Linked e-resources

Details

Ion
Emergency analysis Based on Affective Computing in Universities Forum
Network Attack and Defense Effectiveness Evaluation Based on Dematel Method
Web Application-layer DDoS Attack Detection Based on generalized Jaccard Similarity and Information Entropy
Ultra-broad Bandpass Filter Based on Composite Right-Left Handed Transmission Line Model
An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen's Chaos
Security Analysis and Improvement of Elliptic Curve Digital Signature Scheme
Risk Taking Behavior in Crowdsourcing Adoption: The Case of Witkey
Anomaly detection in Wireless Sensor Networks based on KNN
Comparison of The Legal Principle Foundation of Chinese And American Secret Information Access Control Technique ign of a Peristaltic Pump Driven by Pneumatic Artificial Muscles
An Approach to Deep Learning Service Provision with Elastic Remote Interfaces
Design of an IoT-based Efficient Security Scheme in Home Wireless System
Discussion on the Application of Industrial Internet
Performance Analysis of a NB-IoT based Smart Lamp Solution with Application Enabled Platform
Mining Hypernym-Hyponym Relations from Social Tags via Tag Embedding
Accurate and Fast DV-hop Localization Algorithm in Irregular Networks
Shape Recognition with Recurrent Neural Network
WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model
Tobacco Intelligent Management System Based on Internet of Things
Research on Fault Self Diagnosis Technology of Agricultural Internet of Things Information Collection System
Analysis of Antenna Array Parameter Effect for Massive MIMO Transmission
Intelligent Irrigation System of Balcony Flowers Based on Internet of Things
Multimedia Forensics
The Impact of Using Facebook on the Academic Performance of University Students
Robust Audio Watermarking Algorithm Based on Moving Average and DCT
Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm
Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification
Image Hashing based on CS-LBP and DCT for Copy Detection
KMSVM: A Efficient Min-Max Modular Support Vector Machine Based on Clustering
An Image Forensic Method for AI Inpainting Using Faster R-CNN
Kernel Generalized Canonical Correlation and A New Feature Fusion Strategy
Multiple Obstacle Detection for Assistance Driver System Using Deep Neural Networks
Encryption and Cybersecurity
CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data
Calculation of Network Security Index Based on Convolution Neural Networks
A Method to Defense APT based on Dynamic ID Transformat.

Browse Subjects

Show more subjects...

Statistics

from
to
Export