Results 21 to 30 of about 5,476,619 (222)

The future of Artificial Intelligence in Cybersecurity: A Comprehensive Survey [PDF]

open access: yesEAI Endorsed Transactions on Creative Technologies, 2021
AI in Cybersecurity Market scheme helps organizations in observance, detecting, reporting, and countering cyber threats to keep up information confidentiality.
Feng Tao, Muhammad Akhtar, Zhang Jiayuan
doaj   +1 more source

SED-ML Script Language [PDF]

open access: yes, 2011
The Simulation Experiment Description Markup Language (SED-ML) is a XML format describing simulation experiments, so that they can be easily exchanged independent of software tools that created them.
Frank Bergmann
core   +2 more sources

Early detection of diabetic foot ulcer using IoT and ML [PDF]

open access: yesMATEC Web of Conferences
This study explores the critical realm of Diabetic Foot Ulcers (DFUs) and proposes an innovative approach for early detection using Internet of Things (IoT) and Machine Learning (ML).
Berugu Sanjana   +3 more
doaj   +1 more source

Adding a temporal dimension to the analysis of argumentative discourse: justified reframing as a means of turning a single-issue discussion into a complex argumentative discussion [PDF]

open access: yes, 2018
This paper seeks to extend existing models of argumentation by considering an important dimension of real-life argumentative discourse: how complex argumentative discussions evolve over time. We define a complex argumentative discussion as a multi-issue
Greco, Sara   +3 more
core   +1 more source

OCR for devanagari script [PDF]

open access: yesMATEC Web of Conferences
The introduction of Optical Character Recognition (OCR) technology revolutionized text digitization, allowing physical documents to be converted into editable and searchable digital representations.
Singh Mitali   +2 more
doaj   +1 more source

TLR9-mediated activation of dendritic cells by CD32 targeting for the generation of highly immunostimulatory vaccines

open access: yesHuman Vaccines & Immunotherapeutics, 2019
The rational for designing dendritic cell (DC)-targeted immunotherapies is their central role in orchestrating immunity. Most studies addressing antigen-targeting to DCs for eliciting T cell responses have employed ex-vivo matured DCs derived from ...
J. A. Sepulveda-Toepfer   +7 more
doaj   +1 more source

Blood group determination using fingerprint [PDF]

open access: yesMATEC Web of Conferences
The fingerprint pattern stands out as the most authentic and unique characteristic defining human identity. This unique pattern is immutable and persists unaltered until an individual's demise. In various circumstances, particularly in legal proceedings,
Nihar T., Yeswanth K., Prabhakar K.
doaj   +1 more source

Investigate and measure the angular accuracy of ML, MUSIC, Root-MUSIC algorithms and spatial smoothing in signal detection [PDF]

open access: yesFanāvarī-i āmūzish, 2007
In this paper, we first simulate ML, MUSIC, Root-MUSIC algorithms and space smoothing in noisy and fiddling environments, and then these algorithms are compared in terms of estimating the accuracy of the angles received from the two sources.
S. Shirvani Moghadam   +2 more
doaj   +3 more sources

Stress Detection Based on Human Sleep Cycle [PDF]

open access: yesMATEC Web of Conferences
Anxiety, mental or emotional stress resulting from a challenging environment, significantly impacts well-being. Understanding and monitoring human stress levels are crucial for averting adverse outcomes.
Papishetti Sathvika   +2 more
doaj   +1 more source

Sensemaking Practices in the Everyday Work of AI/ML Software Engineering [PDF]

open access: yes, 2020
This paper considers sensemaking as it relates to everyday software engineering (SE) work practices and draws on a multi-year ethnographic study of SE projects at a large, global technology company building digital services infused with artificial ...
Book Matthias   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy