Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
13341
Survey on Construction Method of Temporal Knowledge Graph
Published 2025-02-01“…Then, it delves into the construction process of temporal knowledge graph, dividing the core process into three key stages: knowledge extraction, knowledge fusion, and knowledge computing. …”
Get full text
Article -
13342
A Decentralized Signcryption Scheme Based on CFL
Published 2025-03-01“…The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. …”
Get full text
Article -
13343
ACGAN: adaptive conditional generative adversarial network architecture predicting skin lesion using collaboration of transfer learning models
Published 2024-10-01“…The process of collaboration of all such methods improves accuracy further to 95%. …”
Get full text
Article -
13344
Innovative approach of nomography application into an engineering educational context.
Published 2025-01-01“…The past century saw nomography grow as a graphical computing method used by scientists and engineers wishing to solve complex problems to a practical precision. …”
Get full text
Article -
13345
Peptidomic analysis of whey protein hydrolysates and prediction of their antioxidant peptides
Published 2022-03-01Get full text
Article -
13346
-
13347
EXPERIMENTAL STUDY TO ASSESS THE IMPACT OF TIMERS ON USER SUSCEPTIBILITY TO PHISHING ATTACKS
Published 2022-02-01Get full text
Article -
13348
Prediction of Surface Roughness When End Milling Ti6Al4V Alloy Using Adaptive Neurofuzzy Inference System
Published 2013-01-01“…Many diverse techniques have been applied in modelling metal cutting processes. Previous studies have revealed that artificial intelligence techniques are novel soft computing methods which fit the solution of nonlinear and complex problems like metal cutting processes. …”
Get full text
Article -
13349
An adaptive defense mechanism to prevent advanced persistent threats
Published 2021-04-01Get full text
Article -
13350
Temporal cortex activation reveals emotional multisensory integration in preschoolers: An fNIRS study
Published 2025-08-01Get full text
Article -
13351
DAPT: A package enabling distributed automated parameter testing
Published 2021-06-01“…Furthermore, parameter testing, processing, and analysis are slowed if simulation and processing jobs cannot be shared across teammates or computational resources. …”
Get full text
Article -
13352
Dual-Band High-Throughput and High-Contrast All-Optical Topology Logic Gates
Published 2024-12-01“…Optical computing offers advantages such as high bandwidth and low loss, playing a crucial role in signal processing, communication, and sensing applications. …”
Get full text
Article -
13353
A comparative study of deepfake facial manipulation technique using generative adversarial networks
Published 2025-06-01“…Due to the development of image processing tools and visualization techniques integrating deep learning and artificial intelligence (AI) algorithms (in particular generative adversarial networks–GAN), this can pose serious threats to privacy and security. …”
Get full text
Article -
13354
SMT efficiency in supervised ML methods: a throughput and interference analysis
Published 2024-10-01“…Abstract The microarchitecture of general-purpose processors is continuously evolving to adapt to the new computation and memory demands of incoming workloads. …”
Get full text
Article -
13355
Deep-learning based detection of vessel occlusions on CT-angiography in patients with suspected acute ischemic stroke
Published 2023-08-01“…Abstract Swift diagnosis and treatment play a decisive role in the clinical outcome of patients with acute ischemic stroke (AIS), and computer-aided diagnosis (CAD) systems can accelerate the underlying diagnostic processes. …”
Get full text
Article -
13356
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
Published 2021-06-01Get full text
Article -
13357
TinySurveillance: An Extra Low-Power Event-Based Surveillance Method for UAVs
Published 2025-01-01Get full text
Article -
13358
Leveraging Local LLMs for Secure In-System Task Automation With Prompt-Based Agent Classification
Published 2024-01-01“…While these models show promise in improving personal computing experiences concerns surrounding data privacy and security have hindered their integration with sensitive personal information. …”
Get full text
Article -
13359
Digital Architectures for UWB Beamforming Using 2D IIR Spatio-Temporal Frequency-Planar Filters
Published 2012-01-01“…The real-time throughput is maximized using look-ahead optimization applied locally to each processor in the proposed massively-parallel realization of the filter. …”
Get full text
Article -
13360