ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Computing
Computing
Education
Pure sciences
Research
Social Sciences
Architecture and Urbanism
Biology
Communication
all records (72)

Languages
English
Spanish
Portuguese
German

Countries
Indonesia
USA
Ukraine
Brazil
Austria
Switzerland
Romania
Spain
Canada
South Africa
all records (74)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
32.666  Articles
1 of 3.268 pages  |  10  records  |  more records»
Human speech perception involves transforming a countinuous acoustic signal into discrete linguistically meaningful units (phonemes) while simultaneously causing a listener to activate words that are similar to the spoken utterance and to each other. The ... see more

Security in computer networks can be vulnerable, this is because we have weaknesses in making security policies, weak computer system configurations, or software bugs. Intrusion detection is a mechanism for securing computer networks by detecting, prevent... see more

The security of the computer network, especially the internet, is very crucial to note. One of the most effective ways to secure a computer network is to use a firewall. However, making a firewall that is still manual will make it difficult for network ad... see more

Drawing on scholarship from resource dependency, social network analysis, trust, and institutional theories, we present a model that describes the factors that shape relationships among organizations and their stakeholders. We propose that networks compri... see more

The goal of the present study was to characterize how neighborhood structure in sign language influences lexical sign acquisition in order to extend our understanding of how the lexicon influences lexical acquisition in both sign and spoken languages. A r... see more

To overcome the low accuracy and high energy consumption of positioning algorithm in wireless sensor network, we proposed a optimization positioning based on algorithm neighborhood model. Based on the characteristics of the neighborhood model, the algorit... see more

Drawing on scholarship from resource dependency, social network analysis, trust, and institutional theories, we present a model that describes the factors that shape relationships among organizations and their stakeholders. We propose that networks compri... see more

The explosion of genomic data provides new opportunities to improve the task of gene regulatory network reconstruction. Because of its inherent probability character, the Bayesian network is one of the most promising methods. However, excessive computatio... see more

Hepatitis merupakan penyakit yang diderita oleh banyak orang, bahkan bisa menyebabkan kematian. Prediksi awal dapat mencegah kematian tersebut yaitu denganmengumpulkan data pasien hepatitis yang dilihat dari faktor - faktornya. Faktor-faktor tersebut anta... see more

1 of 3.268 pages  |  10  records  |  more records»