Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 2
- Internet in public administration 2
- Moral and ethical aspects 2
- Public administration 2
- Communication policy 1
- Government policy 1
- Internet 1
- Photography 1
- Prevention 1
- Psychological aspects 1
- Psychology 1
- Social aspects 1
- Technological innovations 1
- Telecommunication policy 1
- Terrorism 1
- Terrorists 1
- Visual communication 1
-
7001
-
7002
Fitted Tension Spline Scheme for a Singularly Perturbed Parabolic Problem With Time Delay
Published 2024-01-01“…Further, the boundary layer behaviors of the solutions are given graphically.…”
Get full text
Article -
7003
Preliminary evidence-based recommendations for return to learn: a novel pilot study tracking concussed college students
Published 2019-10-01“…The severity for five chief symptoms (headache, dizziness, difficulty concentrating, fatigue, anxiety) were recorded six-times per day through text messages, and daily phone calls recorded participant's behavioral traits. Results: We identified five behavioral variables which significantly influenced symptom resolution (music, sleep, physical activity, water and time) (p = 0.0004 to p = 0.036). …”
Get full text
Article -
7004
Numerical simulations through first order nonlinear difference equation to study highly ductile symmetric fold (HDSF) dynamics: A conceptual study
Published 1998-01-01“…In the second experiment, the time dependent stress that is changed according to a dynamical rule is used to model distinct dynamical behaviors of these HDSFs.The results arrived through computer simulations are the attractor interlimb angles (AIAs).Bifurcation diagrams are also depicted to show the dynamical behaviors concerning the change in the stress dynamics.…”
Get full text
Article -
7005
Strategic Traffic Management in Mixed Traffic Road Networks: A Methodological Approach Integrating Game Theory, Bilevel Optimization, and C-ITS
Published 2024-12-01“…The framework is applied to a real-world road network, validating its practicality and effectiveness through computational results. The extraction and analysis of computational results are used to propose optimal traffic management policies for mixed-traffic environments. …”
Get full text
Article -
7006
Trust-Based Anomaly Detection in Emerging Sensor Networks
Published 2015-10-01Get full text
Article -
7007
-
7008
CGTS: graph transformer-based anomaly detection in controller area networks
Published 2025-08-01Get full text
Article -
7009
-
7010
Information coevolution spreading model and simulation based on self-organizing multi-agents
Published 2025-06-01Get full text
Article -
7011
-
7012
Defining a Novel Meaning of the New Organic Architecture
Published 2018-12-01“…This discussion will be categorized into three major divisions: “Morphological”, “Material”, and “Behavioral” owing to the different focus of computational applications within each one of them. …”
Get full text
Article -
7013
A Dynamic Programming Model for Internal Attack Detection in Wireless Sensor Networks
Published 2017-01-01Get full text
Article -
7014
Identification of digital device hardware vulnerabilities based on scanning systems and semi-natural modeling
Published 2024-08-01“…Based on scanning control, a verification method was developed to compare a behavioral model with a standard. Recommendations for ensuring security at all stages of the computer systems development process are provided.Conclusions. …”
Get full text
Article -
7015
Application of a Dynamic Step Size Iterative Method for Parameter Inversion in the Unified Hardening Models
Published 2025-05-01“…However, being an incremental elastoplastic constitutive model, the CSUH model requires extensive iterative computations during parameter identification, resulting in significant computational time. …”
Get full text
Article -
7016
Deep Learning Approach for Classifying DDoS Attack Traffic in SDN Environments
Published 2024-12-01Get full text
Article -
7017
Asymptotic Stability of a Rumor Spreading Model with Three Time Delays and Two Saturation Functions
Published 2025-06-01Get full text
Article -
7018
-
7019
-
7020
Artificial Intelligence for Automatic Pain Assessment: Research Methods and Perspectives
Published 2023-01-01“…For narrative purposes, AI-based methods are grouped into behavioral-based approaches and neurophysiology-based pain detection methods. …”
Get full text
Article