Search Results - (( ((chess computer) OR (threats computer)) ) OR (( hess OR ( less OR loss)) computer ))
Suggested Topics within your search.
Suggested Topics within your search.
- Computational Intelligence 70
- Computational intelligence 70
- Telecommunication 61
- Communications Engineering, Networks 53
- Artificial Intelligence 42
- Artificial intelligence 42
- Control engineering 31
- Data protection 31
- Signal processing 31
- Signal, Speech and Image Processing 31
- Data and Information Security 30
- Electronic Circuits and Systems 29
- Electronic circuits 29
- Security Science and Technology 26
- Security systems 26
- Electronics 23
- Electronics and Microelectronics, Instrumentation 23
- Mechanics, Applied 23
- Control and Systems Theory 21
- Electric power production 19
- Electrical Power Engineering 19
- Computer networks 16
- Materials 16
- System theory 16
- Computer Communication Networks 15
- Microwaves, RF Engineering and Optical Communications 15
- Applied Dynamical Systems 14
- Dynamics 14
- Engineering Design 14
- Engineering design 14
-
1
Emergent Computation A Festschrift for Selim G. Akl /
Published 2017Table of Contents: “…All Twelve Prototypes Implement 1961 Lee algorithm -- Computer Chess Endgame Play with Pawns: Then and Now.- Community Detection Using Synthetic Coordinates and Flow Propagation.…”
Full-text access
View in OPAC
e-Book -
2
-
3
-
4
Information Loss in Deterministic Signal Processing Systems
Published 2018Full-text access
View in OPAC
e-Book -
5
-
6
-
7
-
8
Transactions on Engineering Technologies World Congress on Engineering and Computer Science 2017 /
Published 2019Table of Contents: “…Addressing the Challenges of IGBO Computational Morphological Studies Using Frequent Pattern-Based Induction -- 12. …”
Full-text access
View in OPAC
e-Book -
9
Music and death : interdisciplinary readings and perspectives /
Published 2019Full-text access
View in OPAC
e-Book -
10
-
11
-
12
Computer and Network Security Essentials
Published 2018Table of Contents: “…Part I.COMPUTER SECURITY -- Chapter 1.Computer Security -- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems -- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics -- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining -- Chapter 5.A Postmortem Forensic Analysis for a JavaScript Based Attack -- Part II. …”
Full-text access
View in OPAC
e-Book -
13
Soft Computing Applications
Published 2018Table of Contents: “…A Brain like Computer Made of Time crystal: Could a Metric of Prime alone Replace a User and Alleviate Programming Forever? …”
Full-text access
View in OPAC
e-Book -
14
-
15
-
16
-
17
Soft Computing: Theories and Applications Proceedings of SoCTA 2016, Volume 2 /
Published 2018Table of Contents: “…Virtual Experimental Analysis of Redundant Robot Manipulators using Neural Networks -- Selection of Energy Efficient Material: an Entropy-TOPSIS Approach -- Analyses & Detection of Health Insurance Fraud Using Data Mining & Predictive Modeling Techniques -- Software Cost Estimation Using Artificial Neural Network -- A Three Layer Approach for Overlay Text Extraction in Video Stream -- Recognition of Noisy Numbers Using Neural Network -- Secure Group Authentication Scheme for LTE-Advanced -- Frequency Fractal Behaviour in the Retina Nano Centre- Fed Dipole Antenna Network of a Human Eye -- Trigonometric Probability Tuning in Asynchronous Differential Evolution -- Analytical review on Image Compression using Fractal Image Coding -- The Fulcrum principle between Parasympathetic and Sympathetic peripheral systems: Auditory noise can modulate body's peripheral temperature -- Improved Clustering Algorithm for Wireless Sensor Network -- Fuzzy based probabilistic ecological risk assessment approach: Acase study of heavy metal contaminated soil -- Performance Comparisons of Four Modified Structures of Log Periodic Three Element Microstrip Antenna Arrays -- Preliminary Study of Ecommerce Adoption in Indian Handicraft SME: A Case Study -- Threat Detection for Software Vulnerability using DE based Adaptive Approach -- Methods to choose the 'Best-fit' Patch in Patch-Based Texture Synthesis Algorithm -- Revisiting Requirements Analysis Techniques and Challenges -- Speech Recognition with Combined MFCC, MODGDF and ZCPA Features Extraction techniques using NTN and MNTN conventional Classifiers for Telugu language -- Real Time Sentiment Analysis of Big Data Applications Using Twitter Data with Hadoop Framework -- Addressing Security concerns for Infrastructure of Cloud Computing.…”
Full-text access
View in OPAC
e-Book -
18
-
19
Soft Computing: Theories and Applications Proceedings of SoCTA 2016, Volume 1 /
Published 2018Table of Contents: “…Modified Critical-Path and Top-Level attributes (MCPTL) based Task Scheduling Algorithm in Parallel Computing -- Critical Path Problem for Scheduling using Genetic Algorithm -- A Robust Digital Image Watermarking Algorithm Using DWT and SVD -- A Novel and Secure Authentication Secret Key Generation Scheme Using Bilinear Self- Pairing Map Based on Elliptic Curve Cryptography -- Study and Comparatively Analysis of various Vulnerabilities occur in Google Chrome -- Secure Framework for Data Security in Cloud Computing -- An Improved Spider Monkey Optimization Algorithm -- Neural Network Based prediction of Productivity parameters -- Rigorous Data Analysis and Performance Evaluation of Indian Classical Raga Using RapidMiner -- EPQ Model with Product Stewardship Approach -- Loss and Cost Minimization with Enhancement of Voltage Profile of Distribution Systems Using a Modified Differential Evolution Technique -- Integration of GIS, Spatial Data Mining and Fuzzy Logic for Agricultural Intelligence -- Patient-specific Modeling for Pattern Identification in Clinical Events Using Data Mining Models and Evolutionary Computing -- Teaching Learning Based Optimization on Hadoop -- Analysis and Parameter Estimation of Micro Strip Circular Patch Antennas Using Artificial Neural Networks -- Vibrational Frequencies of Parallelogram Plate with Circular Variations in Thickness -- Study and Comparative Analysis of Various Image Spamming Techniques -- On Comparing Performance of Conventional Fuzzy System with Recurrent Fuzzy System -- Application of PSO Clustering for Selection of Chemical Interface Materials for Sensor Array Electronic Nose -- Panorama Generation using Feature based Mosaicing and Modified Graph-cut Blending -- Application of fuzzy multi-criteria approach to assess the water quality of river Ganges -- Efficient multiprocessor scheduling Using Water Cycle Algorithm.…”
Full-text access
View in OPAC
e-Book -
20