Suggested Topics within your search.
Suggested Topics within your search.
- Computer science 2
- Automatic speech recognition 1
- Digital techniques 1
- Enterprise application integration (Computer systems) 1
- Government policy 1
- Graphical user interfaces (Computer systems) 1
- Human-computer interaction 1
- Human-machine systems 1
- Interactive computer systems 1
- Java (Computer program language) 1
- Management information systems 1
- Mathematics 1
- Moral and ethical aspects 1
- Natural language processing (Computer science) 1
- Object-oriented programming (Computer science) 1
- Prevention 1
- Psychological aspects 1
- Psychology 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
- Social aspects 1
- Speech processing systems 1
- Speech synthesis 1
- Technological innovations 1
- Terrorism 1
- Terrorists 1
- Visual communication 1
- Visual programming (Computer science) 1
-
81
-
82
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Published 2025-02-01Get full text
Article -
83
-
84
-
85
Comprehensive Review of Meta-Learning Methods for Cold-Start Issue in Recommendation Systems
Published 2025-01-01Get full text
Article -
86
-
87
-
88
-
89
-
90
Artificially intelligent nursing homes: a scoping review of palliative care interventions
Published 2025-02-01“…The aim of this scoping review is to synthesize research surrounding AI-based palliative care interventions in nursing homes.MethodsA PRISMA-ScR scoping review was carried out using modified guidelines specifically designed for computer science research. A wide range of keywords are considered in searching six databases, including IEEE, ACM, and SpringerLink.ResultsWe screened 3255 articles for inclusion after duplicate removal. 3175 articles were excluded during title and abstract screening. …”
Get full text
Article -
91
Run-Time Value Chain Analysis and Cost Accounting via Microservices in Agile Manufacturing
Published 2025-01-01Get full text
Article -
92
CDMA/OTFS Sensing Outperforms Pure OTFS at the Same Communication Throughput
Published 2025-01-01Get full text
Article -
93
Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication
Published 2025-01-01Get full text
Article -
94
Traditional Chinese Medicine Prescription Generation Model Based on Search Enhancement
Published 2025-01-01Get full text
Article -
95
Uncertainty-based quantization method for stable training of binary neural networks
Published 2024-08-01Get full text
Article -
96
A Novel Generalization of Strong Probabilistic $b$-Metric Spaces and Fixed Point Theorems
Published 2024-10-01Get full text
Article -
97
-
98
Analysis of Forest Cover in the Tumba-Lediima Nature Reserve (RTL-DRC)
Published 2025-02-01Get full text
Article -
99
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01Get full text
Article -
100
Refinement of Midpoint and Trapezoid Type Inequalities for Multiplicatively Convex Functions
Published 2024-07-01Get full text
Article