Found: 12
Select item for more details and to access through your institution.
Exploring the Impact of Vocabulary Techniques on Code Completion: A Comparative Approach.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2024, v. 34, n. 5, p. 705, doi. 10.1142/S0218194023500687
- By:
- Publication type:
- Article
Exploring the Impact of Balanced and Imbalanced Learning in Source Code Suggestion.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2022, v. 32, n. 10, p. 1499, doi. 10.1142/S0218194022500589
- By:
- Publication type:
- Article
Global Sensitivity Analysis for Fuzzy RDF Data.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2021, v. 31, n. 8, p. 1119, doi. 10.1142/S0218194021500352
- By:
- Publication type:
- Article
AN INVESTIGATION OF THE SOCIO-CULTURAL CONSTRAINTS IN GENDER MAINSTREAMING IN FOOD SECURITY AT HOUSEHOLD LEVEL IN RURAL PUNJAB, PAKISTAN.
- Published in:
- Journal of Agricultural Research (03681157), 2019, v. 57, n. 2, p. 135
- By:
- Publication type:
- Article
ROLE OF RURAL WOMEN IN AGRICULTURAL ACTIVITIES AND HOUSEHOLD FOOD SECURITY: A CASE STUDY IN FAISALABAD DISTRICT.
- Published in:
- Journal of Agricultural Research (03681157), 2017, v. 55, n. 3, p. 585
- By:
- Publication type:
- Article
TRAINING NEED ASSESSMENT OF RURAL WOMEN IN LIVESTOCK MANAGEMENT - CASE OF SOUTHERN PUNJAB, PAKISTAN.
- Published in:
- Journal of Agricultural Research (03681157), 2013, v. 51, n. 1, p. 99
- By:
- Publication type:
- Article
Molecular characterization of lumpy skin disease virus (LSDV) emerged in Bangladesh reveals unique genetic features compared to contemporary field strains.
- Published in:
- BMC Veterinary Research, 2021, v. 17, n. 1, p. 1, doi. 10.1186/s12917-021-02751-x
- By:
- Publication type:
- Article
ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 6, p. 7876, doi. 10.1007/s11227-023-05764-5
- By:
- Publication type:
- Article
Generating realistic IoT-based IDS dataset centred on fuzzy qualitative modelling for cyber-physical systems.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2020, v. 56, n. 9, p. 441, doi. 10.1049/el.2019.4158
- By:
- Publication type:
- Article
Generating realistic IoT‐based IDS dataset centred on fuzzy qualitative modelling for cyber‐physical systems.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2020, v. 56, n. 9, p. 441, doi. 10.1049/el.2019.4158
- By:
- Publication type:
- Article
Efficient behaviour specification and bidirectional gated recurrent units-based intrusion detection method for industrial control systems.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2020, v. 56, n. 1, p. 27, doi. 10.1049/el.2019.3008
- By:
- Publication type:
- Article
Efficient behaviour specification and bidirectional gated recurrent units‐based intrusion detection method for industrial control systems.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2020, v. 56, n. 2, p. 27, doi. 10.1049/el.2019.3008
- By:
- Publication type:
- Article