Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
14381
-
14382
Social threat avoidance depends on action-outcome predictability
Published 2024-10-01“…These results support the central role of goal-directed processes in social threat avoidance and reveal its physiological and computational correlates.…”
Get full text
Article -
14383
A Modular, Model, Library Framework (DebrisLib) for Non-Newtonian Geophysical Flows
Published 2025-06-01“…A computational library consolidates the algorithms for each process. …”
Get full text
Article -
14384
SECURE METRIC DIMENSION OF ALTERNATE SNAKE GRAPHS
Published 2025-05-01“…A set is secure if each outside vertex can replace an inside one while preserving resolvability. Computing this parameter is NP-complete and has applications in routing, image processing, and network verification. …”
Get full text
Article -
14385
Hybrid Intelligence in Architectural Robotic Materialization (HI-ARM)
Published 2021-05-01“…Porosity, Hybridity, and Assembly are introduced as main constituents for materialization frameworks relying on computational design and robotic production. These are tested in a series of original experiments that are presented in this thesis together with four peer-reviewed published papers discussing the process of developing integrated design-to-production methodologies in detail. …”
Get full text
Article -
14386
Optimizing Supply Chain Management in the Confectionery Industry with Odoo 16
Published 2024-12-01Get full text
Article -
14387
Enterprise Architecture Model for Smart Government Implementation
Published 2025-03-01Get full text
Article -
14388
Mathematical analysis of spectral estimation algorithms resolution
Published 2019-06-01“…The classical methods of evaluating the energy spectra of discretized deterministic and stochastic processes are generally based on the use of procedures that use the fast Fourier transformation (FFT). …”
Get full text
Article -
14389
Entity-level cross-modal fusion for multimodal chinese agricultural diseases and pests named entity recognition
Published 2025-12-01“…(NER), as one of the popular directions in natural language processing, plays a critical role in fields such as information extraction and agricultural knowledge graph construction. …”
Get full text
Article -
14390
A Trust-By-Learning Framework for Secure 6G Wireless Networks Under Native Generative AI Attacks
Published 2025-01-01Get full text
Article -
14391
Structure and Principles of Operation of a Quaternion VLSI Multiplier
Published 2024-09-01Get full text
Article -
14392
Modelling big data platforms as knowledge graphs: the data platform shaper
Published 2025-03-01“…These challenges require the integration of diverse storage and computing platforms. Consequently, incorporating new data sources and developing new data transformation methods is typically a slow and expensive process. …”
Get full text
Article -
14393
Liquid white box model as an explainable AI for surgery
Published 2025-06-01“…Artificial intelligence shows great promise in filling the gap where humans and classical computing algorithms cannot process information in an efficient manner. …”
Get full text
Article -
14394
Research on Simulation Method of Missile Adapter’s Separation Based on Combined Calculation
Published 2019-01-01“…Through the dynamic simulation of the separation process of the adapters, the simulation results are in good agreement with the experimental data. …”
Get full text
Article -
14395
-
14396
Numerical investigations on the modelling of ultrafine particles in SSH-aerosol-v1.3a: size resolution and redistribution
Published 2025-07-01“…Here, a new analytic formulation is presented to compute efficiently coagulation partition coefficients, allowing us to dynamically adjust the discretization of the coagulation operator to the size mesh evolution and therefore solve all the processes linked to aerosol dynamics with a dynamics mesh approach, avoiding the redistribution on the fixed-size grid. …”
Get full text
Article -
14397
CFGWC-PSO in Analyzing Factors Affecting the Spread of Dengue Fever in East Java Province
Published 2019-10-01“…CFGWC-PSO method can overcome slow computing time problems in terms of iterations, and produce accurate data partition with stable. …”
Get full text
Article -
14398
Study of the Current–Voltage Characteristics of Membrane Systems Using Neural Networks
Published 2025-02-01“…CVC is the most important characteristic of the mass transfer process in electro-membrane systems (EMS). CVC is used to evaluate and select the optimal design and effective operating modes of EMS. …”
Get full text
Article -
14399
Event-Based Spiking Neural Networks for Object Detection: A Review of Datasets, Architectures, Learning Rules, and Implementation
Published 2024-01-01“…Spiking Neural Networks (SNNs) represent a biologically inspired paradigm offering an energy-efficient alternative to conventional artificial neural networks (ANNs) for Computer Vision (CV) applications. This paper presents a systematic review of datasets, architectures, learning methods, implementation techniques, and evaluation methodologies used in CV-based object detection tasks using SNNs. …”
Get full text
Article -
14400
On Microservice-Based Architecture for Digital Forensics Applications: A Competition Policy Perspective
Published 2025-03-01“…Digital forensics systems are complex applications consisting of numerous individual components that demand substantial computing resources. By adopting the concept of microservices, forensics applications can be divided into smaller, independently managed services. …”
Get full text
Article