Search for persons
X
?
Proceedings of the 2024 9th International Conference on Intelligent Information Technology ,
1
Knife Detection using YOLOV5: A Deep Learning Approach:
, In:
?
IFMBE Proceedings; 9th International Conference on the Development of Biomedical Engineering in Vietnam ,
2
Preparation of Trimethyl Chitosan Nanoparticles for Spike P..:
, In:
?
Sustainability in Plant and Crop Protection; Sustainable Management of Nematodes in Agriculture, Vol.2: Role of Microbes-Assisted Strategies ,
4
Biological Control of Parasitic Nematodes and Pathogenic Fu..:
, In:
?
2022 International Conference on Multimedia Analysis and Pattern Recognition (MAPR) ,
5
The Use of Machine Learning Algorithms for Evaluating Water..:
, In:
?
IFMBE Proceedings; 7th International Conference on the Development of Biomedical Engineering in Vietnam (BME7) ,
6
Pancreas Segmentation in Medical Images Based on Gaussian M..:
, In:
?
2023 Asia Meeting on Environment and Electrical Engineering (EEE-AM) ,
7
Performance Analysis of SRM with Different Rotor and Stator..:
, In:
?
Algorithms for Intelligent Systems; Proceedings of Second International Conference on Intelligent System ,
8
MED-H: Smart Healthcare System Based on IoT and Rule Set:
, In:
?
2023 IEEE 15th International Conference on Computational Intelligence and Communication Networks (CICN) ,
9
LVSUM-Optimized Live 360 Degree Video Streaming in Unicast ..:
, In:
?
Current Developments in Biotechnology and Bioengineering ,
11
Sustainable production and application of biochar for energ..:
, In:
?
Advances in Engineering Research and Application; Lecture Notes in Networks and Systems ,
12
Calculating Optimum Main Design Factors of a Two-Stage Heli..:
, In:
?
Advances in Engineering Research and Application; Lecture Notes in Networks and Systems ,
13
Study on Multi-criteria Decision Making in CBN Grinding SKD..:
, In:
?
Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications; Communications in Computer and Information Science ,
14
Evading Security Products for Credential Dumping Through Ex..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
15