Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
25241
-
25242
-
25243
-
25244
Enhanced Pose Estimation for Badminton Players via Improved YOLOv8-Pose with Efficient Local Attention
Published 2025-07-01Get full text
Article -
25245
-
25246
SERS nose arrays based on a signal differentiation approach for TNT gas detection
Published 2025-08-01Get full text
Article -
25247
5G-Practical Byzantine Fault Tolerance: An Improved PBFT Consensus Algorithm for the 5G Network
Published 2025-03-01Get full text
Article -
25248
Joint Intensity and Spatio-Temporal Representation Learning for Extreme Precipitation Nowcasting
Published 2025-01-01Get full text
Article -
25249
Class Concept Representation From Contextual Texts for Training-Free Multi-Label Recognition
Published 2025-01-01Get full text
Article -
25250
A Novel Multi-Image Encryption Scheme Using Generalized Rectangular Transform and Advanced 5-D Hyperchaotic Map
Published 2025-01-01“…This paper presents GRTPHM (Generalized Rectangular Transform and Penta-Hyperchaotic Map), a novel multi-image encryption scheme that enhances security, efficiency, and versatility. The encryption process consists of two key phases: pixel permutation and pixel diffusion. …”
Get full text
Article -
25251
Efficient Robot Localization Through Deep Learning-Based Natural Fiduciary Pattern Recognition
Published 2025-01-01“…As robots increasingly operate in environments where computational efficiency and adaptability are paramount, our methodology offers a viable solution to enhance localization without compromising accuracy or speed. …”
Get full text
Article -
25252
Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks
Published 2025-03-01“…A Hybrid Policy Derivation Algorithm is introduced to balance encryption complexity and computational overhead by dynamically switching between these learning models. …”
Get full text
Article -
25253
A precise spatiotemporal fusion crop classification framework based on parcels
Published 2025-06-01Get full text
Article -
25254
A Hybrid Large Language Model for Context-Aware Document Ranking in Telecommunication Data
Published 2025-01-01Get full text
Article -
25255
Deep Residual Transfer Ensemble Model for mRNA Gene-Expression-Based Breast Cancer
Published 2025-01-01“…Executing standard pre-processing tasks, the synthetic underrepresented class over-sampling technique (SMOTE) was applied to alleviate any possible class-imbalance problem. …”
Get full text
Article -
25256
Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication
Published 2025-01-01“…TenSEAL ensures all computations occur in the encrypted domain, preventing raw biometric data exposure during authentication. …”
Get full text
Article -
25257
A Deep Learning Approach to Assist in Pottery Reconstruction from Its Sherds
Published 2025-05-01Get full text
Article -
25258
Assessing the impact of socio-technical congruence in software development: a systematic literature review
Published 2021-12-01Get full text
Article -
25259
-
25260
Nystromformer based cross-modality transformer for visible-infrared person re-identification
Published 2025-05-01Get full text
Article