Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 2
- Internet in public administration 2
- Moral and ethical aspects 2
- Public administration 2
- Communication policy 1
- Government policy 1
- Internet 1
- Photography 1
- Prevention 1
- Psychological aspects 1
- Psychology 1
- Social aspects 1
- Technological innovations 1
- Telecommunication policy 1
- Terrorism 1
- Terrorists 1
- Visual communication 1
-
561
Efficient Orchestration of Distributed Workloads in Multi-Region Kubernetes Cluster
Published 2025-03-01Get full text
Article -
562
Generative AI in Engineering and Computing Education: A Scoping Review of Empirical Studies and Educational Practices
Published 2025-01-01“…Our purpose with the outcomes and conclusions of this scoping review is to support educators, faculty members, and other stakeholders in engineering and computing education to co-create educational methodologies that articulate GenAI with curricula, AI literacy, and prompt engineering encompassing students’ learning domains such as cognitive, affective, or behavioral.…”
Get full text
Article -
563
-
564
Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic
Published 2025-04-01Get full text
Article -
565
-
566
A discovery strategy for APT anomaly based on homologous behavior analysis
Published 2016-01-01“…As APT(advanced persistent threat)attacks are increasingly frequently,higher requirements for the detection of APT attacks were proposed.It was an effective method to early discover the attack behavior of APT based on homologous behavior analysis.Aiming at the problem of low efficiency of data authentication caused by excessive data,the historical behavior database with data label technology was established and the database was stored in the cloud.Relying on the Hadoop platform and the aggregate computing ability of MapReduce and the pseudorandom permutation technique,the whole traffic parallel detection of the network was realized.In order to determine whether there was a APT attack behavior,the detection of APT attacks was implemented by comparing the data labels in the database.Test results show that the proposed method can detect the abnormal behavior of APT from the network as soon as possibleand improve the efficiency of the whole data flow detection.…”
Get full text
Article -
567
-
568
A structural health monitoring method proposal based on optical scanning and computational models
Published 2022-08-01Get full text
Article -
569
Exploring Dynamic Behavior in a Competition Duopoly Game Based on Corporate Social Responsibility
Published 2025-06-01Get full text
Article -
570
Measuring Children’s Computational Thinking and Problem-Solving in a Block-Based Programming Game
Published 2025-01-01“…Our findings showed that children’s gameplay behavior can be used to measure their CT and problem-solving skills.…”
Get full text
Article -
571
Perturbation Methods in Solving the Problem of Two Bodies of Variable Masses with Application of Computer Algebra
Published 2024-12-01“…All the relevant symbolic and numerical calculations are performed with the computer algebra system Wolfram Mathematica.…”
Get full text
Article -
572
The Effect of Speed On Bow Thruster Tunnel Acoustics Using Computational Fluid Dynamics Methods
Published 2025-04-01“…The study utilizes Computational Fluid Dynamics (CFD) simulations with ANSYS Fluent to analyze the relationship between fluid flow and acoustic behavior within the tunnel. …”
Get full text
Article -
573
Applying Reinforcement Learning for AMR’s Docking and Obstacle Avoidance Behavior Control
Published 2025-03-01Get full text
Article -
574
-
575
Approaches to Semantic Mutation of Behavioral State Machines in Model-Driven Software Development
Published 2018-09-01Get full text
Article -
576
A two-scale computational homogenization approach for elastoplastic truss-based lattice structures
Published 2025-03-01“…Despite progress in the homogenization of metamaterials, most existing studies have focused on the elastic behavior of lattice structures (whether linear or nonlinear), while the inelastic behavior, particularly elastoplasticity, remains largely unexplored. …”
Get full text
Article -
577
Building a Quantum Computer with Photons: Simulation Algorithm for Linear Optical Quantum Systems
Published 2024-09-01“…This research aims to develop a simulation algorithm that focuses on modeling optical elements as a way to study the behavior of quantum states in photons. An implementation of quantum computation with linear optics has been developed as part of the simulation in this research. …”
Get full text
Article -
578
Analysis of Algorithms for Detecting Users’ Behavioral Models based on Sessions Data
Published 2024-12-01“… Analysis of user behavior models based on user session data can be conducted using clustering (or community detecting) algorithms that do not require a predefined number of clusters. …”
Get full text
Article -
579
Observing others give & take: A computational account of bystanders' feelings and actions.
Published 2022-05-01“…Social interactions influence people's feelings and behavior. Here, we propose that a person's well-being is influenced not only by interactions they experience themselves, but also by those they observe. …”
Get full text
Article -
580