Search

Showing total 123 results

Search Constraints

Start Over You searched for: Topic computer science Remove constraint Topic: computer science Publisher mdpi Remove constraint Publisher: mdpi
123 results

Search Results

1. A Comprehensive Review of Behavior Change Techniques in Wearables and IoT: Implications for Health and Well-Being.

2. A Bibliometric Review of the Ordered Weighted Averaging Operator.

3. Multi-Dimensional Data Analysis Platform (MuDAP): A Cognitive Science Data Toolbox.

4. Attention–Survival Score: A Metric to Choose Better Keywords and Improve Visibility of Information.

5. Reflection Symmetry Detection in Earth Observation Data.

6. A Survey on EEG Data Analysis Software.

7. Provenance Data Management in Health Information Systems: A Systematic Literature Review.

8. Free Agency and Determinism: Is There a Sensible Definition of Computational Sourcehood?

9. Extended Stability and Control Strategies for Impulsive and Fractional Neural Networks: A Review of the Recent Results.

10. Yet Another Effective Dendritic Neuron Model Based on the Activity of Excitation and Inhibition.

11. New Ways to Modelling and Predicting Ionosphere Variables.

12. A New Transformation Technique for Reducing Information Entropy: A Case Study on Greyscale Raster Images.

13. The Evolution of Robin Sequence Treatment Based on the Biomimetic Interdisciplinary Approach: A Historical Review.

14. The Advent of Domain Adaptation into Artificial Intelligence for Gastrointestinal Endoscopy and Medical Imaging.

15. Improving CS1 Programming Learning with Visual Execution Environments.

16. Some New Versions of Fractional Inequalities for Exponential Trigonometric Convex Mappings via Ordered Relation on Interval-Valued Settings.

17. Bayesian Estimation of Variance-Based Information Measures and Their Application to Testing Uniformity.

18. Multi-Agent Systems for Resource Allocation and Scheduling in a Smart Grid.

19. Using Probabilistic Models for Data Compression.

20. Bibliometric Analysis of Information Theoretic Studies.

21. Multiverse of HawkNess: A Universally-Composable MPC-Based Hawk Variant.

22. Fast Shape Recognition via the Restraint Reduction of Bone Point Segment.

23. A Machine Proof System of Point Geometry Based on Coq.

24. Geometric Shape Characterisation Based on a Multi-Sweeping Paradigm.

25. A Complete Breakdown of Politics Coverage Using the Concept of Domination and Double Domination in Picture Fuzzy Graph.

26. Where Are We Going with Statistical Computing? From Mathematical Statistics to Collaborative Data Science.

27. A Systematic Review of Effective Hardware and Software Factors Affecting High-Throughput Plant Phenotyping.

28. A Comprehensive Bibliometric Analysis of Fractional Programming (1965–2020).

29. Preface to the Special Issue on "Mathematical Methods for Computer Science".

30. Proposal for Mathematical and Parallel Computing Modeling as a Decision Support System for Actuarial Sciences.

31. A New Technique to Uniquely Identify the Edges of a Graph.

32. On Rotationally Symmetrical Planar Networks and Their Local Fractional Metric Dimension.

33. Comparison of Algorithms for the AI-Based Fault Diagnostic of Cable Joints in MV Networks.

34. A Survey on Quantum Computing for Recommendation Systems.

35. Utilizing Smartphones for Approachable IoT Education in K-12 †.

36. Leverage Boosting and Transformer on Text-Image Matching for Cheap Fakes Detection †.

37. Best Proximity Point Theorems without Fuzzy P -Property for Several (ψ − ϕ)-Weak Contractions in Non-Archimedean Fuzzy Metric Spaces.

38. Prediction Models for Railway Track Geometry Degradation Using Machine Learning Methods: A Review.

39. Selected Papers from IIKII 2019 Conferences in Symmetry.

40. A Security Analysis of Circuit Clock Obfuscation.

41. Light Weight Authentication Scheme for Smart Home IoT Devices.

42. Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms.

43. How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem.

44. Physical Layer Security Design for Polar Code Construction.

45. BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models.

46. Side-Channel Attacks on Masked Bitsliced Implementations of AES.

47. Image Encryption Based on Local Fractional Derivative Complex Logistic Map.

48. A Hierarchical Universal Algorithm for Geometric Objects' Reflection Symmetry Detection.

49. Headgear Accessories Classification Using an Overhead Depth Sensor.

50. Membrane Computing after 25 Years.