Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
8881
Towards Scalable Distributed Framework for Urban Congestion Traffic Patterns Warehousing
Published 2015-01-01Get full text
Article -
8882
Classification of Textual E-Mail Spam Using Data Mining Techniques
Published 2011-01-01Get full text
Article -
8883
-
8884
A Distributed Bio-Inspired Method for Multisite Grid Mapping
Published 2010-01-01“…Computational grids assemble multisite and multiowner resources and represent the most promising solutions for processing distributed computationally intensive applications, each composed by a collection of communicating tasks. …”
Get full text
Article -
8885
Amharic Language Image Captions Generation Using Hybridized Attention-Based Deep Neural Networks
Published 2023-01-01“…Image captioning is a task that combines both computer vision and natural language processing (NLP) domains. …”
Get full text
Article -
8886
Precision Healthcare for UTIs: Leveraging Machine Learning to Reduce Readmissions
Published 2025-01-01Get full text
Article -
8887
Color Image Denoising Based on Guided Filter and Adaptive Wavelet Threshold
Published 2017-01-01Get full text
Article -
8888
Evaluation of Sustainable Performance of Industry 4.0 Technologies Using a Novel Fuzzy OPLO-POCOD Method
Published 2025-01-01Get full text
Article -
8889
-
8890
Anomaly-Based Intrusion Detection System in Wireless Sensor Networks Using Machine Learning Algorithms
Published 2024-01-01Get full text
Article -
8891
-
8892
-
8893
Fuzzy Set and Soft Set Theories as Tools for Vocal Risk Diagnosis
Published 2023-01-01Get full text
Article -
8894
Aspect-Based Sentiment Analysis for Afaan Oromoo Movie Reviews Using Machine Learning Techniques
Published 2023-01-01Get full text
Article -
8895
Network modeling identifies molecular functions targeted by miR-204 to suppress head and neck tumor metastasis.
Published 2010-04-01“…This new strategy that integrates expression profiling, genetics and novel computational biology approaches provides for improved efficiency in characterization and modeling of microRNA functions in cancer as compared to the state of art and is applicable to the investigation of microRNA functions in other biological processes and diseases.…”
Get full text
Article -
8896
ScITree: Scalable Bayesian inference of transmission tree from epidemiological and genomic data.
Published 2025-06-01“…In summary, our method provides a computationally-efficient, highly scalable, accurate modeling framework for inferring the joint spatio-temporal dynamics of epidemiological and evolutionary processes, facilitating timely and effective outbreak responses in space and time. …”
Get full text
Article -
8897
-
8898
-
8899
Federated Learning for Grading Oil Palm Fruit Ripeness in the Oil Palm Industry
Published 2025-01-01“…Current trends focus on computer vision techniques based on image processing and machine learning to improve grading of oil palm fruit bunches at an individual factory, resulting in limited diversity of the data used for evaluation. …”
Get full text
Article -
8900
An Improved Hashing Approach for Biological Sequence to Solve Exact Pattern Matching Problems
Published 2023-01-01“…Pattern matching algorithms have gained a lot of importance in computer science, primarily because they are used in various domains such as computational biology, video retrieval, intrusion detection systems, and fraud detection. …”
Get full text
Article