Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
6841
Effectiveness of Mobile Health–Based Gamification Interventions for Improving Physical Activity in Individuals With Cardiovascular Diseases: Systematic Review and Meta-Analysis of...
Published 2025-01-01“…Statistical analyses were conducted using R (version 4.3.2; R Foundation for Statistical Computing). ResultsIn total, 6 randomized controlled trials were included. …”
Get full text
Article -
6842
Comparing Deep Learning models for mapping rice cultivation area in Bhutan using high-resolution satellite imagery
Published 2025-01-01“…Two Deep Learning approaches, point-based (DNN) and patch-based (U-Net), models were used in conjunction with cloud-computing platforms. Four different models per Deep Learning approaches (DNN and U-Net) were trained: (1) Red, Green, Blue, and Near-Infrared (RGBN) channels from Planet, (2) RGBN and Elevation data (RGBNE), (3) RGBN and Sentinel-1 data (RGBNS), and (4) RGBN with Elevation and Sentinel-1 data (RGBNES). …”
Get full text
Article -
6843
ZSM-Based E2E Security Slice Management for DDoS Attack Protection in MEC-Enabled V2X Environments
Published 2024-01-01“…Research on vehicle-to-everything (V2X) is attracting significant attention nowadays, driven by the recent advances in beyond-5G (B5G) networks and the multi-access edge computing (MEC) paradigm. However, the inherent heterogeneity of B5G combined with the security vulnerabilities of MEC infrastructure in dynamic V2X scenarios introduces unprecedented challenges. …”
Get full text
Article -
6844
Teknologi Irigasi Cerdas pada Sistem Irigasi Drip dengan Algoritma Ant Colony Optimization
Published 2022-12-01“…At the same time, the development of computing technology has entered various areas of life, including agriculture. …”
Get full text
Article -
6845
-
6846
Expedited Colorectal Cancer Detection Through a Dexterous Hybrid CADx System With Enhanced Image Processing and Augmented Polyp Visualization
Published 2025-01-01“…While the ensemble model presents highly improved performance, this computationally and dataset-specific performance requirement suggests further optimization and validation for larger clinical applicability.…”
Get full text
Article -
6847
-
6848
-
6849
Going, going, gone: Landscape drying reduces wetland function across the American West
Published 2025-02-01“…To improve our understanding of rapid ecosystem change, we reconstructed monthly wetland surface water hydrology in the western U.S. from 1984 to 2023 using cloud computing and ∼ 150,000 satellite images to measure shifts in the timing and duration of inundations. …”
Get full text
Article -
6850
Attention to Monkeypox: An Interpretable Monkeypox Detection Technique Using Attention Mechanism
Published 2024-01-01“…Therefore, the development of optimized deep learning models that are both resource-efficient for edge computing and highly accurate becomes imperative. To this end, an attention-based MobileNetV2 model for monkeypox detection, capitalizing on the inherent lightweight design of MobileNetV2 for effective deployment on edge devices, is proposed. …”
Get full text
Article -
6851
Prevalence of Preoperative Anxiety and Associated Factors Among Surgical Patients: Systematic Review and Meta-Analysis in Ethiopia
Published 2025-02-01“…STATA version 17 was used for analysis, and the odds ratios of the outcome variable were determined using the random-effects model. Computing values assessed heterogeneity among the studies for I 2 and P -values. …”
Get full text
Article -
6852
Evaluating cutinase from Fusarium oxysporum as a biocatalyst for the degradation of nine synthetic polymer
Published 2025-01-01Get full text
Article -
6853
Measurement-Based Prediction of mmWave Channel Parameters Using Deep Learning and Point Cloud
Published 2024-01-01Get full text
Article -
6854
Rancang Bangun Purwarupa Pemilah Sampah Pintar Berbasis Deep Learning
Published 2022-06-01“…In addition, this research use the Raspberry Pi as a microcontroller, the Raspberry Pi camera module which is used to take pictures, and the Intel Movidius Neural Compute Stick (NCS) to speed up the computing process so that the identification process is easier. …”
Get full text
Article -
6855
Compensatory increase in oxygen extraction fraction is associated with age-related cerebrovascular disease
Published 2025-01-01Get full text
Article -
6856
Influenza Immunization in Very-Low-Birth-Weight Infants: Epidemiology and Long-Term Outcomes
Published 2025-01-01Get full text
Article -
6857
-
6858
Efficacy and Safety of Non-Vitamin K Anticoagulants for Atrial Fibrillation in Relation to Different Renal Function Levels: A Network Meta-Analysis
Published 2020-01-01“…NMA was analyzed with R (version 3.5.1, R Foundation for Statistical Computing) with the packages gemtc recalling JAGS (version 4.3.0) for the efficacy and safety of each drug with regard to different levels of renal function. …”
Get full text
Article -
6859
Cyberinfrastructure for machine learning applications in agriculture: experiences, analysis, and vision
Published 2025-01-01“…IntroductionAdvancements in machine learning (ML) algorithms that make predictions from data without being explicitly programmed and the increased computational speeds of graphics processing units (GPUs) over the last decade have led to remarkable progress in the capabilities of ML. …”
Get full text
Article -
6860