Search

Showing total 124 results
124 results

Search Results

1. Interpolation Once Binary Search over a Sorted List.

2. A Comprehensive Review of Behavior Change Techniques in Wearables and IoT: Implications for Health and Well-Being.

3. A Bibliometric Review of the Ordered Weighted Averaging Operator.

4. Multi-Dimensional Data Analysis Platform (MuDAP): A Cognitive Science Data Toolbox.

5. Reflection Symmetry Detection in Earth Observation Data.

6. Attention–Survival Score: A Metric to Choose Better Keywords and Improve Visibility of Information.

7. A Survey on EEG Data Analysis Software.

8. Free Agency and Determinism: Is There a Sensible Definition of Computational Sourcehood?

9. Provenance Data Management in Health Information Systems: A Systematic Literature Review.

10. A New Transformation Technique for Reducing Information Entropy: A Case Study on Greyscale Raster Images.

11. New Ways to Modelling and Predicting Ionosphere Variables.

12. The Evolution of Robin Sequence Treatment Based on the Biomimetic Interdisciplinary Approach: A Historical Review.

13. Extended Stability and Control Strategies for Impulsive and Fractional Neural Networks: A Review of the Recent Results.

14. Yet Another Effective Dendritic Neuron Model Based on the Activity of Excitation and Inhibition.

15. Some New Versions of Fractional Inequalities for Exponential Trigonometric Convex Mappings via Ordered Relation on Interval-Valued Settings.

16. The Advent of Domain Adaptation into Artificial Intelligence for Gastrointestinal Endoscopy and Medical Imaging.

17. Improving CS1 Programming Learning with Visual Execution Environments.

18. Bayesian Estimation of Variance-Based Information Measures and Their Application to Testing Uniformity.

19. Multi-Agent Systems for Resource Allocation and Scheduling in a Smart Grid.

20. Using Probabilistic Models for Data Compression.

21. Bibliometric Analysis of Information Theoretic Studies.

22. Multiverse of HawkNess: A Universally-Composable MPC-Based Hawk Variant.

23. Fast Shape Recognition via the Restraint Reduction of Bone Point Segment.

24. A Machine Proof System of Point Geometry Based on Coq.

25. Geometric Shape Characterisation Based on a Multi-Sweeping Paradigm.

26. A Complete Breakdown of Politics Coverage Using the Concept of Domination and Double Domination in Picture Fuzzy Graph.

27. A Comprehensive Bibliometric Analysis of Fractional Programming (1965–2020).

28. Preface to the Special Issue on "Mathematical Methods for Computer Science".

29. Where Are We Going with Statistical Computing? From Mathematical Statistics to Collaborative Data Science.

30. A Systematic Review of Effective Hardware and Software Factors Affecting High-Throughput Plant Phenotyping.

31. Proposal for Mathematical and Parallel Computing Modeling as a Decision Support System for Actuarial Sciences.

32. A New Technique to Uniquely Identify the Edges of a Graph.

33. On Rotationally Symmetrical Planar Networks and Their Local Fractional Metric Dimension.

34. A Survey on Quantum Computing for Recommendation Systems.

35. Comparison of Algorithms for the AI-Based Fault Diagnostic of Cable Joints in MV Networks.

36. Utilizing Smartphones for Approachable IoT Education in K-12 †.

37. Leverage Boosting and Transformer on Text-Image Matching for Cheap Fakes Detection †.

38. Best Proximity Point Theorems without Fuzzy P -Property for Several (ψ − ϕ)-Weak Contractions in Non-Archimedean Fuzzy Metric Spaces.

39. Selected Papers from IIKII 2019 Conferences in Symmetry.

40. Prediction Models for Railway Track Geometry Degradation Using Machine Learning Methods: A Review.

41. A Security Analysis of Circuit Clock Obfuscation.

42. How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem.

43. Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms.

44. Light Weight Authentication Scheme for Smart Home IoT Devices.

45. Physical Layer Security Design for Polar Code Construction.

46. BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models.

47. Side-Channel Attacks on Masked Bitsliced Implementations of AES.

48. Image Encryption Based on Local Fractional Derivative Complex Logistic Map.

49. A Hierarchical Universal Algorithm for Geometric Objects' Reflection Symmetry Detection.

50. Headgear Accessories Classification Using an Overhead Depth Sensor.