Search Constraints
« Previous |
1 - 50 of 1,628
|
Next »
Number of results to display per page
Search Results
Select an image to start the slideshow
APPENDIX D: Topic Network Maps for a Random 10k Documents & the Complete CORD-19 Dataset
1 of 50
APPENDIX C: Non-Coronaviridae Topic Network Maps [HIV, ZIKA, H1N1, EBOLA]
2 of 50
APPENDIX B: Coronaviridae Topic Network Maps [SARS, MERS, COVID-19]
3 of 50
A Dataset of Roman Fish-Salting and Fulling Workshops
4 of 50

Synchrony
5 of 50
Data on Special Education Voucher use in OH, GA and FLA and information on loss of Least Restrictive Environment Civil Rights
6 of 50
CAM The Workshop: All Things Being Equal: A Place to Call Home (Africa-America)
7 of 50
README - Examining the Substance of Bone through a Meta-Analysis of Academic Texts
8 of 50
Initial Steps on a Digital Preservation Policy
9 of 50
Principles and Practice for Accessible Digitization
10 of 50
UC Data Day 2020 Presentations
11 of 50

COVID 19 literature NLP models – Viral outbreak topic tuning
12 of 50

COVID 19 literature NLP models – Viral outbreak models formatted
13 of 50
COVID 19 literature NLP models - Viral outbreak model centrality files
14 of 50
Impacts of largescale electric vehicle deployment on Cincinnati ambient air quality
15 of 50
Determining the extent of lateral dispersion in the Ohio River: Combs-Hehl Bridge to the Little Miami River confulence (Ohio River miles 461.9 to 463.3)
16 of 50
Full Data Set - Proposal for the establishment of a National Service Learning Academy and complimentary Action Research Program at the University of Cincinnati
17 of 50

Proposal for the establishment of a National Service Learning Academy and complimentary Action Research Program at the University of Cincinnati
18 of 50
Promoting your Research and Research Impact
19 of 50
Publishing Data in Repositories
20 of 50

How the UK Can Lead in 5G and 6G Security and Standards
21 of 50

List of Articles used to Generate Archaeology/Bone Topic Models
22 of 50

Topic Models of Archaeology Articles referencing 'Bone'
23 of 50
Understanding Open Access and Open Data
24 of 50
Getting Published - Publishers Panel
25 of 50
EMS LAW – Legal Lessons Learned & Best Practices (Third Edition)
26 of 50
WORKING DRAFT - 5G and International Security: How the UK can Lead the Way
27 of 50
Does the One-China policy shape the People’s Republic of China’s foreign policy?: Soft, sharp, and hard power
28 of 50
Handling IP and Data in Grants
29 of 50
Interdisciplinary Capstone: Bringing Dialogue in the Dark to Cincinnati
30 of 50
Establishing a comprehensive census of undergraduate economics curricula: Foundational and special requirements for major programs in the U.S.
31 of 50

Promotion of food allergy by the unfolded protein response (preprint)
32 of 50
IoT Emergency Detection Devices
33 of 50
Securing A Small Office Home Office Network: Integrating A Supervised Neural Network Algorithm
34 of 50
Implementation of a hybrid machine learning technique for network intrusion detection
35 of 50
Crime Hot Spots: Proposing a new model for appropriate identification of crime hot spots
36 of 50
Scraping The Deep Web: A 3-Dimensional Framework For Cyber-Threat Intelligence
37 of 50
Relative Importance of Blockchain in Health Care: Enhancing data sharing and mitigating cyber security crimes
38 of 50

A methodology for cyberthreat ranking
39 of 50
Application of Autoencoder Duets in Anomaly and Intrusion Detection
40 of 50
Explaining the Relationship between Internet and Democracy in Partly Free Countries Using Machine Learning Models
41 of 50
Social Networks of Technology Caregivers and Caregivees
42 of 50
A Community-based Approach to Co-Managing Privacy and Security in Smart Homes
43 of 50
Smart Home Repos: Taking Data from Devices
44 of 50
Understanding Decision-Making Needs of Open Government Data Users
45 of 50

Intrusion Detection System in Smart Home Network Using Artificial Immune System and Extreme Learning Machine Hybrid Approach
46 of 50
Enhancing Physical and Cyber Security of Smart Homes using Co-Monitoring of IoT Devices
47 of 50
Integrating NIST Framework into FAIR model for Quantitative Risk Assessment of Cyber Threats
48 of 50
Finding Actionable Information on Social Media
49 of 50
PREDICTION AND DETECTION OF DEPRESSION USING FOREST TREE ALGORITHM
50 of 50