Showing 18,861 - 18,880 results of 19,257 for search '"researcher"', query time: 0.10s Refine Results
  1. 18861

    La gestion de l’eau à Bibracte (Saône-et-Loire), avant et après la Conquête romaine by Laetitia Borau

    Published 2020-12-01
    “…In order to do so, exhaustive research was carried out, compiling the entire documentation collected between the 19th, 20th and 21th centuries, in particular ancient excavations and geophysical analyses but also new archaeological research carried out under the auspices of the European Archaeological Centre of Mont-Beuvray directed by Vincent Guichard (team composed of Miklós Szabó, Sabine Rieckhoff, Daniele Vitali, Daniel Paunier, Thierry Luginbühl, Philippe Barral and Jean-Paul Guillaumet). …”
    Get full text
    Article
  2. 18862
  3. 18863
  4. 18864
  5. 18865

    Perbandingan Instance Segmentation Image Pada Yolo8 by Resty Wulanningrum, Anik Nur Handayani, Aji Prasetya Wibawa

    Published 2024-08-01
    “…Comparison of segmentation on Penn-Fundan Database dataset using yolov8 with yolov8n-seg, yolov8s-seg, yolov8m-seg, yolov8l-seg, yolov8x-seg models. This research uses a public pedestrian dataset with multi-person objects taken from the Penn-Fudan Database dataset. …”
    Get full text
    Article
  6. 18866
  7. 18867
  8. 18868
  9. 18869
  10. 18870

    Epidemics In The 21st Century: A Multifaceted Challenge by Shawana Sharif

    Published 2023-12-01
    “…The interconnectedness of our world mandates cohesive international collaborations, fostering information-sharing, research partnerships, and coordinated responses to combat epidemics transcending geographical boundaries. …”
    Get full text
    Article
  11. 18871
  12. 18872
  13. 18873
  14. 18874
  15. 18875
  16. 18876
  17. 18877

    Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy by Diah Ratih Destyorini, Ari Kusyanti, Reza Andria Siregar

    Published 2022-12-01
    “…The development requires consideration of several aspects, such as the resources used, as well as the time for the encryption and decryption process.  In research, the MORUS V2 algorithm was chosen to secure data from attacks. …”
    Get full text
    Article
  18. 18878
  19. 18879
  20. 18880