Results 31 to 40 of about 639,132 (240)

Improving Fall Detection Using an On-Wrist Wearable Accelerometer

open access: yesSensors, 2018
Fall detection is a very important challenge that affects both elderly people and the carers. Improvements in fall detection would reduce the aid response time. This research focuses on a method for fall detection with a sensor placed on the wrist. Falls
Samad Barri Khojasteh   +4 more
doaj   +1 more source

Subtractive and Additive Technologies in Fixed Dental Restoration: A Systematic Review

open access: yesJournal of Techniques, 2023
Today, computers and digital devices are an indispensable part of our daily lives, and dentistry is no exception. Dentistry has adopted a number of digital technologies, including CAD/CAM (computer-aided design and manufacturing) systems.
Rafal Kareem Rasheed   +3 more
doaj   +1 more source

PackerRobo: Model-based robot vision self supervised learning in CART

open access: yesAlexandria Engineering Journal, 2022
Robots are most widely used to replace human contribution with machine generated response. When humans interact with robots, its mandatory for both to forecast actions based on current conditions. Huge efforts have been channelized towards attaining this
Asif Khan   +8 more
doaj   +1 more source

Mobile Agents for Mobile Tourists: A User Evaluation of Gulliver's Genie [PDF]

open access: yes, 2005
How mobile computing applications and services may be best designed, implemented and deployed remains the subject of much research. One alternative approach to developing software for mobile users that is receiving increasing attention from the research ...
O'Grady, M., O'Hare, G.M.P., Sas, Corina
core   +1 more source

Teaching interdisciplinary computational science from an electronic book on the Internet [PDF]

open access: yesProceedings of 1994 IEEE Frontiers in Education Conference - FIE '94, 2002
The authors argue that by offering a general introduction and overview to networks, computer architectures, scientific visualization, programming languages, a variety of operating systems and hypertext authoring tools, computer science students get a broad comprehensive view of modern high performance computing methodologies.
Oliver, C. E.   +2 more
openaire   +2 more sources

Dependence Research on Multi-Layer Convolutions of Images

open access: yesFrontiers in Physics, 2022
Convolutions are important structures in deep learning. However, theoretical analysis on the dependence among multi-layer convolutions cannot be found until now.
Zhiwu Liao, Yong Yu, Shaoxiang Hu
doaj   +1 more source

Level of Knowledge and Skills of Kuwaiti Science Teachers Regarding Their Usage of Computers and Instructional Software in Science Teaching [PDF]

open access: yesJournal of Islamic Studies, 2003
The study aimed at investigating the level of knowledge and skills of Kuwaiti science teachers regarding their usage of computers in science teaching_ The sample consisted of 145 Kuwaiti sc pence teachers from all over the State of Kuwait The study x%as ...
Abdullah AbdulAziz A1-Hadlaq
doaj  

Cultural consequences of computing technology [PDF]

open access: yes, 2012
Computing technology is clearly a technical revolution, but will most probably bring about a cultural revolution\ud as well. The effects of this technology on human culture will be dramatic and far-reaching.
Memmi, Daniel
core   +1 more source

Information tools for teaching the basics of programming in high school

open access: yesUkrainian Journal of Educational Studies and Information Technology, 2017
The article focuses on the problem of finding methodological approaches to the use of information programming tools in the course of computer science high school. The definition of information tools for teaching as electronic means of storage, processing
Maksym Pavlenko, Tetiana Varava
doaj   +3 more sources

A Cluster-Based Hierarchical-Approach for the Path Planning of Swarm

open access: yesApplied Sciences, 2021
This paper addresses the path planning and control of multiple colonies/clusters that have unmanned aerial vehicles (UAV) which make a network in a hazardous environment. To solve the aforementioned issue, we design a new and novel hybrid algorithm.
Muhammad Shafiq   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy