Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
461
Playing hide and seek with primates: A comparative study of Theory of Mind
Published 2015-03-01Subjects: Get full text
Article -
462
-
463
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection
Published 2019-01-01“…The feasibility of utilizing Granular Computing (GC) as a solution to the most current challenges in cybersecurity is researched. …”
Get full text
Article -
464
Real-Time Evaluation of Breast Self-Examination Using Computer Vision
Published 2014-01-01“…The general objective of this paper is to design and develop a computer vision algorithm to evaluate the BSE performance in real-time. …”
Get full text
Article -
465
Post-processing methods for delay embedding and feature scaling of reservoir computers
Published 2025-01-01“…Abstract Reservoir computing is a machine learning method that is well-suited for complex time series prediction tasks. …”
Get full text
Article -
466
CLOUD COMPUTING AND FINANCIAL PERFORMANCE OF LISTED DEPOSIT MONEY BANKS IN NIGERIA
Published 2024-12-01Subjects: Get full text
Article -
467
Correlation of Image Quality Metrics with Expert Perception for Industrial Computed Tomography
Published 2025-02-01“…This study contributes to a deeper understanding of the relationship between objective image quality metrics and subjective human perception in the context of industrial computed tomography. …”
Get full text
Article -
468
Computation of the topological entropy in chaotic biophysical bursting models for excitable cells
Published 2006-01-01Get full text
Article -
469
Computationally Efficient Minimum-Time Motion Primitives for Vehicle Trajectory Planning
Published 2024-01-01“…In autonomous racing, motion primitives have been used as computationally faster alternatives to model predictive control, for online obstacle avoidance. …”
Get full text
Article -
470
Computer modeling of Vilnius University finance management in a process of studies
Published 2023-09-01“… In this work a computer simulation of Vilnius University financial management is completed. …”
Get full text
Article -
471
Empowering drones in vehicular network through fog computing and blockchain technology.
Published 2025-01-01“…Fog nodes strategically placed near IoT devices serve as computational resources for drones, ensuring quick service responses for deadline-driven tasks. …”
Get full text
Article -
472
Improved Harmony Search Algorithm to Compute the Underfrequency Load Shedding Parameters
Published 2022-01-01“…This paper introduces a novel method to compute an optimally parametrized conventional UFLS scheme in specific given operating conditions by formulating it as a constrained problem and using the Improved Harmony Search (IHS) algorithm to solve it. …”
Get full text
Article -
473
Comparative analysis of computing platforms for onboard micromodule of provisional image recognition
Published 2018-09-01“…This paper is devoted to the analysis of basic hardware and software of recent cheap and commercially available computing microplatforms for selecting an appropriate solution for development of an onboard micromodule for preliminary recognition and selection of images of underlying surface of given types. …”
Get full text
Article -
474
Characterizing Perception Deep Learning Algorithms and Applications for Vehicular Edge Computing
Published 2025-01-01Subjects: “…vehicular edge computing…”
Get full text
Article -
475
Juveniles as victims of criminal acts committed under the misuse of computer network
Published 2018-01-01Subjects: “…computer crime…”
Get full text
Article -
476
Retracted: Computation of Vertex Degree-Based Molecular Descriptors of Hydrocarbon Structure
Published 2023-01-01Get full text
Article -
477
Markov processes: branching properties and asymptotic behavior applications in computer science
Published 2024-12-01Get full text
Article -
478
Machine Learning for Ischemic Heart Disease Diagnosis Aided by Evolutionary Computing
Published 2021-01-01“…In light of these findings, a hybrid diagnostic tool has been developed that combines several computational intelligence (machine learning) techniques capable of analyzing clinical histories and images of electrocardiogram signals and indicating whether or not the patient has ischemic heart disease with up to 97.01% accuracy. …”
Get full text
Article -
479
State feedback impulsive control of computer worm and virus with saturated incidence
Published 2018-11-01Subjects: “…computer worm…”
Get full text
Article -
480
Spatial Cluster Analysis by the Bin-Packing Problem and DNA Computing Technique
Published 2013-01-01“…Typical techniques include CLARANS, density- and gravity-based clustering, and other algorithms based on traditional von Neumann's computing architecture. The purpose of this paper is to propose a technique for spatial cluster analysis based on sticker systems of DNA computing. …”
Get full text
Article