Suggested Topics within your search.
Suggested Topics within your search.
- Computer science 3
- Application software 1
- Automata 1
- Automatic speech recognition 1
- Coding and Information Theory 1
- Coding theory 1
- Computer access points 1
- Development 1
- Digital techniques 1
- Enterprise application integration (Computer systems) 1
- Government policy 1
- Graphical user interfaces (Computer systems) 1
- Human-computer interaction 1
- Human-machine systems 1
- Information theory 1
- Interactive computer systems 1
- Java (Computer program language) 1
- Management information systems 1
- Mathematics 1
- Moral and ethical aspects 1
- Natural language processing (Computer science) 1
- Object-oriented programming (Computer science) 1
- Prevention 1
- Programming Languages, Compilers, Interpreters 1
- Programming languages (Electronic computers) 1
- Psychological aspects 1
- Psychology 1
- Scripting languages (Computer science) 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
-
521
Embeddings
Published 2022-12-01“…I argue here that the concept of embedding (understood in the mathematical and computer science sense) provides a general way of understanding the relation between generative AI, written language and semiotics, and animal cognition when understood recursively. …”
Get full text
Article -
522
A Unif: A common supercategory of pMET and Unif
Published 1998-01-01“…Some natural examples are presented, such as function spaces, hyperspaces, spaces of measures, and an example concerning theoretical computer science.…”
Get full text
Article -
523
Training of scientific generation of mathematicians
Published 2001-12-01“…The scientific staff situation in mathematics, computer science and partly in mathematical educology is considered. …”
Get full text
Article -
524
Application of the New Mapping Method to Complex Three Coupled Maccari’s System Possessing M-Fractional Derivative
Published 2024-07-01“…Our study establishes a connection between computer science and soliton physics, emphasizing the pivotal role of soliton phenomena in advancing simulations and computational modeling. …”
Get full text
Article -
525
Studies of Metal Organic Networks via M-Polynomial-Based Topological Indices
Published 2022-01-01“…Topological index (TI) is a graph-theoretic tool that is used to study different physical and structural properties of the networks in various disciplines of science such as computer science, chemistry, and information technology. …”
Get full text
Article -
526
Quantum measurement: A short review
Published 2024-01-01“…The last forty years brought a renowned interest in this problem with an emphasis on the new foundations of quantum theory and unpredicted formulation of some new quantum disciplines, such as the open quantum systems theory and the quantum information and computation science. A state of the art of the problem of measurement is shortly presented, including a brief historical view, with a review of the authors' original contributions.…”
Get full text
Article -
527
Vertex Degrees and Isomorphic Properties in Complement of an m-Polar Fuzzy Graph
Published 2017-01-01“…Computational intelligence and computer science rely on graph theory to solve combinatorial problems. …”
Get full text
Article -
528
The G-Asymptotic Tracking Property and G-Asymptotic Average Tracking Property in the Inverse Limit Spaces under Group Action
Published 2021-01-01“…The results obtained improve the conclusions of asymptotic tracking property, asymptotic average tracking property, and quasi-weak almost-periodic point in the inverse limit space and provide the theoretical basis and scientific foundation for the application of tracking property in computational mathematics, biological mathematics, and computer science.…”
Get full text
Article -
529
Double Domination and Regular Domination in Intuitionistic Fuzzy Hypergraph
Published 2022-01-01“…This study investigates the domination, double domination, and regular domination in intuitionistic fuzzy hypergraph (IFHG), which has enormous application in computer science, networking, chemical, and biological engineering. …”
Get full text
Article -
530
Application and Development of Artificial Intelligence in Dentistry
Published 2024-12-01“…Artificial intelligence (AI) is the intelligence of the machine and the branch of computer science that enables its creation. The technology enables a machine to simulate human behaviors and perform complex tasks. …”
Get full text
Article -
531
The main methodological approaches to the formation of universal competencies of students of technical universities
Published 2022-12-01“…The paper highlights the theoretical provisions describing the main methodological approaches to the formation of competencies, which are provided for by modern federal state educational standards of higher education, taking into account professional standards (FGOS HE (3++)) bachelors degree in the areas of training of the enlarged group 090000 Computer Science and Computer engineering: competence, system-activity and information approaches in education and pedagogical science. …”
Get full text
Article -
532
Anxiety due to Dental Treatment and Procedures among University Students and Its Correlation with Their Gender and Field of Study
Published 2013-01-01“…Seven hundred students participated in this study including 13% of medical students, 10% of dental students, 58% of arts students, and 18% of computer science students. Medical and dental students were less anxious than arts and computer science students (P<0.05). …”
Get full text
Article -
533
Predicting the Link between Stock Prices and Indices with Machine Learning in R Programming Language
Published 2021-01-01“…With the development of computer science, the author now uses many computer science techniques to make more accurate predictions of stock prices. …”
Get full text
Article -
534
Protocols for Robotic Telescope Networks
Published 2010-01-01“…This paper is addressed to astronomers who are not specialists in computer science. We give explanations of some basic and advanced protocols to receive events and how to implement them in a robotic observatory software. …”
Get full text
Article -
535
The dangerous biology of pathogenic germs
Published 2024-09-01“…The convergence of biotechnologies with other disciplines, including computer science and Artificial Intelligence (AI), may make it possible to carry out dangerous genetic manipulations on pathogenic germs, as the gain-of-function experiments exacerbating virulence, as those carried out on myxoviruses and coronaviruses. …”
Get full text
Article -
536
Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity
Published 2022-09-01“…In connection with these ideas, this article is prepared for applications in computing science and cybersecurity. This paper presents computing and combinatorial formulae such as theorems on factorials, binomial, and multinomial coefficients and probability and binomial distributions. …”
Get full text
Article -
537
SLM-DFS: A systematic literature map of deepfake spread on social media
Published 2025-01-01“…As this technology evolves, the urgency for effective detection methods to counter misuse intensifies. Computer science researchers are increasingly focused on stopping the spread of deepfakes (DFs) on social media. …”
Get full text
Article -
538
A Modified Iterative Approach for Fixed Point Problem in Hadamard Spaces
Published 2024-01-01“…The role of iterative algorithms is vital in exploring the diverse domains of science and has proven to be a powerful tool for solving complex computational problems in the most trending branches of computer science. Taking motivation from this fact, we develop and apply a modified four-step iterative algorithm to solve the fixed point problem in the Hadamard spaces using a total asymptotic nonexpansive mapping. …”
Get full text
Article -
539
On the Metric Dimension of Generalized Tensor Product of Interval with Paths and Cycles
Published 2020-01-01“…The concept of minimum resolving set for a connected graph has played a vital role in Robotic navigation, networking, and in computer sciences. In this article, we investigate the values of m and n for which P2⊗mPn and P2⊗mCn are connected and find metric dimension in this case. …”
Get full text
Article -
540
Experiencing a Problem-Based Learning Approach for Teaching Reconfigurable Architecture Design
Published 2009-01-01“…This paper presents the “reconfigurable computing” teaching part of a computer science master course (first year) on parallel architectures. …”
Get full text
Article