-
561
A Secure Image Steganography Using Shark Smell Optimization and Edge Detection Technique
Published 2022-10-01Get full text
Article -
562
A Review on Person Re-Identification Techniques and Its Analysis
Published 2025-01-01Get full text
Article -
563
Cluster Optimization in Mobile Ad Hoc Networks Based on Memetic Algorithm: memeHoc
Published 2020-01-01Get full text
Article -
564
Improving the Accuracy for Analyzing Heart Diseases Prediction Based on the Ensemble Method
Published 2021-01-01Get full text
Article -
565
-
566
Comparison of Machine Learning Techniques for the Prediction of Compressive Strength of Concrete
Published 2018-01-01Get full text
Article -
567
FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining
Published 2014-01-01Get full text
Article -
568
-
569
-
570
CTU Hornet 65 Niner: A network dataset of geographically distributed low-interaction honeypotsMendeley Data
Published 2025-02-01Get full text
Article -
571
-
572
A model for predicting dropout of higher education students
Published 2025-03-01Get full text
Article -
573
Performance analysis of REST API technologies using Spring and Express.js examples
Published 2023-12-01Get full text
Article -
574
-
575
Two Iterative Methods for Solving Linear Interval Systems
Published 2018-01-01Get full text
Article -
576
MRI Reconstruction with Separate Magnitude and Phase Priors Based on Dual-Tree Complex Wavelet Transform
Published 2022-01-01Get full text
Article -
577
Pricing Resources in LTE Networks through Multiobjective Optimization
Published 2014-01-01Get full text
Article -
578
Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions
Published 2018-01-01Get full text
Article -
579
Incorporating Multimodal Directional Interpersonal Synchrony into Empathetic Response Generation
Published 2025-01-01Get full text
Article -
580