Suggested Topics within your search.
Suggested Topics within your search.
- Automatic speech recognition 1
- Electric power distribution 1
- Electric power systems 1
- Fourier transformations 1
- Harmonic analysis 1
- Human-computer interaction 1
- Human-machine systems 1
- Interactive computer systems 1
- Natural language processing (Computer science) 1
- Speech processing systems 1
- Speech synthesis 1
- Transformations (Mathematics) 1
-
781
-
782
-
783
-
784
Public Transport Driver Identification System Using Histogram of Acceleration Data
Published 2019-01-01Get full text
Article -
785
Inferring effects of mutations on SARS-CoV-2 transmission from genomic surveillance data
Published 2025-01-01Get full text
Article -
786
Creation of a stable vector vortex beam with dual fractional orbital angular momentum
Published 2025-01-01Get full text
Article -
787
A Workload-Adaptive and Reconfigurable Bus Architecture for Multicore Processors
Published 2010-01-01Get full text
Article -
788
-
789
Microwave Characterization of Metal Powder in Additive Manufacturing (AM)
Published 2024-01-01Get full text
Article -
790
-
791
-
792
Real-Time Adaptive Content-Based Synchronization of Multimedia Streams
Published 2011-01-01Get full text
Article -
793
-
794
-
795
Cryogenic Characterization of Low-Frequency Noise in 40-nm CMOS
Published 2024-01-01Get full text
Article -
796
Multifeature Fusion Detection Method for Fake Face Attack in Identity Authentication
Published 2018-01-01Get full text
Article -
797
Link-Based Similarity Measures Using Reachability Vectors
Published 2014-01-01Get full text
Article -
798
Breast Cancer Detection Using Ensemble Classifiers for Accuracy Improvement
Published 2023-03-01Get full text
Article -
799
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01“…In the current increasingly competitive international cyberspace security game,critical information infrastructure is facing a severe security situation.From the view of scientific principle,the essence of network security risk is the limitation of people’s cognitive logic of information science.It is impossible to build a solid network defense system,and it is not necessarily cost-effective from the view of economic benefits.In network security work,the most important thing is the convergence of security objectives.The key is to ensure that the logical combination of computing tasks is not tampered with or destroyed,and to achieve correct calculation.Focusing on this security goal,scientific and technological innovations were made in such aspects as logical correct verification theory,computing architecture and application mode of computing engineering.The problem that logical defects were not exploited by attackers was solved,a unity of offensive and defensive contradictions was formed,and the active immunity capability for information systems was established.…”
Get full text
Article -
800
Effects of Ground Constituent Parameters on Array Mutual Coupling for DOA Estimation
Published 2011-01-01Get full text
Article