Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9
Научные статьи
В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
Gender Classification Optimization with Thermal Images Using Advanced Neural Networks
Enhanced Surgical Mask Recognition Using EfficientNet Architecture
Quality Assessment of Degraded Palmprints Using Enhancement Filters
Refining Cyclonic Cloud Analysis via INSAT-3D Satellite Imagery and Advanced Image Processing Techniques
Image De-Weathering Using Median Channel Technique and RGB-based Transmission Map for Autonomous Vehicles
A Machine Learning Approach for Sentiment Analysis Using Social Media Posts
Enhancing Jakarta Faces Web App with AI Data-Driven Python Data Analysis and Visualization
Multi-head Network based Students Behaviour Prediction with Feedback Generation for Enhancing Classroom Engagement and Teaching Effectiveness
A Comparative Model for Blurred Text Detection in Wild Scene Using Independent Component Analysis (ICA) and Enhanced Genetic Algorithm (Using a Bird Approach) with Classifiers
Real-time Deep Learning Based Mobile Application for Detecting Edible Fungi: Mushapp
Performance Evaluation of Deep Learning Architectures for Blood Pressure Estimation Using Photoplethysmography
Identification of Customer Through Voice Biometric System in Call Centres
Information Technology for Gender Voice Recognition Based on Machine Learning Methods
Improve Usability of Multidimensional Data Exploration with Water Fountain Based 3D User Interface Metaphor
Heuristic – Driven Disjoint Alternate Path Switching – Based Fault Resilient Multi- Constraints Routing Protocol for SDN-mIOT
Machine Learning Algorithms for Detecting DDoS Attacks in Intrusion Detection Systems
Methodology for Searching for the Dependence Between Data Defensiveness and Volume of Social Network Evolution
Delay-sensitive Quality of Service Routing with Integrated Admission Control for Wireless Mesh Network
An Efficient Optimized Neural Network System for Intrusion Detection in Wireless Sensor Networks
Green Optimization with Load balancing in Wireless Sensor Network using Elephant Herding Optimization
A Feasibility Study for Developing a Computerized Adaptive Version of Verbal Ability Test for Gulf Student
Indonesian Sign Language: Detection with Applying Convolutional Neural Network in a Song Lyric
Dilated Convolutional Neural Network with Attention Mechanism for Classification of Malaria Parasites
A Novel Image Acquisition Technique for Classifying Whole and Split Cashew Nuts Images Using Multi-CNN
A Novel GAN with DNA Sequences and Hash-based Approach for Improving Medical Image Security
CD-BGRU Net: Detection of Colon Cancer in Histopathology Images Using Bidirectional GRU with EfficientnetB0 Feature Extraction System
Suspicious Activity Detection Model in Bank Transactions Using Deep Learning with Fog Computing Infrastructure
IoT-Based Fish Recommendation System: A Machine Learning Approach via Mobile Application for Precision Agriculture
Active Light Weight Recommendation System for Social Networking Analysis Using a Novel Classifier Algorithm
A Framework for Diabetic Retinopathy Detection using Transfer Learning and Data Fusion
Performance Evaluation of Fake News Detection Models
Intelligent Identification of Cryptographic Ciphers using Machine Learning Techniques
Information Technology for Sound Analysis and Recognition in the Metropolis based on Machine Learning Methods
Human Perception Based on Textual Analysis
Fuzzy-based Bi-objective Energy Efficient Routing Protocol for Large Scale Mobile Ad-hoc Network
Hive-Based Data Encryption for Securing Sensitive Data in HDFS
Analyzing Sentiments on Twitter Using Deep Learning Techniques
Emotion Classification Utilizing Transformer Models with ECG Signal Data
A Prediction Method of Forecasting University Student Achievements Using an Iterative Neural Network Shrinking Algorithm
IoMT Survey: Device, Architecture, Communication Protocols, Application and Security
← Предыдущая
Следующая страница →
1
|
...
|
73
|
74
|
75
|
76
|
77
|
78
|
79
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.