Journal articles on the topic 'Word 97. (Computer file)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Word 97. (Computer file).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kim, Hyunji, Jaehoon Park, Hyeokdong Kwon, Kyoungbae Jang, and Hwajeong Seo. "Convolutional Neural Network-Based Cryptography Ransomware Detection for Low-End Embedded Processors." Mathematics 9, no. 7 (March 24, 2021): 705. http://dx.doi.org/10.3390/math9070705.
Full textAmos, Adediran Adekunle. "Sources of Information for Social Studies Teachers and their Level of usage in Abeokuta, Ogun State Nigeria." Information Management and Business Review 4, no. 10 (October 15, 2012): 517–22. http://dx.doi.org/10.22610/imbr.v4i10.1007.
Full textPitaud, Philippe. "The Elderly, Digital Technologies and the Breakdown of Social Ties: Risks of Exclusion or Lures of Inclusion?" Ciências e Políticas Públicas / Public Sciences & Policies 6, no. 2 (December 2020): 79–97. http://dx.doi.org/10.33167/2184-0644.cpp2020.vvin2/pp.79-97.
Full textCeccon Ribeiro, Paula, Melissa L. Biles, Charles Lang, Claudio Silva, and Jan L. Plass. "Visualizing log-file data from a game using timed word trees." Information Visualization 17, no. 3 (August 2, 2017): 183–95. http://dx.doi.org/10.1177/1473871617720810.
Full textWang, Zhi Qiang, Yayin Du, and Feng Liu. "Catastrophe Model of Elastic Compression Pole Buckling." Applied Mechanics and Materials 166-169 (May 2012): 3369–73. http://dx.doi.org/10.4028/www.scientific.net/amm.166-169.3369.
Full textAqilah Mohd Nahar, Nur Farah, Nurul Hidayah Ab Rahman, and Kamarudin Malik Mohammad. "E-Raser: File Shredder Application With Content Replacement by Using Random Words Function." JOIV : International Journal on Informatics Visualization 2, no. 4-2 (September 10, 2018): 313. http://dx.doi.org/10.30630/joiv.2.4-2.175.
Full textKhumrin, Piyapong, Ariyaphong Wongnoppavich, Khemmapop Boonploy, and Volaluck Supajatura. "A new approach to Computer-Based Examinations using word documents and spreadsheets." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 3 (January 10, 2014): 3319–24. http://dx.doi.org/10.24297/ijct.v12i3.3241.
Full textDervos, D., Y. Manolopoulos, and P. Linardis. "Comparison of signature file models with superimposed coding." Information Processing Letters 65, no. 2 (January 1998): 101–6. http://dx.doi.org/10.1016/s0020-0190(97)00210-x.
Full textEladawi, A. E., E. S. Gadelmawla, I. M. Elewa, and A. A. Abdel-Shafy. "An application of computer vision for programming computer numerical control machines." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 217, no. 9 (September 1, 2003): 1315–24. http://dx.doi.org/10.1243/095440503322420241.
Full text,, ,. "Great Enterprise Contribution to Society in Information System Perspectives PlagScan." Global Journal of Enterprise Information System 7, no. 1 (March 1, 2015): 89. http://dx.doi.org/10.18311/gjeis/2015/3047.
Full textMeyer, Helen. "Self-mutating Word viruses create strain." Computers & Security 16, no. 7 (January 1997): 621–22. http://dx.doi.org/10.1016/s0167-4048(97)80809-7.
Full textPlank, James S. "The Raid-6 Liber8Tion Code." International Journal of High Performance Computing Applications 23, no. 3 (June 2, 2009): 242–51. http://dx.doi.org/10.1177/1094342009106191.
Full textPollack, S. N., Z. J. Haskal, and S. A. Foster. "Personal Computer-Based Integrated Interventional Radiology Case Log and Digital Teaching File Database." Journal of Vascular and Interventional Radiology 8, no. 1 (January 1997): 261. http://dx.doi.org/10.1016/s1051-0443(97)70120-9.
Full textQiao, Yanchen, Weizhe Zhang, Xiaojiang Du, and Mohsen Guizani. "Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security." ACM Transactions on Internet Technology 22, no. 1 (February 28, 2022): 1–22. http://dx.doi.org/10.1145/3436751.
Full textMadeja, Matej, Jaroslav Porubän, Sergej Chodarev, Matúš Sulír, and Filip Gurbáľ. "Empirical Study of Test Case and Test Framework Presence in Public Projects on GitHub." Applied Sciences 11, no. 16 (August 6, 2021): 7250. http://dx.doi.org/10.3390/app11167250.
Full textGao, Jie. "A Parametric Design of Teaching Aid in Russian Class Based on Computer Technology." Advanced Materials Research 912-914 (April 2014): 1116–19. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1116.
Full textTukino, Tukino. "Pelatihan Microsoft Office 2010 pada Kelompok Kerja Kepala TK (K3TK) dan Gugus Paud Naga di Kota Batam sebagai Aplikasi dari Pembelajaran Komputer pada Anak Usia Dini." J-ABDIPAMAS (Jurnal Pengabdian Kepada Masyarakat) 2, no. 2 (October 31, 2018): 65. http://dx.doi.org/10.30734/j-abdipamas.v2i2.245.
Full textNoever, David A., and Samantha E. Miller Noever. "Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks." International Journal of Network Security & Its Applications 13, no. 03 (May 31, 2021): 1–13. http://dx.doi.org/10.5121/ijnsa.2021.13301.
Full textZHANG, HENG, DA-HAN WANG, CHENG-LIN LIU, and HORST BUNKE. "KEYWORD SPOTTING FROM ONLINE CHINESE HANDWRITTEN DOCUMENTS USING ONE-VERSUS-ALL CHARACTER CLASSIFICATION MODEL." International Journal of Pattern Recognition and Artificial Intelligence 27, no. 03 (May 2013): 1353001. http://dx.doi.org/10.1142/s0218001413530017.
Full textMartin, Sven, Jörg Liermann, and Hermann Ney. "Algorithms for bigram and trigram word clustering." Speech Communication 24, no. 1 (April 1998): 19–37. http://dx.doi.org/10.1016/s0167-6393(97)00062-9.
Full textLee, Sungkyu, and Rachelle S. Heller. "Use of a keystroke log file to evaluate an interactive computer system in a museum setting." Computers & Education 29, no. 2-3 (November 1997): 89–101. http://dx.doi.org/10.1016/s0360-1315(97)00025-0.
Full textBulley, Michael. "Unicode for beginners." English Today 21, no. 2 (April 2005): 63–64. http://dx.doi.org/10.1017/s0266078405002087.
Full textJang, Gilsang, and Heeseok Lee. "File and workload allocation design for distributed database on a two-level local multi-access computer network." Computers & Industrial Engineering 33, no. 3-4 (December 1997): 649–52. http://dx.doi.org/10.1016/s0360-8352(97)00213-1.
Full textMoore, G. W., U. N. Riede, R. A. Polacsek, R. E. Miller, and G. M. Hutchins. "Group Theory Approach to Computer Translation of Medical German." Methods of Information in Medicine 25, no. 03 (July 1986): 176–82. http://dx.doi.org/10.1055/s-0038-1635465.
Full textBarnes, Richard, Kerry L. Callaghan, and Andrew D. Wickert. "Computing water flow through complex landscapes – Part 3: Fill–Spill–Merge: flow routing in depression hierarchies." Earth Surface Dynamics 9, no. 1 (March 2, 2021): 105–21. http://dx.doi.org/10.5194/esurf-9-105-2021.
Full textYang, Kang, Huiqun Yu, Guisheng Fan, and Xingguang Yang. "Graph embedding code prediction model integrating semantic features." Computer Science and Information Systems 17, no. 3 (2020): 907–26. http://dx.doi.org/10.2298/csis190908027y.
Full textZhang, Kai, Wei Jun Liu, and Xiao Feng Shang. "Process Research on the Laser Rapid Manufacturing Technology." Advanced Materials Research 97-101 (March 2010): 4042–45. http://dx.doi.org/10.4028/www.scientific.net/amr.97-101.4042.
Full textChapman, Stephen K. "The Development of Remote Teaching Aids." Microscopy and Microanalysis 7, S2 (August 2001): 802–3. http://dx.doi.org/10.1017/s1431927600030087.
Full textDE BEUVRON, FRANÇOIS DE BERTRAND, and PHILIPPE TRIGANO. "HIERARCHICALLY CODED LEXICON WITH VARIANTS." International Journal of Pattern Recognition and Artificial Intelligence 09, no. 01 (February 1995): 145–65. http://dx.doi.org/10.1142/s0218001495000080.
Full textAhamed, Istiak, Maliha Jahan, Zarin Tasnim, Tajbia Karim, S. M. Salim Reza, and Dilshad Ara Hossain. "Spell corrector for Bangla language using Norvig’s algorithm and Jaro-Winkler distance." Bulletin of Electrical Engineering and Informatics 10, no. 4 (August 1, 2021): 1997–2005. http://dx.doi.org/10.11591/eei.v10i4.2410.
Full textTreff, Gunnar, Kay Winkert, Katja Machus, and Jürgen M. Steinacker. "Computer-Aided Stroke-by-Stroke Visualization of Actual and Target Power Allows for Continuously Increasing Ramp Tests on Wind-Braked Rowing Ergometers." International Journal of Sports Physiology and Performance 13, no. 6 (July 1, 2018): 729–34. http://dx.doi.org/10.1123/ijspp.2016-0716.
Full textHou, Yumin, Hu He, Xu Yang, Deyuan Guo, Xu Wang, Jiawei Fu, and Keni Qiu. "FuMicro: A Fused Microarchitecture Design Integrating In-Order Superscalar and VLIW." VLSI Design 2016 (December 15, 2016): 1–12. http://dx.doi.org/10.1155/2016/8787919.
Full textKobayashi, Kent D., Mary A. Young, David L. Hensley, H. C. Bittenbender, and Julie Ann T. Yogi. "Farmer's Bookshelf: Hypermedia Information System to Recommend Trees for Landscaping." HortScience 31, no. 4 (August 1996): 652c—652. http://dx.doi.org/10.21273/hortsci.31.4.652c.
Full textO’Brien, Myles. "A set of free cross-platform authoring programs for flexible web-based CALL exercises." EuroCALL Review 20, no. 2 (September 29, 2012): 59. http://dx.doi.org/10.4995/eurocall.2012.11378.
Full textHoyer, A. "Een Terminologiedatabank Voor Vertalers - Meer dan een Woordenboek." Toegepaste Taalwetenschap in Artikelen 27 (January 1, 1987): 77–87. http://dx.doi.org/10.1075/ttwia.27.10hoy.
Full textTejedor, Javier, Doroteo T. Toledano, Jose M. Ramirez, Ana R. Montalvo, and Juan Ignacio Alvarez-Trejos. "The Multi-Domain International Search on Speech 2020 ALBAYZIN Evaluation: Overview, Systems, Results, Discussion and Post-Evaluation Analyses." Applied Sciences 11, no. 18 (September 14, 2021): 8519. http://dx.doi.org/10.3390/app11188519.
Full textKanavas, Vasilios, Athanasios Zisopoulos, and Konstantinos Spinthiropoulos. "Law, Ethics and Tech Aspects for an Irrevocable BlockChain Based Curriculum Vitae Created by Big Data Analytics Fed by Internet of Things, Sensors and Approved Data Sources." Int'l Journal of Management Innovation Systems 3, no. 1 (November 14, 2018): 50. http://dx.doi.org/10.5296/ijmis.v3i1.13774.
Full textBanerjee, S., F. Steenkeste, P. Couturier, M. Debray, and A. Franco. "Telesurveillance of elderly patients by use of passive infra-red sensors in a 'smart' room." Journal of Telemedicine and Telecare 9, no. 1 (February 1, 2003): 23–29. http://dx.doi.org/10.1258/135763303321159657.
Full textMusfika, Puput Nada, and Depi Rusda. "Sistem Informasi Lowongan Kerja di Kota Sampit Berbasis Web." Building of Informatics, Technology and Science (BITS) 2, no. 2 (December 10, 2020): 84–90. http://dx.doi.org/10.47065/bits.v2i2.498.
Full textVinh, Truong Quang, Le Hoai Duy, and Nguyen Thanh Nhan. "Vietnamese handwritten character recognition using convolutional neural network." IAES International Journal of Artificial Intelligence (IJ-AI) 9, no. 2 (June 1, 2020): 276. http://dx.doi.org/10.11591/ijai.v9.i2.pp276-281.
Full textSpiroski, Mirko. "How to Verify Plagiarism of the Paper Written in Macedonian and Translated in Foreign Language?" Open Access Macedonian Journal of Medical Sciences 4, no. 1 (February 29, 2016): 1–4. http://dx.doi.org/10.3889/oamjms.2016.035.
Full textKobayashi, Kent D., and H. C. Bittenbender. "FARMER'S BOOKSHELF™: HYPERMEDIA INFORMATION SYSTEM TO RECOMMEND GROUND COVERS." HortScience 27, no. 6 (June 1992): 578d—578. http://dx.doi.org/10.21273/hortsci.27.6.578d.
Full textKhalafat, Monther, Ja'far S. Alqatawna, Rizik M. H. Al-Sayyed, Mohammad Eshtay, and Thaeer Kobbaey. "Violence Detection over Online Social Networks: An Arabic Sentiment Analysis Approach." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 14 (July 28, 2021): 90. http://dx.doi.org/10.3991/ijim.v15i14.23029.
Full textGelfand, Stanley A. "Tri-Word Presentations With Phonemic Scoring for Practical High-Reliability Speech Recognition Assessment." Journal of Speech, Language, and Hearing Research 46, no. 2 (April 2003): 405–12. http://dx.doi.org/10.1044/1092-4388(2003/033).
Full textZanona, Marwan Abo, Anmar Abuhamdah, and Bassam Mohammed El-Zaghmouri. "Arabic Hand Written Character Recognition Based on Contour Matching and Neural Network." Computer and Information Science 12, no. 2 (April 30, 2019): 126. http://dx.doi.org/10.5539/cis.v12n2p126.
Full textHaliq, Abdul, Akmal Hamsa, and Sakaria Sakaria. "ANALISIS PEMANFAATAN, FAKTOR PENDUKUNG DAN PENGHAMBAT, SERTA UPAYA OPTIMALISASI APLIKASI ZOTERO DALAM PENULISAN KARYA ILMIAH." Edukasi: Jurnal Pendidikan 19, no. 1 (April 30, 2021): 16. http://dx.doi.org/10.31571/edukasi.v19i1.2325.
Full textORAN, Mehmet. "Opinions of Social Studies Teacher Candidates Prepared for KPSS Regarding the Effect of the Pandemic Period on Their Course Studies." International Education Studies 14, no. 6 (May 7, 2021): 12. http://dx.doi.org/10.5539/ies.v14n6p12.
Full textSarmini, Sarmini, Niken Lia Prihatiningtias Pambayun, and Nilam Puspita Nurdewanti. "PELATIHAN PEMBUATAN BAHAN AJAR MENGGUNAKAN FILMORA KEPADA GURU MADRASAH ALIYAH (MA) TANBIHUL GHOFILIIN BANJARNEGARA." SELAPARANG Jurnal Pengabdian Masyarakat Berkemajuan 4, no. 3 (August 5, 2021): 672. http://dx.doi.org/10.31764/jpmb.v4i3.4871.
Full textLee, Gary Geunbae, Jeongwon Cha, and Jong-Hyeok Lee. "Syllable-Pattern-Based Unknown-Morpheme Segmentation and Estimation for Hybrid Part-of-Speech Tagging of Korean." Computational Linguistics 28, no. 1 (March 2002): 53–70. http://dx.doi.org/10.1162/089120102317341774.
Full textDeCola, Elise G., Tim L. Robertson, Terry Bryant, and Gary Folley. "TAMING THE OIL SPILL PAPERWORK BEAST: THE ALASKA SPILL RESPONSE PERMITS PROJECT." International Oil Spill Conference Proceedings 2005, no. 1 (May 1, 2005): 115–18. http://dx.doi.org/10.7901/2169-3358-2005-1-115.
Full text