Results 11 to 20 of about 1,278,781 (270)

Modal logics are coalgebraic [PDF]

open access: yes, 2008
Applications of modal logics are abundant in computer science, and a large number of structurally different modal logics have been successfully employed in a diverse spectrum of application contexts.
Cirstea, Corina   +4 more
core   +5 more sources

Conceptualizing human resilience in the face of the global epidemiology of cyber attacks [PDF]

open access: yes, 2019
Computer security is a complex global phenomenon where different populations interact, and the infection of one person creates risk for another. Given the dynamics and scope of cyber campaigns, studies of local resilience without reference to global ...
Camp, L. Jean   +5 more
core   +3 more sources

Arithmetic Optimization With Ensemble Deep Learning SBLSTM-RNN-IGSA Model for Customer Churn Prediction

open access: yesIEEE Access, 2023
Companies in a wide variety of industries use the customer churn prediction (CCP) process to keep their current clientele happy. Insurance companies need to be able to forecast churn to enhance the potency and functionality of deep learning methods. Deep
Nagaraju Jajam   +3 more
doaj   +1 more source

Optimised distributed sensor system for covid protocol monitoring using multiprocessor architecture

open access: yesMeasurement: Sensors, 2023
Covid Protocol Monitoring with Multiprocessor Architecture (CPMMA) is proposed in this study as an approach for implementing a Distributed Sensor System (DSS) for covid protocol monitoring utilising multiprocessor architecture.
S. Venkatraman   +5 more
doaj   +1 more source

Helping AI to Play Hearthstone: AAIA'17 Data Mining Challenge [PDF]

open access: yes, 2017
This paper summarizes the AAIA'17 Data Mining Challenge: Helping AI to Play Hearthstone which was held between March 23, and May 15, 2017 at the Knowledge Pit platform.
Janusz, Andrzej   +2 more
core   +1 more source

Heterogenous Social Media Analysis for Efficient Deep Learning Fake-Profile Identification

open access: yesIEEE Access, 2023
The surge in e-scams attributed to an estimated 30% of fake social media accounts has highlighted the urgent need to identify such fraudulent profiles.
Bhrugumalla L. V. S. Aditya   +1 more
doaj   +1 more source

HABIT: Horse Automated Behaviour Identification Tool: a position paper [PDF]

open access: yes, 2015
HABIT (Horse Automated Behaviour Identification Tool) is an Animal Computer Interaction (ACI) project, on the interdisciplinary boundary between equitation science and computer science.
Hall, Carol   +3 more
core   +3 more sources

Practice-oriented controversies and borrowed epistemic credibility in current evolutionary biology: phylogeography as a case study [PDF]

open access: yes, 2013
Although there is increasing recognition that theory and practice in science are intimately intertwined, philosophy of science perspectives on scientific controversies have been historically focused on theory rather than practice.
Arroyo-Santos, Alfonso   +2 more
core   +3 more sources

Secure FedIDS - Privacy preserving IDS with ensemble deep learning approach [PDF]

open access: yesEPJ Web of Conferences
People are increasingly reliant on the internet for communication and various devices in their daily lives. The Internet of Things (IoT) has dramatically changed many industries by allowing more automation and easy data sharing, but it also has a high ...
V Poonguzhali, Saravanan Srisakthi
doaj   +1 more source

An Explainable Deep Learning Framework for Sorghum Weed Classification Using Multi-Scale Feature Enhanced DenseNet

open access: yesIEEE Access
Sorghum is a vital crop known for its resilience in harsh environmental conditions, playing a key role in food security and bioenergy production across the globe.
Armaano Ajay   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy