Application of Printed Teaching Materials in Digital Form |
PaedDr. Natália Hrkotáčová, doc. PhDr. Adriana Kičková, PhD. |
Education |
12, 3, September, 2024 |
Exploring Sentiment Analysis Research: A Social Media Data Perspective |
Zahra Dahish |
Soft Computing |
14, 1, February, 2023 |
Performance of Aloha-Q with Adaptive Transmission Probability |
Katsumi Sakakibara |
Networks & Communications |
17, 1, January, 2025 |
A LINEAR MODELING APPROACH ON LTGP SIGNALS AND SEISMIC ACTIVITY |
Dimitrios Dechouniotis and Apostolos Ifantis |
Computational Science |
7, 01, March, 2018 |
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN |
Alvernon Walker and Evelyn R. Sowells-Boone |
Electrical Engineering |
5, 01, March, 2018 |
Click Spam Prevention Model for Online Advertisement |
Nicola Zingirian and Michele Benini |
Software Engineering & Security |
10, 1, January, 2018 |
ANALYSIS AND FORECASTING OF ELECTRICITY DEMAND IN DAVAO DEL SUR, PHILIPPINES |
Samuel John E. Parreño |
Artificial Intelligence |
11, 1/2, May, 2022 |
RANGE-BASED DATA GATHERING ALGORITHM WITH A MOBILE SINK IN WIRELESS SENSOR NETWORKS |
A. Alhasanat1, K. Alhasanat2 and M. Ahmed3 |
Wireless Sensor Networks |
7, 6, December, 2015 |
Mining Actionable Patterns in Bigdata for Enhanced Human Emotions |
Sanchari Chatterjee |
Data Mining |
15, 1, January, 2025 |
Assessment on LSPU-SPCC Students’ Readiness towards M-learning |
Joanna A. Erlano-De Torres |
Computer Science & Information Technology |
13, 4, November, 2021 |
Uncovering Fake News by Means of Social Network Analysis |
Prashant Kumar Shrivastava1 , Mayank Sharma2 , Megha Kamble3 , Vaibhav Gore4 and Avenash Kumar5 |
Artificial Intelligence |
12, 4, October, 2022 |
Study on Cerebral Aneurysms: Rupture Risk Prediction Using Geometrical Parameters and Wall Shear Stress With CFD and Machine Learning Tools |
Alfredo Aranda and Alvaro Valencia |
Machine Learning |
5, 4, December, 2018 |
Dynamic HW Priority Queue Based Schedulers for Embedded System |
Dinesh G Harkut and M.S. Ali |
Embedded Systems |
5, 5, December, 2015 |
Image Recognition Based Automatic Decryption Method for Text Ecrypted Using Visual Cryptography |
Naoyuki Awano |
Digital Signal & Image Processing |
7, 3/4, August, 2017 |
On Algorithmic Problems Concerning Graphs of Higher Degree of Symmetry |
Vishal Goundar |
Networks & Communications |
6, 4, December, 2014 |
Operational Intelligence Performance Inferencing Across Business Processes |
Rajeev Kaula |
DBWorld: Database Management Systems |
12, 01, February, 2020 |
Model Checking for Multi-Agent Systems Modeled by Epistemic Process Calculus |
Qixian Yu 1, Zining Cao 1,2,3, Zong Hui 1,4 and Yuan Zhou 1
Software Engineering & Security |
16, 01, February, 2025 |
|
A Method of Trust Management in Wireless Sensor Networks |
Janusz Górski and Alan Turower |
Software Engineering & Security |
7, 4, November, 2018 |
Teaching Strategies based on Generational Teacher Cohorts |
Jessica Ramírez, Ginia Montes de Oca, Carmen Caraballo |
Education |
11, 4, December, 2022 |
Immunizing Image Classifiers Against Localized Adversary Attacks |
Henok Ghebrechristos and Gita Alaghband |
Artificial Intelligence |
15, 2, March, 2024 |