Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
9461
Sub-nanometer depth resolution and single dopant visualization achieved by tilt-coupled multislice electron ptychography
Published 2025-01-01“…This approach can be implemented on widely available transmission electron microscopes equipped with hybrid pixel detectors, with data processing achievable using high-performance computing systems.…”
Get full text
Article -
9462
-
9463
Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays
Published 2025-01-01“…Convolutional neural networks (CNNs) are increasingly recognized as an important and potent artificial intelligence approach, widely employed in many computer vision applications, such as facial recognition. …”
Get full text
Article -
9464
Novel Intuitionistic Fuzzy Fault Tree Analysis for Effective Infectious Medical Waste Management
Published 2025-04-01“…The paper proposes an intuitionistic fuzzy fault tree analysis (FFTA) method that quantifies data uncertainty through trapezoidal intuitionistic fuzzy numbers (TrIFN) while novel arithmetic operations are applied for computing the top incident failure possibility. To develop these novel operations, the weakest t-norm is applied to detract the accumulating circumstances of fuzziness, while Algebraic t-norm and t-conorm are used to estimate membership and non-membership degrees, respectively, of top event failure possibility in terms of trapezoidal intuitionistic fuzzy numbers (TrIFN). …”
Get full text
Article -
9465
-
9466
-
9467
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01“…This PQC algorithm is designed to withstand the decryption capabilities of quantum computers, thus providing long-term security. To further bolster security, the encryption key of the PQC algorithm is protected using Physically Unclonable Function (PUF) technology. …”
Get full text
Article -
9468
-
9469
PGMweb: an online tool for visualizing the X-ray beam path through plane grating monochromators
Published 2025-01-01“…We present here a newly developed software tool (called PGMweb) for computing and simulating the X-ray beam path through a plane grating monochromator (PGM), a key component in soft X-ray beamlines at modern synchrotron and free-electron laser facilities. …”
Get full text
Article -
9470
Automatic priority analysis of emergency response systems using internet of things (IoT) and machine learning (ML)
Published 2025-03-01“…The system provides dynamic visualisation and real-time tracking of emergency scenarios through the integration of geographical information systems (GIS) and the utilisation of cloud computing resources. This framework not only improves immediate response capabilities but also aids in strategic planning by providing actionable insights into potential future events. …”
Get full text
Article -
9471
-
9472
-
9473
PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping
Published 2025-01-01Get full text
Article -
9474
-
9475
Real-world clinical validation of the Qatar pre-diabetes risk score: a cross-sectional study
Published 2024-04-01“…Negative predictive value, positive predictive value, sensitivity and specificity of PRISQ were computed.Results Of the 1021 participants, 797 agreed to provide blood. …”
Get full text
Article -
9476
Author Correction: Systematic protein-protein interaction mapping for clinically relevant human GPCRs
Published 2025-01-01Get full text
Article -
9477
Visual impairment prevention by early detection of diabetic retinopathy based on stacked auto-encoder
Published 2025-01-01“…Traditional diagnosis methods are prone to human error, necessitating accurate alternatives. While various computer-aided systems have been developed to assist in DR detection, there remains a need for accurate and efficient methods to classify its stages. …”
Get full text
Article -
9478
Male involvement in prevention of mother-to-child transmission of HIV, and its association with knowledge and residence in Ethiopia: a systematic review and meta-analysis
Published 2024-09-01“…Heterogeneity among the reported prevalence was assessed by computing values for c2, I2, and p-values. Random effects-model was applied to estimate the pooled effect. …”
Get full text
Article -
9479
Assembly-free reads accurate identification (AFRAID) approach outperforms other methods of DNA barcoding in the walnut family (Juglandaceae)
Published 2025-01-01“…AFRAID accurately identified species for all samples tested after 500,000 clean reads, with far less computing time than common approaches. These results provide a new approach to accurately identify species, overcoming limitations of traditional DNA barcodes. …”
Get full text
Article -
9480