Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 1 - 20 von 314.529

1

Data Protection Challenges in AI-Driven Criminal Justice in the EU and India
G. Anbarasi ; D. Sankar
International Journal of Computational Intelligence Systems, Vol 19, Iss 1, Pp 1-13 (2026)

Artificial Intelligence Data privacy Criminal justice process Data protection Electronic computers. Co... QA75.5-76.95
Fachzeitschrift
2

Kubernetes-aware load balancing for leaf-spine EVPN data centers
João Carvalheiro ; Rui Valadas ; Marlon Paz ; et al.
Journal of Cloud Computing: Advances, Systems and Applications, Vol 15, Iss 1, Pp 1-24 (2026)

Kubernetes Load balancing Datacenter Leaf-spine Computer engineering. Co... TK7885-7895
Fachzeitschrift
3

SAM2-UNet: segment anything 2 makes strong encoder for natural and medical image segmentation
Xinyu Xiong ; Zihuang Wu ; Shuangyi Tan ; et al.
Visual Intelligence, Vol 4, Iss 1, Pp 1-9 (2026)

Image segmentation Segment anything model U-Net Vision foundation model Electronic computers. Co... QA75.5-76.95
Fachzeitschrift
4

A Validation Strategy for Deep Learning Models: Evaluating and Enhancing Robustness
Abdul-Rauf Nuhu ; Parham M. Kebria ; Vahid Hemmati ; et al.
IEEE Open Journal of the Computer Society, Vol 7, Pp 276-289 (2026)

Adversarial robustness common corruption robust... deep learning models model validation weak robust samples Electronic computers. Co...
Fachzeitschrift
5

2025 Reviewers List
IEEE Open Journal of the Computer Society, Vol 7, Pp 1-5 (2026)

Electronic computers. Co... QA75.5-76.95 Information technology T58.5-58.64
Fachzeitschrift
6

A collaborative framework for rapid fault repair and service restoration in distribution networks
Hanwen Wang ; Sheng Lu ; Yanxin Jiang ; et al.
International Journal of Intelligent Networks, Vol 7, Iss , Pp 1-9 (2026)

Collaborative framework Distribution networks Rapid fault repair Service restoration Electronic computers. Co... QA75.5-76.95
Fachzeitschrift
7

Reinforcement learning for mobile robot mapless navigation: a review of recent advances
Kok Vernon ; Ezugwu Absalom E. ; Olusanya Micheal
Journal of Intelligent Systems, Vol 35, Iss 1, Pp 26-38 (2026)

reinforcement learning mobile robot dynamic environment navigation path planning agent
Fachzeitschrift
8

Automated detection and classification of road infrastructure for intelligent urban planning
Bafail Alaa ; Aljeaid Dania ; Alotaibi Hanan ; et al.
Journal of Intelligent Systems, Vol 35, Iss 1, Pp 34-150 (2026)

automated detection road damage classificati... deep learning real-time analysis computer vision model yolov8
Fachzeitschrift
9

An adversarial attack method based on pixel location characteristics
Zhao Qin ; Liu Jiuhong ; Ma Xian ; et al.
Journal of Intelligent Systems, Vol 35, Iss 1, Pp 130-147 (2026)

adversarial attack image processing feature extraction neural network unsupervised learning Science
Fachzeitschrift
10

Significance of essential vital signs for analysis of risk level of critical care patients – a review
Prabhu Savithri ; Bairy G. Muralidhar ; Sampathila Niranjana
Journal of Intelligent Systems, Vol 35, Iss 1, Pp 971-974 (2026)

vital signs patient risk level respiration rate sensor technology machine learning Science
Fachzeitschrift
11

Discrimination of Alzheimer’s diseases based on combination of generalized Hadamard difference and deep learning features
Al-Shamasneh Ala’a R. ; Omer Herman Khalid ; Karim Faten Khalid ; et al.
Journal of Intelligent Systems, Vol 35, Iss 1, Pp 1-5 (2026)

alzheimer’s disease hadamard difference deep learning classification 00a35 Science
Fachzeitschrift
12

Optimized YOLOv7 for traffic sign recognition
Lin Kaisi ; Zhang Lu
Journal of Intelligent Systems, Vol 35, Iss 1, Pp 132689-132700 (2026)

traffic signs yolov7 small targets attention mechanism dynamic Science
Fachzeitschrift
13

A computerized text analysis on the evolution of China’s industrial internet policies concerning SMEs
Fan Yilin ; Xu Jiahao ; Chen Bingchi
Journal of Intelligent Systems, Vol 35, Iss 1, Pp 1-13 (2026)

computerized text analys... policy evolution industrial internet smes china Science
Fachzeitschrift
14

On the Formalization of the Notion of a Concurrent Algorithm
C.A. Middelburg
Scientific Annals of Computer Science, Vol XXXVI, Iss 1, Pp 1-26 (2026)

concurrent algorithm concurrent proto-algorit... algorithmic equivalence computational equivalenc... non-determinism Electronic computers. Co...
Fachzeitschrift
15

Towards a Human-Centric Intelligent Lighting System in Expressway Tunnels: A Deep Learning Based Framework for Luminance Demand Prediction
Shunlin Liu ; Ruoyu Chen ; Chengcheng Xu ; et al.
Human-Centric Intelligent Systems, Vol 6, Iss 1, Pp 1-18 (2026)

Intelligent tunnel light... Luminance demand predict... Long short-term memory (... Attention mechanism Information technology T58.5-58.64
Fachzeitschrift
16

CTI-Thinker: an LLM-driven system for CTI knowledge graph construction and attack reasoning
Xiuzhang Yang ; Ruijie Zhong ; Yuling Chen ; et al.
Cybersecurity, Vol 9, Iss 1, Pp 1-29 (2026)

Cyber threat intelligenc... Large language model Retrieval-augmented gene... Knowledge graph Attack reasoning Computer engineering. Co...
Fachzeitschrift
17

Low-visibility adversarial sample generation method based on human visual perception
Binbin Tu ; Haoyuan Zhou ; Linfei Zhao ; et al.
Cybersecurity, Vol 9, Iss 1, Pp 1-22 (2026)

Adversarial samples Brightness awareness Energy functional Human visual system Adversarial attack Stealth
Fachzeitschrift
18

Program-plate: a method for identifying the ability to extract vulnerability features
Yifan Wang ; Yanzhi Hou ; Bin Wu
Cybersecurity, Vol 9, Iss 1, Pp 1-24 (2026)

Vulnerability detection Code cloning Machine learning Computer engineering. Co... TK7885-7895 Electronic computers. Co...
Fachzeitschrift
19

A newly image encryption scheme based on 3-D coupled map lattice and Baker map
Zhuo Liu ; Yong Wang ; Jinyuan Liu ; et al.
Cybersecurity, Vol 9, Iss 1, Pp 1-20 (2026)

Chaos cryptography Chaotic maps Image encryption Combined pixel Security analysis Computer engineering. Co...
Fachzeitschrift
20

Improved search models of boomerang distinguishers and application to LILLIPUT
Yunong Wu ; Yanyan Zhou ; Zongsheng Zhang ; et al.
Cybersecurity, Vol 9, Iss 1, Pp 1-14 (2026)

LILLIPUT cipher Boomerang attack Block cipher Automatic search Computer engineering. Co... TK7885-7895
Fachzeitschrift

Filter