266,311 results
Search Results
152. Developing Translation Abilities Through Knowledge-Network-Based Translator Training
153. Application of Formative Assessment Model in College English Course Assisted by Digital Platforms---Taking HFUT as an Example
154. Blended Learning Approach in English Teaching: Effectiveness and Challenges
155. Automated Assessment in Computer Science: A Bibliometric Analysis of the Literature
156. Open Source Software Supply Chain Recommendation Based on Heterogeneous Information Network
157. Methodology for the Selection of Optimal Parameters of the Finite Element Mesh in Composite Materials Calculation
158. Cooperative Use of Autonomous Systems to Monitor Toxic Industrial Materials and Face Accidents & Contamination Crises
159. Aerial Target System Design for Effective Air Defence Training
160. Unmanned Surface Vehicle Chase a Moving Target Remotely Controlled
161. Performance Comparison of Visual Teach and Repeat Systems for Mobile Robots
162. Realising Fair Outcomes from Algorithm-Enabled Decision Systems: An Exploratory Case Study
163. Using AI-based Edge Processing in Monitoring the Pedestrian Crossing
164. RDBMS Speculative Support Improvement by the Use of the Query Hypergraph Representation
165. A Survey of Interval Algorithms for Solving Multicriteria Analysis Problems
166. NPDP Benchmark Suite for Loop Tiling Effectiveness Evaluation
167. Comparison of Load Balancing Schemes for Asynchronous Many-Task Runtimes
168. Testing Program Segments to Detect Runtime Exceptions in Java
169. Formal Derivation and Verification of Critical Path Algorithm for Directed Acyclic Graph
170. Performance Evaluation of Clustering Techniques on a Hybrid RFM-Based Scoring Framework
171. Volume Forecasting in Supply Chain: A Mixed Study of Boosting and Prophet Algorithms
172. Predictive Maintenance on Industrial Data Using Soft Voted Ensemble Classifiers
173. Smart Autonomous Bike Hardware Safety Metrics
174. Using AHP Method and QFD for Selection of a Goalkeeper in a Football Team
175. Forecasting PM10 Concentration from Blasting Operations in Open-Pit Mines Using Unmanned Aerial Vehicles and Adaptive Neuro-Fuzzy Inference System
176. Proposal of Study on InSAR-Based Land Subsidence Analysis as Basis for Subsequent Hydro-mechanical Modeling: A Case Study of Hanoi, Vietnam
177. Characterization of the Natural Dolomite from Thanh Liem Area, Vietnam, and Its Applications
178. Application of Unmanned Aerial Vehicles for Surveying and Mapping in Mines: A Review
179. Indirect Georeferencing in Terrestrial Laser Scanning: One-Step and Two-Step Approaches
180. Output-Feedback Model Predictive Control Using Set of State Estimates
181. Model-Based Optimization of Vaccination Strategies in Different Phases of Pandemic Virus Spread
182. Digital Architectures Under Society 5.0: An Enterprise Architecture Perspective
183. Disjunction in a Predictive Theory of Anaphora
184. A Game-Theoretic Analysis of Delegation Incentives in Blockchain Governance
185. The Ticket Price Matters in Sharding Blockchain
186. Sustaining Well-Being of Teachers in Higher Education
187. Advances in the Research Domain of Crowdfunding: A Systematic Literature Review
188. Reliability Model of Autonomous Transport with Life Support Systems Based on Closed Biotechnological Complexes
189. Anomaly Detection for Predictive Maintenance on the Example of an Induced Draft of a Waste Power Plant
190. Scripting Complex Events and Behaviors in Computer Simulation of a Security Monitored Area
191. Autonomous Mobile Robot Study in the Context of Maintenance 4.0
192. Autonomous Mobile Robot Navigation Issues in Terms of Obstacles Detection in Disrupting Operating Conditions – Case Study
193. SAEOn: An Ontological Metamodel for Quantitative Security Assurance Evaluation
194. Council of Europe Guidelines on the Use of ICT in Electoral Processes
195. Non(c)esuch Ballot-Level Comparison Risk-Limiting Audits
196. Design of a Validation Model of the Cognitive State in Military Operations in Cyberspace
197. Examining 5G Technology-Based Applications for Military Communications
198. A Revisitation of Clausewitz’s Thinking from the Cyber Situational Awareness Perspective
199. Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions
200. Cautious Distributed Belief
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.