Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
10141
DeapSea: Workflow-Supported Serious Game Design for Stroke Rehabilitation
Published 2023-01-01Get full text
Article -
10142
-
10143
Brain Tumor Classification of Medical Images based on Transfer Pre-trained Learning Models
Published 2025-06-01Get full text
Article -
10144
-
10145
Design and Implemented of an Algorithm for Covered Writing on a Video File (mov)
Published 2010-12-01“…Experimental results demonstrated success of hiding process. The designed algorithm has been implemented using Matlab (ver. 7) on P4 computer.…”
Get full text
Article -
10146
Pengembangan Chatbot “Ciovita” Virtual Assistant Cioccolato Brownie Semarang Dengan Metode Waterfall
Published 2022-12-01Get full text
Article -
10147
-
10148
Penerapan Metode Economic Order Quantity dan Reorder Point Pada Aplikasi Pengelolaan Persediaan Fumigasi
Published 2023-11-01Get full text
Article -
10149
-
10150
-
10151
Talent identification in soccer using a one-class support vector machine
Published 2019-12-01Get full text
Article -
10152
Transfer Learning for Cancer Diagnosis in Medical Images: A Compendious Study
Published 2025-03-01“…However, the process of training these neural networks from scratch is often complex and requires significant computational resources. …”
Get full text
Article -
10153
A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure Network
Published 2025-02-01“…Accordingly, an authentication and key exchange protocol with an insecure channel has been proposed, in which the operations of symmetric encryption and XOR encryption are adopted for all interactive processes to improve protocol security. The theoretical analysis and formal verification demonstrate that the proposed protocol satisfies security properties including authentication and confidentiality, and reduces the costs of computation and communication compared with the method with public key encryption.…”
Get full text
Article -
10154
Enterprise Tax Assessment and Risk Avoidance Based on Deep Learning
Published 2025-04-01Get full text
Article -
10155
A development framework for decision support systems in high-performance sport
Published 2020-07-01Get full text
Article -
10156
An Efficient Workload-balancing Algorithm for a Parallel Environment Using Hybrid Spatio-temporal Indexes
Published 2025-08-01Get full text
Article -
10157
Efficient Execution of Networked MPSoC Models by Exploiting Multiple Platform Levels
Published 2012-01-01Get full text
Article -
10158
-
10159
Signal-Based Performance Evaluation of Dereverberation Algorithms
Published 2010-01-01Get full text
Article -
10160
A Novel Denoising Algorithm of Electromagnetic Ultrasonic Detection Signal Based on Improved EEMD Method
Published 2018-01-01Get full text
Article