Search

Showing total 464 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic application software Remove constraint Topic: application software Publisher mdpi Remove constraint Publisher: mdpi
464 results

Search Results

1. Application Layer Software Design of Vehicle Comfort Braking Based on Brake-by-Wire System.

2. Instance Segmentation of Shrimp Based on Contrastive Learning.

3. Diagnostics of Exercise-Induced Laryngeal Obstruction Using Machine Learning: A Narrative Review.

4. Concurrent Access Performance Comparison Between Relational Databases and Graph NoSQL Databases for Complex Algorithms.

5. A Generator for Recursive Zip Files.

6. A Developer-Oriented Framework for Assessing Power Consumption in Mobile Applications: Android Energy Smells Case Study.

7. Sorting Permutations on an n − Broom.

8. Digital Genome and Self-Regulating Distributed Software Applications with Associative Memory and Event-Driven History.

9. Remote Sensing and Geovisualization of Rock Slopes and Landslides.

10. Rewarding Developers by Storing Applications on Non-Fungible Tokens.

11. GESUS, an Interactive Computer Application for Teaching and Learning the Space Groups of Symmetry.

12. A Lightweight Pig Face Recognition Method Based on Automatic Detection and Knowledge Distillation.

13. Survey on Videos Data Augmentation for Deep Learning Models.

14. Next-Gen Dynamic Hand Gesture Recognition: MediaPipe, Inception-v3 and LSTM-Based Enhanced Deep Learning Model.

15. Segmentation of 3D Point Clouds of Heritage Buildings Using Edge Detection and Supervoxel-Based Topology.

16. SNNtrainer3D: Training Spiking Neural Networks Using a User-Friendly Application with 3D Architecture Visualization Capabilities.

17. Puzzle Pattern, a Systematic Approach to Multiple Behavioral Inheritance Implementation in Object-Oriented Programming.

18. Fast Gaussian Filter Approximations Comparison on SIMD Computing Platforms.

19. Investigating the Support Provided by Chatbots to Educational Institutions and Their Students: A Systematic Literature Review.

20. Overcoming Dimensionality Constraints: A Gershgorin Circle Theorem-Based Feature Extraction for Weighted Laplacian Matrices in Computer Vision Applications.

21. HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security †.

22. Design and Assessment of an Active Learning-Based Seminar.

23. Theoretical and Empirical Analysis of a Fast Algorithm for Extracting Polygons from Signed Distance Bounds.

24. iPlan : A Platform for Constructing Localized, Reduced-Form Models of Land-Use Impacts †.

25. Formal Software Architecture Rule Learning: A Comparative Investigation between Large Language Models and Inductive Techniques.

26. Utilizing Stereography to Compare Cultural Heritage in the Past and Now: An Interactive AR Application.

27. Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical Implementations.

28. Application of Simulation in the Optimization of the Blood Plasma Storage Process.

29. Security Monitoring during Software Development: An Industrial Case Study.

30. A Web-Based Docker Image Assistant Generation Tool for User-PC Computing System.

31. Benchmarking Message Queues.

32. Towards the Integration of Security Practices in Agile Software Development: A Systematic Mapping Review.

33. Requirements Engineering in Software Startups: A Systematic Mapping Study.

34. Combinatorial Test Case Generation Based on ROBDD and Improved Particle Swarm Optimization Algorithm.

35. A Crack Segmentation Model Combining Morphological Network and Multiple Loss Mechanism.

36. Congruence Mapping of the Activity Flows Allocated in Built Environments: A Pilot Application of Under-Development Software in an Emergency-Care Service.

37. No-Reference Video Quality Assessment Using the Temporal Statistics of Global and Local Image Features.

38. Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm.

39. Data Hiding of Multicompressed Images Based on Shamir Threshold Sharing.

40. Performance Estimation of High-Level Dataflow Program on Heterogeneous Platforms by Dynamic Network Execution †.

41. A Bibliometric and Visualized Analysis of Research Progress and Trends on Decay and Cavity Trees in Forest Ecosystem over 20 Years: An Application of the CiteSpace Software.

42. Architectural Patterns for Blockchain Systems and Application Design.

43. Applications of Computer Vision-Based Structural Monitoring on Long-Span Bridges in Turkey.

44. Hardware and Software Implementation of the Embedded Controlling System for the TuMag Camera.

45. AppSimV: A Cyber–Physical Simulation and Verification Platform for Software Applications of Intelligent Buildings.

46. DNA Computing: Concepts for Medical Applications.

47. Editorial for the Special Issue on "ROBOETHICS".

48. Application of Game Method for Modelling and Temporal Intuitionistic Fuzzy Pairs to the Forest Fire Spread in the Presence of Strong Wind.

49. The Mathematical Models of the Operation Process for Critical Production Facilities Using Advanced Technologies.

50. Increasing Offline Handwritten Chinese Character Recognition Using Separated Pre-Training Models: A Computer Vision Approach.