Haku
Aineistot 411-420 / 2254
Combining YOLO V5 and transfer learning for smoke-based wildfire detection on boreal forests
(Copernicus publications, 2023)
Wildfires present severe threats to various aspects of ecosystems, human settlements, and the environment. Early detection plays a critical role in minimizing the destructive consequences of wildfires. This study introduces ...
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
(ACM, 2022)
In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security ...
Communication-Efficient Federated Learning in Channel Constrained Internet of Things
(IEEE, 2022)
Federated learning (FL) is able to utilize the computing capability and maintain the privacy of the end devices by collecting and aggregating the locally trained learning model parameters while keeping the local personal ...
Compact Quantum Circuit Design of PUFFIN and PRINT Lightweight Ciphers for Quantum Key Recovery Attack
(Institute of Electrical and Electronics Engineers (IEEE), 2023)
Quantum computing plays a vital role in the next generation computing platforms as researchers have achieved quantum supremacy by proving that quantum computers can outperform classical computers. These high performance ...
Comparing Cybersecurity Information Exchange Models and Standards for the Common Secure Information Management Framework
(Springer, 2021)
Cyber threats have increased in spite of formal economic integration in the world. Decision-makers and authorities need to respond to the growing challenge of cyberthreats by increasing cooperation. Information is one of ...
Comparing interactive evolutionary multiobjective optimization methods with an artificial decision maker
(Springer Science+Business Media, 2023)
Solving multiobjective optimization problems with interactive methods enables a decision maker with domain expertise to direct the search for the most preferred trade-offs with preference information and learn about the ...
Comparing reference point based interactive multiobjective optimization methods without a human decision maker
(Springer, 2023)
Interactive multiobjective optimization methods have proven promising in solving optimization problems with conflicting objectives since they iteratively incorporate preference information of a decision maker in the search ...
Comparing the Effect Size of School Level Support on Teachers’ Technology Integration
(Springer, 2020)
Teachers are expected to lead the innovative use of Information Communication and Technology (ICT) at the classroom level of context. However, research literature shows that a number of factors influence their ICT pedagogical ...
Comparison between the shifted-Laplacian preconditioning and the controllability methods for computational acoustics
(Elsevier, 2010)
Processes that can be modelled with numerical calculations of acoustic pressure fields include medical and industrial ultrasound, echo sounding, and environmental noise. We present two methods for making these calculations ...
Comparison of cluster validation indices with missing data
(ESANN, 2018)
Clustering is an unsupervised machine learning technique, which aims to divide a given set of data into subsets. The number of hidden groups in cluster analysis is not always obvious and, for this purpose, various cluster ...