Suggested Topics within your search.
Suggested Topics within your search.
- Computer science 3
- Application software 1
- Automata 1
- Automatic speech recognition 1
- Coding and Information Theory 1
- Coding theory 1
- Computer access points 1
- Development 1
- Digital techniques 1
- Enterprise application integration (Computer systems) 1
- Government policy 1
- Graphical user interfaces (Computer systems) 1
- Human-computer interaction 1
- Human-machine systems 1
- Information theory 1
- Interactive computer systems 1
- Java (Computer program language) 1
- Management information systems 1
- Mathematics 1
- Moral and ethical aspects 1
- Natural language processing (Computer science) 1
- Object-oriented programming (Computer science) 1
- Prevention 1
- Programming Languages, Compilers, Interpreters 1
- Programming languages (Electronic computers) 1
- Psychological aspects 1
- Psychology 1
- Scripting languages (Computer science) 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
-
661
An adaptive neuro-fuzzy inference system for multinomial malware classification
Published 2025-02-01Get full text
Article -
662
-
663
Evaluating the Cassandra NoSQL Database Approach for Genomic Data Persistency
Published 2015-01-01Get full text
Article -
664
Large Language Models as Evaluators in Education: Verification of Feedback Consistency and Accuracy
Published 2025-01-01Get full text
Article -
665
Real-Time Fall Risk Assessment Using Functional Reach Test
Published 2017-01-01Get full text
Article -
666
Improved Coupled Tensor Factorization with Its Applications in Health Data Analysis
Published 2019-01-01Get full text
Article -
667
Smartphone image dataset for radish plant leaf disease classification from BangladeshMendeley Data
Published 2025-02-01Get full text
Article -
668
Research on Lung Nodule Detection Based on Improved Target Detection Network
Published 2020-01-01Get full text
Article -
669
Towards Utilization of Neurofuzzy Systems for Taxonomic Identification Using Psittacines as a Case Study
Published 2016-01-01Get full text
Article -
670
-
671
-
672
-
673
-
674
Dependability and Security for Wireless Ad Hoc and Sensor Networks and Their Applications
Published 2013-07-01Get full text
Article -
675
Self-similar random fractal measures using contraction method in probabilistic metric spaces
Published 2003-01-01Get full text
Article -
676
Code Parameter Summarization Based on Transformer and Fusion Strategy
Published 2024-01-01Get full text
Article -
677
-
678
AFT-SAM: Adaptive Fusion Transformer with a Sparse Attention Mechanism for Audio–Visual Speech Recognition
Published 2024-12-01Get full text
Article -
679
Because Follower Experience Matters: The Continuance Intention to Follow Recommendation of the Influencer
Published 2022-01-01Get full text
Article -
680
A deep learning method for bias correction of wind field in the South China Sea
Published 2025-01-01Get full text
Article