Results 41 to 50 of about 491,133 (314)

Android-Based Introduction to Agricultural Crops and Pests

open access: yesJournal of Information Systems and Informatics, 2022
The number of farmers in Indonesia continues to increase during the pandemic. However, this increase was not accompanied by good literacy related to plants and pests. The main factor is the increasing amount of information that is not credible.
Aldi Susanto   +3 more
doaj   +1 more source

Język migowy w świetle współczesnego paradygmatu głuchoty

open access: yesProblemy Wczesnej Edukacji, 2019
The main issue addressed in this paper is a practical application of sign language in early development support for deaf and hard of hearing children in Poland.
Piotr Tomaszewski, Lucyna Kościelniak
doaj   +1 more source

Length of a Hanging Cable

open access: yesUndergraduate Journal of Mathematical Modeling: One + Two, 2011
The shape of a cable hanging under its own weight and uniform horizontal tension between two power poles is a catenary. The catenary is a curve which has an equation defined by a hyperbolic cosine function and a scaling factor.
Eric Costello
doaj   +1 more source

User Story Software Estimation:a Simplification of Software Estimation Model with Distributed Extreme Programming Estimation Technique [PDF]

open access: yes, 2011
Software estimation is an area of software engineering concerned with the identification, classification and measurement of features of software that affect the cost of developing and sustaining computer programs [19].
Ashari, A. (Ahmad)   +3 more
core   +3 more sources

C# parser for extracting cryptographic protocols structure from source code

open access: yesТруды Института системного программирования РАН, 2019
Cryptographic protocols are the core of any secure system. With the help of them, data is transmitted securely and protected from third parties' negative impact.
Ilya Aleksandrovich Pisarev   +1 more
doaj   +1 more source

Software implementation of 2 FA Software implementation of two-factor authentication to ensure security when accessing an information system

open access: yesВестник КазНУ. Серия математика, механика, информатика, 2019
The article describes methods for applying two-factor authentication (2FA). An example of two-factor authentication using mobile devices as identifiers and the generation of a temporary password based on the hash function of encryption standards is ...
О. А. Ussatova   +2 more
doaj   +1 more source

Combined Effect of Radiant Heat, Local Nusselt Number and Skin Friction Coefficient of a Third Grade Fluid through a Channel Flow in a Saturated Porous Medium

open access: yesJournal of Applied Sciences and Environmental Management, 2022
This paper investigates the combined effects of radiant heat, local Nusselt number and Skin friction coefficient on a channel flow of third grade fluid in the presence of saturated porous medium.
B. A. Peter   +3 more
doaj   +1 more source

Lifted Variable Elimination for Probabilistic Logic Programming

open access: yes, 2014
Lifted inference has been proposed for various probabilistic logical frameworks in order to compute the probability of queries in a time that depends on the size of the domains of the random variables rather than the number of instances.
Bellodi, Elena   +4 more
core   +1 more source

Enhancing Wind Energy Potential Assessment with Three-Parameter Weibull Distribution: A Comparative Analysis using MATLAB [PDF]

open access: yesE3S Web of Conferences
To determine the wind energy potential, the probability density function is typically used. For data distribution with modest wind speeds, this paper developed a three-parameter Weibull model.
K Kannakumar   +6 more
doaj   +1 more source

Measure Transformer Semantics for Bayesian Machine Learning [PDF]

open access: yesLogical Methods in Computer Science, 2013
The Bayesian approach to machine learning amounts to computing posterior distributions of random variables from a probabilistic model of how the variables are related (that is, a prior distribution) and a set of observations of variables.
Johannes Borgström   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy