Your selections:
ANSWER : generating information dissemination network on campus
- Qing, Qing, Guo, Teng, Zhang, Dongyu, Xia, Feng
As simple as pressing a button? A review of the literature on BigBlueButton
Assessing reliability of smart grid against cyberattacks using stability index
- Rashed, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder, Islam, Syed
Benefit based transmission expansion planning for ASEAN power grid
- Ahmed, Tofael, Mekhilef, Saad, Shah, Rakibuzzaman
Carbon offsetting in the road transport industry : issues and challenges of meeting the objectives
- Peters, Lies, Chattopadhyay, Gopinath, Kandra, Harpreet
Choosing VET as a post-school activity: What are some influences on non-metropolitan students?
- Smith, Erica, Foley, Annette
Churn prediction in telecom industry using machine learning ensembles with class balancing
- Chowdhury, Abdullahi, Kaisar, Shahriar, Rashid, Md Mamunur, Shafin, Sakib, Kamruzzaman, Joarder
Coding observer nodes for sybil attacks detection in mobile wireless sensor networks
- Sassani Sarrafpour, Bahman, Alomirah, Alomirah, Pang, Shaning, Sarrafpour, Soshian
Conceptual modelling of railway infrastructure cost-a system dynamics approach
- Mafokosi, Katleho, Pretorius, Jan-Harm, Chattopadhyay, Gopinath
Cost effective annotation framework using zero-shot text classification
- Kasthuriarachchy, Buddhika, Chetty, Madhu, Shatte, Adrian, Walls, Darren
Cross network representation matching with outliers
- Hou, Mingliang, Ren, Jing, Febrinanto, Febrinanto, Shehzad, Ahsan, Xia, Feng
Cybersecurity risks in meat processing plant and impacts on total productive maintenance
- Chundhoo, Vickram, Chattopadhyay, Gopinath, Karmakar, Gour, Appuhamillage, Gayan
D-optimal design for information driven identification of static nonlinear elements
- Ulapane, Nalika, Thiyagarajan, Karthick, Kodagoda, Sarath, Nguyen, Linh
Decision behavior based private vehicle trajectory generation towards smart cities
- Chen, Qiao, Ma, Kai, Hou, Mingliang, Kong, Xiangjie, Xia, Feng
Decision-making in complex asset life extension
- Morey, Stephen, Chattopadhyay, Gopinath, Larkins, Jo-Ann
Deep video anomaly detection : opportunities and challenges
- Ren, Jing, Xia, Feng, Liu, Yemeng, Lee, Ivan
Delivery of online electronics and mechatronics labs during lockdowns
- Jayawardena, Amal, Kahandawa, Gayan, Piyathilaka, Lasitha
Detection of android malware using tree-based ensemble stacking model
- Shafin, Sakib, Ahmed, Md Maroof, Pranto, Mahmud, Chowdhury, Abdullahi
Detection of Malleefowl Mounds from Point Cloud Data
- Parvin, Nahida, Awrangjeb, Mohammad, Irvin, Marc, Florentine, Singarayer, Murshed, Manzur, Lu, Guojun
Distributed denial of service attack detection using machine learning and class oversampling
- Shafin, Sakib, Prottoy, Shafin, Abbas, Saif, Hakim, Safayat, Chowdhury, Abdullahi, Rashid, Md Mamanur
Are you sure you would like to clear your session, including search history and login status?