Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             36 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A class of adaptive filtering algorithms based on improper complex correntropy Qian, Guobing

633 C p. 573-596
artikel
2 A facial geometry based detection model for face manipulation using CNN-LSTM architecture Liang, Peifeng

633 C p. 370-383
artikel
3 A fast approximate method for k-edge connected component detection in graphs with high accuracy Yu, Ting

633 C p. 384-409
artikel
4 Analysis based on statistical distributions: A practical approach for stochastic solvers using discrete and continuous problems Herzog, Jana

633 C p. 469-490
artikel
5 A novel sequential switching quadratic particle swarm optimization scheme with applications to fast tuning of PID controllers Luo, Yuqiang

633 C p. 305-320
artikel
6 A novel two-level interactive action recognition model based on inertial data fusion Qiu, Sen

633 C p. 264-279
artikel
7 A rule-based deep fuzzy system with nonlinear fuzzy feature transform for data classification Yin, Rui

633 C p. 431-452
artikel
8 Clone consistent-defect prediction based on deep learning method Zhang, Fanlong

633 C p. 357-369
artikel
9 Complementary networks for person re-identification Zhang, Guoqing

633 C p. 70-84
artikel
10 3D adversarial attacks beyond point cloud Zhang, Jinlai

633 C p. 491-503
artikel
11 Deep generation network for multivariate spatio-temporal data based on separated attention Wang, Junkai

633 C p. 85-103
artikel
12 Distributed fault estimation over sensor networks: A bit rate allocation scheme Ju, Yamei

633 C p. 597-612
artikel
13 Distributed L 2 − L ∞ containment control with nonconvex constraints for multi-agent systems Hu, Yangming

633 C p. 1-9
artikel
14 Editorial Board
633 C p. ii
artikel
15 Efficient algorithms for multi-armed bandits with additional feedbacks: Modeling and algorithms Xie, Hong

633 C p. 453-468
artikel
16 Employing fuzzy hypothesis testing to improve modified p charts for monitoring the process fraction nonconforming Chukhrova, Nataliya

633 C p. 141-157
artikel
17 Evidential Markov decision-making model based on belief entropy to predict interference effects Pan, Lipeng

633 C p. 10-26
artikel
18 Fixed-time event-triggered fuzzy adaptive control for uncertain nonlinear systems with full-state constraints Wang, Chen

633 C p. 158-169
artikel
19 Heterogeneous cognitive learning particle swarm optimization for large-scale optimization problems Zhang, En

633 C p. 321-342
artikel
20 Hypergraph and cross-attention-based unsupervised domain adaptation framework for cross-domain myocardial infarction localization Yuan, Shuaiying

633 C p. 245-263
artikel
21 Incomplete mixed data-driven outlier detection based on local–global neighborhood information Li, Ran

633 C p. 204-225
artikel
22 Investor preference analysis: An online optimization approach with missing information Hu, Xiao

633 C p. 27-40
artikel
23 Neural network-based secure event-triggered control of uncertain industrial cyber-physical systems against deception attacks Ma, Yajing

633 C p. 504-516
artikel
24 ParsingPhrase: Parsing-based automated quality phrase mining Wu, Yongliang

633 C p. 531-548
artikel
25 Publishing locally private high-dimensional synthetic data efficiently Zhang, Hua

633 C p. 343-356
artikel
26 RESO-based distributed bipartite tracking control for stochastic MASs with actuator nonlinearity Sun, Zhize

633 C p. 226-244
artikel
27 Robust ML model ensembles via risk-driven anti-clustering of training data Mauri, Lara

633 C p. 122-140
artikel
28 Saaty’s consistency trapezoidal fuzzy extension and optimized fuzzy utility vector acquisition Wang, Zhou-Jing

633 C p. 549-572
artikel
29 Safe reinforcement learning method integrating process knowledge for real-time scheduling of gas supply network Zhou, Pengwei

633 C p. 280-304
artikel
30 S-DeepTrust: A deep trust prediction method based on sentiment polarity perception Wang, Qiuhua

633 C p. 104-121
artikel
31 Similarity-navigated graph neural networks for node classification Zou, Minhao

633 C p. 41-69
artikel
32 Specification transformation method for functional program generation based on partition-recursion refinement rule Zuo, Zhengkang

633 C p. 613-632
artikel
33 Stratified multi-density spectral clustering using Gaussian mixture model Yue, Guanli

633 C p. 182-203
artikel
34 Time-varying formation prescribed performance control with collision avoidance for multi-agent systems subject to mismatched disturbances Zheng, Chang-Bing

633 C p. 517-530
artikel
35 VeriORouting: Verification on intelligent routing outsourced to the cloud Bai, Hui

633 C p. 410-430
artikel
36 Writer-independent signature verification; Evaluation of robotic and generative adversarial attacks Bird, Jordan J.

633 C p. 170-181
artikel
                             36 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland