Suggested Topics within your search.
Suggested Topics within your search.
- Computer science 3
- Application software 1
- Automata 1
- Automatic speech recognition 1
- Coding and Information Theory 1
- Coding theory 1
- Computer access points 1
- Development 1
- Digital techniques 1
- Enterprise application integration (Computer systems) 1
- Government policy 1
- Graphical user interfaces (Computer systems) 1
- Human-computer interaction 1
- Human-machine systems 1
- Information theory 1
- Interactive computer systems 1
- Java (Computer program language) 1
- Management information systems 1
- Mathematics 1
- Moral and ethical aspects 1
- Natural language processing (Computer science) 1
- Object-oriented programming (Computer science) 1
- Prevention 1
- Programming Languages, Compilers, Interpreters 1
- Programming languages (Electronic computers) 1
- Psychological aspects 1
- Psychology 1
- Scripting languages (Computer science) 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
-
2641
-
2642
Ergodic sequences of probability measures on commutative hypergroups
Published 2004-01-01Get full text
Article -
2643
-
2644
Site Assessment of Multiple-Sensor Approaches for Buried Utility Detection
Published 2011-01-01Get full text
Article -
2645
Biological arrow of time: emergence of tangled information hierarchies and self-modelling dynamics
Published 2025-01-01Get full text
Article -
2646
-
2647
-
2648
Radiogenomics and machine learning predict oncogenic signaling pathways in glioblastoma
Published 2025-01-01Get full text
Article -
2649
-
2650
Perceptions and practices of dental faculty members of Khyber Pakhtunkhwa, Pakistan regarding smartphones as an adjunct teaching tool
Published 2025-01-01“…A great deal has been accomplished because of developments in computer science. This also needs to be a part of our educational practices. …”
Get full text
Article -
2651
Marshall–Olkin Extended Gumbel Type-II Distribution: Properties and Applications
Published 2022-01-01“…These applications are found in reliability engineering, computer sciences, economics, psychology, survival analysis, and some others. …”
Get full text
Article -
2652
Artificial intelligence in precision medicine for lung cancer: A bibliometric analysis
Published 2025-01-01“…These publications were mainly published in the following scientific disciplines, including Radiology Nuclear Medicine, Medical Imaging, Oncology, and Computer Science Notably, Li Weimin and Aerts Hugo J. W. …”
Get full text
Article -
2653
Simulation Strategies for Mixed Traffic Conditions: A Review of Car-Following Models and Simulation Frameworks
Published 2020-01-01“…The area of traffic flow modelling and analysis that bridges civil engineering, computer science, and mathematics has gained significant momentum in the urban areas due to increasing vehicular population causing traffic congestion and accidents. …”
Get full text
Article -
2654
Analysis of Psychological and Emotional Tendency Based on Brain Functional Imaging and Deep Learning
Published 2021-01-01“…How to effectively obtain psychological data signals and use advanced intelligent technology to identify and make decisions is a research hotspot in psychology and computer science. Therefore, a personal emotional tendency analysis method based on brain functional imaging and deep learning is proposed. …”
Get full text
Article -
2655
Applications of artificial neural networks in health care organizational decision-making: A scoping review.
Published 2019-01-01“…We screened 3,397 articles from six databases with coverage of Health Administration, Computer Science and Business Administration. We extracted study characteristics, aim, methodology and context (including level of analysis) from 80 articles meeting inclusion criteria. …”
Get full text
Article -
2656
Analysis of Artificial Intelligence Training Indicators According to the Results of Russian Universities Monitoring
Published 2022-07-01“…More than half of all AI learning programs are implemented within the «09.00.00 Informatics and Computer Science» and «01.00.00 Mathematics and Mechanics» majors/ specialties. …”
Get full text
Article -
2657
Complex Diophantine interval-valued Pythagorean normal set for decision-making processes
Published 2025-01-01“…Machine tool technology and computer science play essential roles in robots. To evaluate robotic systems, four factors must be considered such as tasks, precision, speed and completion of the work. …”
Get full text
Article -
2658
Toward Questionnaire Complexity Reduction by Decreasing the Questions
Published 2025-01-01“…To evaluate the effectiveness of the proposed method, it has been used across various subjects in Computer Sciences Engineering degrees over different academic years. …”
Get full text
Article -
2659
Privacy view and target of differential privacy
Published 2023-10-01“…The study aimed to address the challenges in understanding the privacy goals of differential privacy by analyzing the privacy controversies surrounding it in various fields.It began with the example of data correlation and highlighted the differing perspectives among scholars regarding the targets of privacy protection.In cases where records in a dataset were correlated, adversaries can exploit this correlation to infer sensitive information about individuals, thereby sparking a debate on whether this violates privacy protection.To investigate the influence of privacy theories in the legal domain on defining privacy, two mainstream privacy theories in the computer field were examined.The first theory, limited access to personal information, focuses on preventing others from accessing an individual’s sensitive information.According to this theory, privacy mechanisms should aim to prevent adversaries from accessing a user’s actual information.In contrast, the second theory, control over personal information, emphasizes an individual’s right to communicate personal information to others.This theory suggests that the disclosure of personal information due to the relevance of others sharing data should not be considered a breach of privacy.Then the controversies of differential privacy were analyzed in the fields of computer science, social science, ethics and human-computer interaction due to their different understandings of privacy.By exploring the privacy concept of differential privacy from a multidisciplinary perspective, this study helps readers gain a correct understanding of the privacy viewpoint and goals of differential privacy while enhancing their understanding of the concept of “privacy” itself.…”
Get full text
Article -
2660
Towards an integrated analytical framework of information and communications technology literacy: from intended to implemented and achieved dimensions
Published 2006-01-01“…</b> The analysis is conducted from a technology (i.e., computer science) conceptual perspective. The focus is on those aspects of new literacies that are directly related to the use of ICT. …”
Get full text
Article