Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
8761
Graphon Neural Networks-Based Detection of False Data Injection Attacks in Dynamic Spatio-Temporal Power Systems
Published 2025-01-01“…This allows to leverage the learning by transference on the graphs to address the computational complexity and environmental concerns of training on large-scale systems, and the dynamicity resulting from the spatio-temporal evolution of power systems. …”
Get full text
Article -
8762
-
8763
-
8764
Predicting wind power using LSTM, Transformer, and other techniques
Published 2024-12-01Get full text
Article -
8765
Real-Time Adaptive Content-Based Synchronization of Multimedia Streams
Published 2011-01-01Get full text
Article -
8766
-
8767
An Inductive Link-Based Wireless Power Transfer System for Biomedical Applications
Published 2012-01-01Get full text
Article -
8768
Mathematical Modeling and Optimal Control Strategy for a Discrete Time Drug Consumption Model
Published 2020-01-01Get full text
Article -
8769
-
8770
Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems
Published 2015-01-01“…Presently, the processing time and performance of intrusion detection systems are of great importance due to the increased speed of traffic data networks and a growing number of attacks on networks and computers. Several approaches have been proposed to address this issue, including hybridizing with several algorithms. …”
Get full text
Article -
8771
Gender and Handedness Prediction from Offline Handwriting Using Convolutional Neural Networks
Published 2018-01-01Get full text
Article -
8772
Heavy and Lightweight Deep Learning Models for Semantic Segmentation: A Survey
Published 2025-01-01“…Semantic segmentation is an important computer vision task due to its numerous real-world applications such as autonomous driving, video surveillance, medical image analysis, robotics, augmented reality, among others, and its popularity increased with the development of deep learning approaches. …”
Get full text
Article -
8773
Open-world barely-supervised learning via augmented pseudo labels
Published 2024-10-01Get full text
Article -
8774
-
8775
Measuring the Inferential Values of Relations in Knowledge Graphs
Published 2024-12-01Get full text
Article -
8776
A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods
Published 2014-01-01Get full text
Article -
8777
Automatic Segmentation of Ischemic Stroke Lesions in CT Perfusion Maps Using Deep Learning Networks
Published 2024-09-01“…The current standard approach for segmenting ischemic stroke lesions is based on thresholding of computed tomography perfusion (CTP) maps. However, this detection approach is inaccurate (the dice similarity coefficient is around 68%). …”
Get full text
Article -
8778
Effect of physical activity on structural asymmetry of mouse hippocampus
Published 2019-01-01Get full text
Article -
8779
Massive Scrotal Hematoma due to Ruptured Anastomotic Pseudoaneurysm in a Patient with Aortobifemoral Bypass Surgery: CTA Evaluation
Published 2019-01-01“…Ultrasound evaluation revealed a massive scrotal hematoma. Computed tomography angiography (CTA) was conducted, confirming the aortobifemoral graft existence and revealing bilateral anastomotic pseudoaneurysms with the left one being ruptured, resulting in extension of the hematoma to the left femoro-inguinal region and the scrotum. …”
Get full text
Article -
8780
Hybrid Movie Recommendation System With User Partitioning and Log Likelihood Content Comparison
Published 2025-01-01“…The Alternating Least Squares (ALS) method, in particular, stands out for its ability to process data in parallel, thereby enhancing computational efficiency. However, when dealing with an original rating matrix, the ALS method may inadvertently sacrifice some information, leading to increased error rates. …”
Get full text
Article