Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 3
- Information Technology 2
- Analysis 1
- Application software 1
- Biochemistry 1
- Case studies 1
- Communication planning 1
- Computer programs 1
- Computers 1
- Decentralization 1
- Decentralization in government 1
- Development 1
- Dialogue analysis 1
- Digital techniques 1
- Education and state 1
- English language 1
- Financial services industry 1
- French language 1
- Genetics 1
- Genetics, Medical 1
- Grammar 1
- Graphical user interfaces (Computer systems) 1
- Information Technology 1
- Interview, Psychological 1
- Interviewing in psychiatry 1
- Management 1
- Mass media 1
- Methodology 1
- Molecular structure 1
- Moral and ethical aspects 1
-
1081
INCIDENT MANAGEMENT IN ITSM USING ARTIFICIAL INTELLIGENCE
Published 2020-08-01Get full text
Article -
1082
-
1083
-
1084
-
1085
-
1086
-
1087
-
1088
Liquefaction Mitigation Using Lateral Confinement Technique
Published 2012-01-01Get full text
Article -
1089
Policy translation and configuration using dynamic template
Published 2019-12-01Get full text
Article -
1090
-
1091
Preparation of Polymeric Nanomaterials Using Emulsion Polymerization
Published 2021-01-01Get full text
Article -
1092
On economic efficiency of using lands in municipal district
Published 2020-10-01Get full text
Article -
1093
Vermicomposting of Vegetable Wastes Using Cow Dung
Published 2008-01-01“…The present study aims to find out the possibility of utilization of vegetable wastes for vermiculture. Earthworm Megascolex mauritii cultured in plastic trays (45 x 30 x 30 cm) containing soil alone (control) (T1), soil + cow dung (T2), soil + vegetable waste (T3) and soil + vegetable waste + cow dung (T4) for 60 days. …”
Get full text
Article -
1094
Using deep learning for detecting BotCloud
Published 2016-11-01“…Finally, in order to detect BotCloud, it utilized CNN algorithm to learn and extract characteristics that were more abstract to express the hidden model and structural relationship in the network data flow. …”
Get full text
Article -
1095
Credit Risk Modeling Using Interpreted XGBoost
Published 2023-01-01“…In the consumer finance sector, the processes are usually largely automated, and increasingly the latest machine learning methods based on neural networks and ensemble learning methods are being used for the purpose. …”
Get full text
Article -
1096
-
1097
Blasting neuroblastoma using optimal control of chemotherapy
Published 2009-05-01“…Optimal control theoryis applied to minimize the tumor volume and the amount of drug utilized.The model incorporates a state constraint that requires the level ofcirculating neutrophils (white blood cells that form an integral part of the immune system) to remain above an acceptable value. …”
Get full text
Article -
1098
Using double attention for text tattoo localisation
Published 2022-05-01“…Previous tattoo studies applied existing object detectors to detect general tattoos, but none of them considered text tattoo localisation and they neglect the prior knowledge that text tattoos are usually inside or nearby larger tattoos and appear only on human skin. …”
Get full text
Article -
1099
Internet application Mozilla localization and using in teaching
Published 2002-12-01Get full text
Article -
1100