Haku
Aineistot 381-390 / 2135
Combined Behavioral and Mismatch Negativity Evidence for the Effects of Long-Lasting High-Definition tDCS in Disorders of Consciousness : A Pilot Study
(Frontiers Media, 2020)
Objective: To evaluate the effects of long-term High-definition transcranial direct current stimulation (HD-tDCS) over precuneus on the level of consciousness (LOC) and the relationship between Mismatch negativity (MMN) ...
Combining conjunctive rule extraction with diffusion maps for network intrusion detection
(IEEE, 2013)
Network security and intrusion detection are important
in the modern world where communication happens
via information networks. Traditional signature-based intrusion
detection methods cannot find previously unknown ...
Combining PCA and multiset CCA for dimension reduction when group ICA is applied to decompose naturalistic fMRI data
(Institute of Electrical and Electronic Engineers, 2015)
An extension of group independent component
analysis (GICA) is introduced, where multi-set canonical
correlation analysis (MCCA) is combined with principal
component analysis (PCA) for three-stage dimension reduction.
The ...
Combining Social Service and Healthcare as the First Country in the World : Exploring the Impacts on Information Systems
(Engineering and Technology Publishing (ETPUB), 2018)
The Finnish government has decided to
implement a reform in the social and healthcare system by
combining the two in the future. There are several drivers
for this change that have been identified. Large number ...
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
(ACM, 2022)
In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security ...
Communication-Efficient Federated Learning in Channel Constrained Internet of Things
(IEEE, 2022)
Federated learning (FL) is able to utilize the computing capability and maintain the privacy of the end devices by collecting and aggregating the locally trained learning model parameters while keeping the local personal ...
Compact Quantum Circuit Design of PUFFIN and PRINT Lightweight Ciphers for Quantum Key Recovery Attack
(Institute of Electrical and Electronics Engineers (IEEE), 2023)
Quantum computing plays a vital role in the next generation computing platforms as researchers have achieved quantum supremacy by proving that quantum computers can outperform classical computers. These high performance ...
Comparing Cybersecurity Information Exchange Models and Standards for the Common Secure Information Management Framework
(Springer, 2021)
Cyber threats have increased in spite of formal economic integration in the world. Decision-makers and authorities need to respond to the growing challenge of cyberthreats by increasing cooperation. Information is one of ...
Comparing interactive evolutionary multiobjective optimization methods with an artificial decision maker
(Springer Science+Business Media, 2023)
Solving multiobjective optimization problems with interactive methods enables a decision maker with domain expertise to direct the search for the most preferred trade-offs with preference information and learn about the ...
Comparing reference point based interactive multiobjective optimization methods without a human decision maker
(Springer, 2023)
Interactive multiobjective optimization methods have proven promising in solving optimization problems with conflicting objectives since they iteratively incorporate preference information of a decision maker in the search ...