Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
19601
Predicting lncRNA and disease associations with graph autoencoder and noise robust gradient boosting
Published 2025-05-01“…Subsequently, the performance of LDA-GARB against LDA-LNSUBRW, GAMCLDA, LDA-VGHB, LDAGM, and GANLDA on imbalanced data was evaluated. We also performed parameter sensitivity analysis and ablation experiments. …”
Get full text
Article -
19602
RootTracer: An intuitive solution for root image annotation
Published 2025-03-01Get full text
Article -
19603
Adaptive DecayRank: Real-Time Anomaly Detection in Dynamic Graphs with Bayesian PageRank Updates
Published 2025-03-01Get full text
Article -
19604
CoCEC: An Automatic Combinational Circuit Equivalence Checker Based on the Interactive Theorem Prover
Published 2021-01-01Get full text
Article -
19605
-
19606
Consensus-Based Load Frequency Control of a Multi-Area Power System
Published 2024-01-01Get full text
Article -
19607
-
19608
Development of a Smart Lock System using QR Code Technology
Published 2024-11-01“… A smart lock system refers to a modern security solution that enables users to remotely control access to their homes or businesses using a smart device such as smartphone, tablet, or computer. This paper presents the development of a smart lock system using Quick Response (QR) code technology to address the problem of insecurity, inconvenience, and inflexibility in access control. …”
Get full text
Article -
19609
An optimized LSTM-based deep learning model for anomaly network intrusion detection
Published 2025-01-01Get full text
Article -
19610
-
19611
-
19612
Adaptive image encryption approach using an enhanced swarm intelligence algorithm
Published 2025-03-01Get full text
Article -
19613
-
19614
Robust Anti-Jamming Method for Large-Array Radar Systems Using Deep Learning Based Null-Space Beamforming
Published 2025-01-01“…The proposed method combines the computational simplicity of null-space beamforming with the adaptability of deep learning to effectively suppress interference and maintain a high signal-to-interference-plus-noise ratio (SINR). …”
Get full text
Article -
19615
An End-to-End Solution for Large-Scale Multi-UAV Mission Path Planning
Published 2025-06-01“…This work advances large-scale UAV mission planning by offering a scalable, adaptive, and computationally efficient solution.…”
Get full text
Article -
19616
-
19617
A hybrid approach for cervical cancer detection: Combining D-CNN, transfer learning, and ensemble models
Published 2025-09-01Get full text
Article -
19618
Simultaneous Learning Knowledge Distillation for Image Restoration: Efficient Model Compression for Drones
Published 2025-03-01“…This dual-teacher approach enables the student model to learn from both degraded and clean images simultaneously, achieving robust image restoration while significantly reducing computational complexity. Experimental evaluations across five benchmark datasets and three restoration tasks—deraining, deblurring, and dehazing—demonstrate that, compared to the teacher models, the SLKD student models achieve an average reduction of 85.4% in FLOPs and 85.8% in model parameters, with only a slight average decrease of 2.6% in PSNR and 0.9% in SSIM. …”
Get full text
Article -
19619
Botnet detection in internet of things using stacked ensemble learning model
Published 2025-07-01Get full text
Article -
19620
Modified Whale Optimization Algorithm for Multiclass Skin Cancer Classification
Published 2025-03-01“…A more effective feature selection methodology improves accuracy and reduces computational overhead while maintaining robust performance. …”
Get full text
Article