


default search action
Frontiers in Computer Science, Volume 7
Volume 7, 2025
- Yunye Gong, Pavan Turaga, P. Thomas Fletcher, Ajay Divakaran:
Editorial: Geometries of learning. - Gundala Pallavi, Rangarajan Prasanna Kumar:
Quantum natural language processing and its applications in bioinformatics: a comprehensive review of methodologies, concepts, and future directions. - Pasan Bhanu Guruge
, Y. H. P. P. Priyadarshana:
Time series forecasting-based Kubernetes autoscaling using Facebook Prophet and Long Short-Term Memory. - Ana Maria Silvia Gonzalez-Acosta, Marciano Vargas-Treviño
, Patricia Batres-Mendoza, Erick Israel Guerra-Hernandez
, Jaime Gutiérrez-Gutiérrez, José Luis Cano-Perez, Manuel A. Solis-Arrazola
, Horacio Rostro-González:
The first look: a biometric analysis of emotion recognition using key facial features. - Alessandro Bruno, Pier Luigi Mazzeo, Nicola Strisciuglio, Barbara Hammer, Mingliang Gao:
Editorial: Computer vision and AI in real-world applications: robustness, generalization, and engineering. - Jessie Leila Bravo Jaico, Gisella Luisa Elena Maquen-Niño, Nilton César Germán Reyes, Carlos Valdivia, Roger Alarcón, Janet Aquino, Oscar Serquén:
Assessing digital transformation maturity in higher education institutions: a correlational analysis by actors and dimensions. - Romana Rahman Ema, Pintu Chandra Shill:
Multi-model approach for precise lesion localization and severity grading for diabetic retinopathy and age-related macular degeneration. - Nikolos Gurney, David V. Pynadath, John H. Miller:
Willingness to work as a predictor of human-agent team success. - Nobuyuki Oishi, Phil Birch, Daniel Roggen
, Paula Lago
:
WIMUSim: simulating realistic variabilities in wearable IMUs for human activity recognition. - Muhammad Aminu Umar
, Kevin Lano, Abdullahi Kutiriko Abubakar:
Automated requirements engineering framework for agile model-driven development. - Maxi Heitmayer:
When the phone's away, people use their computer to play: distance to the smartphone reduces device usage but not overall distraction and task fragmentation during work. - Lizhong Jin, Rulong Fan, Xiaoling Han, Xueying Cui:
IGSA-SAC: a novel approach for intrusion detection using improved gravitational search algorithm and soft actor-critic. - Nazmul Ahasan Maruf, Abdullah Basuhail:
Breast cancer diagnosis using radiomics-guided DL/ML model-systematic review and meta-analysis. - George Evangelou, Orestis Georgiou, Eddie Brown, James W. Moore:
Sense of agency in gesture-based interactions: modulated by sensory modality but not feedback meaning. - Moeiz Miraoui
, Mohamed Ben Belgacem:
Binary and multiclass malware classification of windows portable executable using classic machine learning and deep learning. - Nada Alasbali, Jawad Ahmad, Ali Akbar Siddique, Oumaima Saidani, Alanoud Al Mazroa, Asif Raza, Rahmat Ullah
, Muhammad Shahbaz Khan:
Privacy-enhanced skin disease classification: integrating federated learning in an IoT-enabled edge computing. - Arslan Musaddiq, Irfan Azam, Tobias Olsson, Fredrik Ahlgren:
Editorial: Machine learning for resource management in industrial Internet of Things. - Fabrizio Galeazzi, Gayatri Parameswaran, Felix Gaedtke, Viren Swami:
Exploring the revitalisation of endangered intangible heritage and languages through multimedia storytelling and immersive technologies: a case study of virtual reality and 2D film with the Kusunda community in Nepal. - Abeer Hakeem, Maha Farouk Sabir, Reemah M. Alhebshi
, Abeer Ghazy Almakky, Imran Ashraf:
Integrating artificial intelligence for improved security of IoT-drones through cyber-physical attack detection. - Jayedi Aman, Timothy C. Matisziw:
Urban sentiment mapping using language and vision models in spatial analysis. - Ayodele A. Periola, Opeyeolu Timothy Laseinde, Olugbenga Kayode Ogidan:
Future aerial sustainable and environment-friendly transport using stratospheric platforms. - Andrea Delgado, Prasanna Date:
Defining quantum-ready primitives for hybrid HPC-QC supercomputing: a case study in Hamiltonian simulation. - Phasuwut Chunnapiya, Porawat Visutsak:
Enhancing automatic electric vehicle charging: a deep learning approach with YOLO and feature extraction techniques. - Badri Raj Lamichhane, Gun Srijuntongsiri, Teerayut Horanont:
CNN based 2D object detection techniques: a review. - Anthony Belessis
, Iliana Loi, Konstantinos Moustakas:
Advanced articulated motion prediction. - Dhananjay Joshi
, Bhupesh Kumar Singh, Kapil Kumar Nagwanshi, Nitin S. Choubey:
Integrating pyramid vision transformer and topological data analysis for brain tumor. - Liliek Triyono, Rahmat Gernowo, Prayitno:
MoNetViT: an efficient fusion of CNN and transformer technologies for visual navigation assistance with multi query attention. - Agostino Marengo, Fatma Gizem Karaoglan Yilmaz
, Ramazan Yilmaz, Mehmet Ceylan:
Development and validation of generative artificial intelligence attitude scale for students. - Martin Neumann, Vanessa Dirksen
:
Symbol grounding for generative AI: lessons learned from interpretive ABM. - Arshia Hemmat, Mohammadreza Sharbaf, Shekoufeh Kolahdouz Rahimi, Kevin Lano, Sobhan Yassipour Tehrani:
Research directions for using LLM in software requirement engineering: a systematic review. - Sheena Angra, Shinnu Jangra, Yonis Gulzar
, Bhanu Sharma, Gurjinder Singh, Wou Onn Choo:
Twenty-two years of advancements in augmented and virtual reality: a bibliometric and systematic review. - Altynbek Amirzhanov
, Cemil Turan, Alfira Makhmutova:
Plagiarism types and detection methods: a systematic survey of algorithms in text analysis. - Jonatan Reyes, Anil Ufuk Batmaz, Marta Kersten-Oertel:
Trusting AI: does uncertainty visualization affect decision-making? - Abdul Muhammed Rasheed, Retnaswami Mathusoothana S. Kumar:
Efficient lightweight cryptographic solutions for enhancing data security in healthcare systems based on IoT. - Amirhossein Douzandeh Zenoozi
, Laura Erhan, Antonio Liotta, Lucia Cavallaro:
A comparative study of neural network pruning strategies for industrial applications. - Osama Jamil, Annmarie Brennan
:
Immersive heritage through Gaussian Splatting: a new visual aesthetic for reality capture. - Ecaterina Coman:
IVR systems used in call center management: a scientometric analysis of the literature.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.