Your selections:
Cyberbullying detection on social networks using machine learning approaches
- Islam, Md Manowarul, Uddin, Md Ashraf, Islam, Linta, Akter, Arnisha, Sharmin, Selina, Acharjee, Uzzal
DE-RUSBoost : an efficient electricity theft detection scheme with additive communication layer
- Mujeeb, Sana, Javaid, Nadeem, Khalid, Rabiya, Imran, Muhammad, Naseer, Nidal
DEFINE: friendship detection based on node enhancement
- Pan, Hanxiao, Guo, Teng, Bedru, Hayat, Qing, Qing, Zhang, Dongyu, Xia, Feng
Discovery of small group interactions and performance from project emails
- Ivkovic, Sasha, Oseni, Taiwo, Chadhar, Mehmood, Firmin, Sally
Dynamic derivative-droop control for supercapacitor synthetic inertial support
- Akram, Umer, Mithulananthan, N., Shah, Rakibuzzaman, Islam, Rabiul
Efficient data trading and storage in internet of vehicles using consortium blockchain
- Sadiq, Ayesha, Javaid, Nadeem, Samuel, Omaji, Khalid, Adia, Haider, Noman, Imran, Muhammad
Efficient low bit-rate intra-frame coding using common information for 360-degree video
- Afsana, Fariha, Paul, Manoranjan, Murshed, Manzur, Taubman, David
Electric Load Forecasting using EEMD and machine learning techniques
- Naz, Aqdas, Javaid, Nadeem, Khalid, Adia, Shoaib, Muhammad, Imran, Muhammad
Electricity theft detection using pipeline in machine learning
- Anwar, Mubbashra, Javaid, Nadeem, Khalid, Adia, Imran, Muhammad, Shoaib, Muhammad
Energy storage for short-term frequency stability enhancement in low-inertia power systems
- Akram, Umer, Mithulananthan, N., Shah, Rakibuzzaman, Basit, Saad
Enhancing linear time complexity time series classification with hybrid bag-of-patterns
- Liang, Shen, Zhang, Yanchun, Ma, Jiangang
Evaluating the Performances of the Agoraphilic Navigation Algorithm under Dead-Lock Situations
- Hewawasam, Hasitha, Ibrahim, Yousef, Kahandawa, Gayan, Choudhury, Tanveer
Friendly jammer against an adaptive eavesdropper in a relay-aided network
- Giti, J. E., Sakzad, A., Srinivasan, B., Kamruzzaman, Joarder, Gaire, R.
Gestalt based evaluation of health information diagrams
- Sharma, Vishakha, Stranieri, Andrew, Burstein, Frada, Warren, Jim, Firmin, Sally
Graduate employment prediction with bias
- Guo, Teng, Xia, Feng, Zhen, Shihao, Bai, Xiaomei, Zhang, Dongyu
Graph Force Learning
- Sun, Ke, Liu, Jiaying, Yu, Shuo, Xu, Bo, Xia, Feng
Identifying cross-version function similarity using contextual features
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Image encryption based on fractional-order chen hyperchaotic system
- Peng, Jun, Yang, Wu, Jin, Shangzhu, Pang, Shaoning, Tang, Dedong, Bai, Junjie, Zhang, Du
Impact of feature selection on non-technical loss detection
- Ghori, Khawaja, Rabeeh Ayaz, Abbasi, Awais, Muhammad, Imran, Muhammad, Ullah, Atta, Szathmary, Laszlo
Impact of MMC-HVDC Control Parameter Selection on the Dynamic Performance of AC System
- Shah, Rakibuzzaman, Islam, Syed, Islam, Md Rabiul
Are you sure you would like to clear your session, including search history and login status?