Showing 141 - 160 of 20,020

141

DynaVLC 13 towards dynamic GTS allocation in VLC networks
Kurunathan, John Harrison ; Gutiérrez Gaitán, Miguel ; Sámano-Robles, Ramiro ; et al.

Computer systems organiz... Real-time systems Networks Network protocols Theory of computation Design and analysis of a...
Save to List
142

On the average complexity of Berge Algorithm ; Sur la complexité moyenne de l'algorithme de Berge
David, Julien ; Gholami, Mostafa ; Lhote, Loïck ; et al.
https://hal.science/hal-04637413 ; 2025.

2012 ACM Subject Classif... Minimal Transversal Berge Algorithm Hypergraphs Analytic Combinatorics D... [INFO.INFO-CC]Computer S...
Report
Save to List
143

The Integral Role of Mathematics in Modern Research
A.D. Awasare

Mathematics, mathematica...
Academic journal
Save to List
144

Fluid Dynamics in Turbomachinery Optimization Techniques and Performance Analysis
Niketa Patel
International Journal of Intelligent Systems and Applications in Engineering; Vol. 12 No. 22s (2024); 859 – 868

Turbomachinery, Fluid Dy...
Academic journal
Save to List
145

Improved Bounds for the Expected Number of k-Sets: Improved bounds for the expected number of \(k\)-sets
Brett Leroux ; Luis Rademacher
Discrete & Computational Geometry. 70:790-815

Lattices and convex bodi... random point configurati... Analysis of algorithms a... Probability (math.PR) Metric Geometry (math.MG... 52C05, 52C10, 05C30, 60D...
Academic journal
Save to List
146

Searchable encryption with randomized ciphertext and randomized keyword search
Calderini Marco ; Longo Riccardo ; Sala Massimiliano ; et al.
Journal of Mathematical Cryptology, Vol 18, Iss 1, Pp 506-22 (2024)

searchable encryption paeks scheme cloud cryptography bilinear pairings 94a60 cryptography 14h52 elliptic curves
Academic journal
Save to List
147

MSKT: multimodal data fusion for improved nursing management in hemorrhagic stroke
Ting Zhou ; Dandan Li ; Jingfang Zuo ; et al.
PeerJ Comput Sci
PeerJ Computer Science, Vol 11, p e2969 (2025)

Non-stationary Gaussian... Nursing management Algorithms and Analysis... Predictive model Multiscale Kernel functi... Electronic computers. Co...
Academic journal
Save to List
148

A methodological approach for inferring causal relationships from opinions and news-derived events with an application to climate change
Juan Marten ; Fernando Delbianco ; Fernando Tohme ; et al.
PeerJ Comput Sci
PeerJ Computer Science, Vol 11, p e2964 (2025)

Opinion mining Sentiment analysis Algorithms and Analysis... Electronic computers. Co... Climate change Topic mining
Academic journal
Save to List
149

Optimized customer churn prediction using tabular generative adversarial network (GAN)-based hybrid sampling method and cost-sensitive learning
I Nyoman Mahayasa Adiputra ; Paweena Wanchai ; Pei-Chun Lin
PeerJ Comput Sci
PeerJ Computer Science, Vol 11, p e2949 (2025)

Cost-sensitive learning Algorithms and Analysis... Electronic computers. Co... GAN-based hybrid samplin... QA75.5-76.95 Customer churn predictio...
Academic journal
Save to List
150

Sporting a virtual future: exploring sports and virtual reality patents using deep learning-based analysis
Jea Woog Lee ; Sangmin Song ; JungMin Yun ; et al.
PeerJ Comput Sci
PeerJ Computer Science, Vol 11, p e2919 (2025)

Algorithms and Analysis... Natural language process... Electronic computers. Co... Deep learning QA75.5-76.95 Sports patent
Academic journal
Save to List
151

Linear B-cell epitope prediction for SARS and COVID-19 vaccine design: Integrating balanced ensemble learning models and resampling strategies
Fatih Gurcan
PeerJ Comput Sci
PeerJ Computer Science, Vol 11, p e2970 (2025)

Algorithms and Analysis... Ensemble learning Electronic computers. Co... Immunoinformatics QA75.5-76.95 B-cell epitope predictio...
Academic journal
Save to List
152

Novel conditional tabular generative adversarial network based image augmentation for railway track fault detection
Ali Raza ; Rukhshanda Sehar ; Abdul Moiz ; et al.
PeerJ Comput Sci
PeerJ Computer Science, Vol 11, p e2898 (2025)

Railway track fault Algorithms and Analysis... Generative AI Electronic computers. Co... Machine learning Deep learning
Academic journal
Save to List
153

Enhancing analogy-based software cost estimation using Grey Wolf Optimization algorithm
Taghi Javdani Gandomani ; Maedeh Dashti ; Sadegh Ansaripour ; et al.
PeerJ Comput Sci
PeerJ Computer Science, Vol 11, p e2794 (2025)

Grey Wolf Optimization a... Algorithms and Analysis... Electronic computers. Co... QA75.5-76.95 Analogy-based estimation Software cost estimation
Academic journal
Save to List
154

Tencent Meeting forensics based on memory reverse analysis
Shilong Yu ; Binglong Li ; Lin Zhu ; et al.
PeerJ Comput Sci
PeerJ Computer Science, Vol 11, p e2963 (2025)

Memory forensics Algorithms and Analysis... Electronic computers. Co... Tencent Meeting QA75.5-76.95 Reverse analysis
Academic journal
Save to List
155

Fusing Transformer-XL with bi-directional recurrent networks for cyberbullying detection
Md. Mithun Hossain ; Md. Shakil Hossain ; Md. Shakhawat Hossain ; et al.
PeerJ Comput Sci
PeerJ Computer Science, Vol 11, p e2940 (2025)

Cyberbullying detection Algorithms and Analysis... Natural language process... Electronic computers. Co... Fusion transformer-XL Hybrid transformer
Academic journal
Save to List
156

The geometry of meaning: evaluating sentence embeddings from diverse transformer-based models for natural language inference
Mohammed Alsuhaibani
PeerJ Comput Sci
PeerJ Computer Science, Vol 11, p e2957 (2025)

Textual entailment Algorithms and Analysis... Electronic computers. Co... NLI Text processing Geometry
Academic journal
Save to List
157

GAPNet: Single and multiplant leaf disease classification method based on simplified SqueezeNet for grape, apple and potato plants
Özge Nur Özaras ; Asuman Günay Yılmaz
PeerJ Comput Sci
PeerJ Computer Science, Vol 11, p e2941 (2025)

Lightweight CNN models Algorithms and Analysis... Electronic computers. Co... Deep learning Convolutional neural net... QA75.5-76.95
Academic journal
Save to List
158

Leveraging large language models for spelling correction in Turkish
Ceren Guzel Turhan
PeerJ Comput Sci
PeerJ Computer Science, Vol 11, p e2889 (2025)

Masked language modeling Algorithms and Analysis... Electronic computers. Co... QA75.5-76.95 Encoder-decoder sequence... Spell check
Academic journal
Save to List
159

Aerial image segmentation of embankment dams based on multispectral remote sensing: a case study in the Belo Monte Hydroelectric Complex, Pará, Brazil
Carlos André de Mattos Teixeira ; Thabatta Moreira Alves de Araujo ; Evelin Cardoso ; et al.
PeerJ Comput Sci
PeerJ Computer Science, Vol 11, p e2917 (2025)

Vegetation Segmentation Algorithms and Analysis... UAV Electronic computers. Co... Embankment dam
Academic journal
Save to List
160

A malware detection method with function parameters encoding and function dependency modeling
Ronghao Hou ; Dongjie Liu ; Xiaobo Jin ; et al.
PeerJ Comput Sci
PeerJ Computer Science, Vol 11, p e2946 (2025)

Algorithms and Analysis... API sequence Electronic computers. Co... Malware detection Deep learning QA75.5-76.95
Academic journal
Save to List

Filter