Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
13621
Mobile application for wildlife capture–mark–recapture data collection and query
Published 2013-12-01Get full text
Article -
13622
Advanced methodologies and technologies in government and society /
Published 2019Table of Contents: “…Kamel -- Socio-economic processes, user generated content, and media pluralism / Androniki Kavoura -- Bipolar model in collective choice / Ayeley P. …”
View in OPAC
Book -
13623
Advanced methodologies and technologies in government and society /
Published 2019Table of Contents: “…Kamel -- Socio-economic processes, user generated content, and media pluralism / Androniki Kavoura -- Bipolar model in collective choice / Ayeley P. …”
View in OPAC
Book -
13624
Nitrous oxide (N<sub>2</sub>O) in Macquarie Harbour, Tasmania
Published 2024-12-01Get full text
Article -
13625
Convolutional neural networks for sea surface data assimilation in operational ocean models: test case in the Gulf of Mexico
Published 2025-01-01“…<p>Deep learning models have demonstrated remarkable success in fields such as language processing and computer vision, routinely employed for tasks like language translation, image classification, and anomaly detection. …”
Get full text
Article -
13626
Efficient and real-time lane detection using CUDA-based implementation
Published 2024-01-01“…However, given its high computational demands, optimization of this process is essential for real-time applications. …”
Get full text
Article -
13627
-
13628
Hardware/Software Implementation of a Chip-to-Chip Communication Protocol Based on SPDM
Published 2024-01-01“…The proposed architecture consists of four key modules: a Zero-Trust Processor (ZTP) with an RV64 core, a Zero-Trust Management (ZTM) unit with an RV32 core featuring Certificate and Secret Storage (CSS) and a Certificate Management Unit (CMU). …”
Get full text
Article -
13629
-
13630
Research on Development Progress and Test Evaluation of Post-Quantum Cryptography
Published 2025-02-01“…This paper first analyzes the threat of quantum computing to existing cryptographic systems, then introduces in detail the main technical routes of PQC and its standardization process. …”
Get full text
Article -
13631
Amorphous Localization Algorithm Based on BP Artificial Neural Network
Published 2015-07-01Get full text
Article -
13632
An AI-based nutrition recommendation system: technical validation with insights from Mediterranean cuisine
Published 2025-08-01Get full text
Article -
13633
-
13634
Numerical modelling of tsunami-induced scour around a coastal dike
Published 2025-09-01Get full text
Article -
13635
Combining Transfer Learning and Ensemble Algorithms for Improved Citrus Leaf Disease Classification
Published 2024-09-01Get full text
Article -
13636
A novel pythonic paradigm for image encryption using axis-aligned bounding boxes
Published 2025-05-01“…If the boxes do not overlap, the pixels within them are swapped. This pixel-swapping process, guided by random numbers generated from a 5D multi-wing hyper-chaotic map, is repeated numerous times to infuse confusion into the image. …”
Get full text
Article -
13637
-
13638
Digital traceability in horticulture: a systematic review of edge-cloud-blockchain-terminal (ECBT) integration with IoT and AI technologies
Published 2025-08-01“…This systematic mini-review examines the Edge-Cloud-Blockchain-Terminal (ECBT) framework—an integrated architecture positioning blockchain as the trust backbone connecting distributed computing, edge intelligence, and user terminals—for comprehensive traceability. …”
Get full text
Article -
13639
Bootstrapping Optimization Techniques for the FINAL Fully Homomorphic Encryption Scheme
Published 2025-03-01“…Enhancing the efficiency of bootstrapping necessitates a dual focus: reducing the computational burden of outer product operations integral to the process while rigorously constraining the noise generated by bootstrapping within predefined threshold limits. …”
Get full text
Article -
13640
A concept for fully automated segmentation of bone in ultrasound imaging
Published 2025-03-01Get full text
Article