Modern Application of Computer Science and Technology

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Application of Computer Technology in Advanced Material Science and Processing

Computer technology is an actual system model, which is largely unaffected by experimental conditions, time and space constraints, and is of great flexibility. Nowadays, computer technology has thoroughly penetrated in the various areas of material processing and research, which becomes one of the important frontiers in the field of material manufacturing industry. At the same time, material sc...

متن کامل

Philosophical Evaluation from Science and Technology in a Replacing Civilization with Emphasis on Critical Re-reading of Modern Science

In the present study, the dignity of science and technology in modern civilizations is evaluated as the vital status of the ontological and of "Being" and "Not-Being" type, while emphasizing that the problem description in religious models of new civilization cannot be reduced to the acquisition of modern and strategic science and technologies; Accordingly, this article, while reviewing and cri...

متن کامل

Global Journal of Computer Science and Technology

This paper proposes a transformation scheme for rendering the asymmetric watermarking technique into its asymmetric version. The asymmetric technique uses secret watermark as private key and public watermark as public key. The public watermark has a normal distribution and the private watermark is a linear combination of the public watermark and a secret sequence. The detection process is imple...

متن کامل

Global Journal of Computer Science and Technology

Data security has become a major issue in most network protocols. For wireless system, security support is even more important to protect the users as well as the network. Due to this importance, different protocol were designed & deployed with network standards in order to add the security. The security sub layer of IEEE 802.16 employs an authenticated client/server key management protocol in ...

متن کامل

Global Journal of Computer Science and Technology

In this paper, we analyze the characteristics of the dynamic job shop scheduling problem when machine breakdown and new job arrivals occur. A hybrid approach involving neural networks(NNs) and geneticalgorithm(GA) is presented to solve the dynamic job shop scheduling problem as a static scheduling problem. The objective of this kind of job shop scheduling problem is minimizing the completion ti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lifelong Education

سال: 2020

ISSN: 2251-2683

DOI: 10.18282/le.v9i6.1329