Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
15881
Metabolic modeling of endosymbiont genome reduction on a temporal scale
Published 2011-03-01“…Here, we study the order in which genes are lost in an in silico evolutionary process, leading from the metabolic network of Eschericia coli to that of the endosymbiont Buchnera aphidicola. …”
Get full text
Article -
15882
A Novel Complex Networks Clustering Algorithm Based on the Core Influence of Nodes
Published 2014-01-01Get full text
Article -
15883
Aggregated Recommendation through Random Forests
Published 2014-01-01“…Aggregated recommendation refers to the process of suggesting one kind of items to a group of users. …”
Get full text
Article -
15884
Research on the Flattening Method of an Energy-Based Fabric Deformation Model in Garment Design
Published 2022-01-01Get full text
Article -
15885
Application of knowledge tools in training, based on problems’ solving: methodology and it support
Published 2017-07-01“…The distribution of work tools with knowledge on the stages of the problemsolving process is proposed. We have considered the use of computer tools and options for creating an informational educational environment for implementing the proposed ideas of problem-based learning and working with knowledge. …”
Get full text
Article -
15886
User Knowledge, Data Modelling, and Visualization: Handling through the Fuzzy Logic-Based Approach
Published 2021-01-01“…In data modelling, visualization is the process of extracting knowledge to reveal the detail data structure and process of data. …”
Get full text
Article -
15887
-
15888
-
15889
An Improved Integrity Monitoring Algorithm for GNSS Receiver
Published 2021-06-01Get full text
Article -
15890
Sample-Path Large Deviations in Credit Risk
Published 2011-01-01“…We first derive a sample-path large deviation principle (LDP) for the portfolio's loss process, which enables the computation of the logarithmic decay rate of the probabilities of interest. …”
Get full text
Article -
15891
Detection of disease on nasal breath sound by new lightweight architecture: Using COVID-19 as an example
Published 2025-05-01“…The Dense-ReLU-Dropout model, combined with innovative feature processing techniques, offers a promising approach for efficient and accurate COVID-19 detection, showcasing the capabilities of mobile device-based diagnostics…”
Get full text
Article -
15892
Hyperparameter tuned deep learning-driven medical image analysis for intracranial hemorrhage detection.
Published 2025-01-01“…The ICH detection process is accomplished by the ensemble classification process, comprising long short-term memory (LSTM), stacked autoencoder (SAE), and bidirectional LSTM (Bi-LSTM) networks. …”
Get full text
Article -
15893
PROVIDING DISTANCE EDUCATION DURING THE WAR: THE EXPERIENCE OF UKRAINE
Published 2023-12-01“…We also analyze the impact of digital technologies and educational IT infrastructure on the viability of the educational process under unfavorable social conditions. In addition, by constructing an educational regression model, we investigate various factors that may have influenced students’ achievement before the war (e.g., the availability of computers for students and teachers, schools’ access to high-speed internet, etc.), and identify the relationships between these factors. …”
Get full text
Article -
15894
Investigation of Opto‐magnetic Memory Effects in Antiferromagnetic CuMnAs Using Ultrafast Heat Dynamics and Quench Switching
Published 2025-06-01“…Antiferromagnets offer a promising platform for seeking such approaches due to their exceptional features: low‐power consumption and possible high integration density are desirable for information storage and processing or applications in unconventional computing. …”
Get full text
Article -
15895
Neuromorphic devices assisted by machine learning algorithms
Published 2025-01-01“…Neuromorphic computing extends beyond sequential processing modalities and outperforms traditional von Neumann architectures in implementing more complicated tasks, e.g., pattern processing, image recognition, and decision making. …”
Get full text
Article -
15896
A Classification Data Packets Using the Threshold Method for Detection of DDoS
Published 2024-06-01“…The Threshold method is used to process numeric attributes so obtained from the logfile in a computer network so that data packages can be classified into 2, namely normal access and attack access. …”
Get full text
Article -
15897
Thermo-gravometric studies of fruits and vegetables
Published 2025-01-01“…When studying the kinetics of the process, the Wahuski-Voboril and Erofeev models were used, and a calculation program was given. …”
Get full text
Article -
15898
A new era in provisional restorations: evaluating marginal accuracy and fracture strength in additive, substractive and conventional techniques
Published 2025-06-01“…Abstract Objective The aim of this study was to compare the marginal gaps and fracture resistance of fixed provisional restorations fabricated using conventional, subtractive (Computer-Aided Design/Computer-Aided Manufacturing (CAD/CAM)), and additive (3D printing) techniques. …”
Get full text
Article -
15899
-
15900
Removal of a maxillary tumor with simultaneous placement of intraosseous zygomatic implants
Published 2019-07-01“…During the examination of the oral cavity, we found a dense endophytic tumor in the area of two missing teeth (17 and 18) involving the alveolar process and palatine process of the maxilla. Computed tomography revealed destruction of the alveolar process, lateral, medial, and posterior walls of the maxillary sinus on the right, and tumor invasion into the right iliac fossa, pterygopalatine fossa, and right maxillary sinus. …”
Get full text
Article