Menu
Home
All Episodes
Meet the Hosts
Pricing
FAQs
Login
Sign Up
Sign Up
All Previous Episodes
Previous Episodes
Free Samples
DDoS Detection in SDN
Multi-Criteria Recommendation Systems
Cooperative Packet Recovery Protocol
GenAI Text Detectors
Javascript Package Selection
MQTT Framework
ARM vs RISC-V
REST vs GraphQL vs gRPC
Collision Avoidance
Petri-Net Concurrent System
K-Conditional Nearest Neighbors
Mixed Integer Non-Linear Programming
Conformer Based Vulnerability Detection
Kubernetes Optimization
QUIC vs TCP
Imperative Genetic Programming
Proximal Policy Optimization
Capability Maturity Model
Crime Classification
Stochastic Resetting
Latest Episodes
Improving the Fast Fourier Transform
Joint Attention System
Fairness in Federated Learning
Peanut Genotyping
Structural Contrastive Learning
Copy-Move Forgery
FPGA Accelerated SpeckleNN
Artillery in Wildfire Suppression
Video Slice Encryption
Service Function Tree Mapping
Hardware IP Protection
SWIN Vision Transformer
Trending
Copy-Move Forgery
Aerial Blight Disease
Distributed Ollama
Egyptian Stock Market
Alpha-Synuclein Knockout
Security Oriented Crawlers
FOREX prediction
Cold-Chain Vehicle Routing
Sound-Based Robot Assembly
Acoustic Temporal Alignments
Molecular Typing
Memory Leak Detection
Medicine
Fermentation of Poultry Feed
Misclassified Patients
Electroanatomic Mapping
Multimodal Imaging
Medical LLM Biases
Self-Conditioned Diffusion
Melatonin & Cannabinols
Embryo Implantation Prediction
Genomic Biobanks
Predicting Cardiovascular Aging
Pneumonia Image Classification
Diagnostic Retinopathy Diagnosis
Heterogenous Federated Learning
Forced Oscillation
Mass Spectrometry Imaging
Telerobotic Ultrasound
Predicting ACL Function
Skin Fluorescence
A.I. Driven Diagnostics
Stunting Prediction
Deterministric Graph Traversal
PCOS Prediction
Pain Relief Combinations
Rare Disease Identification
Coenzyme Q10
Epilepsy Identification
The Reliever Reliance Test
Spatial Identification for Bionic Hands
Molecular Typing
Histopathy Image Classification
Signal Averaged Electrocardiography
Automated Name Redaction
Heart Disease Detection
Aneurysm Detection
Caloric Restriction and Renal Injury
Brain-Computer Interfaces
Finger Vein Recognition
Manufacturing
Nonlinear Variation Decomposition
Digital Twins: Recent Advances
Hardware IP Protection
Neural Network Pruning Strategies
MQTT Framework
Garment Durability
Mixed Integer Non-Linear Programming
Programming Industrial Robots
Custom Dosed Tablets
Robot Control Platform
Nonlinear Variation Decomposition
Digital Twins: Recent Advances
Hardware IP Protection
Neural Network Pruning Strategies
MQTT Framework
Garment Durability
Mixed Integer Non-Linear Programming
Programming Industrial Robots
Custom Dosed Tablets
Robot Control Platform
Data Science
Flare Sensitive Clustering
Evapotranspiration Estimation
Molecular Typing
Climatological Time Series Reconstruction
RUL of Lithium Ion
Audio as Data
Bayesian Framework for Spectroscopes
Petri-Net Concurrent System
Sparse Matrix Storage Formats
Reflective Error
Trends in Data Compression
PCOS Prediction
Fusion Device Data
Earthquake Detection
Operations
Neural Network Pruning Strategies
Distribued Build Assurance
Cold-Chain Vehicle Routing
Reconstructing QR Codes
Three-State Heuristic
Mixed Integer Non-Linear Programming
Neural Network Pruning Strategies
Distribued Build Assurance
Cold-Chain Vehicle Routing
Reconstructing QR Codes
Three-State Heuristic
Mixed Integer Non-Linear Programming
Computing Hardware
ARM vs RISC-V
Deep Learning Hardware
Photonic Computing
Status Bits Encoding
FPGA/ASIC Implementation
High Performance Storage
Hardware IP Protection
ARM vs RISC-V
Deep Learning Hardware
Photonic Computing
Status Bits Encoding
FPGA/ASIC Implementation
High Performance Storage
Hardware IP Protection
Cloud Computing
CRM Lead Identification
Wavelet Based Edged Computing
Kubernetes Optimization
Proximal Policy Optimization
Location Privacy Protection
Unreliable Quantum Hardware
Energy Aware HPC
Whale Goshawk Algorithm
Dynamic VM Placement
Activity Monitoring with Distillation
Fog Node Locations
Underwater Edge Computing
Similarity Caching
Martial Aurora Detection
Multi-Objective Simulated Annealing
Cost Modeling Cloud Infrastructure
Grey Wolf Optimization
Vibe Coding Microservices
Algorithms
GPGPU FastSLAM
Three-State Heuristic
Flare Sensitive Clustering
Dynamic VM Placement
Binary Spider Wasp Optimization
K-Conditional Nearest Neighbors
Stochastic Resetting
Multi-Objective Task Scheduling
Neutrosophic Soft Information
Causal Contextual Bandits
Mixed Integer Non-Linear Programming
Barcode Detection
Five-Phase Combinatoral Approach
Enhanced Binary Kepler Optimization
Ant Lion Algorithm
Deterministric Graph Traversal
Multi-Objective Simulated Annealing
Facial Recognition
Last Mile Delivery
Atom Search Optimization
Bat Optimization
Greenhouse Robotics
ABWOA Algorithm
Petri-Net Concurrent System
Grey Wolf Optimization
Scoop Optimization Algorithm
Solid Oxide Fuel Cell
Improving the Fast Fourier Transform
Trajectory Planner
Fuzzy Analytic Hierarchy Process
Whale Goshawk Algorithm
Pharmacology
Mass Spectrometry Imaging
Custom Dosed Tablets
Light Programmable Microrobots
Pain Relief Combinations
Coenzyme Q10
Melatonin & Cannabinols
Mass Spectrometry Imaging
Custom Dosed Tablets
Light Programmable Microrobots
Pain Relief Combinations
Coenzyme Q10
Melatonin & Cannabinols
Electromagnetic Spectrum
Multi-Objective Task Scheduling
Dendritic Deep Learning
Retrial Queue
Bayesian Framework for Spectroscopes
Cotton Leaf Curl Virus
Mass Spectrometry Imaging
Bragg Peak Segmentation
Kernel Density Estimation
Photonic Computing
Internet of Paint
Full-Duplex & Short Packets
Ant Lion Algorithm
Edge Computing
Service Function Tree Mapping
Location Privacy Protection
Improving the Fast Fourier Transform
Wavelet Based Edged Computing
Fog Node Locations
Activity Monitoring with Distillation
Proximal Policy Optimization
Underwater Edge Computing
Service Function Tree Mapping
Location Privacy Protection
Improving the Fast Fourier Transform
Wavelet Based Edged Computing
Fog Node Locations
Activity Monitoring with Distillation
Proximal Policy Optimization
Underwater Edge Computing
Physics
Transfer Learning for Nuclear Fusion
Bayesian Framework for Spectroscopes
FPGA Accelerated SpeckleNN
Photonic Computing
Atom Search Optimization
Racetrack Safety Analysis
Fusion Device Data
Neutron Star Estimation
Gravitational Wave Analysis
Hadoop for Synchrotrons
Transfer Learning for Nuclear Fusion
Bayesian Framework for Spectroscopes
FPGA Accelerated SpeckleNN
Photonic Computing
Atom Search Optimization
Racetrack Safety Analysis
Fusion Device Data
Neutron Star Estimation
Gravitational Wave Analysis
Hadoop for Synchrotrons
Civil Engineering
Crisis Management
Human Trajectories
Vehicle Re-Identification
Pavement Damage Detection
Traffic Clearance System
Real-Time Fire Detection
Earthquake Detection
Crisis Management
Human Trajectories
Vehicle Re-Identification
Pavement Damage Detection
Traffic Clearance System
Real-Time Fire Detection
Earthquake Detection
Optimization
Five-Phase Combinatoral Approach
Binary Spider Wasp Optimization
Bayesian Framework for Spectroscopes
Kubernetes Optimization
Causal Contextual Bandits
Bat Optimization
MHEV for Motorbikes
Grey Wolf Optimization
Three-State Heuristic
Fog Node Locations
Dynamic VM Placement
Proximal Policy Optimization
Neutrosophic Soft Information
ABWOA Algorithm
Mixed Integer Non-Linear Programming
Environmental Science
Non-Traditional Climate Science
Sustainable Environmental Technologies
Protected Zones
Atomic Force Microscopy
Energy Aware HPC
Kernel Density Estimation
Temperature Variability on Rice
Evolutionary Game Theory
Portable Electrolysis
Life on the Edge
Climatological Time Series Reconstruction
Evapotranspiration Estimation
Deep Learning
Agentic A.I. (Autonomous Agents)
Dendritic Deep Learning
Deep Learning Hardware
Neo4j Dueling Deep Q Network
Facial Recognition
Enhanced Intrusion Detection
Extremism Detection
Structural Contrastive Learning
Transfer Learning for Nuclear Fusion
Deep Learning for Algorithmic Trading
Quotient Network
Multi-Criteria Recommendation Systems
Multimodal Scene Recognition
Barcode Detection
Real-Time Fire Detection
Potato Leaf Diseases
Network Engineering
Post Quantum TLS
REST vs GraphQL vs gRPC
MQTT Framework
ABWOA Algorithm
VLSM Subnetting
Accelerated Cold Start
Stealth Messaging with MQTT
Fast Routing Recovery
Cooperative Packet Recovery Protocol
Load Balancing in SDN
Traffic Classification in SDN
DDoS Detection in SDN
Similarity Caching
Full-Duplex & Short Packets
QUIC vs TCP
Natural Language Processing
Urban Sentiment Mapping
Tour Recommendation System
Fusion Text Representations
Emojis as Prosodic Elements
Automated Name Redaction
Vertical Web Search
Singing to Speech Conversion
Crime Classification
Extremism Detection
Sarcasm Detection
Medical LLM Biases
Urban Sentiment Mapping
Tour Recommendation System
Fusion Text Representations
Emojis as Prosodic Elements
Automated Name Redaction
Vertical Web Search
Singing to Speech Conversion
Crime Classification
Extremism Detection
Sarcasm Detection
Medical LLM Biases
Convolutional Neural Networks
Copy-Move Forgery
A.I. Driven Diagnostics
Enhanced Intrusion Detection
Traffic Sign Detection
Conformer Based Vulnerability Detection
Complex Valued Neural Networks
Extremism Detection
Emotion Recognition
Fractal Neural Networks
Regional Wind Forecasts
Copy-Move Forgery
A.I. Driven Diagnostics
Enhanced Intrusion Detection
Traffic Sign Detection
Conformer Based Vulnerability Detection
Complex Valued Neural Networks
Extremism Detection
Emotion Recognition
Fractal Neural Networks
Regional Wind Forecasts
Statistics
HLQ Cluster Analysis
Reflective Error
Garment Durability
Temperature Variability on Rice
Life on the Edge
Kernel Density Estimation
HLQ Cluster Analysis
Reflective Error
Garment Durability
Temperature Variability on Rice
Life on the Edge
Kernel Density Estimation
Databases
Sparse Matrix Storage Formats
High Performance Graph Storage
Neo4j Dueling Deep Q Network
NewSQL Databases
High Performance Storage
Skyline Queries
Sparse Matrix Storage Formats
High Performance Graph Storage
Neo4j Dueling Deep Q Network
NewSQL Databases
High Performance Storage
Skyline Queries
Temporal Analysis
Climatological Time Series Reconstruction
Temporal Graph Network
Human Trajectories
Efficiency of Apache Kafka
Earthquake Detection
Semi-Synthetic Traffic Generator
Stunting Prediction
Knowledge Graph Embedding
BackForward Bi‐LSTM
Data Assimilation
Recurrent Sigmoid Piecewise Linear Neurons
Egyptian Stock Market
Crisis Management
Multi-Density Crime Predictor
Regional Wind Forecasts
Pilot Workload Evaluation
Video Object Detection
PCOS Prediction
High-Productivity Forecasting
Spatiotemporal Traffic Forecasting
Web Development
REST vs GraphQL vs gRPC
WebAssembly Data Exchange
Passwordless Authentication
Graph Visualization Efficiency
Realtime Co-Editing with CRDTs
Javascript Package Selection
QUIC vs TCP
Security Oriented Crawlers
Similarity Caching
Cooperative Packet Recovery Protocol
REST vs GraphQL vs gRPC
WebAssembly Data Exchange
Passwordless Authentication
Graph Visualization Efficiency
Realtime Co-Editing with CRDTs
Javascript Package Selection
QUIC vs TCP
Security Oriented Crawlers
Similarity Caching
Cooperative Packet Recovery Protocol
IoT
Wavelet Based Edged Computing
Multi-Objective Simulated Annealing
Service Function Tree Mapping
Underwater Edge Computing
Fog Node Locations
Location Privacy Protection
Delay Sensitive IoT
Operating System for Microservices
Wavelet Based Edged Computing
Multi-Objective Simulated Annealing
Service Function Tree Mapping
Underwater Edge Computing
Fog Node Locations
Location Privacy Protection
Delay Sensitive IoT
Operating System for Microservices
Agriculture
Livestock Guardian Dogs
Apple Picking Robot
Aerial Blight Disease
Cotton Leaf Curl Virus
Electronic Nose
Fermentation of Poultry Feed
Smart Irrigation System
Protected Zones
Evapotranspiration Estimation
Peanut Genotyping
Livestock Guardian Dogs
Apple Picking Robot
Aerial Blight Disease
Cotton Leaf Curl Virus
Electronic Nose
Fermentation of Poultry Feed
Smart Irrigation System
Protected Zones
Evapotranspiration Estimation
Peanut Genotyping
Microservices
Proximal Policy Optimization
REST vs GraphQL vs gRPC
Operating System for Microservices
ARM vs RISC-V
Kubernetes Optimization
Akka for Smart Grids
Service Function Tree Mapping
Martial Aurora Detection
Proximal Policy Optimization
REST vs GraphQL vs gRPC
Operating System for Microservices
ARM vs RISC-V
Kubernetes Optimization
Akka for Smart Grids
Service Function Tree Mapping
Martial Aurora Detection
3D Mapping
Aneurysm Detection
Neural Radiance Fields
Delaunay Triangulation
Ostia Antica
Voxel Volumes
B-Spline Curve Fitting
Aneurysm Detection
Neural Radiance Fields
Delaunay Triangulation
Ostia Antica
Voxel Volumes
B-Spline Curve Fitting
Computer Vision
Aerial Blight Disease
Single Image Super-Resolution
Facial Recognition
Join Motion Capture
Yoga Pose Prediction
Deterministric Graph Traversal
Pneumonia Image Classification
Target Detection Algorithm
SWIN Vision Transformer
Multimodal Scene Recognition
Deterioration Detection
Finger Vein Recognition
Semantic Segmentation
Barcode Detection
Potato Leaf Diseases
Pavement Damage Detection
Reconstructing QR Codes
Joint Attention System
Intrusion Detection with Image Representation
Fingerprint Examination
Fractal Neural Networks
Spatial Identification for Bionic Hands
YOLOv10 for Conservation
Cropped Image Classification
Traffic Sign Detection
Person Re-Identification (ReID)
Selective State Models
Histopathy Image Classification
Vehicle Re-Identification
Video Object Detection
Apple Picking Robot
Cotton Leaf Curl Virus
Genetics
Alpha-Synuclein Knockout
CRISPR Frontiers
Mosquito Derived DNA
Genomic Biobanks
DNA Cryptography
Life on the Edge
Peanut Genotyping
Scorpion Toxin Processing
Alpha-Synuclein Knockout
CRISPR Frontiers
Mosquito Derived DNA
Genomic Biobanks
DNA Cryptography
Life on the Edge
Peanut Genotyping
Scorpion Toxin Processing
Security
Enhanced Intrusion Detection
Smart Contract Vulnerabilities
Scoop Optimization Algorithm
DDoS Detection in SDN
Per-File Attack Recovery
Security Oriented Crawlers
Post Quantum TLS
VLSM Subnetting
Zero Trust Defenses
Video Slice Encryption
Intrusion Detection with Image Representation
Unreliable Quantum Hardware
Conformer Based Vulnerability Detection
Padding Machines for Tor
Copy-Move Forgery
Beyond Encryption
Distribued Build Assurance
Stealth Messaging with MQTT
Passwordless Authentication
Heterogenous Federated Learning
DNA Cryptography
Transportation
BackForward Bi‐LSTM
Spatiotemporal Traffic Forecasting
MHEV for Motorbikes
Cold-Chain Vehicle Routing
Traffic Clearance System
Pilot Workload Evaluation
Vehicle Re-Identification
BackForward Bi‐LSTM
Spatiotemporal Traffic Forecasting
MHEV for Motorbikes
Cold-Chain Vehicle Routing
Traffic Clearance System
Pilot Workload Evaluation
Vehicle Re-Identification
Energy Science
Fast Routing Recovery
Solid Oxide Fuel Cell
Portable Electrolysis
Transfer Learning for Nuclear Fusion
MHEV for Motorbikes
Smart Irrigation System
Zero Trust Defenses
HITL Thermostats
Nuclear Decommissioning
Data Stream Mining
RUL of Lithium Ion
Perovskite Solar Cells
Energy Aware HPC
Autonomous Vehicles
Trajectory Planner
Take-Over Response Systems
An Open Source Vehicle
Intellgent Swarm
Collision Avoidance
Jerk Suppression
Reinforcement Learning for Autonomous Cars
Trajectory Planner
Take-Over Response Systems
An Open Source Vehicle
Intellgent Swarm
Collision Avoidance
Jerk Suppression
Reinforcement Learning for Autonomous Cars
Telecommunications
Retrial Queue
Dendritic Deep Learning
Kernel Density Estimation
Multi-Objective Task Scheduling
Full-Duplex & Short Packets
Ant Lion Algorithm
Human Trajectories
Internet of Paint
Stealth Messaging with MQTT
Retrial Queue
Dendritic Deep Learning
Kernel Density Estimation
Multi-Objective Task Scheduling
Full-Duplex & Short Packets
Ant Lion Algorithm
Human Trajectories
Internet of Paint
Stealth Messaging with MQTT
Model Training
Self-Conditioned Diffusion
Self-Exploring Robots
Stochastic Resetting
Neural Network Pruning Strategies
Semantic Segmentation
Medical LLM Biases
R-GAN for Imbalanced Datasets
Activity Monitoring with Distillation
Sparse Matrix Storage Formats
Scalable Boosting Method
Embryo Implantation Prediction
Data Leakage in ML
High-Productivity Forecasting
Fairness in Federated Learning
Enhanced Binary Kepler Optimization
Network Slimming Method
Data Amplification
Ecology
Livestock Guardian Dogs
YOLOv10 for Conservation
Scorpion Toxin Processing
Protected Zones
Mosquito Derived DNA
Voxel Volumes
Selective State Models
Evapotranspiration Estimation
Livestock Guardian Dogs
YOLOv10 for Conservation
Scorpion Toxin Processing
Protected Zones
Mosquito Derived DNA
Voxel Volumes
Selective State Models
Evapotranspiration Estimation
Distributed Systems
Data Assimilation
System Call Analyzer
Distribued Build Assurance
Intellgent Swarm
Retrial Queue
Hadoop for Synchrotrons
Efficiency of Apache Kafka
MQTT Framework
Vertical Web Search
Multi-Modal Video Search
Multi-Objective Task Scheduling
NewSQL Databases
Runtime Coordination of Robots
Akka for Smart Grids
Climate Science
Life on the Edge
Non-Traditional Climate Science
Regional Wind Forecasts
Climatological Time Series Reconstruction
Data Assimilation
Evapotranspiration Estimation
Life on the Edge
Non-Traditional Climate Science
Regional Wind Forecasts
Climatological Time Series Reconstruction
Data Assimilation
Evapotranspiration Estimation
Classification
Cropped Image Classification
Semantic Segmentation
Misclassified Patients
Traffic Classification in SDN
Histopathy Image Classification
Pneumonia Image Classification
Fuzzy Analytic Hierarchy Process
Credit Risk Prediction Engine
Fusion Text Representations
Skyline Queries
Potato Leaf Diseases
Cropped Image Classification
Semantic Segmentation
Misclassified Patients
Traffic Classification in SDN
Histopathy Image Classification
Pneumonia Image Classification
Fuzzy Analytic Hierarchy Process
Credit Risk Prediction Engine
Fusion Text Representations
Skyline Queries
Potato Leaf Diseases
Software Engineering
Code Smells
Memory Leak Detection
Javascript Package Selection
Commit Classification
Realtime Co-Editing with CRDTs
WebAssembly Data Exchange
Test Suite Reduction
Imperative Genetic Programming
Similarity Caching
Load Balancing in SDN
ChatGPT and Novice Programmers
Complex Valued Neural Networks
GPGPU FastSLAM
QUIC vs TCP
Distribued Build Assurance
Quality Aware Code Fixing
Multi-Criteria Recommendation Systems
Multi-Modal Video Search
Nanotechnology
Atomic Force Microscopy
Sound-Based Robot Assembly
Graphene Based Membranes
Light Programmable Microrobots
Wearable Nanorobots
Shape Memory Alloys
Internet of Paint
Multimodal Imaging
Atomic Force Microscopy
Sound-Based Robot Assembly
Graphene Based Membranes
Light Programmable Microrobots
Wearable Nanorobots
Shape Memory Alloys
Internet of Paint
Multimodal Imaging
Robotics
Shape Memory Alloys
Wearable Nanorobots
FPGA Escalator
Search and Rescue Robots
Runtime Coordination of Robots
Apple Picking Robot
Programming Industrial Robots
Agentic Workflows for Robots
Agentic A.I. (Autonomous Agents)
Greenhouse Robotics
Robot Control Platform
Spatial Identification for Bionic Hands
Sound-Based Robot Assembly
Self-Exploring Robots
Joint Attention System
Nuclear Decommissioning
Electronic Nose
Large Language Models
ChatGPT and Novice Programmers
Self-Exploring Robots
Distributed Ollama
GenAI Text Detectors
Sociolinguistic Foundations of LLMs
LLM for Phase Diagrams
Agentic Workflows for Robots
Robot Control Platform
LLMs in Scientific Facilities
ChatGPT and Novice Programmers
Self-Exploring Robots
Distributed Ollama
GenAI Text Detectors
Sociolinguistic Foundations of LLMs
LLM for Phase Diagrams
Agentic Workflows for Robots
Robot Control Platform
LLMs in Scientific Facilities
Forgotten Gems
Kubernetes Optimization
Ostia Antica
Proximal Policy Optimization
Take-Over Response Systems
REST vs GraphQL vs gRPC
Evapotranspiration Estimation
Avatar Customization
Stunting Prediction
Passwordless Authentication
Cotton Leaf Curl Virus
Robot Control Platform
Conformer Based Vulnerability Detection