Subscribed Libraries
Total: 201
| Sn | Title | Author | Abstract | Full Text |
|---|---|---|---|---|
| 1 | Mycobacterium tuberculosis: cell biology, pathogenesis and role of immune cells, drug resistance mechanism and diagnostic methods | Amandeep Kaur | Abstract | Full Text |
| 2 | Cell Biology and Cellular Processes | Kirtan Kumar | Abstract | Full Text |
| 3 | https://www.nasa.gov/sites/default/files/styles/side_image/public/thumbnails/image/solar_system_dust_jacket-front-cover_0.jpg?itok=t-S70IO3 | Abstract | Full Text | |
| 4 | Medical QA Oriented Multi-Task Learning Model for Question Intent Classification and Named Entity Recognition | by nTurdi Tohti,nMamatjan Abdurxit andnAskar Hamdulla | Abstract | Full Text |
| 5 | Initial Cybersecurity Framework in the New Capital City of Indonesia: Factors, Objectives, and Technology | by nDana Indra Sensuse,nPrasetyo Adi Wibowo Putro,nRini Rachmawati andnWikan Danar Sunindyo | Abstract | Full Text |
| 6 | Cloud Gamification: Bibliometric Analysis and Research Advances | by nMyriam González-LimĂłn andnAsunciĂłn RodrĂguez-Ramos | Abstract | Full Text |
| 7 | Automatically Testing Containedness between Geometric Graph Classes Defined by Inclusion, Exclusion, and Transfer Axioms under Simple Transformations | Lucas Böltz and Hannes Frey | Abstract | Full Text |
| 8 | SWAR: A Deep Multi-Model Ensemble Forecast Method with Spatial Grid and 2-D Time Structure Adaptability for Sea Level Pressure | Jingyun Zhang, Lingyu Xu and Baogang Jin | Abstract | Full Text |
| 9 | A Comparative Study of Machine Learning and Deep Learning Techniques for Fake News Detection | by nJawaher Alghamdi,nYuqing Lin andnSuhuai Luo | Abstract | Full Text |
| 10 | User-Generated Content in Social Media: A Twenty-Year Bibliometric Analysis in Hospitality | Fotis Kitsios, Eleftheria Mitsopoulou, Eleni Moustaka and Maria Kamariotou | Abstract | Full Text |
| 11 | Development of a Method for the Engineering of Digital Innovation Using Design Science Research | by nMurad Huseynli,nUdo Bub andnMichael Chima Ogbuachi | Abstract | Full Text |
| 12 | DEGAIN: Generative-Adversarial-Network-Based Missing Data Imputation | by nReza Shahbazian andnIrina Trubitsyna | Abstract | Full Text |
| 13 | Fast Training Set Size Reduction Using Simple Space Partitioning Algorithms | by nStefanos Ougiaroglou,nTheodoros Mastromanolis,nGeorgios Evangelidis andnDionisis Margaris | Abstract | Full Text |
| 14 | An Efficient Malware Classification Method Based on the AIFS-IDL and Multi-Feature Fusion | by nXuan Wu andnYafei Song | Abstract | Full Text |
| 15 | How the V4 Nations Handle the Idea of Smart Cities | by nRoman Blazek,nPavol Durana andnJaroslav Jaros | Abstract | Full Text |
| 16 | Serious Games for Vision Training Exercises with Eye-Tracking Technologies: Lessons from Developing a Prototype | by nQasim Ali,nIlona Heldal,nCarsten Gunnar Helgesen andnAre Dæhlen | Abstract | Full Text |
| 17 | Incremental Entity Blocking over Heterogeneous Streaming Data | by nTiago Brasileiro AraĂşjo,nKostas Stefanidis,nCarlos Eduardo Santos Pires,nJyrki Nummenmaa andnThiago Pereira da NĂłbrega | Abstract | Full Text |
| 18 | The Impact of Story Structure, Meaningfulness, and Concentration in Serious Games | by nSofia Pescarin andnDelfina S. Martinez Pandiani | Abstract | Full Text |
| 19 | Freehand Gestural Selection with Haptic Feedback in Wearable Optical See-Through Augmented Reality | by nGang Wang,nGang Ren,nXinye Hong,nXun Peng,nWenbin Li andnEamonn O’Neill | Abstract | Full Text |
| 20 | CA-STD: Scene Text Detection in Arbitrary Shape Based on Conditional Attention | by nXing Wu,nYangyang Qi,nJun Song,nJunfeng Yao,nYanzhong Wang,nYang Liu,nYuexing Han andnQuan Qian | Abstract | Full Text |
| 21 | Deep Reinforcement Learning-Based iTrain Serious Game for Caregivers Dealing with Post-Stroke Patients | by nRytis Maskeliunas,nRobertas Damasevicius,nAndrius Paulauskas,nMaria Gabriella Ceravolo,nMarina Charalambous,nMaria Kambanaros,nEliada Pampoulou,nFrancesco Barbabella,nArianna Poli andnCarlos V. Carvalho | Abstract | Full Text |
| 22 | A Context-Aware Android Malware Detection Approach Using Machine Learning | by nMohammed N. AlJarrah,nQussai M. Yaseen andnAhmad M. Mustafa | Abstract | Full Text |
| 23 | Systematic Construction of Knowledge Graphs for Research-Performing Organizations | by nDavid Chaves-Fraga,nOscar Corcho,nFrancisco Yedro,nRoberto Moreno,nJuan OlĂas andnAlejandro De La Azuela | Abstract | Full Text |
| 24 | Generalized Zero-Shot Learning for Image Classification—Comparing Performance of Popular Approaches | by nElie Saad,nMarcin Paprzycki,nMaria Ganzha,nAmelia BÄdicÄ,nCostin BÄdicÄ,nStefka Fidanova,nIvan Lirkov andnMirjana Ivanović | Abstract | Full Text |
| 25 | Using Crypto-Asset Pricing Methods to Build Technical Oscillators for Short-Term Bitcoin Trading | by nZixiu Yang andnDean Fantazzini | Abstract | Full Text |
| 26 | Evaluating and Comparing the Usability of Mobile Banking Applications in Saudi Arabia | by nSarah Alhejji,nAbdulmohsen Albesher,nHeider Wahsheh andnAbdulaziz Albarrak | Abstract | Full Text |
| 27 | LED-Lidar Echo Denoising Based on Adaptive PSO-VMD | by nZiqi Peng,nHongzi Bai,nTatsuo Shiina,nJianglong Deng,nBei Liu andnXian Zhang | Abstract | Full Text |
| 28 | Determining Intermediary Closely Related Languages to Find a Mediator for Intertribal Conflict Resolution | by nArbi Haza Nasution,nShella Eldwina Fitri,nRizauddin Saian,nWinda Monika andnNasreen Badruddin | Abstract | Full Text |
| 29 | Liquid Proof-of-Stake in Tezos: An Economic Analysis | by nNicola Dimitri | Abstract | Full Text |
| 30 | Improving the Adversarial Robustness of Neural ODE Image Classifiers by Tuning the Tolerance Parameter | by nFabio Carrara,nRoberto Caldelli,nFabrizio Falchi andnGiuseppe Amato | Abstract | Full Text |
| 31 | HEVC Based Frame Interleaved Coding Technique for Stereo and Multi-View Videos | by nBruhanth Mallik,nAkbar Sheikh-Akbari,nPooneh Bagheri Zadeh andnSalah Al-Majeed | Abstract | Full Text |
| 32 | Image-Based Approach to Intrusion Detection in Cyber-Physical Objects | by nSergey Golubev,nEvgenia Novikova andnElena Fedorchenko | Abstract | Full Text |
| 33 | Driving Factors of Industry 4.0 Readiness among Manufacturing SMEs in Malaysia | by nAnnie Pooi Hang Wong andnDaisy Mui Hung Kee | Abstract | Full Text |
| 34 | Explainable Decision-Making for Water Quality Protection | by nJozo Dujmović andnWilliam L. Allen | Abstract | Full Text |
| 35 | Multimodal EEG Emotion Recognition Based on the Attention Recurrent Graph Convolutional Network | by nJingxia Chen,nYang Liu,nWen Xue,nKailei Hu andnWentao Lin | Abstract | Full Text |
| 36 | On the Reality of Signaling in Auctions | by nAviad Levi andnShani Alkoby | Abstract | Full Text |
| 37 | Object Detection Based on YOLOv5 and GhostNet for Orchard Pests | by nYitao Zhang,nWeiming Cai,nShengli Fan,nRuiyin Song andnJing Jin | Abstract | Full Text |
| 38 | SOCRAT: A Dynamic Web Toolbox for Interactive Data Processing, Analysis and Visualization | by nAlexandr A. Kalinin,nSelvam Palanimalai,nJunqi Zhu,nWenyi Wu,nNikhil Devraj,nChunchun Ye,nNellie Ponarul,nSyed S. Husain andnIvo D. Dinov | Abstract | Full Text |
| 39 | A Semantic Similarity-Based Identification Method for Implicit Citation Functions and Sentiments Information | by nRami Malkawi,nMohammad Daradkeh,nAmmar El-Hassan andnPavel Petrov | Abstract | Full Text |
| 40 | Benefits and Risks of Teleworking from Home: The Teleworkers’ Point of View | by nÉmilie Vayre,nChristine Morin-Messabel,nFlorence Cros,nAnne-Sophie Maillot andnNelly Odin | Abstract | Full Text |
| 41 | SGM: Strategic Game Model for Resisting Node Misbehaviour in IoT-Cloud Ecosystem | by nBurhan Ul Islam Khan,nFarhat Anwar,nFarah Diyana Bt. Abdul Rahman,nRashidah Funke Olanrewaju,nKhang Wen Goh,nZuriati Janin andnMd Arafatur Rahman | Abstract | Full Text |
| 42 | Public Health Policy Monitoring through Public Perceptions: A Case of COVID-19 Tweet Analysis | by nChih-yuan Li,nMichael Renda,nFatima Yusuf,nJames Geller andnSoon Ae Chun | Abstract | Full Text |
| 43 | DNS Request Log Analysis of Universities in Shanghai: A CDN Service Provider’s Perspective | by nZhiyang Sun,nTiancheng Guo,nShiyu Luo,nYingqiu Zhuang,nYuke Ma,nYang Chen andnXin Wang | Abstract | Full Text |
| 44 | Accelerating Update of Variable Precision Multigranulation Approximations While Adding Granular Structures | by nChangchun Li andnChengxiang Hu | Abstract | Full Text |
| 45 | Is Information Physical and Does It Have Mass? | by nMark Burgin andnRao Mikkilineni | Abstract | Full Text |
| 46 | Multi-Microworld Conversational Agent with RDF Knowledge Graph Integration | by nGabriel Boroghina,nDragos Georgian Corlatescu andnMihai Dascalu | Abstract | Full Text |
| 47 | S.A.D.E.—A Standardized, Scenario-Based Method for the Real-Time Assessment of Driver Interaction with Partially Automated Driving Systems | by nNadja Schömig,nKatharina Wiedemann,nAndré Wiggerich andnAlexandra Neukum | Abstract | Full Text |
| 48 | Dynamic Random Graph Protection Scheme Based on Chaos and Cryptographic Random Mapping | by nZhu Fang andnZhengquan Xu | Abstract | Full Text |
| 49 | Justifying Arabic Text Sentiment Analysis Using Explainable AI (XAI): LASIK Surgeries Case Study | by nYoumna Abdelwahab,nMohamed Kholief andnAhmed Ahmed Hesham Sedky | Abstract | Full Text |
| 50 | Cross-Domain Identity Authentication Protocol of Consortium Blockchain Based on Face Recognition | by nXiang Chen,nShouzhi Xu,nKai Ma andnPeng Chen | Abstract | Full Text |