Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
19001
Spider web-reinforced chitosan/starch biopolymer for active biodegradable food packaging
Published 2024-12-01Get full text
Article -
19002
-
19003
-
19004
Overview of Traffic Flow Forecasting Techniques
Published 2025-01-01“…This paper provides a comprehensive review of traffic forecasting methods, bridging traditional techniques and innovative approaches driven by computational intelligence and abundant data. The study classifies forecasting methods into four categories: naïve techniques, parametric methods, simulation-based approaches, and nonparametric models such as machine learning and deep learning. …”
Get full text
Article -
19005
Load Balancing for Integrated Access and Backhaul in mmWave Small Cells
Published 2023-01-01Get full text
Article -
19006
A novel approach for breast cancer detection using a Nesterov accelerated adam optimizer with an attention mechanism
Published 2025-07-01“…However, advancements in digital technologies and computer vision have enabled convolutional neural networks (CNNs) to learn features automatically, thereby overcoming these challenges. …”
Get full text
Article -
19007
-
19008
Blockchain-Enhanced Attribute-Based Encryption Architecture With Feasibility Analysis
Published 2025-01-01Get full text
Article -
19009
SC-Route: A Scalable Cross-Layer Secure Routing Method for Multi-Hop Inter-Domain Wireless Networks
Published 2025-05-01“…Despite the advances in secure routing techniques in areas such as node authentication and encryption, they still suffer from the shortcomings of frequent key updates, high computational overhead, and poor adaptability to large-scale dynamic topologies. …”
Get full text
Article -
19010
Learning Graph Structures With Autoregressive Graph Signal Models
Published 2025-01-01“…This method, along with real-world data from the National Climatic Data Center, is used to evaluate GL-AR’s performance in recovering undirected graph structures. …”
Get full text
Article -
19011
Comprehending the outer membrane protein modelling of pathogenic Gram-negative bacteria for in silico antibiotics screening
Published 2025-01-01“…One of the promising strategies is to utilize computational molecular simulations to understand interactions between the target protein and various drug candidates. β-barrel assembly machinery subunit A (BamA) has recently gained attention as a potential target protein. …”
Get full text
Article -
19012
Optimising Connectivity and Energy: The Future of LoRaWAN Routing Protocols for Mobile IoT Applications
Published 2025-03-01Get full text
Article -
19013
HGAPSO-Based Third Order-SMC, ST-SMC, and SMC Strategy for AAV Control: A Comparative Analysis
Published 2025-01-01Get full text
Article -
19014
A feature explainability-based deep learning technique for diabetic foot ulcer identification
Published 2025-02-01Get full text
Article -
19015
-
19016
Large language models to process, analyze, and synthesize biomedical texts: a scoping review
Published 2024-12-01Get full text
Article -
19017
Optimizing Multi-Microgrid Operations with Battery Energy Storage and Electric Vehicle Integration: A Comparative Analysis of Strategies
Published 2025-03-01“…Mathematical models for each strategy are developed and evaluated using annual simulations with real-world data. …”
Get full text
Article -
19018
-
19019
Windows Malware Detection via Enhanced Graph Representations with Node2Vec and Graph Attention Network
Published 2025-04-01Get full text
Article -
19020
An optimization-inspired intrusion detection model for software-defined networking
Published 2025-01-01Get full text
Article