Search Results - "computer"
Suggested Topics within your search.
Suggested Topics within your search.
- 5
- Algoritmos Genéticos 2
- Chaotic systems 2
- Genetic Algorithms 2
- Metaheuristics 2
- Scheduling 2
- Secuenciación 2
- Sistemas caóticos 2
- , Web Api 1
- , e-waste 1
- 3D printing 1
- 4.0 industry 1
- AI 1
- Administrative Solutions 1
- Agreement 1
- Amplificadores operacionales 1
- Analog computation 1
- Aplicaciones de larga duración 1
- Aplicación Web 1
- Aprendizaje virtual 1
- Arquitectura N-Capas 1
- Arquitectura de Software 1
- Artificial Intelligence 1
- BITA 1
- Biocentro de Frankfurt 1
- Biología computacional 1
- Business Models 1
- Business education 1
- COVID-19 1
- Capacidades 1
-
1
Dry Eye Disease Association with Computer Exposure Time Among Subjects with Computer Vision Syndrome
Published 2020“…Purpose: To assess the time of exposure to the computer and dry eye disease (DED) in subjects with computer vision syndrome (CVS).Methods: A cross-sectional study was conducted in office workers, computer users of both sexes, with an age range of 18– 45 years without comorbidities; we included 108 subjects divided into 3 groups according to the time of computer exposure in hours per day (H/D): < 4 (n = 23), 4 − 7.9 (n = 49), > 8 (n = 39). …”
Get full text
Article -
2
Use of artificial intelligence tools for computational-aided diagnostics
Published 2024Get full text
Tesis -
3
Use of artificial intelligence tools for computational-aided diagnostics
Published 2024Get full text
Tesis -
4
Morphological Analysis of Bronchial Arteries and Variants with Computed Tomography Angiography
Published 2017“…The aim of our study was to determine the prevalence of anatomical variants of bronchial arteries using computed tomographic angiography in a population of northeastern Mexico. …”
Get full text
Article -
5
Generation of a Reconfigurable Logical Cell Using Evolutionary Computation
Published 2013Get full text
Article -
6
Morphological Analysis of Bronchial Arteries and Variants with Computed Tomography Angiography
Published 2017“…The aim of our study was to determine the prevalence of anatomical variants of bronchial arteries using computed tomographic angiography in a population of northeastern Mexico. …”
Get full text
Article -
7
Computer simulations of confined colloidal systems at the air/water interface
Published 2002Get full text
Article -
8
Implementación de la aplicación web BITA en Google Compute Engine.
Published 2023Subjects: “…Compute Engine…”
Get full text
Article -
9
-
10
-
11
Nanoalloying in real time: a high resolution STEM and computer simulation study
Published 2011Get full text
Article -
12
Pelvimetry by Reformatted Computed Tomography in 290 Female Pelvis: Morphometric Variations Regarding Age
Published 2016“…Our study measures the pelvic diameters of the birth canal using abdominopelvic computed tomography (CT). Two hundred and ninety CT from Mexican women between the ages of 18 and 50 were collected and 3D reformatted in order to morphologically measure the pelvic diameters of clinical relevance. …”
Get full text
Article -
13
-
14
Approach methodology for the sustainable design of packaging through computational tools: Case study: Water bottles
Published 2019“…This paper presents a methodological approach that enables reducing design times through parametric analysis and computerized tools. It also describes a case study using the proposed methodology. …”
Get full text
Article -
15
-
16
-
17
Soluciones administrativas y técnicas para proteger los recursos computacionales de personal interno-insiders (Administrative and technical solutions to protect computational resources from internal-insiders personnel) = (Administrative and technical solutions to protect computational resources from internal-insiders personnel).
Published 2007“…If the organization does not worry to place policies of computational security, that does not have control computational security, that does not invest in protection tools, does not update itself in the new problems of internal attacks and that a culture in computational security does not foment, among other aspects, more likely this in a high risk of which some computational resource can be affected by internal personnel and in consequence part or all the Business can let operate. …”
Get full text
Article -
18
Identification of potential target genes in Homo sapiens, by miRNA of Triticum aestivum: a cross kingdom computational approach
Published 2022“…It is important to identify targets to determine the possible effects in human genes by using computational approach. In this study, 787 possible mRNAs human targets were predicted by 84 miRNAs of wheat. …”
Get full text
Article -
19
Simulaciones computacionales sobre cuestiones ambientales en dos grupos de contraste = Computer simulations on environmental issues in two contrast groups
“…Abstract: This work aims to describe the cognitive representation on the subject of the environment that two groups of students have: 1) 57 of biology and 2) 64 of psychology, through computer simulations using the method of Pathfinder Associative Networks. …”
Get full text
Article -
20