Results 31 to 40 of about 1,904,391 (376)

Optimizarea generării de itinerarii pentru ghizi turistici autonomi prin integrarea datelor în timp real în algoritmi genetici [PDF]

open access: yesRevista Română de Informatică și Automatică
Research in the field of autonomous vehicles has made good progress in the last years, but mass adoption is unlikely to happen very soon due to, in most part, important ethical and security concerns.
Cristian SANDU   +2 more
doaj   +1 more source

Machine Learning Methods for Spoken Dialogue Simulation and Optimization [PDF]

open access: yes, 2009
Computers and electronic devices are becoming more and more present in our day-to-day life. This can of course be partly explained by their ability to ease the achievement of complex and boring tasks, the important decrease of prices or the new ...
Olivier Pietquin
core   +2 more sources

Dependence Research on Multi-Layer Convolutions of Images

open access: yesFrontiers in Physics, 2022
Convolutions are important structures in deep learning. However, theoretical analysis on the dependence among multi-layer convolutions cannot be found until now.
Zhiwu Liao, Yong Yu, Shaoxiang Hu
doaj   +1 more source

Nanotechnology and Computer Science: Trends and advances

open access: yesMemories - Materials, Devices, Circuits and Systems, 2022
Nanotechnology is the aptitude to perceive, measure, operate, and build materials at the nanometer scale, the size of atoms and molecules. Nanotechnology, is involved in many scientific and practical applications, including health, agriculture ...
Taha Basheer Taha   +3 more
doaj  

Review of Joanna Demers. 2010. Listening Through the Noise: The Aesthetics of Experimental Electronic Music. Oxford, UK: Oxford University Press. Nick Collins and Julio d’Escriván. 2007. The Cambridge Companion to Electronic Music. Cambridge, UK: Cambridg

open access: yesCurrent Musicology, 2010
In Listening Through the Noise, Demers presents an aesthetic theory of experimental electronic music accompanied by audio examples which can be found online.
Marilou Polymeropoulou
doaj   +1 more source

Predicting College of Agriculture professors\u27 adoption of computers and distance education technologies for self-education and teaching at the University of Guadalajara, Mexico [PDF]

open access: yes, 1999
This descriptive and associational study investigated whether personal and institutional characteristics of professors in the College of Agriculture in Guadalajara, Mexico, were related to the use of computers for traditional teaching, and for distance ...
Carr, Ana Ramírez
core   +3 more sources

Improving Fall Detection Using an On-Wrist Wearable Accelerometer

open access: yesSensors, 2018
Fall detection is a very important challenge that affects both elderly people and the carers. Improvements in fall detection would reduce the aid response time. This research focuses on a method for fall detection with a sensor placed on the wrist. Falls
Samad Barri Khojasteh   +4 more
doaj   +1 more source

Information tools for teaching the basics of programming in high school

open access: yesUkrainian Journal of Educational Studies and Information Technology, 2017
The article focuses on the problem of finding methodological approaches to the use of information programming tools in the course of computer science high school. The definition of information tools for teaching as electronic means of storage, processing
Maksym Pavlenko, Tetiana Varava
doaj   +3 more sources

Inventing Intelligence: On the History of Complex Information Processing and Artificial Intelligence in the United States in the Mid-Twentieth Century [PDF]

open access: yes, 2020
In the mid-1950s, researchers in the United States melded formal theories of problem solving and intelligence with another powerful new tool for control: the electronic digital computer.
Penn, Jonathan
core   +1 more source

A Cluster-Based Hierarchical-Approach for the Path Planning of Swarm

open access: yesApplied Sciences, 2021
This paper addresses the path planning and control of multiple colonies/clusters that have unmanned aerial vehicles (UAV) which make a network in a hazardous environment. To solve the aforementioned issue, we design a new and novel hybrid algorithm.
Muhammad Shafiq   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy