Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
12801
X-GANet: An Explainable Graph-Based Framework for Robust Network Intrusion Detection
Published 2025-04-01Get full text
Article -
12802
A Polycarbonate-Assisted Transfer Method for van der Waals Contacts to Magnetic Two-Dimensional Materials
Published 2024-11-01Get full text
Article -
12803
PATTERN RECOGNITION THEORY AND NEUROCOMPUTERS
Published 2019-06-01“…The new approach to use of key statements of pattern recognition theory for the parallel problem oriented processors design is presented. The tasks of classification, clusterization and association are considered from point of view of parallel processor architecture unification. …”
Get full text
Article -
12804
Winter wheat mapping using unbalanced multi-source remote sensing data
Published 2025-08-01Get full text
Article -
12805
Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets
Published 2022-01-01Get full text
Article -
12806
THREE-DIMENSIONAL RECONSTRUCTION BY SART METHOD WITH MINIMIZATION OF THE TOTAL VARIATION
Published 2015-11-01“…Computed tomography is still being intensively studied and widely used to solve a number of industrial and medical applications. …”
Get full text
Article -
12807
-
12808
New High-Speed Arithmetic Circuits Based on Spiking Neural P Systems with Communication on Request Implemented in a Low-Area FPGA
Published 2024-11-01“…As a consequence, the proposed neuromorphic processor achieves higher processing speeds by maintaining low area consumption in comparison with the existing approaches.…”
Get full text
Article -
12809
Theory of Acceleration of Decision-Making by Correlated Time Sequences
Published 2022-01-01Get full text
Article -
12810
Evaluating the Ethical Practices in Developing AI and Ml Systems in Tanzania
Published 2024-09-01Get full text
Article -
12811
Arabic Cyberbullying Detection: A Comprehensive Review of Datasets and Methodologies
Published 2025-01-01Get full text
Article -
12812
-
12813
Smart Manufacturing through Machine Learning: A Review, Perspective, and Future Directions to the Machining Industry
Published 2022-01-01“…One such subclass of artificial intelligence is machine learning, which uses a computer system for making predictions and performing definite tasks without any use of specific instructions to enhance the quality of the product, and rate of production, and to optimize the processes and parameters in machining operations. …”
Get full text
Article -
12814
-
12815
Road-Aware Routing Strategies for Vehicular Ad Hoc Networks: Characteristics and Comparisons
Published 2016-03-01Get full text
Article -
12816
-
12817
Highly Versatile FPGA-Implemented Cyber Coherent Ising Machine
Published 2024-01-01Get full text
Article -
12818
Self-Stabilization of Grid-Connected Inverters by Means of an Impedance-Based Adaptive Controller
Published 2025-01-01Get full text
Article -
12819
-
12820
Enhancing Security in CPS Industry 5.0 using Lightweight MobileNetV3 with Adaptive Optimization Technique
Published 2025-05-01“…Abstract Advanced Cyber-Physical Systems (CPS) that facilitate seamless communication between humans, machines, and objects are revolutionizing industrial automation as part of Industry 5.0, which is being driven by technologies such as IIoT, cloud computing, and artificial intelligence. In addition to providing flexible, individualized production processes, this growth brings with it fresh cybersecurity risks including Distributed Denial of Service (DDoS) attacks. …”
Get full text
Article