Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
7941
A Danger-Theory-Based Immune Network Optimization Algorithm
Published 2013-01-01Get full text
Article -
7942
An Innovative Thinking-Based Intelligent Information Fusion Algorithm
Published 2013-01-01“…This study proposes an intelligent algorithm that can realize information fusion in reference to the relative research achievements in brain cognitive theory and innovative computation. This algorithm treats knowledge as core and information fusion as a knowledge-based innovative thinking process. …”
Get full text
Article -
7943
Incremental Bilateral Preference Stable Planning over Event Based Social Networks
Published 2019-01-01Get full text
Article -
7944
-
7945
Diagnosis of High Voltage Insulators Made of Ceramic Using Spectrophotometry
Published 2016-01-01Get full text
Article -
7946
An Optical Flow-Based Approach for Minimally Divergent Velocimetry Data Interpolation
Published 2019-01-01Get full text
Article -
7947
-
7948
-
7949
Diagnosis of Intra-Abdominal Extralobar Pulmonary Sequestration by means of Ultrasound in a Neonate
Published 2013-01-01Get full text
Article -
7950
-
7951
Projection Analysis Optimization for Human Transition Motion Estimation
Published 2019-01-01Get full text
Article -
7952
P-LEACH: An Efficient Cluster-Based Technique to Track Mobile Sinks in Wireless Sensor Networks
Published 2014-09-01Get full text
Article -
7953
Bandlimited Frequency-Constrained Iterative Methods
Published 2025-01-01“…Variable aperture sampling reconstruction matrices have a history of being computationally intensive due to the need to compute a full matrix inverse. …”
Get full text
Article -
7954
Predicting Students’ Final Performance Using Artificial Neural Networks
Published 2022-12-01Get full text
Article -
7955
A model-free method to learn multiple skills in parallel on modular robots
Published 2024-07-01Get full text
Article -
7956
Dynamic Multidrug Therapies for HIV: Optimal and STI Control Approaches
Published 2004-06-01Get full text
Article -
7957
Advanced Techniques and Antenna Design for Pulse Shaping in UWB Cognitive Radio
Published 2012-01-01Get full text
Article -
7958
SviaB: Secure and verifiable multi‐instance iris remote authentication using blockchain
Published 2022-01-01“…However, most of the existing privacy‐preserving biometric authentication systems using HE assume that the server performs computations honestly. In a malicious server setting, the server may return an arbitrary result to save computational resources, resulting in a false accept/reject. …”
Get full text
Article -
7959
3D Self-Deployment Algorithm in Mobile Wireless Sensor Networks
Published 2015-04-01Get full text
Article -
7960
Traffic Flow Prediction Based on Multi-Spatiotemporal Attention Gated Graph Convolution Network
Published 2022-01-01“…Such research routines have high computational cost and few attentions on impaction of different time and nodes. …”
Get full text
Article