1,523 results on '"A Viorel"'
Search Results
2. An Exploration of K-Mer Ranges for Megahit in the Context of Microbial Community-Wide Identification of Antimicrobial Resistance Genes and Biosynthetic Gene Clusters.
3. Increasing e-Health systems security and availability by using noSQL databases.
4. Blood Glucose Prediction in Type 1 Diabetes Based on Long Short-Term Memory.
5. MIMO Channel Capacity Measurements in an Outdoor-to-Indoor Environment at 6 and 37 GHz.
6. Complex System for Monitoring Environmental Factors at the Galata Platform in the Black Sea.
7. Techniques for Measuring and Optimizing Dissolved Oxygen Concentration in a Liquid Lead Environment.
8. Exploring the Intricacies of the Architectural Framework Underlying the Internet of Things Ecosystem.
9. Using the Open Source Collaborative Model for Digital Educational Content.
10. E-commerce Solutions using Distributed Web Systems with Microservices-Based Architecture for High-Performance Online Stores.
11. Game Theoretic Analysis of the Feedback Loop Caused by Widely Available Computer Estimation on Market Values.
12. Heat Recovery System based on Air Propagation in Tube-in-Tube Pipes for Smart Buildings.
13. Preliminary Study on the Application for Monitoring Work Parameters in the Experimental Testing Facility under the Operating Conditions Generation IV Nuclear Reactors.
14. Optimized Architecture for Modular Online Store Based on Microservices for Heavy Load Transactional User Traffic.
15. IoT solution for thermal comfort and air quality monitoring.
16. Study on the Finite Element Modeling of the Mechanical Stresses of the Samples of Nuclear Structural Materials.
17. Multiple Usage Virtual Reality Based Application - Example Scenario for Medical Purposes.
18. Industrial Expert System for Intelligent Traffic Lane Allocation Using Machine Learning and Pattern Recognition.
19. Modeling the deformation behavior of wind turbine blades using artificial neural networks.
20. Unsupervised Graph Neural Networks for Source Code Similarity Detection.
21. Web Scams Detection System.
22. Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code.
23. Multi-Objective Decision Making System Based on Spatial -Temporal Logics.
24. Pneumonia Detection from X-ray Images Using Convolutional Neural Networks.
25. Predicting Blood Glucose Levels Using LSTM.
26. Comparative study of machine learning methods to classify bowel polyps.
27. Compensation of Temperature Nonlinearity in a Zener-Based Voltage Reference.
28. Virtual Heart Models Help Elucidate the Role of Border Zone in Sustained Monomorphic Ventricular Tachycardia.
29. Predictions based on Evolutionary Algorithms - Implementation Aspects regarding the Control Variables' Domain.
30. Artificial Intelligence-Based Algorithm for Resources Allocation.
31. Data Collection and Command Mechanism for Management of Network Resources.
32. GIS-based integrated system with Interactive Digital Map for archaeological heritage protection.
33. Increasing communication security for Bluetooth Medical Devices in eHealth systems.
34. Increasing the security of web applications by using smartphones.
35. A Sensor-Based Unit for Diagnostics and Optimization of Solar Panel Installations.
36. Indoor Channel Multipath Components Statistics and Spatial Correlation in 6 and 37 GHz Bands.
37. A Fast NDFA-Based Approach to Approximate Pattern-Matching for Plagiarism Detection in Blockchain-Driven NFTs.
38. Fast Automatic Liver Tumor Radiofrequency Ablation Planning via Learned Physics Model.
39. Phishing Kits Source Code Similarity Distribution: A Case Study.
40. Panels Made of Composite Coated Aramid Fabrics, Under Spike Weapon Attack.
41. The main benefits-risks of adopting Robotic Process Automation in Big Four Companies from Romania. A Case Study.
42. Numerical Investigation of the Mixing Efficiency in Square-Wave Passive Micromixers for Microfluidic Device Applications.
43. Numerical Simulation of Fluid Flow on Rotating Microchannels for Centrifugal Micromixer Applications.
44. The Effect of Ensuring Ergonomic Learning Conditions in Technical University Education on the Engineering Profession.
45. Hardware implementation of Hopfield-like neural networks: Quantitative analysis of FPGA approach.
46. Proactive Detection of Phishing Kit Traffic.
47. Cloud based mobile application security enforcement using device attestation API.
48. Indoor Positioning for Low-Cost IoT Devices.
49. IoT Enabled Optimized Architectures for GPS Anti-Theft Tracking Devices.
50. Condition Monitoring of Manufacturing Production Lines Using Fractal Analysis of Energy Consumption Datasets.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.