-
1
Improving Sleep Disorder Diagnosis Through Optimized Machine Learning Approaches
Published 2025-01-01Get full text
Article -
2
BDMANGO: An image dataset for identifying the variety of mango based on the mango leavesMendeley Data
Published 2025-02-01Get full text
Article -
3
ONUBAD: A comprehensive dataset for automated conversion of Bangla regional dialects into standard Bengali dialectMendeley Data
Published 2025-02-01“…It is hosted by the Department of Computer Science and Engineering, Jahangirnagar University, and is freely accessible at https://data.mendeley.com/datasets/6ft99kf89b/2…”
Get full text
Article -
4
-
5
Embodied neuromorphic synergy for lighting-robust machine vision to see in extreme bright
Published 2024-12-01Get full text
Article -
6
-
7
Unveiling shadows: A data-driven insight on depression among Bangladeshi university students
Published 2025-01-01Get full text
Article -
8
-
9
-
10
An Improved Clustering Algorithm of Tunnel Monitoring Data for Cloud Computing
Published 2014-01-01Get full text
Article -
11
SLM-DFS: A systematic literature map of deepfake spread on social media
Published 2025-01-01Get full text
Article -
12
Correction: A Model for Estimating Resiliency of AI-Based Classifiers Defending Against Cyber Attacks
Published 2025-01-01Get full text
Article -
13
Correction: Predictive modeling of ALS progression: an XGBoost approach using clinical features
Published 2025-01-01Get full text
Article -
14
Corrigendum to “Implementation and Evaluation of WLAN 802.11ac for Residential Networks in NS-3”
Published 2018-01-01Get full text
Article -
15
-
16
A Comprehensive Survey on Embodied Intelligence: Advancements, Challenges, and Future Perspectives
Published 2024-12-01Get full text
Article -
17
-
18
An adaptive neuro-fuzzy inference system for multinomial malware classification
Published 2025-02-01Get full text
Article -
19
Smartphone image dataset for radish plant leaf disease classification from BangladeshMendeley Data
Published 2025-02-01Get full text
Article -
20
Dependability and Security for Wireless Ad Hoc and Sensor Networks and Their Applications
Published 2013-07-01Get full text
Article