Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- Information technology 9
- Moral and ethical aspects 9
- Management 8
- computer 8
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- History 4
- Human-computer interaction 4
- Language and languages 4
- Mass media 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- Hospitality industry 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- MATHEMATICS / Mathematical Analysis 3
- Mathematical analysis 3
-
54781
Land Use/Land Cover Change and Its Driving Forces in Shenkolla Watershed, South Central Ethiopia
Published 2021-01-01Get full text
Article -
54782
LEARNING ANALYTICS SYSTEMS TO IMPROVE THE QUALITY OF STUDENTS' OUTCOMES
Published 2025-03-01Get full text
Article -
54783
E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review
Published 2024-06-01“…Advances in artificial intelligence, Machine Learning (ML), and cloud computing have revitalized research and applications in this domain. …”
Get full text
Article -
54784
-
54785
Newly developed genomic SSR markers revealed the population structure and genetic characteristics of abaca (Musa textilis Nee)
Published 2024-12-01“…Our study highlights the diversity, identity, and genetic variation within the abaca collection using accurate, robust, cost-effective, and computationally simple genome-specific markers. These markers are pivotal for genetic studies of abaca, including trait-marker mapping and the differentiation of accessions even in the juvenile stage, when phenotypic differences may be subtle.…”
Get full text
Article -
54786
Adaptive Spatial Regularization Target Tracking Algorithm Based on Multifeature Fusion
Published 2022-01-01“…It is verified that the improved model not only improves the robustness of the algorithm but also can better adapt to the changes of the target, while effectively reducing the computational overhead and meeting the tracking real-time requirements.…”
Get full text
Article -
54787
Problematic issues of using modern information and other technologies in the implementation of investigator’s and interrogator’s instructions by operational units
Published 2022-03-01“…In the conduct of any investigative (searching) activities in practice, in fact, either technical devices and tools or information technology are used in the sense in which they are proposed in the Code and which cause difficulties in use, especially modern latest information technology in the form of computing hardware and software. It is concluded that the appropriate use of modern information technology, open network resources, government or commercial databases, as well as modern approaches to the implementation of the instructions of investigators and interrogators significantly speed up the pre-trial investigation, as operational units have the opportunity to obtain information in a short period of time, using the capabilities of innovative modern technologies. …”
Get full text
Article -
54788
An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
Published 2023-09-01“…We combine Isolation Forest (IF) with Pearson’s Correlation Coefficient (PCC) to reduce computational cost and prediction time. IF is exploited to detect and remove outliers from datasets. …”
Get full text
Article -
54789
Deep learning based analysis of G3BP1 protein expression to predict the prognosis of nasopharyngeal carcinoma.
Published 2025-01-01“…<h4>Conclusion</h4>Computational pathology emerges as a transformative tool capable of substantially reducing the burden on pathologists while concurrently enhancing and diagnostic sensitivity and specificity. …”
Get full text
Article -
54790
Phenotypic analysis of sorghum [Sorghum bicolor (L) Moench] genotypes for drought responsive traits
Published 2025-12-01Get full text
Article -
54791
Prediction of Orbit Decay for Large-Scale Spacecraft considering Rarefied Aerodynamic Perturbation Effects
Published 2022-01-01Get full text
Article -
54792
An Optimization Method for the Train Service Network Design Problem
Published 2020-01-01“…To demonstrate the proposed model and the algorithm, a case study on a real-world sub-network in China is carried out. The computational results show that the proposed approach can obtain high-quality solutions with satisfactory speed. …”
Get full text
Article -
54793
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01“…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
Get full text
Article -
54794
Optimizing humidification–dehumidification desalination systems: Impact of nozzle position and geometric configuration on performance and efficiency
Published 2025-03-01“…Furthermore, the study compares bottom-nozzle and top-nozzle configurations in both the humidifier and dehumidifier units to evaluate their impact on heat transfer, moisture absorption, and water recovery. Computational Fluid Dynamics (CFD) simulations in ANSYS Fluent® were employed to model fluid dynamics, heat, and mass transfer, while the Discrete Phase Model (DPM) simulated water jet nozzle injections. …”
Get full text
Article -
54795
Spatio-Temporal Segmented Traffic Flow Prediction with ANPRS Data Based on Improved XGBoost
Published 2021-01-01“…The experiment results indicate that the proposed framework is convincing, satisfactory, and computationally reasonable.…”
Get full text
Article -
54796
Estimating the Torsional Capacity of Reinforced Concrete Beams Using ANFIS Models
Published 2024-09-01“…To overcome this limitation, accurate Machine Learning (𝑀𝐿) models might replace more sophisticated and computationally intensive models. This work evaluates and determines the most effective tree-based machine learning algorithms to estimate the torsional capacity (𝑇𝑟) of 𝑅𝐶 beams subjected to pure torsion. …”
Get full text
Article -
54797
Exploring the Influence of Lateral Conductivity Contrasts on the Storm Time Behavior of the Ground Electric Field in the Eastern United States
Published 2020-03-01“…This result is of special importance since the computation of GICs relies on integrals of the GEF (voltages), but not on the GEF itself. …”
Get full text
Article -
54798
Investigation of the Pulmonary Artery Hypertension Using an Ad Hoc OpenFOAM CFD Solver
Published 2024-12-01“…Cardiovascular diseases are a group of disorders that affect the heart and blood vessels, representing a leading cause of death worldwide. With the help of computational fluid dynamics, it is possible to study the hemodynamics of the pulmonary arteries in detail and simulate various physiological conditions, thus offering numerous advantages over invasive analyses in the phases of diagnosis and surgical planning. …”
Get full text
Article -
54799
Optimization of hydrocyclon for phosphatic rock separation using CFD
Published 2021-08-01“…This work aimed to use the computational fluid dynamics to study different multiphase models to represent the hydrocyclones, as well as modifications to its geometry to increase its efficiency. …”
Get full text
Article -
54800
COVID-19 World Vaccine Adverse Reactions Based on Machine Learning Clustering Algorithm
Published 2021-05-01“…Clustering algorithms have been used in computational intelligence and digital analysis, which is one of the areas that has taken this into account. …”
Get full text
Article