Suggested Topics within your search.
Suggested Topics within your search.
- Automatic speech recognition 1
- Electric power distribution 1
- Electric power systems 1
- Fourier transformations 1
- Harmonic analysis 1
- Human-computer interaction 1
- Human-machine systems 1
- Interactive computer systems 1
- Natural language processing (Computer science) 1
- Speech processing systems 1
- Speech synthesis 1
- Transformations (Mathematics) 1
-
1481
Erratum to “Reverse Zagreb and Reverse Hyper-Zagreb Indices for Crystallographic Structure of Molecules”
Published 2020-01-01Get full text
Article -
1482
Robustness Issues in Fault Diagnosis and Fault Tolerant Control
Published 2008-01-01Get full text
Article -
1483
-
1484
Author Correction: Patterned electrical brain stimulation by a wireless network of implantable microdevices
Published 2025-01-01Get full text
Article -
1485
Sublimed C60 for efficient and repeatable perovskite-based solar cells
Published 2024-01-01Get full text
Article -
1486
Multimodal neural correlates of childhood psychopathology
Published 2024-12-01Get full text
Article -
1487
A new application for reading optical form with standard scanner by using image processing techniques
Published 2023-07-01“…In order to determine the performance of the proposed system, the optical forms filled by 208 students studying at Karamanoğlu Mehmetbey University, Department of Computer Engineering were evaluated. The accuracy rate of the system has been determined as 99.97%. …”
Get full text
Article -
1488
The Discriminative Lexicon: A Unified Computational Model for the Lexicon and Lexical Processing in Comprehension and Production Grounded Not in (De)Composition but in Linear Discr...
Published 2019-01-01“…The discriminative lexicon also incorporates the insight from machine learning that end-to-end modeling is much more effective than working with a cascade of models targeting individual subtasks. The computational engine at the heart of the discriminative lexicon is linear discriminative learning: simple linear networks are used for mapping form onto meaning and meaning onto form, without requiring the hierarchies of post-Bloomfieldian ‘hidden’ constructs such as phonemes, morphemes, and stems. …”
Get full text
Article -
1489
The main methodological approaches to the formation of universal competencies of students of technical universities
Published 2022-12-01“…The paper highlights the theoretical provisions describing the main methodological approaches to the formation of competencies, which are provided for by modern federal state educational standards of higher education, taking into account professional standards (FGOS HE (3++)) bachelors degree in the areas of training of the enlarged group 090000 Computer Science and Computer engineering: competence, system-activity and information approaches in education and pedagogical science. …”
Get full text
Article -
1490
Internet Usage and Academic Performance of Students At Uganda Martyrs University Kabale Campus.
Published 2024“…From the study findings, upgrading the system, organizing internet training, installation of generating set, institutional subscription to some sites, employing computer engineers, increasing work station, continuous system maintenance, and installation of a library dedicated server were some of the possible solutions to the challenges encountered by students in the use of internet facilities at Uganda Martyrs University, Kabale campus. …”
Get full text
Thesis -
1491
-
1492
-
1493
Charging Station Distribution Optimization Using Drone Fleet in a Disaster
Published 2022-01-01Get full text
Article -
1494
-
1495
-
1496
Comparison of Super Resolution Reconstruction Acquisition Geometries for Use in Mouse Phenotyping
Published 2013-01-01Get full text
Article -
1497
-
1498
An ingestible bioimpedance sensing device for wireless monitoring of epithelial barriers
Published 2025-02-01Get full text
Article -
1499
Handling Imbalance Classification Virtual Screening Big Data Using Machine Learning Algorithms
Published 2021-01-01Get full text
Article -
1500
A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment
Published 2013-03-01Get full text
Article