Results 41 to 50 of about 2,571,172 (193)

Peak reduction technique in commutative algebra

open access: yes, 1999
The "peak reduction" method is a powerful combinatorial technique with applications in many different areas of mathematics as well as theoretical computer science.
D Wright   +11 more
core   +2 more sources

A comprehensive review of the changing landscape of academic dishonesty in automated proctoring in the era of artificial intelligence

open access: yesDiscover Education
Exams are inherent in building confidence and appraising an individual in schools and colleges. However, supervising an exam is a tedious process given the large number of students in a class.
Manit Malhotra, Indu Chhabra
doaj   +1 more source

Improving the Security of Video Embedding Using the CFP-SPE Method

open access: yesJournal of Engineering, 2022
With the amount of data being transferred on a daily basis, it is becoming increasingly dangerous to save data on the Internet in the face of intruders or hackers. This study paper is one of the most effective ways to transmit information in a secure and
Karthick Panneerselvam   +6 more
doaj   +1 more source

Link Prediction in Complex Networks: A Survey

open access: yes, 2010
Link prediction in complex networks has attracted increasing attention from both physical and computer science communities. The algorithms can be used to extract missing information, identify spurious interactions, evaluate network evolving mechanisms ...
Adamic   +163 more
core   +1 more source

Elevating Cloud Security With Advanced Trust Evaluation and Optimization of Hybrid Fireberg Technique

open access: yesIET Software
The rapid expansion of the cloud service industry has raised the critical challenge of ensuring efficient job allocation and trust within a backdrop of heightened privacy concerns.
Himani Saini   +8 more
doaj   +1 more source

Status of research at the Institute for Computer Applications in Science and Engineering (ICASE) [PDF]

open access: yes
Research conducted at the Institute for Computer Applications in Science and Engineering in applied mathematics, numerical analysis and computer science is ...

core   +1 more source

Leveraging HyDE and RAG in Gemma LLM Framework for Enlightened Deep Learning Chatbots

open access: yesHuman-Centric Intelligent Systems
Chatbots have revolutionized human–computer interaction by providing intelligent, conversational assistance in various areas, including academic support, healthcare, and technical support.
Shreetha Bhat   +3 more
doaj   +1 more source

Removing redundancy for attribute implications in data with grades [PDF]

open access: yes, 2016
Reasoning with if-then rules –in particular, with those taking from of implications between conjunctions of attributes– is crucial in many disciplines ranging from theoretical computer science to applications.
Cordero-Ortega, Pablo   +3 more
core  

Evaluation of lightweight and efficient deep learning models for plant disease classification

open access: yesDiscover Internet of Things
Agriculture is essential to the economy and social well-being of any community. Early diagnosis of plant diseases is critical to crop protection and sustainable agriculture. Deep learning (DL) has demonstrated outstanding performance in disease detection,
Sangeeta Duhan   +4 more
doaj   +1 more source

Cumulative reports and publications thru 31 December 1982 [PDF]

open access: yes
Institute for Computer Applications in Science and Engineering (ICASE) reports are ...

core   +1 more source

Home - About - Disclaimer - Privacy