Search alternatives:
commuting » competing (Expand Search)
Showing 361 - 380 results of 7,907 for search '(commuting OR computing) behavior', query time: 0.19s Refine Results
  1. 361

    A Computational Cognitive Biomarker for Early-Stage Huntington's Disease. by Thomas V Wiecki, Chrystalina A Antoniades, Alexander Stevenson, Christopher Kennard, Beth Borowsky, Gail Owen, Blair Leavitt, Raymund Roos, Alexandra Durr, Sarah J Tabrizi, Michael J Frank

    Published 2016-01-01
    “…While symptomatic HD subjects differed substantially from controls in behavioral measures [reaction time (RT) and error rates], there was no such clear behavioral differences in pre-HD. …”
    Get full text
    Article
  2. 362
  3. 363

    Pruning Bayesian networks for computationally tractable multi-model calibration by Nicolas Gratius, Mario Bergés, Burcu Akinci

    Published 2025-05-01
    “…Anomaly response in aerospace systems increasingly relies on multi-model analysis in digital twins to replicate the system’s behaviors and inform decisions. However, computer model calibration methods are typically deployed on individual models and are limited in their ability to capture dependencies across models. …”
    Get full text
    Article
  4. 364

    Teaching basic computer programming to young adults with intellectual disability by Maria Agatina Stimoli, Francesco Domenico Di Blasi, Silvestro Maccarrone, Angela Antonia Costanzo, Paola Occhipinti, Serafino Buono

    Published 2024-11-01
    “…IntroductionTeaching computer programming can be challenging, especially for individuals with intellectual disability (ID) who exhibit a wide range of learning abilities and behavioral characteristics. …”
    Get full text
    Article
  5. 365

    Computer Teaching System Based on Internet of Things and Machine Learning by Lei Chen, Li Zhang

    Published 2022-01-01
    “…In order to solve the problem that the traditional computer-aided teaching system is affected by communication technology, which leads to the inability to interact between teachers and students, the author proposes a research on a computer teaching system based on the Internet of Things and machine learning. …”
    Get full text
    Article
  6. 366

    Encoding time in neural dynamic regimes with distinct computational tradeoffs. by Shanglin Zhou, Sotiris C Masmanidis, Dean V Buonomano

    Published 2022-03-01
    “…It is not known how neural circuits can encode time and satisfy distinct computational requirements, nor is it known whether similar patterns of neural activity at the population level can exhibit dramatically different computational or generalization properties. …”
    Get full text
    Article
  7. 367

    Intelligent standalone eye blinking monitoring system for computer users by Ahmad Jiman, Amjad Abdullateef, Alaa Almelawi, Khan Yunus, Yasser Kadah, Ahmad Turki, Mohammed Abdulaal, Nebras Sobahi, Eyad Attar

    Published 2024-12-01
    “…In this pilot study, an intelligent, standalone eye blinking monitoring system to promote healthier blinking behaviors for computer users was developed using components that are affordable and easily available in the market. …”
    Get full text
    Article
  8. 368
  9. 369
  10. 370
  11. 371
  12. 372
  13. 373
  14. 374
  15. 375
  16. 376
  17. 377
  18. 378

    Personalized learning effect evaluation model for vocational education with cloud computing technology by Xiangyu Wang, Kang Cao

    Published 2025-12-01
    “…The advent of cloud computing technology (CCT) has expedited the advancement of online learning methodologies and, to a certain extent, compensated for the limitations inherent in traditional teaching approaches. …”
    Get full text
    Article
  19. 379

    An Efficient Framework for Secure Communication in Internet of Drone Networks Using Deep Computing by Vivek Kumar Pandey, Shiv Prakash, Aditya Ranjan, Sudhanshu Kumar Jha, Xin Liu, Rajkumar Singh Rathore

    Published 2025-05-01
    “…To overcome authentication vulnerabilities, this paper introduces a secure lightweight framework integrating deep learning-based user behavior analysis and cryptographic protocols. The proposed framework is verified through AVISPA security verification against replay, man-in-the-middle, and impersonation attacks. …”
    Get full text
    Article
  20. 380

    Load Balancing and Server Consolidation in Cloud Computing Environments: A Meta-Study by Mohammed Ala'anzy, Mohamed Othman

    Published 2019-01-01
    “…In terms of system behavior and workload, patterns of cloud computing are very dynamic; and that might serve to imbalance the load among data center resources. …”
    Get full text
    Article