-
641
-
642
-
643
Acoustic Sensors data transmission integrity and endurance with IoT-enabled location-aware framework
Published 2024-12-01Get full text
Article -
644
Enabling smart parking for smart cities using Internet of Things (IoT) and machine learning
Published 2025-01-01Get full text
Article -
645
Prediction of amphipathic helix-membrane interactions with Rosetta.
Published 2021-03-01“…Amphipathic helices have hydrophobic and hydrophilic/charged residues situated on opposite faces of the helix. They can anchor peripheral membrane proteins to the membrane, be attached to integral membrane proteins, or exist as independent peptides. …”
Get full text
Article -
646
Dopamine transporter oligomerization involves the scaffold domain, but spares the bundle domain.
Published 2018-06-01Get full text
Article -
647
ScITree: Scalable Bayesian inference of transmission tree from epidemiological and genomic data.
Published 2025-06-01“…However, the Lau method faces major computational bottlenecks. As the volume of genomic data collected during outbreaks continues to grow, it is crucial to develop scalable yet accurate phylodynamic methods. …”
Get full text
Article -
648
-
649
Analysis of mutations in precision oncology using the automated, accurate, and user-friendly web tool PredictONCO
Published 2024-12-01“…Next-generation sequencing technology has created many new opportunities for clinical diagnostics, but it faces the challenge of functional annotation of identified mutations. …”
Get full text
Article -
650
Detection of Hijaiyah Letters Handwritten in Early Childhood Using Yolov8
Published 2025-07-01Get full text
Article -
651
ParaU-Net: An improved UNet parallel coding network for lung nodule segmentation
Published 2024-11-01Get full text
Article -
652
Detection and Analysis of Malicious Software Using Machine Learning Models
Published 2024-08-01Get full text
Article -
653
-
654
SAFE-CAST: secure AI-federated enumeration for clustering-based automated surveillance and trust in machine-to-machine communication
Published 2025-01-01“…Machine-to-machine (M2M) communication within the Internet of Things (IoT) faces increasing security and efficiency challenges as networks proliferate. …”
Get full text
Article -
655
A zero-trust based scheme for detecting illegal terminals in the Internet of Things of smart grid
Published 2025-03-01Get full text
Article -
656
SA3C-ID: a novel network intrusion detection model using feature selection and adversarial training
Published 2025-07-01“…With the continuous proliferation of emerging technologies such as cloud computing, 5G networks, and the Internet of Things, the field of cybersecurity is facing an increasing number of complex challenges. …”
Get full text
Article -
657
Video Detection and Fusion Tracking for the Targets in Traffic Scenario
Published 2024-01-01Get full text
Article -
658
-
659
-
660
An Approach to Enable Human–3D Object Interaction Through Voice Commands in an Immersive Virtual Environment
Published 2025-07-01“…Nowadays, the Metaverse is facing many challenges. In this context, Virtual Reality (VR) applications allowing voice-based human–3D object interactions are limited due to the current hardware/software limitations. …”
Get full text
Article