Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
11021
-
11022
Diagnosis of Intra-Abdominal Extralobar Pulmonary Sequestration by means of Ultrasound in a Neonate
Published 2013-01-01Get full text
Article -
11023
-
11024
Projection Analysis Optimization for Human Transition Motion Estimation
Published 2019-01-01Get full text
Article -
11025
P-LEACH: An Efficient Cluster-Based Technique to Track Mobile Sinks in Wireless Sensor Networks
Published 2014-09-01Get full text
Article -
11026
Event-Based Nonfragile H∞ Filter Design for Networked Control Systems with Interval Time-Varying Delay
Published 2018-01-01Get full text
Article -
11027
Bandlimited Frequency-Constrained Iterative Methods
Published 2025-01-01“…Variable aperture sampling reconstruction matrices have a history of being computationally intensive due to the need to compute a full matrix inverse. …”
Get full text
Article -
11028
Predicting Students’ Final Performance Using Artificial Neural Networks
Published 2022-12-01Get full text
Article -
11029
A model-free method to learn multiple skills in parallel on modular robots
Published 2024-07-01Get full text
Article -
11030
Dynamic Multidrug Therapies for HIV: Optimal and STI Control Approaches
Published 2004-06-01Get full text
Article -
11031
A Transformer-Based Model for Abnormal Activity Recognition
Published 2024-04-01“…Considering recent advances in artificial intelligence, particularly deep learning, this paper introduces a model based on the Transformer network. To reduce computational complexity, keypoints of the human body are utilized in this approach. …”
Get full text
Article -
11032
Advanced Techniques and Antenna Design for Pulse Shaping in UWB Cognitive Radio
Published 2012-01-01Get full text
Article -
11033
SviaB: Secure and verifiable multi‐instance iris remote authentication using blockchain
Published 2022-01-01“…However, most of the existing privacy‐preserving biometric authentication systems using HE assume that the server performs computations honestly. In a malicious server setting, the server may return an arbitrary result to save computational resources, resulting in a false accept/reject. …”
Get full text
Article -
11034
3D Self-Deployment Algorithm in Mobile Wireless Sensor Networks
Published 2015-04-01Get full text
Article -
11035
Traffic Flow Prediction Based on Multi-Spatiotemporal Attention Gated Graph Convolution Network
Published 2022-01-01“…Such research routines have high computational cost and few attentions on impaction of different time and nodes. …”
Get full text
Article -
11036
AIVariant: a deep learning-based somatic variant detector for highly contaminated tumor samples
Published 2023-08-01Get full text
Article -
11037
-
11038
A Green AI Methodology Based on Persistent Homology for Compressing BERT
Published 2025-01-01“…However, they come with substantial computational and memory costs. Additionally, they are essentially black-box models, being challenging to explain and interpret. …”
Get full text
Article -
11039
Image Quality Assessments by Leveraging Diverse Visual Tasks
Published 2025-01-01“…Image quality assessment (IQA) is a fundamental task in computer vision with the goal of accurately predicting the mean opinion score of humans for assessing the quality of images. …”
Get full text
Article -
11040
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Published 2025-01-01“…Notably, the AES-GCM algorithm exhibited superior performance, achieving minimal computation time and robust side-channel resistance. …”
Get full text
Article