Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
10581
An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems
Published 2022-01-01Get full text
Article -
10582
-
10583
Fire Video Recognition Based on Local and Global Adaptive Enhancement
Published 2025-01-01“…In the domain of fire warning, earlier approaches leveraging computer vision have achieved significant progress. …”
Get full text
Article -
10584
Promoting Geospatial Service from Information to Knowledge with Spatiotemporal Semantics
Published 2019-01-01Get full text
Article -
10585
A Trusted Federated Learning Method Based on Consortium Blockchain
Published 2024-12-01“…This method leverages computational power registration to group participants with similar resources into private chains and employs cross-chain communication with a central management chain to ensure efficient and secure model aggregation. …”
Get full text
Article -
10586
Simulation Study of Swarm Intelligence Based on Life Evolution Behavior
Published 2015-01-01“…Swarm intelligence (SI) is a new evolutionary computation technology, and its performance efficacy is usually affected by each individual behavior in the swarm. …”
Get full text
Article -
10587
An Obstacle Avoidance Scheme Maintaining Connectivity for Micro-Unmanned Aerial Vehicles
Published 2014-04-01Get full text
Article -
10588
Cov-trans: an efficient algorithm for discontinuous transcript assembly in coronaviruses
Published 2024-12-01“…Cov-trans is freely available at https://github.com/computer-Bioinfo/Cov-trans.git .…”
Get full text
Article -
10589
Simulating Crowd Evacuation in a Social Force Model with Iterative Extended State Observer
Published 2020-01-01Get full text
Article -
10590
Verification of Classification Model and Dendritic Neuron Model Based on Machine Learning
Published 2022-01-01Get full text
Article -
10591
Protecting Compressive Ghost Imaging with Hyperchaotic System and DNA Encoding
Published 2020-01-01“…As computational ghost imaging is widely used in the military, radar, and other fields, its security and efficiency became more and more important. …”
Get full text
Article -
10592
Intersezione tra intelligenza artificiale generativa e educazione: un’ipotesi
Published 2025-01-01“…By addressing technological challenges and ethical concerns, and embracing human-centered approaches, educators and computer science experts can leverage GenAI to create innovative and inclusive learning environments. …”
Get full text
Article -
10593
-
10594
An Algorithm for Improving Email Security on the Android Operating System in the Industry 4.0 Era
Published 2021-01-01Get full text
Article -
10595
Survey of Connectivity Restoration in 3D Wireless Ad Hoc/Sensor Networks
Published 2024-01-01Get full text
Article -
10596
FAB: Fast Angular Binary Descriptor for Matching Corner Points in Video Imagery
Published 2016-01-01“…Image matching is a fundamental step in several computer vision applications where the requirement is fast, accurate, and robust matching of images in the presence of different transformations. …”
Get full text
Article -
10597
Prediction of hemolytic peptides and their hemolytic concentration
Published 2025-02-01Get full text
Article -
10598
ONLINE and multi-objective trajectory planner for robotic systems
Published 2025-01-01“…Given the need for efficient real-time implementation with low computational demands, the kinematic method is indispensable. …”
Get full text
Article -
10599
Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network
Published 2020-06-01“…As a potential technology, the identity-based online/offline encryption scheme is split into two phases (the offline phase and the online phase) which is especially suitable for sensor nodes with limited computation resources in that most of the works can be executed offline. …”
Get full text
Article -
10600
Compound Autoregressive Network for Prediction of Multivariate Time Series
Published 2019-01-01Get full text
Article