Search Results - ((( threads OR threats) computer ) OR (( hess OR ( less OR loss)) computer ))
Suggested Topics within your search.
Suggested Topics within your search.
- Computational Intelligence 72
- Computational intelligence 72
- Telecommunication 64
- Communications Engineering, Networks 55
- Artificial Intelligence 45
- Artificial intelligence 45
- Control engineering 37
- Electronic Circuits and Systems 32
- Electronic circuits 32
- Signal processing 32
- Signal, Speech and Image Processing 32
- Data protection 31
- Data and Information Security 30
- Electronics 26
- Electronics and Microelectronics, Instrumentation 26
- Mechanics, Applied 26
- Security Science and Technology 26
- Security systems 26
- Control and Systems Theory 21
- Electric power production 19
- Electrical Power Engineering 19
- Automation 17
- Computer networks 17
- Control, Robotics, Automation 17
- Machines, Tools, Processes 17
- Manufactures 17
- Materials 17
- Robotics 17
- Computer Communication Networks 16
- Microwaves, RF Engineering and Optical Communications 16
-
1
-
2
Emergent Computation A Festschrift for Selim G. Akl /
Published 2017Table of Contents: “…-Structural Properties of the Generalized Exchanged Hypercubes.- Enumerated BSP Automata -- Coping with Silent Errors in HPC Applications.- Parallel Sorting For GPUs.- Mining for Functional Dependencies Using Shared Radix Trees in Many-Core Multi-Threaded Systems.- Cellular Automata and Wireless Sensor Networks.- Connectivity Preserving Network Transformers.- Operating Secure Mobile Healthcare Services over Constrained Resource Networks.- On Vague Computers.- Parallel evolutionary Optimization of Natural Convection Problem.- Theory and Practice of Discrete Interacting Agents Models.…”
Full-text access
View in OPAC
e-Book -
3
-
4
-
5
Information Loss in Deterministic Signal Processing Systems
Published 2018Full-text access
View in OPAC
e-Book -
6
-
7
-
8
-
9
Transactions on Engineering Technologies World Congress on Engineering and Computer Science 2017 /
Published 2019Table of Contents: “…Addressing the Challenges of IGBO Computational Morphological Studies Using Frequent Pattern-Based Induction -- 12. …”
Full-text access
View in OPAC
e-Book -
10
Music and death : interdisciplinary readings and perspectives /
Published 2019Full-text access
View in OPAC
e-Book -
11
-
12
-
13
Computer and Network Security Essentials
Published 2018Table of Contents: “…Part I.COMPUTER SECURITY -- Chapter 1.Computer Security -- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems -- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics -- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining -- Chapter 5.A Postmortem Forensic Analysis for a JavaScript Based Attack -- Part II. …”
Full-text access
View in OPAC
e-Book -
14
Soft Computing Applications
Published 2018Table of Contents: “…A Brain like Computer Made of Time crystal: Could a Metric of Prime alone Replace a User and Alleviate Programming Forever? …”
Full-text access
View in OPAC
e-Book -
15
-
16
-
17
-
18
-
19
Soft Computing: Theories and Applications Proceedings of SoCTA 2016, Volume 2 /
Published 2018Table of Contents: “…Virtual Experimental Analysis of Redundant Robot Manipulators using Neural Networks -- Selection of Energy Efficient Material: an Entropy-TOPSIS Approach -- Analyses & Detection of Health Insurance Fraud Using Data Mining & Predictive Modeling Techniques -- Software Cost Estimation Using Artificial Neural Network -- A Three Layer Approach for Overlay Text Extraction in Video Stream -- Recognition of Noisy Numbers Using Neural Network -- Secure Group Authentication Scheme for LTE-Advanced -- Frequency Fractal Behaviour in the Retina Nano Centre- Fed Dipole Antenna Network of a Human Eye -- Trigonometric Probability Tuning in Asynchronous Differential Evolution -- Analytical review on Image Compression using Fractal Image Coding -- The Fulcrum principle between Parasympathetic and Sympathetic peripheral systems: Auditory noise can modulate body's peripheral temperature -- Improved Clustering Algorithm for Wireless Sensor Network -- Fuzzy based probabilistic ecological risk assessment approach: Acase study of heavy metal contaminated soil -- Performance Comparisons of Four Modified Structures of Log Periodic Three Element Microstrip Antenna Arrays -- Preliminary Study of Ecommerce Adoption in Indian Handicraft SME: A Case Study -- Threat Detection for Software Vulnerability using DE based Adaptive Approach -- Methods to choose the 'Best-fit' Patch in Patch-Based Texture Synthesis Algorithm -- Revisiting Requirements Analysis Techniques and Challenges -- Speech Recognition with Combined MFCC, MODGDF and ZCPA Features Extraction techniques using NTN and MNTN conventional Classifiers for Telugu language -- Real Time Sentiment Analysis of Big Data Applications Using Twitter Data with Hadoop Framework -- Addressing Security concerns for Infrastructure of Cloud Computing.…”
Full-text access
View in OPAC
e-Book -
20