Search alternatives:
compositional » composition (Expand Search)
Showing 221 - 240 results of 52,129 for search '(compositional OR computational) data', query time: 0.35s Refine Results
  1. 221
  2. 222

    Password Cracking Methods and Techniques in Computer Forensic Investigation by İlker Kara

    Published 2021-06-01
    “…Corporate firms and ordinary users commonly use new-generation encryption methods to hide their data. This situation creates large obstacles forto the investigation of computer systems and files which are the subject of forensic events, especially. …”
    Get full text
    Article
  3. 223
  4. 224

    Reversible Adversarial Examples with Minimalist Evolution for Recognition Control in Computer Vision by Shilong Yang, Lu Leng, Ching-Chun Chang, Chin-Chen Chang

    Published 2025-01-01
    “…As artificial intelligence increasingly automates the recognition and analysis of visual content, it poses significant risks to privacy, security, and autonomy. Computer vision systems can surveil and exploit data without consent. …”
    Get full text
    Article
  5. 225

    Joint optimization of edge computing and caching in NDN by Yu ZHANG, Min CHENG

    Published 2022-08-01
    Subjects: “…named data networking…”
    Get full text
    Article
  6. 226

    Dynamic display algorithm of sonar data based on grayscale distribution model and computational intelligence by Hongquan Lei, Diquan Li, Haidong Jiang

    Published 2025-04-01
    “…Multiple noise sources interfere with sonar signals, which affects both data precision and clarity. This article studies the dynamic display algorithm of sonar data based on grayscale distribution model and computational intelligence. …”
    Get full text
    Article
  7. 227
  8. 228
  9. 229

    COMPUTATIONAL THINKING IN THE PROBLEM OF RELIABLE AND SECURE DATA TRANSMISSION OVER A COMMUNICATION CHANNEL by Kirill V. Agievets, Andarbek Z. Ahmadov, Grigory A. Ivanenko, Mikhail A. Ivanov, Mikael A. Kondakhchan, Andrey V. Starikovsky

    Published 2025-05-01
    “…There are three problems that have to be solved when transmitting data over communication channels: detection and correction of errors caused by interference in communication channels; ensuring of transmitted data privacy; protection against injection of false data. …”
    Get full text
    Article
  10. 230

    Computational tools and data integration to accelerate vaccine development: challenges, opportunities, and future directions by Lindsey N. Anderson, Charles Tapley Hoyt, Jeremy D. Zucker, Andrew D. McNaughton, Jeremy R. Teuton, Klas Karis, Natasha N. Arokium-Christian, Jackson T. Warley, Zachary R. Stromberg, Benjamin M. Gyori, Benjamin M. Gyori, Neeraj Kumar

    Published 2025-03-01
    “…We discuss the role of natural language processing, semantic integration, and causal inference in extracting valuable insights from published literature and unstructured data sources, as well as the computational modeling of immune responses. …”
    Get full text
    Article
  11. 231

    Synthetic data and ELSI-focused computational checklists-A survey of biomedical professionals' views. by Jennifer K Wagner, Laura Y Cabrera, Sara Gerke, Daniel Susser

    Published 2024-11-01
    “…Our survey findings suggest that there is a gap in familiarity with both synthetic data and computational checklists among AI/ML users and developers and those in ethics-related positions who might be tasked with ensuring the proper use or oversight of AI/ML tools. …”
    Get full text
    Article
  12. 232
  13. 233
  14. 234
  15. 235
  16. 236

    A novel, human-in-the-loop computational grounded theory framework for big social data by Lama Alqazlan, Zheng Fang, Michael Castelle, Rob Procter

    Published 2025-06-01
    “…The availability of big data has significantly influenced the possibilities and methodological choices for conducting large-scale behavioural and social science research. …”
    Get full text
    Article
  17. 237
  18. 238
  19. 239
  20. 240