Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
8741
A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
Published 2020-01-01Get full text
Article -
8742
-
8743
Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism
Published 2014-01-01Get full text
Article -
8744
Damage Identification in Bars with a Wave Propagation Approach and a Hybrid Optimization Method
Published 2012-01-01Get full text
Article -
8745
-
8746
-
8747
Performance Modeling of Proposed GUISET Middleware for Mobile Healthcare Services in E-Marketplaces
Published 2014-01-01Get full text
Article -
8748
-
8749
A Novel User Selection Strategy with Incentive Mechanism Based on Time Window in Mobile Crowdsensing
Published 2020-01-01Get full text
Article -
8750
Enhancing Industrial Cybersecurity: Insights From Analyzing Threat Groups and Strategies in Operational Technology Environments
Published 2025-01-01“…Consequently, it highlights the need for increased vigilance in protecting OT environments, which can be done by using a variety of open-source threat intelligence platforms and databases, including Thai computer emergency response team (ThaiCERT), Malpedia by Fraunhofer-Institut für Kommunikation, Informationsverarbeitung und Ergonomie (Malpedia by FKIE), adversarial tactics, techniques, and common knowledge by massachusetts institute of technology research and engineering (MITRE ATT&CK), and Industrial Control Systems Cyber Emergency Response Team. …”
Get full text
Article -
8751
Identifying vital spreaders in large-scale networks based on neighbor multilayer contributions
Published 2025-01-01“…These tests demonstrated the effectiveness of our proposed algorithm in identifying influential spreaders accurately.DiscussionFurthermore, computational complexity analysis indicates that our algorithm consumes less time compared to existing methods, suggesting it can be efficiently applied to large-scale networks.…”
Get full text
Article -
8752
An Improved Pearson’s Correlation Proximity-Based Hierarchical Clustering for Mining Biological Association between Genes
Published 2014-01-01“…Microarray gene expression datasets has concerned great awareness among molecular biologist, statisticians, and computer scientists. Data mining that extracts the hidden and usual information from datasets fails to identify the most significant biological associations between genes. …”
Get full text
Article -
8753
Influencing Factors and Clustering Characteristics of COVID-19: A Global Analysis
Published 2022-12-01Get full text
Article -
8754
-
8755
-
8756
Monitoring Population Phenology of Asian Citrus Psyllid Using Deep Learning
Published 2021-01-01Get full text
Article -
8757
-
8758
-
8759
Efficient Periodic Broadcasting for Mobile Networks at Small Client Receiving Bandwidth and Buffering Space
Published 2013-01-01Get full text
Article -
8760
Research on Spectroscopy Modulation of a Distributed Feedback Laser Diode Based on the TDLAS Technique
Published 2021-01-01Get full text
Article