Suggested Topics within your search.
Suggested Topics within your search.
- Automatic speech recognition 1
- Electric power distribution 1
- Electric power systems 1
- Fourier transformations 1
- Harmonic analysis 1
- Human-computer interaction 1
- Human-machine systems 1
- Interactive computer systems 1
- Natural language processing (Computer science) 1
- Speech processing systems 1
- Speech synthesis 1
- Transformations (Mathematics) 1
-
2721
-
2722
The usefulness of the T1DDS simulator in the context of multi-day type 1 diabetes therapy
Published 2024-12-01“…The T1DDS simulator has so far been used within a one-day scope and in this form was employed as the computational engine in the educational application T1DCoach. …”
Get full text
Article -
2723
CODE-ACCORD: A Corpus of building regulatory data for rule generation towards automatic compliance checking
Published 2025-01-01Get full text
Article -
2724
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01“…In the current increasingly competitive international cyberspace security game,critical information infrastructure is facing a severe security situation.From the view of scientific principle,the essence of network security risk is the limitation of people’s cognitive logic of information science.It is impossible to build a solid network defense system,and it is not necessarily cost-effective from the view of economic benefits.In network security work,the most important thing is the convergence of security objectives.The key is to ensure that the logical combination of computing tasks is not tampered with or destroyed,and to achieve correct calculation.Focusing on this security goal,scientific and technological innovations were made in such aspects as logical correct verification theory,computing architecture and application mode of computing engineering.The problem that logical defects were not exploited by attackers was solved,a unity of offensive and defensive contradictions was formed,and the active immunity capability for information systems was established.…”
Get full text
Article -
2725
Editorial: Cybersecurity and artificial intelligence: advances, challenges, opportunities, threats
Published 2025-01-01Get full text
Article -
2726
The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks
Published 2025-01-01Get full text
Article -
2727
Hyperchaos on the dynamics of memristive Tabu learning neuron model under influence of electromagnetic radiation: Application in biomedical data privacy
Published 2025-03-01“…The insights gained from neural dynamics could pave the way for applications in neuromorphic computing, engineering, and brain-machine interfaces. Based on the complex dynamics of the model, a data privacy of biomedical data has been build and reveals good results, and enable to resist to robust attacks.…”
Get full text
Article -
2728
Switching MIMO System with Adaptive OFDM Modulation for Indoor Visible Light Communication
Published 2018-01-01Get full text
Article -
2729
A novel computational analysis of boundary-driven two-dimensional heat flow with internal heat generation
Published 2024-03-01“…It provides a template for extension to more complex geometries and multiphysics phenomena, contributing to advances in computational engineering.…”
Get full text
Article -
2730
-
2731
-
2732
Subspace Compressive GLRT Detector for MIMO Radar in the Presence of Clutter
Published 2015-01-01Get full text
Article -
2733
Advanced Presentation of BETHSY 6.2TC Test Results Calculated by RELAP5 and TRACE
Published 2012-01-01“…Nuclear Regulatory Commission TRAC/RELAP Advanced Computational Engine (TRACE) best-estimate reactor system code. …”
Get full text
Article -
2734
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
Published 2025-01-01Get full text
Article -
2735
Vibrational Modal Frequencies and Shapes of Two-Span Continuous Timber Flooring Systems
Published 2019-01-01Get full text
Article -
2736
Threshold Accepting Heuristic for Fair Flow Optimization in Wireless Mesh Networks
Published 2014-01-01Get full text
Article -
2737
-
2738
A Polynomial-Time Algorithm for Detection of Uncovered Transitions in a Petri Net-Based Concurrent System
Published 2025-01-01Get full text
Article -
2739
Hybrid ZnO/TiO2 Loaded in Electrospun Polymeric Fibers as Photocatalyst
Published 2015-01-01Get full text
Article -
2740
Digital Twin-Empowered Green Mobility Management in Next-Gen Transportation Networks
Published 2024-01-01Get full text
Article