Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
13121
Divisibility and Compactness Analysis of Physiological Signals for Sentiment Classification in Body Sensor Network
Published 2013-10-01“…Affective computing draws more and more attention to the human-computer interaction. …”
Get full text
Article -
13122
Merge Operation Effect On Image Compression Using Fractal Technique
Published 2007-03-01“…In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. …”
Get full text
Article -
13123
Wavelet Filter Approach and Z-R Relationship in Meteorological Forecasting
Published 2015-01-01“…The purpose of this study is to investigate the Z-R relationship for computing rainfall using conventional and wavelet filters technique. …”
Get full text
Article -
13124
An effective method of solving of sin gular integral equations in mechanical problems with mixed boundary conditions
Published 2009-12-01“…Special presentation of the kernel of integral equation is able to significantly weaken its singularity, which in turn helped to realize a sustainable computing process by collocation method.…”
Get full text
Article -
13125
Efficient optimum safety factor approach for system reliability-based design optimization with application to composite yarns
Published 2019-10-01“…An Optimum Safety Factor (OSF) method is proposed to compute safety factors satisfying a required reliability level without demanding additional computing cost for the reliability evaluation. …”
Get full text
Article -
13126
RINX 2.0: A Containerized Climate Raster Information Extraction System on OpenShift Cloud Environment
Published 2025-07-01“…RINX (Raster INformation eXtraction) 2.0 is an advanced solution for efficiently extracting climate data from large raster datasets in a cloud computing environment. Building upon the original RINX 1.0, which utilized high-performance computing clusters, RINX 2.0 leverages cloud technologies such as OpenShift and PostGIS to handle massive datasets and automate the extraction process. …”
Get full text
Article -
13127
Evaluation of Seismic Performance of Reinforced Concrete Frame Structures in the Context of Big Data
Published 2019-01-01“…Using the distributed computing design concept to efficiently process big data, a dynamic evaluation model for the seismic performance of reinforced concrete frame structures is established. …”
Get full text
Article -
13128
-
13129
HCCD: A handwritten camera-captured dataset for document enhancement under varied degradation conditionsMendeley Data
Published 2025-08-01“…The degradation issues encompass motion blur, shadow artifacts, and uneven lighting, which reflect challenges incurred in the real-life document digitization process.In the proposed dataset, each handwritten document is paired with a high-quality enhanced image created through a combination of computer vision-based imaging techniques. …”
Get full text
Article -
13130
Hybrid Network-on-Chip: An Application-Aware Framework for Big Data
Published 2018-01-01“…Burst growing IoT and cloud computing demand exascale computing systems with high performance and low power consumption to process massive amounts of data. …”
Get full text
Article -
13131
Symmetric Block Algorithm WBC1 and Analysis of Its Implementation Complexity
Published 2025-03-01“…Introduction. Nowadays, computer networks are gaining more and more importance for information exchange. …”
Get full text
Article -
13132
Efficient text-to-video retrieval via multi-modal multi-tagger derived pre-screening
Published 2025-03-01“…Most existing methods use real-valued and hash-based embeddings to represent the video and text, allowing retrieval by computing their similarities. However, these methods are often inefficient for large volumes of video, and require significant storage and computing resources. …”
Get full text
Article -
13133
-
13134
Dog facial landmarks detection and its applications for facial analysis
Published 2025-07-01“…Abstract Automated analysis of facial expressions is a crucial challenge in the emerging field of animal affective computing. One of the most promising approaches in this context is facial landmarks, which are well-studied for humans and are now being adopted for many non-human species. …”
Get full text
Article -
13135
A Robust and Efficient Machine Learning Framework for Enhancing Early Detection of Android Malware
Published 2025-01-01Get full text
Article -
13136
Enhanced Diagnosis of Thyroid Diseases Through Advanced Machine Learning Methodologies
Published 2025-05-01Get full text
Article -
13137
Security-Enhanced Image Encryption: Combination of S-Boxes and Hyperchaotic Integrated Systems
Published 2025-01-01Get full text
Article -
13138
Simulation of Coupled Fire/Atmosphere Interaction with the MesoNH-ForeFire Models
Published 2011-01-01“…Simulating interaction between forest fire and atmospheric processes requires a highly detailed and computationally intensive model. …”
Get full text
Article -
13139
-
13140
Developing Digital Service Transformation Maturity Model in Public Sector
Published 2024-01-01“…To evaluate the effectiveness of the transformation process, organizations require a maturity model to assess execution quality. …”
Get full text
Article