Suggested Topics within your search.
Suggested Topics within your search.
- Computer science 3
- Application software 1
- Automata 1
- Automatic speech recognition 1
- Coding and Information Theory 1
- Coding theory 1
- Computer access points 1
- Development 1
- Digital techniques 1
- Enterprise application integration (Computer systems) 1
- Government policy 1
- Graphical user interfaces (Computer systems) 1
- Human-computer interaction 1
- Human-machine systems 1
- Information theory 1
- Interactive computer systems 1
- Java (Computer program language) 1
- Management information systems 1
- Mathematics 1
- Moral and ethical aspects 1
- Natural language processing (Computer science) 1
- Object-oriented programming (Computer science) 1
- Prevention 1
- Programming Languages, Compilers, Interpreters 1
- Programming languages (Electronic computers) 1
- Psychological aspects 1
- Psychology 1
- Scripting languages (Computer science) 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
-
81
Detection of Masses in Mammogram Images Based on the Enhanced RetinaNet Network With INbreast Dataset
Published 2025-02-01“…Mingzhao Wang,1 Ran Liu,1 Joseph Luttrell IV,2 Chaoyang Zhang,2 Juanying Xie1 1School of Computer Science, Shaanxi Normal University, Xian, People’s Republic of China; 2School of Computing Sciences and Computer Engineering, University of Southern Mississippi, Hattiesburg, MS, USACorrespondence: Juanying Xie, School of Computer Science, Shaanxi Normal University, No. 620, West Chang’an Avenue, Chang’an District, Xi’an, 710119, Shaanxi, People’s Republic of China, Tel +86 13088965815, Email xiejuany@snnu.edu.cn Chaoyang Zhang, School of Computing Sciences and Computer Engineering, University of Southern Mississippi, 118 College Drive, Hattiesburg, MS, 39406-0001, USA, Email chaoyang.zhang@usm.eduPurpose: Breast cancer is the most common major public health problems of women in the world. …”
Get full text
Article -
82
Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability
Published 2025-01-01Get full text
Article -
83
Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
Published 2024-05-01Get full text
Article -
84
A Radio-interferometric Imaging Method Based on the Wavelet Tight Frame
Published 2025-01-01Get full text
Article -
85
Robotic assembly of modular concrete shells using falsework
Published 2025-03-01Get full text
Article -
86
-
87
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01Get full text
Article -
88
-
89
-
90
-
91
Embeddings
Published 2022-12-01“…I argue here that the concept of embedding (understood in the mathematical and computer science sense) provides a general way of understanding the relation between generative AI, written language and semiotics, and animal cognition when understood recursively. …”
Get full text
Article -
92
Cloud-edge hybrid deep learning framework for scalable IoT resource optimization
Published 2025-02-01Get full text
Article -
93
-
94
PIPENN-EMB ensemble net and protein embeddings generalise protein interface prediction beyond homology
Published 2025-02-01Get full text
Article -
95
AI-based quality assessment methods for protein structure models from cryo-EM
Published 2025-06-01Get full text
Article -
96
-
97
-
98
Dual-Path Adaptive Channel Attention Network Based on Feature Constraints for Face Anti-Spoofing
Published 2025-01-01Get full text
Article -
99
Improvement of Specific Multi-target Tracking Algorithm in Cross-domain Environment
Published 2025-01-01Get full text
Article -
100
Open Filters and Congruence Relations on Self-Distributive Weak Heyting Algebras
Published 2024-06-01Get full text
Article