Search alternatives:
"using computational and computing program" » "and computational and computing program" (Expand search), "using computational fluid computing program" (Expand search), "using computational and consulting program" (Expand search), "using computational and computer program" (Expand search), "using computational and computador program" (Expand search), "using computational grid computing program" (Expand search), "using computational fog computing program" (Expand search)
"_ computational to computing program" » "_ computational to consulting program" (Expand search), "_ computational to computer program" (Expand search), "_ computational to computador program" (Expand search), "_ computational tool computing program" (Expand search), "_ computational _ computing program" (Expand search), "_ computational 3d computing program" (Expand search), "_ computational fog computing program" (Expand search), "_ computational of computing program" (Expand search)
"using computational and computing program" » "and computational and computing program" (Expand search), "using computational fluid computing program" (Expand search), "using computational and consulting program" (Expand search), "using computational and computer program" (Expand search), "using computational and computador program" (Expand search), "using computational grid computing program" (Expand search), "using computational fog computing program" (Expand search)
"_ computational to computing program" » "_ computational to consulting program" (Expand search), "_ computational to computer program" (Expand search), "_ computational to computador program" (Expand search), "_ computational tool computing program" (Expand search), "_ computational _ computing program" (Expand search), "_ computational 3d computing program" (Expand search), "_ computational fog computing program" (Expand search), "_ computational of computing program" (Expand search)
1
2
3
“... shape, using the condition factor (K) and ellipticity (E) as criteria. Data from 1380 individuals...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
4
5
6
7
8
9
10
11
“...257734638). The funders had no role in study design, data collection and analysis, decision...”
Access document
Access document
Article
12
13
“... verified by comparison with experimental and computational data from the literature. Additionally, the...”
Access document
Access document
Article
14
15
16
Subjects:
“...Computational thinking education...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Master thesis
17
“... is performed using the Normal Flow technique. A computational algorithm was implemented using the free program...”
Access document
Access document
Article
18
“... an N=N bridge, have been synthesized by azo coupling using 1-alkyl(aryl)thienylpyrroles (1) and benzothiazolyl...”
Access document
Access document
Article
19
“...This study has received the major support of the Octacilio Gualberto Foundation (FOG), and it has...”
Access document
Access document
Article
20
“... specification in which parameters are used to abstract variables, such as in predicates and functions. In the...”
Access document
Access document
Doctoral thesis