Linked e-resources

Details

Watermarking Scheme based on Singular Value Decomposition and Quantization Technique
Boolean Function Decomposition Based on Grover Algorithm and Its Simulation Using Quantum Language Quipper
Research on Emotional Recognition of EEG Signals in Experimental Paradigm
Research on Rasterized Population Evaluation Method Based on Multi-class Machine Learning Method
Salary Satisfaction of University Teachers with Different Professional Positions
Defining Cost Function for Robust Embedding
Efficient Identity-Based Signature authentication scheme for smart home system
A Resource Allocation Mechanism for Edge-blockchain
Remote sensing image zero-watermarking algorithm based on accurate polar harmonic Fourier moment
Multi-layer quantum secret sharing based on GHZ states
Robot scheduling system based on semantic recognition
Pedestrian Counting without Tracking for the Security Application of IoT Framework f Operating System on Assembly Layer in Isabelle/HoL
Nonlinear Correction Based on Depth Neural Network
Spatial-temporal co-attention network for action recognition
Improved SSD for object detection
Sentiment Analysis on Weibo Platform for Stock Prediction
Refinement Measurement and Evaluation of Streets in Shanghai Old City
A Traceability Architecture for the Fresh Food Supply Chain based on Blockchain Technology in China
Research Progress in Blind Forensics of Digital Image Smooth Filtering
Research on video violence detection technology of UAV on cloud platform
A Generative Steganography Method Based on WGAN-GP
A deep learning network for coarse-to-fine deformable medical image registration
Research on Cross-lingual Machine Reading Comprehension Technology Based on Non-parallel Corpus
Research on the data reference model of NMIS
A Real-time Recommender System Design Based on Spark Streaming
A Novel Clone Detection Scheme Based on Generative Adversarial Networks
Design of Vehicle Remote Monitoring System Based on LoRa Technology and QT Platform
Unifying Domain Adaptation into Simultaneous Discriminant Analysis: a Method for Low-resolution Face Recognition with Single Sample per Person
An exploratory study of blending Smart classroom in database course
Optimization and simulation of pre-warehouse multi-objective stock levels based on the Weibull distribution function
Research and Analysis of Fine Management of Engineering Cost Based on BIM
Survey of Software-Defined Network Security Issues
A Fall Detection Algorithm Based on a Support Vector Machine
A Multi-AGV Optimal Scheduling Algorithm Based on Particle Swarm Optimization
An efficient quantum private comparison protocol based on conjugate coding
Deliberated Vulnerable Environment Generating based on Container and Structured Vulnerability Intelligence
Deep neural network watermarking based on texture analysis
A Robust Reversible Image.

Browse Subjects

Show more subjects...

Statistics

from
to
Export