Search

Showing total 1,908 results
1,908 results

Search Results

1. Component Recognition and Coordinate Extraction in Two-Dimensional Paper Drawings Using SegFormer.

2. A Benchmark Dataset to Distinguish Human-Written and Machine-Generated Scientific Papers †.

3. Smart Contracts in Blockchain Technology: A Critical Review.

4. Modeling- and Simulation-Driven Methodology for the Deployment of an Inland Water Monitoring System.

5. Detection of Korean Phishing Messages Using Biased Discriminant Analysis under Extreme Class Imbalance Problem.

6. Quantum Information: Systems, Their States, and the Use of Variances.

7. Cloud Broker: Customizing Services for Cloud Market Requirements.

8. Early Parkinson's Disease Diagnosis through Hand-Drawn Spiral and Wave Analysis Using Deep Learning Techniques.

9. Towards a Supervised Remote Laboratory Platform for Teaching Microcontroller Programming.

10. Toward Generating a New Cloud-Based Distributed Denial of Service (DDoS) Dataset and Cloud Intrusion Traffic Characterization.

11. A Study of Learning Environment for Initiating Flutter App Development Using Docker.

12. Multi-Objective Advantage Actor-Critic Algorithm for Hybrid Disassembly Line Balancing with Multi-Skilled Workers.

13. A Comparison of Neural-Network-Based Intrusion Detection against Signature-Based Detection in IoT Networks.

14. A Survey of AI Techniques in IoT Applications with Use Case Investigations in the Smart Environmental Monitoring and Analytics in Real-Time IoT Platform.

15. Advances in Facial Expression Recognition: A Survey of Methods, Benchmarks, Models, and Datasets.

16. Countermeasure Strategies to Address Cybersecurity Challenges Amidst Major Crises in the Higher Education and Research Sector: An Organisational Learning Perspective.

17. Evaluating Ontology-Based PD Monitoring and Alerting in Personal Health Knowledge Graphs and Graph Neural Networks.

18. Design of a Meaningful Framework for Time Series Forecasting in Smart Buildings.

19. A Review of the Consent Management Literature.

20. Resource Allocation and Pricing in Energy Harvesting Serverless Computing Internet of Things Networks.

21. NDNOTA: NDN One-Time Authentication.

22. Principle of Information Increase: An Operational Perspective on Information Gain in the Foundations of Quantum Theory.

23. Fuzzy Integrated Delphi-ISM-MICMAC Hybrid Multi-Criteria Approach to Optimize the Artificial Intelligence (AI) Factors Influencing Cost Management in Civil Engineering.

24. Preface to the Special Issue on Computational Linguistics and Natural Language Processing.

25. Fake User Detection Based on Multi-Model Joint Representation.

26. Impact of Handedness on Driver's Situation Awareness When Driving under Unfamiliar Traffic Regulations.

27. Insights into Cybercrime Detection and Response: A Review of Time Factor.

28. A Comparative Analysis of the Bayesian Regularization and Levenberg–Marquardt Training Algorithms in Neural Networks for Small Datasets: A Metrics Prediction of Neolithic Laminar Artefacts.

29. L-PCM: Localization and Point Cloud Registration-Based Method for Pose Calibration of Mobile Robots.

30. The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead.

31. Novel Ransomware Detection Exploiting Uncertainty and Calibration Quality Measures Using Deep Learning.

32. Medical Support Vehicle Location and Deployment at Mass Casualty Incidents.

33. An Omnidirectional Image Super-Resolution Method Based on Enhanced SwinIR.

34. Immersive Storytelling in Social Virtual Reality for Human-Centered Learning about Sensitive Historical Events.

35. Self-Bilinear Map from One Way Encoding System and i.

36. Software Platform for the Comprehensive Testing of Transmission Protocols Developed in GNU Radio.

37. Mapping the Landscape of Misinformation Detection: A Bibliometric Approach.

38. A Fair Energy Allocation Algorithm for IRS-Assisted Cognitive MISO Wireless-Powered Networks.

39. Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness.

40. A Study on the Multi-Cyber Range Application of Mission-Based Cybersecurity Testing and Evaluation in Association with the Risk Management Framework.

41. Explainable AI Evaluation: A Top-Down Approach for Selecting Optimal Explanations for Black Box Models.

42. Formal Methods and Validation Techniques for Ensuring Automotive Systems Security.

43. Sentiment Analysis in the Age of COVID-19: A Bibliometric Perspective.

44. The Coupling and Coordination Degree of Digital Business and Digital Governance in the Context of Sustainable Development.

45. The Dilemma of Rapid AI Advancements: Striking a Balance between Innovation and Regulation by Pursuing Risk-Aware Value Creation.

46. Integrated Attack Tree in Residual Risk Management Framework.

47. What Is Hidden in Clear Sight and How to Find It—A Survey of the Integration of Artificial Intelligence and Eye Tracking.

48. Efficient Resource Utilization in IoT and Cloud Computing.

49. Science Mapping of Meta-Analysis in Agricultural Science.

50. POSS-CNN: An Automatically Generated Convolutional Neural Network with Precision and Operation Separable Structure Aiming at Target Recognition and Detection.