Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
9961
Analyzing students' academic performance using educational data mining
Published 2024-12-01Get full text
Article -
9962
3D reconstruction of toys based on adaptive scaled neural radiation field
Published 2025-07-01“…With the rapid development of computer vision technology, 3D reconstruction of toys under single-view conditions still faces significant challenges in terms of detail loss and color distortion. …”
Get full text
Article -
9963
Retrieval-augmented generation for educational application: A systematic survey
Published 2025-06-01“…Retrieval-Augmented Generation (RAG) enhances LLMs by retrieving relevant information from an external knowledge base and incorporating it into the LLM's generation process. This approach improves factual accuracy and enables dynamic knowledge updates, making LLMs particularly suitable for educational applications. …”
Get full text
Article -
9964
Three scenarios for amyloid transformation in the context of the funnel model
Published 2025-01-01Get full text
Article -
9965
Enhancing ESG Insights Using Machine Learning: A Case Study of Top Performing Banks in Indonesia
Published 2025-06-01Get full text
Article -
9966
-
9967
Design and Development of Efficient SRAM Cell Based on FinFET for Low Power Memory Applications
Published 2023-01-01“…Stationary random-access memory (SRAM) undergoes an expansion stage, to repel advanced process variation and support ultra-low power operation. …”
Get full text
Article -
9968
Enhancing e-learning through AI: advanced techniques for optimizing student performance
Published 2024-12-01Get full text
Article -
9969
Enhancing market trend prediction using convolutional neural networks on Japanese candlestick patterns
Published 2025-02-01Get full text
Article -
9970
-
9971
Tencent Meeting forensics based on memory reverse analysis
Published 2025-06-01“…First, by analyzing the process storage and metadata format of Tencent Meeting in memory, an inverse metadata extraction algorithm is designed. …”
Get full text
Article -
9972
Long Short-Term Memory as a Rainfall Forecasting Model for Bogor City in 2025-2026
Published 2025-03-01Get full text
Article -
9973
RBI: a novel algorithm for regulatory-metabolic network model in designing the optimal mutant strain
Published 2025-05-01Get full text
Article -
9974
-
9975
Robot-assisted knee arthroplasty: Analyzing the learning curve and initial institutional experience
Published 2024-12-01Get full text
Article -
9976
-
9977
-
9978
Augmented Reality Interactive Guide System and Method for Tourist Attractions Based on Geographic Location
Published 2022-01-01“…Probabilistic algorithms allow the random choice of the next computational step during execution. In many cases, when the algorithm is faced with a choice during the execution process, the random choice is time-saving compared to the optimal one. …”
Get full text
Article -
9979
A hybrid blockchain-based solution for secure sharing of electronic medical record data
Published 2025-01-01Get full text
Article -
9980
Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks
Published 2025-03-01“…Prior research on network attacks is predominantly technical, yet little is known about behavioral patterns of attackers inside computer systems. This study adopts a criminological perspective to examine these patterns, with a particular focus on data thieves targeting organizational networks. …”
Get full text
Article