Suggested Topics within your search.
Suggested Topics within your search.
- History 5
- Risk management 5
- library 5
- Consumers 4
- Research 4
- Sociological aspects 4
- Sports 4
- Business enterprises 3
- Entrepreneurship 3
- Industrial management 3
- Information Science 3
- methods 3
- Biochemistry 2
- Chemistry, Clinical 2
- Damages 2
- Evaluation 2
- Health and Fitness 2
- Internet 2
- Libraries 2
- Libraries and electronic publishing 2
- Management 2
- Popular music 2
- Soldiers 2
- World War, 1914-1918 2
- ART / Film & Video 1
- Access control 1
- Air conditioning 1
- Anesthesia 1
- Anesthesiology 1
- Applied linguistics 1
-
9561
Religious and educational activities of theologian Nurgali Khasanov
Published 2020-02-01“…In this paper, we introduced more than 10 works and publications written by Nurgali Khasanov – they were found in Russian libraries, some proved helpful for description of his life path – into science. …”
Get full text
Article -
9562
Who is wearing me? TinyDL‐based user recognition in constrained personal devices
Published 2022-01-01“…Recently, a new milestone has been reached driven by the emergence of the TinyDL paradigm, which enables adaptation of complex DL models generated by well‐known libraries to the restrictions of constrained microcontroller‐based devices. …”
Get full text
Article -
9563
Selective Phenome Growth Adapted NK Model: A Novel Landscape to Represent Aptamer Ligand Binding
Published 2017-01-01“…Aptamers are single-stranded oligonucleotides selected by evolutionary approaches from massive libraries with significant potential for specific molecular recognition in diagnostics and therapeutics. …”
Get full text
Article -
9564
AN EFFECTIVE APPROACH TO FACE RECOGNITION WITH ARTIFICIAL INTELLIGENCE AND THE INTERNET OF THINGS USING NVIDIA JETSON NANO
Published 2024-09-01“…It explores in detail the technical attributes of the NVIDIA Jetson Nano, including its compact design, robust computing power, and the availability of software libraries that facilitate the deployment of AI models on devices with limited resources. …”
Get full text
Article -
9565
Encoding Crime and Punishment in TEI: The Digital Processing of Early Modern Broadsheets from Vienna
Published 2019-06-01“…In this project note, we introduce a set of printed single broadsheets in German, recently discovered in two of Vienna’s libraries, which, thanks to their digitization, annotation, and online publication by the Austrian Centre for Digital Humanities (ACDH) at the Austrian Academy of Sciences (ÖAW), promise to shed new light on the history of crime and punishment in early modern Vienna. …”
Get full text
Article -
9566
Seeking information, seeking connections, seeking meaning: genealogists and family historians. Genealogy, Family history, Information seeking, Archives, Personal information manage...
Published 2004-01-01“…Genealogy and family history are examples of everyday life information seeking and provide a unique example of intensive and extensive use of libraries and archives over time. In spite of the ongoing nature of this activity, genealogists and family historians have rarely been the subject of study in the information seeking literature and therefore the nature of their information problems have not been explored. …”
Get full text
Article -
9567
Role of Micro Finance Institutions on the Social Economic Wellbeing of its Customers: A Case Study of Pride Microfinance Kabale Branch.
Published 2024“…The literature review for the study was extracted from different textbooks, manuals, reports, journals, and websites from different libraries and computer laboratories. The study employed descriptive cross-sectional research design. …”
Get full text
Thesis -
9568
Pathological variants in HPV-independent vulvar tumours
Published 2025-01-01“…Totally, 94% of DNA libraries and 81% of RNA libraries were of adequate quality for further downstream analysis. …”
Get full text
Article -
9569
Bibliometrics of electronic journals in information science
Published 2001-01-01“…Common topics of e-journal articles in information science include electronic information, electronic publishing, virtual (digital) libraries, information search and retrieval, and use of the Internet. …”
Get full text
Article -
9570
Image experience prediction for historic districts using a CNN-transformer fusion model
Published 2025-02-01“…Our analysis of images from 12 Jiangnan historic districts showed the system’s efficiency in aligning images with existing imaging libraries, providing valuable references and feedback. …”
Get full text
Article -
9571
استعراض الانتاج الفکرى للمستودعات المؤسسية للرسائل والأطروحات الرقمية
Published 2021-01-01“…The studyaims to gain familiarity and knowledge of what has been published from sourcesand references in this field, to help Egyptian libraries and other academicinstitutions in planning to build and develop an institutional repository for theiruniversity theses production in view of the urgent necessity and urgent need itrepresents, answering most questions and posing all the problems andchallenges that Confront these institutions when initiating and thinking aboutstarting or planning to build such a project…”
Get full text
Article -
9572
AutomationML Meets Bayesian Networks: A Comprehensive Safety-Security Risk Assessment in Industrial Control Systems
Published 2024-01-01“…This article uses AML libraries and connection setup techniques to generate a valuable model of a single source of data for an integrated safety and security risk assessment. …”
Get full text
Article -
9573
Aux seuils du paratexte médiéval : les auteurs français et leur nom dans les inventaires aristocratiques de la fin du Moyen Âge
Published 2021-06-01“…It does so by using original data collected in 41 inventories of medieval aristocratic libraries located in French-speaking areas from the 14th and 15th century, amounting to a total of 4686 entries. …”
Get full text
Article -
9574
Accurate pulse time distribution determination using MLEM algorithm in integral experiments
Published 2025-02-01“…Results are compared across multiple nuclear databases such as CENDL-3.2, ENDF/B-VIII.0, JENDL-5.0, and JEFF-3.3 libraries. The developed method significantly enhances the precision of pulse time distribution determination, thereby improving the quality and reliability of experimental data obtained from integral experiments conducted with pulsed accelerators.…”
Get full text
Article -
9575
A Critical Review on the Reconstruction of the Manouchehri House in Kashan
Published 2021-07-01“…This research has been done by reviewing documents, field studies, and libraries and by the qualitative research method. The purpose of this research is to analyze the effective features in reviving one of the historical houses of Kashan city called "Manouchehri House" which is considered as a case study in this regard due to being a candidate for the Aga-Khan-Award and cultural economic prosperity provided by a tourist-accommodation.…”
Get full text
Article -
9576
Detecting Source Code Plagiarism in Student Assignment Submissions Using Clustering Techniques
Published 2024-06-01“…To implement our approach, we utilize the Python programming language along with relevant libraries, providing a robust and efficient system for source code plagiarism detection in student assignment submissions. …”
Get full text
Article -
9577
Tube Thoracostomy: Complications and Its Management
Published 2012-01-01“…A review of the publications obtained from Medline search, medical libraries, and Google on tube thoracostomy and its complications was done. …”
Get full text
Article -
9578
Research on Data Analysis and Visualization of Recruitment Positions Based on Text Mining
Published 2022-01-01“…To solve this problem, this paper firstly uses a web crawler to collect job information from recruitment websites based on keywords retrieved by users, then extracts job information using regular expressions, and cleans and processes the extracted job information using third-party libraries such as Pandas and NumPy. Finally, through the probabilistic theme model of text mining, the topic model of job description content in the recruitment information is modeled. …”
Get full text
Article -
9579
An Intrusion Detection System Based on Deep Learning and Metaheuristic Algorithm for IOT
Published 2024-04-01“…This method was implemented using the Tensorflow and keras libraries and tested on the KDDCup99, UNSW-NB15 and Bot-IoT datasets. …”
Get full text
Article -
9580
A Computational Complexity-Based Method for Predicting Scholars’ Ages through Articles’ Information
Published 2021-01-01“…Alternatively, scholars’ publications’ information can be obtained through various digital libraries. Inspired by this fact, we propose a novel scholar’s age prediction method based on their articles’ information. …”
Get full text
Article