Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
6561
From relaxed beliefs under psychedelics (REBUS) to revised beliefs after psychedelics (REBAS)
Published 2025-01-01Get full text
Article -
6562
-
6563
A 40-year remote sensing analysis of spatiotemporal temperature and rainfall patterns in Senegal
Published 2025-02-01“…This occurs at a time of rapid growth in Earth observations (EO) data, methodologies, and computational capabilities, which could potentially augment studies in data-scarce regions. …”
Get full text
Article -
6564
-
6565
-
6566
-
6567
Ad Click Fraud Detection Using Machine Learning and Deep Learning Algorithms
Published 2025-01-01Get full text
Article -
6568
-
6569
Evaluating Machine Unlearning: Applications, Approaches, and Accuracy
Published 2025-01-01“…ABSTRACT Machine learning (ML) enables computers to learn from experience by identifying patterns and trends. …”
Get full text
Article -
6570
Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls
Published 2024-01-01“…Prospects of cloud computing as a technology that optimizes resources, reduces complexity, and provides cost-effective solutions to its consumers are well established. …”
Get full text
Article -
6571
Location Information-Based Routing Protocol for Energy Harvesting Cognitive Radio Wireless Sensor Network
Published 2025-01-01Get full text
Article -
6572
An Efficient Third-Order Full-Discretization Method for Prediction of Regenerative Chatter Stability in Milling
Published 2020-01-01“…The feature of accurate computing makes the proposed NI-HI-3rdFDM more adaptable to a dynamic milling scenario, in which a computationally efficient and accurate chatter stability method is required.…”
Get full text
Article -
6573
‘The Apex of Hipster XML GeekDOM’
Published 2011-06-01“…As an interdiscipline, humanities computing has always well-understood its methodologies; indeed, the digital humanities (of which digital literary studies is a part), more generally, have made a virtue of the way in which they render explicit and tangible the theoretical models that govern the representative and analytical endeavour of their fields via computational application. …”
Get full text
Article -
6574
Fueling the development of elderly care services in China with digital technology: A provincial panel data analysis
Published 2025-02-01“…Objective: This study aims to investigate the transformative potential of digital technology, which includes innovations such as e-commerce, cloud computing, and artificial intelligence, on elderly care cervices in China. …”
Get full text
Article -
6575
Improved Binary Grey Wolf Optimization Approaches for Feature Selection Optimization
Published 2025-01-01“…Finally, the results revealed that the best approach in terms of classification accuracy, fitness value, and number of selected features had the highest computational complexity.…”
Get full text
Article -
6576
Identification of a Robust Five-Gene Risk Model in Prostate Cancer: A Robust Likelihood-Based Survival Analysis
Published 2020-01-01“…FAM72D, ARHGAP33, TACR2, PLEK2, and FA2H were identified as independent prognosis factors in prostate cancer patients. We built the computing model as follows: CMU5 risk score = 1.158∗FAM72D + 1.737∗ARHGAP33 − 0.737∗TACR2 − 0.651∗PLEK2 − 0.793∗FA2H. …”
Get full text
Article -
6577
Exploring the Orca Predation Algorithm for Economic Dispatch Optimization in Power Systems
Published 2024-09-01“…Although Orca Predation Algorithm demonstrates greater performance, it necessitates extended computing time, which future research could mitigate by exploring parallelization or hybrid methodologies. …”
Get full text
Article -
6578
Everyday Activities for Children with Mitochondrial Disorder: A Retrospective Chart Review
Published 2018-01-01“…Seventeen patient records, presenting notes on capacities and performed activities, showed an overview of everyday activities that covered the categories: self-care, house chores, therapy, school, computing, hobby, play, sports, and mobility/transport. …”
Get full text
Article -
6579
SDES-YOLO: A high-precision and lightweight model for fall detection in complex environments
Published 2025-01-01“…With only 2.9M parameters and 7.2 GFLOPs of computation, SDES-YOLO achieves an mAP@0.5 of 85.1%, representing a 3.41% improvement over YOLOv8n, while reducing parameter count and computation by 1.33% and 11.11%, respectively. …”
Get full text
Article -
6580
Development and validation of a tool for advising primiparous women during early labour: study protocol for the GebStart Study
Published 2022-06-01“…Internal consistency of the tool will be assessed using Cronbach’s alpha and convergent validity computing correlations of items of the tool with the German versions of the Childbirth Self-Efficacy Inventory and the Cambridge-Worry Scale. …”
Get full text
Article