Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 2
- Internet in public administration 2
- Moral and ethical aspects 2
- Public administration 2
- Communication policy 1
- Government policy 1
- Internet 1
- Photography 1
- Prevention 1
- Psychological aspects 1
- Psychology 1
- Social aspects 1
- Technological innovations 1
- Telecommunication policy 1
- Terrorism 1
- Terrorists 1
- Visual communication 1
-
7361
The relation between game disorder and interruption during game is mediated by game craving
Published 2025-06-01Get full text
Article -
7362
Does music counteract mental fatigue? A systematic review.
Published 2025-01-01“…Personal preference music is effective in counteracting behavioral performance decrements in motor control and endurance tasks. …”
Get full text
Article -
7363
ACIVY: An Enhanced IVY Optimization Algorithm with Adaptive Cross Strategies for Complex Engineering Design and UAV Navigation
Published 2025-07-01“…The Adaptive Cross Ivy (ACIVY) algorithm is a novel bio-inspired metaheuristic that emulates ivy plant growth behaviors for complex optimization problems. While the original Ivy Optimization Algorithm (IVYA) demonstrates a competitive performance, it suffers from limited inter-individual information exchange, inadequate directional guidance for local optima escape, and abrupt exploration–exploitation transitions. …”
Get full text
Article -
7364
Hypergraph-Driven High-Order Knowledge Tracing with a Dual-Gated Dynamic Mechanism
Published 2025-08-01Get full text
Article -
7365
Alzheimer’s Disease Prediction Using Fisher Mantis Optimization and Hybrid Deep Learning Models
Published 2025-06-01Get full text
Article -
7366
Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis
Published 2025-01-01“…In this paper, PCAP refers to Packet Capture, Network Intrusion Detection Systems refers to NIDS, Artificial Intelligence refers to AI, machine learning refers to ML, Computer Vision refers to CV, and Natural Language Processing refers to NLP. …”
Get full text
Article -
7367
Study of an Extensive Set of Eye Movement Features: Extraction Methods and Statistical Analysis
Published 2018-03-01“…The presented methods and analysis can provide a valuable tool for researchers in various fields that explore eye movements, such as in behavioral studies, attention and cognition research, medical research, biometric recognition, and human-computer interaction.…”
Get full text
Article -
7368
Multi-Fidelity Temporal Reasoning: A Stratified Logic for Cross-Scale System Specifications
Published 2025-06-01“…We present <b>S</b>tratified <b>M</b>etric <b>T</b>emporal <b>L</b>ogic (SMTL), a novel formalism for specifying and verifying the properties of complex cyber–physical systems that exhibit behaviors across multiple temporal and abstraction scales. …”
Get full text
Article -
7369
Cognitive Intraindividual Variability and White Matter Integrity in Aging
Published 2013-01-01“…For both methods, fractional anisotropy, along with the mean, radial, and axial diffusivity parameters, was computed. In accord with previous studies, our results showed that the DTI parameters were more related to IIV than to mean performance. …”
Get full text
Article -
7370
-
7371
-
7372
-
7373
The Discrete Ueda System and Its Fractional Order Version: Chaos, Stabilization and Synchronization
Published 2025-01-01Get full text
Article -
7374
-
7375
-
7376
-
7377
Current Status and Research Trend on Ecological Migration of Radionuclides and Radiation Dose Assessment
Published 2024-10-01“…From multi-dimensional perspectives, such as computational models, evaluation methods, and parameters, etc., this paper explores the transport and transfer behaviors of radionuclides in the ecological environment. …”
Get full text
Article -
7378
Information Propagation in Hypergraph-Based Social Networks
Published 2024-11-01Get full text
Article -
7379
Combining Supervised and Reinforcement Learning to Build a Generic Defensive Cyber Agent
Published 2025-05-01“…Sophisticated mechanisms for attacking computer networks are emerging, making it crucial to have equally advanced mechanisms in place to defend against these malicious attacks. …”
Get full text
Article -
7380
Near-Field Nulling Control Beamfocusing Optimization for Multi-User Interference Suppression
Published 2025-01-01Get full text
Article