Suggested Topics within your search.
Suggested Topics within your search.
- History 5
- Risk management 5
- library 5
- Consumers 4
- Research 4
- Sociological aspects 4
- Sports 4
- Business enterprises 3
- Entrepreneurship 3
- Industrial management 3
- Information Science 3
- methods 3
- Biochemistry 2
- Chemistry, Clinical 2
- Damages 2
- Evaluation 2
- Health and Fitness 2
- Internet 2
- Libraries 2
- Libraries and electronic publishing 2
- Management 2
- Popular music 2
- Soldiers 2
- World War, 1914-1918 2
- ART / Film & Video 1
- Access control 1
- Air conditioning 1
- Anesthesia 1
- Anesthesiology 1
- Applied linguistics 1
-
2281
Retracted: Blockchain‐based covert software information transmission for bitcoin
Published 2023-08-01“…The above article from IET Software, published online on 8 February 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor‐in‐Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. …”
Get full text
Article -
2282
Exploring Text Mining and Analytics for Applications in Public Security: an in-depth dive into a systematic literature review
Published 2023-07-01“…The searches covered four major article bases (Scopus, Web of Science, IEEE Xplore, and ACM Digital Library), selecting 194 materials published between 2014 and the first half of 2021, among journals, conferences, and book chapters. …”
Get full text
Article -
2283
-
2284
-
2285
Exercise reduced the formation of new adipocytes in the adipose tissue of mice in vivo.
Published 2021-01-01Get full text
Article -
2286
-
2287
-
2288
-
2289
A deep learning based detection algorithm for anomalous behavior and anomalous item on buses
Published 2025-01-01“…Abstract This paper proposes a new strategy for analysing and detecting abnormal passenger behavior and abnormal objects on buses. First, a library of abnormal passenger behaviors and objects on buses is established. …”
Get full text
Article -
2290
Generating and Improving a Dataset of Masked Faces Using Data Augmentation
Published 2023-06-01“…The first step was to detect, align and crop the faces of unmasked faces datasets in a dataset and then apply simulated masks on the faces utilizing the dlib-ml library. This method was used to generate a dataset for masked faces (CASIA-mask). …”
Get full text
Article -
2291
Cross-ViT based benign and malignant classification of pulmonary nodules.
Published 2025-01-01Get full text
Article -
2292
-
2293
Strategies to improve access to cognitive behavioral therapies for anxiety disorders: A scoping review.
Published 2022-01-01Get full text
Article -
2294
Information professionals: core competencies and professional development
Published 2007-01-01“…</b> The results suggest a gulf between knowledge and skills acquired in library school and those that are required by the job market. …”
Get full text
Article -
2295
-
2296
-
2297
Bayesian active sound localisation: To what extent do humans perform like an ideal-observer?
Published 2025-01-01Get full text
Article -
2298
-
2299
LİVÂYÎ’NİN MANZÛM YASİN TEFSİRİ / LIVAYI’S POETICAL INTERPRETATION OF “YASEEN” (SURA YASEEN)
Published 2015-06-01“…</p><p>Abstract:</p><p>The text of poetical interpretation of “Yaseen” (Sura Yaseen) appeared in Livayi’s, one of the 16th century poets, the work (the beginning part missing) stored under the number Diez A. 8<sup>0</sup>.192 in Berlin Königliche Library, is given in this essay. Poetical interpretations of Suras “Mulk” and “Amme” are included in this work, completed in 1543 and presented to Sultan Suleiman the Lawgiver. …”
Get full text
Article -
2300
Transitions in intensive care: Investigating critical slowing down post extubation.
Published 2025-01-01Get full text
Article