Suggested Topics within your search.
Suggested Topics within your search.
- Sustainable development 2
- computer 2
- Agriculture 1
- Biotechnology 1
- Calculus 1
- Chemistry Techniques, Analytical 1
- Children 1
- Climate change mitigation 1
- Economic Policy 1
- Economic policy 1
- Education 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Enterprise application integration (Computer systems) 1
- Environmental Economics 1
- Environmental economics 1
- Ethnoscience 1
- Hospitality industry 1
- Immune System 1
- Immunity 1
- Industrial Organization 1
- Industrial organization 1
- Information technology 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MEDICAL / Audiology & Speech Pathology 1
- MEDICAL / Biotechnology 1
- Management 1
-
3121
ELM-based control system applications: A bibliometric analysis and review
Published 2024-07-01“…This study conducts a bibliometric analysis of the extreme learning machine (ELM) research, with a particular emphasis on ELM-based control systems and applications. The objective of this study is to identify research trends, collaboration opportunities, and challenges in ELM applications. …”
Get full text
Article -
3122
Risks of Relying on Artificial Intelligence in Learning Arabic Language Sciences Through the Meta Application
Published 2025-02-01“…The research highlights these risks through descriptive, analytical, and applied approaches, testing the Meta application in grammar, morphology, orthography, prosody, semantics, and rhetoric. …”
Get full text
Article -
3123
A topic-enhanced python question-answering model
Published 2025-01-01“…When traditional retrieval methods are applied to educational questions and answers, they often have problems such as inaccurate semantic matching, insufficient context understanding, and difficulty in data processing, resulting in poor answer quality. …”
Get full text
Article -
3124
MCKite: A Multi-Producer Multicast Scheme in Named Data Networking
Published 2015-12-01“…Named data networking(NDN)-a future internet architecture replacing hosts with named data as the core objects in the network layer and natively supports single producer- multi consumer multicast application pattern. …”
Get full text
Article -
3125
Validation of geotechnical laboratory tests data obtained from various sources
Published 2024-11-01“…ExCalibre application enables automatic calibration of three critical state models based on data from standard laboratory tests. …”
Get full text
Article -
3126
-
3127
Developing Project-Based Electronic Student Worksheet on Number Processing Application Materials
Published 2021-10-01“…This study aims to develop a project-based electronic student worksheet on the number processing application course for tenth grade and investigate find out teacher's and student's responses to the product. …”
Get full text
Article -
3128
Enhancing Patient-Medical Staff Interaction using Technology
Published 2025-05-01“…In addition, the solution integrates a secure authentication module, ensuring the protection of personal and medical data. We analyzed first the existing market solutions to identify their limitations and justify the need for such an application. …”
Get full text
Article -
3129
WebTrace: An enhanced system for remote user interaction tracking and analysis in web applications
Published 2025-05-01“…Usability testing is crucial for enhancing the user experience of web applications, yet traditional methods remain prohibitively costly and complex. …”
Get full text
Article -
3130
Exploring the Transformation in Cognition, Emotion, and Behavior among Stakeholders in Artificial Intelligence Large Models Healthcare Applications
Published 2025-03-01“…Based on data from multiple platforms such as government websites and medical forums, and using methods such as social network analysis, sentiment analysis, and exponential smoothing, this study deeply analyzes the cognitive, emotional, and behavioral evolution of stakeholders in the medical application of artificial intelligence (AI) large models, focusing on exploring the emotional differences in public perceptions of AI applications across various medical fields. …”
Get full text
Article -
3131
-
3132
Effects of Contractual and Relational Governance on Project Performance: The Role of BIM Application Level
Published 2024-10-01“…The theoretical foundation of this research is rooted in transaction cost economics. The data come from the construction industry in China’s Sichuan province. …”
Get full text
Article -
3133
Linguistic Patterns Among Pop Culture Discourse on @westenthu X or Twitter Platform
Published 2025-01-01Get full text
Article -
3134
-
3135
A DIGITAL QUALITY ASSESSMENT OF BAMBOOSHOOTS.AI FOR HARVEST AND PEST DETECTION
Published 2024-12-01Get full text
Article -
3136
User Acceptance Testing to Assess User Receptiveness Toward a Soft Skills Training Information System
Published 2025-09-01“…Soft skills organizations face significant challenges due to manual management practices, leading to scattered participant data, lack of proper documentation, and manual archiving. …”
Get full text
Article -
3137
A Secure Application for Information Sharing i n Organizations: A Case Study of Kabale District Local Government
Published 2019“…This makes information shared secure. The application was tested and validated by a range of stakeholders and it was found secure. …”
Get full text
Article -
3138
Tensor Decomposition for Multiple-Instance Classification of High-Order Medical Data
Published 2018-01-01“…Multidimensional data that occur in a variety of applications in clinical diagnostics and health care can naturally be represented by multidimensional arrays (i.e., tensors). …”
Get full text
Article -
3139
USAGE RATE OF THE UNLICENSED MEDICATIONS IN NEONATOLOGY: DATA OF THE PHARMACO EPIDEMIOLOGICAL RESEARCH
Published 2007-08-01Get full text
Article -
3140
Security Login System on Mobile Application with Implementation of Advanced Encryption Standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit
Published 2019-05-01“…The development of mobile applications is unbalanced with the level of its security which is vulnerable to hacker attacks. …”
Get full text
Article