Search Constraints
Filtering by:
Type of Work
Article
Remove constraint Type of Work: Article
Language
English
Remove constraint Language: English
Publisher
University of Cincinnati
Remove constraint Publisher: University of Cincinnati
« Previous |
1 - 50 of 108
|
Next »
Number of results to display per page
Search Results
Select an image to start the slideshow
The Unspoken Arms Race: Neurowarfare
1 of 50
Architecture and Sculpture in Cincinnati
2 of 50
Great Kitchens of Cincinnati
3 of 50
Frank Lloyd Wright's Scandals
4 of 50
John deKoven Hill and the Corbett House
5 of 50
Crosley Tower
6 of 50

Frank Lloyd Wright in Cincinnati
7 of 50
Crosley Tower
8 of 50
Boswell House
9 of 50
Common Objects
10 of 50
Does the One-China policy shape the People’s Republic of China’s foreign policy?: Soft, sharp, and hard power
11 of 50
Securing A Small Office Home Office Network: Integrating A Supervised Neural Network Algorithm
12 of 50
Implementation of a hybrid machine learning technique for network intrusion detection
13 of 50
Crime Hot Spots: Proposing a new model for appropriate identification of crime hot spots
14 of 50
Scraping The Deep Web: A 3-Dimensional Framework For Cyber-Threat Intelligence
15 of 50
Relative Importance of Blockchain in Health Care: Enhancing data sharing and mitigating cyber security crimes
16 of 50
Application of Autoencoder Duets in Anomaly and Intrusion Detection
17 of 50
Explaining the Relationship between Internet and Democracy in Partly Free Countries Using Machine Learning Models
18 of 50
Social Networks of Technology Caregivers and Caregivees
19 of 50
A Community-based Approach to Co-Managing Privacy and Security in Smart Homes
20 of 50
Smart Home Repos: Taking Data from Devices
21 of 50
Understanding Decision-Making Needs of Open Government Data Users
22 of 50

Intrusion Detection System in Smart Home Network Using Artificial Immune System and Extreme Learning Machine Hybrid Approach
23 of 50
Enhancing Physical and Cyber Security of Smart Homes using Co-Monitoring of IoT Devices
24 of 50
Integrating NIST Framework into FAIR model for Quantitative Risk Assessment of Cyber Threats
25 of 50
Finding Actionable Information on Social Media
26 of 50
PREDICTION AND DETECTION OF DEPRESSION USING FOREST TREE ALGORITHM
27 of 50
A LOOK AT EDGELESS HYBRID-CLOUD INFRASTRUCTURE – AN OPTIMIZED SOLUTION FOR MULTI-SITE BACKUP, DISASTER RECOVERY AND HIGH AVAILABILITY
28 of 50
Predicting Future Shooting Crime Locations Using Principles of Data Analytics (SHOPS)
29 of 50
Minimal Criteria: Minimizing User Input and User Interface for Faster Output in Minimalistic Mobile Applications
30 of 50
OPTIMIZING PATIENT-CENTERED MOBILE APPLICATIONS USING DATA MINING TECHNIQUES
31 of 50
Tilt Brush: The Utilization of a Virtual Reality Intervention for Evaluating Self-Reported Anxiety, Depression, & Stress
32 of 50

An Overview of the next phase of Virtualization
33 of 50

Proposal of a Time Theory
34 of 50
A Process Mining Approach to Improving Defect Detection of SysML Models
35 of 50
An Extended Comment on the Analysis of Risk-‐Sensitive Foraging Among the Aché of Paraguay and a Brief Reply to Codding et al.
36 of 50
Virtual Reality in Healthcare
37 of 50
Challenges in Intelligent Applications development
38 of 50
How We Got to the Same Place (Almost): the Universality of the Music Called "Jazz"
39 of 50
On the Substance of Absence: Filling the Historical Void
40 of 50
The Pulse of a Nation: A Study on the Cybersecurity Issues Plaguing the Healthcare Industry
41 of 50
Developing Standardized Guidelines for Medical Virtual Reality Training
42 of 50
Design 3.0 - Open, Deep, Big: a New Design Paradigm for the Next Generation of Design Research, Practice, and Education
43 of 50
Design and U.S. Military: Educating Special Operation for a Complex World
44 of 50
We're Here For the Humans
45 of 50
A Study on the Entrepreneurial Path of Design-led Startups in Taiwan
46 of 50
Creating Breakthrough Products in a Public Policy Classroom
47 of 50
Cyber Threats and Security for Small Business
48 of 50
An Interdisciplinary Exploration of an Analog Tool to Elicit Socio-Cultural Narratives
49 of 50
What is worth doing in design research?
50 of 50
- « Previous
- Next »
- 1
- 2
- 3