Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
12561
Zynq FPGA-Based Acceleration of Kernelized Correlation Filters via High-Level Synthesis of a Custom DFT Block
Published 2024-04-01“…Leveraging the High-level synthesis (HLS) and the Zynq heterogeneous platform, the KCF algorithm’s performance is enhanced by using a custom hardware implementation for the computationally intensive Discrete Fourier Transform (DFT) operation. …”
Get full text
Article -
12562
Hiding Encryption Text by DNA using Exploiting Modification Direction Algorithm
Published 2021-06-01Get full text
Article -
12563
Smart Water Level Indicator with Dry Protection Based on Ultrasonic Sensor Water indicator, Dry protection, Ultrasonic
Published 2024-12-01“…In this research, we suggest an intelligent system to regulate the water level and the process of turning on and off. The water level is detected by this method using an ultrasonic sensor and an Arduino. …”
Get full text
Article -
12564
Control System Strategy for Ring Thrower Robot Based on PID-CSA for ABU Robocon 2023
Published 2024-03-01Get full text
Article -
12565
Image Enhancement Based on Fan Filter Parameters Adjustment
Published 2021-12-01Get full text
Article -
12566
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data
Published 2013-07-01“…With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as Intrusion Detection Systems IDSs for detecting the known and unknown attacks. …”
Get full text
Article -
12567
Enhancing Reliability Engineering Through Weibull Distribution in R
Published 2024-06-01Get full text
Article -
12568
-
12569
Quantum-Inspired Data Embedding for Unlabeled Data in Sparse Environments: A Theoretical Framework for Improved Semi-Supervised Learning without Hardware Dependence
Published 2024-12-01“…In contrast to conventional quantum machine learning methodologies that often rely on quantum hardware, this framework is fully realizable within classical computational architectures, thus bypassing the practical limitations of quantum hardware. …”
Get full text
Article -
12570
Estimate Programmatic Effort using the Traditional COCOMO Model and Neural Networks
Published 2013-03-01Get full text
Article -
12571
Control System for U-Arm Robot Arm Movement with Linear Gripper Based on Inverse Kinematic Method
Published 2024-12-01Get full text
Article -
12572
Modification of Sugarcane Bagasse Fiber into Microfibrils as Composite Materials Reinforcement
Published 2025-05-01Get full text
Article -
12573
A Lightweight Terrain‐Constraint Model for Wind Spatial Downscaling
Published 2025-06-01Get full text
Article -
12574
Application of Textual Representation Methods for Clinical Numerical Data in Early Sepsis Diagnosis
Published 2024-09-01Get full text
Article -
12575
Sentence type identification-based product review sentiment analysis using BeDi-DC and Log-Squish CNN
Published 2025-06-01Get full text
Article -
12576
Enhanced Hardrock Seismic Imaging Through Multi‐Scale Information‐Guided Unsupervised Learning
Published 2025-06-01Get full text
Article -
12577
Hiding Sensitive Frequent Itemsets over Privacy Preserving Distributed Data
Published 2013-03-01“…Data mining is the process of extracting hidden patterns from data. One of the most important activities in data mining is the association rule mining and the new head for data mining research area is privacy of mining. …”
Get full text
Article -
12578
Design and Implementation of Remote Lab PID Controller Experiment Based on IoT
Published 2024-08-01Get full text
Article -
12579
-
12580
Fast Backpropagation Neural Network for VQ-Image Compression
Published 2004-05-01“…Artificial neural networks are becoming very attractive in image processing where high computational performance and parallel architectures are required.…”
Get full text
Article