This study demonstrated single‐crystalline PbTiO3‐based memristors with atomically sharp interfaces, well‐ordered lattices, and minimal lattice mismatch. The devices exhibited an ON/OFF ratio exceeding 105, high stability, and rich resistance‐state modulation.
Haining Li   +7 more
wiley   +1 more source

Identification of digital device hardware vulnerabilities based on scanning systems and semi-natural modeling

open access: yesРоссийский технологический журнал
Objectives. The development of computer technology and information systems requires the consideration of issues of their security, various methods for detecting hardware vulnerabilities of digital device components, as well as protection against ...
E. F. Pevtsov   +3 more
doaj   +1 more source

A new hybrid optimization method inspired from swarm intelligence: Fuzzy adaptive swallow swarm optimization algorithm (FASSO)

open access: yesEgyptian Informatics Journal, 2015
In this article, the objective was to present effective and optimal strategies aimed at improving the Swallow Swarm Optimization (SSO) method. The SSO is one of the best optimization methods based on swarm intelligence which is inspired by the ...
Mehdi Neshat, Ghodrat Sepidname
doaj   +1 more source

Higher‐Order Temporal Dynamics in Complementary Charge Trap Memristor for High‐Dimensional Reservoir Computing

open access: yesAdvanced Functional Materials, EarlyView.
A complementary charge‐trap memristor (CoCTM) featuring a unique current transient with tunable overshoot‐relaxation dynamics is introduced for high‐resolution reservoir computing. By leveraging higher‐order temporal dynamics from engineered trapping layers, the device generates multiple output states from a single input, forming rich, high‐dimensional
Alba Martinez   +9 more
wiley   +1 more source

Toward the 3rd Generation of Smart Farming: Materials, Devices, and Systems for E‐Plant Technologies

open access: yesAdvanced Functional Materials, EarlyView.
This review explores the latest developments in e‐plant technologies, which are revolutionizing smart farming by enabling real‐time monitoring of plant and environmental conditions. It covers the design, applications, and systems of e‐plant devices, detailing how they integrate data analytics to optimize agricultural practices, enhance crop yields, and
Daegun Kim   +5 more
wiley   +1 more source

Aplikasi Sistem Pakar Diagnosis Kerusakan Hardware Komputer Dengan Metode Forward Chaining [PDF]

open access: yes, 2012
Not all owners and computer technicians can diagnose early damage to computer hardware properly and appropriately. Errors in the diagnosis process will certainly bring harm to the owner of a computer or computer technicians.
Arifin, S. (Samsul)
core  

Home - About - Disclaimer - Privacy