Showing Results for
From:PeerJ Computer Science (Vol. 7) Peer-ReviewedWhile the publication of Linked Data has become increasingly common, the process tends to be a relatively complicated and heavy-weight one. Linked Data is typically published by centralized entities in the form of...
From:PeerJ Computer Science (Vol. 7) Peer-ReviewedFrequently used items mining is a significant subject of data mining studies. In the last ten years, due to innovative development, the quantity of data has grown exponentially. For frequent Itemset (FIs) mining...
From:PeerJ Computer Science (Vol. 7) Peer-ReviewedIn cryptosystems and cryptographic modules, insufficient entropy of the noise sources that serve as the input into random number generator (RNG) may cause serious damage, such as compromising private keys. Therefore, it...
From:PeerJ Computer Science (Vol. 7) Peer-ReviewedThis article presents an approach to solve the inverse kinematics of cooperative mobile manipulators for coordinate manipulation tasks. A self-adaptive differential evolution algorithm is used to solve the inverse...
Choose how you want to be alerted when new results for your search become available.
Subscribe to Gale's RSS feed to get content delivered to your favorite RSS aggregator. Copy and paste the URL below into your reader:
Tell us where to send the alert and how often you want to receive it