Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             38 results found
no title author magazine year volume issue page(s) type
1 Analyzing the public sentiment on COVID-19 vaccination in social media: Bangladesh context Zulfiker, Md. Sabab

15 C p.
article
2 An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks Sallal, Muntadher

15 C p.
article
3 An improved probability propagation algorithm for density peak clustering based on natural nearest neighborhood Zuo, Wendi

15 C p.
article
4 A parameter-free graph reduction for spectral clustering and SpectralNet Alshammari, Mashaan

15 C p.
article
5 Application of Artificial Immune Systems in Advanced Manufacturing Pinto, Rui

15 C p.
article
6 A robust and secure watermarking algorithm based on DWT and SVD in the fractional order fourier transform domain Tang, Ming

15 C p.
article
7 Bayesian optimization of distributed neurodynamical controller models for spatial navigation Hadzic, Armin

15 C p.
article
8 BLPnet: A new DNN model and Bengali OCR engine for Automatic Licence Plate Recognition Onim, Md. Saif Hassan

15 C p.
article
9 CE-Fed: Communication efficient multi-party computation enabled federated learning Kanagavelu, Renuga

15 C p.
article
10 Classifying jobs towards power-aware HPC system operation through long-term log analysis Tsujita, Yuichi

15 C p.
article
11 Decision trees for regular factorial languages Moshkov, Mikhail

15 C p.
article
12 Deep reinforcement learning for gearshift controllers in automatic transmissions Gaiselmann, Gerd

15 C p.
article
13 Distributed denial of service attack detection in E-government cloud via data clustering Abdullayeva, Fargana J.

15 C p.
article
14 Efficient alignment-based average delay time estimation in fluctuating delayed propagation Nakamura, Atsuyoshi

15 C p.
article
15 Eye tracking technologies to visualize secure coding behavior Davis, Daniel Kyle

15 C p.
article
16 How statistical modeling and machine learning could help in the calibration of numerical simulation and fluid mechanics models? Application to the calibration of models reproducing the vibratory behavior of an overhead line conductor Amroun, Hamdi

15 C p.
article
17 Improved Deep Multi-Patch Hierarchical Network For Handling Saturation In Image Deblurring B.M., Mahendra

15 C p.
article
18 Learning to rank method combining multi-head self-attention with conditional generative adversarial nets Li, Jinzhong

15 C p.
article
19 Maximization influence in dynamic social networks and graphs Smani, Gkolfo I.

15 C p.
article
20 Mechanisms and techniques to enhance the security of big data analytic framework with MongoDB and Linux Containers Mailewa, Akalanka

15 C p.
article
21 Natural language model for automatic identification of Intimate Partner Violence reports from Twitter Al-Garadi, Mohammed Ali

15 C p.
article
22 Node co-activations as a means of error detection—Towards fault-tolerant neural networks Myllyaho, Lalli

15 C p.
article
23 Novel group handover mechanism for Cooperative and Coordinated Mobile Femtocells technology in railway environment Raheem, Rand

15 C p.
article
24 Performance evaluation of a portable single-board computer as a 3-tiered LAMP stack under 32-bit and 64-bit Operating Systems Dhuny, Riyad

15 C p.
article
25 Post-quantum cryptography Algorithm's standardization and performance analysis Kumar, Manish

15 C p.
article
26 Quantum advantage on proof of work Bard, Dan A.

15 C p.
article
27 Recognition of road cracks based on multi-scale Retinex fused with wavelet transform Liu, Shenao

15 C p.
article
28 Remodelling correlation: A fault resilient technique of correlation sensitive stochastic designs Mitra, Shyamali

15 C p.
article
29 Research on multi-factory combination optimization based on DOSTAR Chen, Sen

15 C p.
article
30 Road scene classification based on street-level images and spatial data Prykhodchenko, Roman

15 C p.
article
31 Selection of unlabeled source domains for domain adaptation in remote sensing Geiß, Christian

15 C p.
article
32 Spatio-temporal aggregation of skeletal motion features for human motion prediction Ueda, Itsuki

15 C p.
article
33 Stochastic recognition of human daily activities via hybrid descriptors and random forest using wearable sensors Halim, Nurkholish

15 C p.
article
34 Tablext: A combined neural network and heuristic based table extractor Colter, Zach

15 C p.
article
35 Terminal independent security token derivation scheme for ultra-dense IoT networks Nyangaresi, Vincent Omollo

15 C p.
article
36 Towards automatic discovery and assessment of vulnerability severity in cyber–physical systems Jiang, Yuning

15 C p.
article
37 Using textual bug reports to predict the fault category of software bugs Hirsch, Thomas

15 C p.
article
38 Visual SLAM algorithms and their application for AR, mapping, localization and wayfinding Theodorou, Charalambos

15 C p.
article
                             38 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands