A Comparative Survey of Deep Learning Based Techniques and Tools Used in Modern Farming
|
2022 |
Carmine, Amedeo |
Moving Control from Ship to Shore: Computer Supported Cooperative Work in Autonomous Shipping
|
2022 |
Sellberg, Charlott |
Editorial Illustration: An Exploration of Audience Interaction Through Time and Space
|
2022 |
Selby, Andrew |
Gesture Based Confidence Assessment System for Visually Impaired People Using Deep Learning
|
2022 |
Adeel, M. I. |
Exploring Potential Improvement of Daytime Clear-Sky Radiance for VIIRS by Using Deep Learning Approach
|
2022 |
Liang, Xingming |
That’s What She Said: Humor Identification with Word Embeddings and Recurrent Neural Networks
|
2022 |
Kayastha, Ashish |
A Study on Non-overlapping Multi-agent Pathfinding
|
2022 |
Daneshvaramoli, Mohammadreza |
Functional Nanomaterials Design in the Workflow of Building Machine-Learning Models
|
2022 |
Xi, Zhexu |
Optimization of Production: Literature Review
|
2022 |
Habbadi, Sahar |
Trusting the Needle in the Haystack: Cybersecurity Management of AI/ML Systems
|
2022 |
Shukla, Sanjana |
Production Orgitonization: Some Principles of the Central/Decentral Dichotomy and a Witness Application Example
|
2022 |
Heiden, Bernhard |
Impact of eWoM on Purchase Intension of Insurance Products
|
2022 |
Priya, Ramajayam Padma |
Building a Meta-agent for Human-Machine Dialogue in Machine Learning Systems
|
2022 |
Goldberg, Saveli |
Design of Distributed Architecture of Refinery Complexes Control Systems by "Al Zour Refinery" Example
|
2022 |
Yusupbekov, Nodirdek |
Digital Information Transparency for Cyber Security: Critical Points in Social Media Trends
|
2022 |
Huda, Miftachul |
Internet Crime Enabling: Stalking and Cyberstalking
|
2022 |
Cohen-Almagor, Raphael |
Methods and Techniques of Information Security Risk Management During Assessment of Information Systems
|
2022 |
Boranbayev, Seilkhan |
Cybersecurity Risk Management Frameworks in the Oil and Gas Sector: A Systematic Literature Review
|
2022 |
Imran, Huma |
Lattice Puncturable Attribute Based Proxy Re-encryption Scheme and Its Application in Information Centric Network
|
2022 |
Affum, Eric |
Developing a Framework of Comprehensive Criteria for Privacy Protections
|
2022 |
Wang, Tian |