Your selections:
An exploration of online technoliteracy capability teaching and learning in early years classrooms
Coupled attention networks for multivariate time series anomaly detection
- Xia, Feng, Chen, Xin, Yu, Shuo, Hou, Mingliang, Liu, Mujie, You, Linlin
DCCGAN based intrusion detection for detecting security threats in IoT
- Cyriac, Robin, Balasubaramanian, Sundaravadivazhagn, Balamurugan, Venkatachalam, Karthikeyan, R.
DQN approach for adaptive self-healing of VNFs in cloud-native network
- Arulappan, Arunkumar, Mahanti, Aniket, Passi, Kalpdrum, Srinivasan, Thiruvenkadam, Naha, Ranesh, Raja, Gunasekaran
- Wang, Yanping, Wang, Xiaofen, Dai, Hong-Ning, Zhang, Xiaosong, Imran, Muhammad
A nethack learning environment language wrapper for autonomous agents
- Goodger, Nikolaj, Vamplew, Peter, Foale, Cameron, Dazeley, Richard
A novel dynamic software-defined networking approach to neutralize traffic burst
- Sharma, Aakanksha, Balasubramanian, Venki, Kamruzzaman, Joarder
A robust local texture descriptor in the parametric space of the weibull distribution
- Tania, Sheikh, Karmakar, Gour, Teng, Shyh, Murshed, Manzur
Anti-aliasing deep image classifiers using novel depth adaptive blurring and activation function
- Hossain, Md Tahmid, Teng, Shyh, Lu, Guojun, Rahman, Mohammad Arifur, Sohel, Ferdous
Application of various robust techniques to study and evaluate the role of effective parameters on rock fragmentation
- Mehrdanesh, Amirhossein, Monjezi, Masoud, Khandelwal, Manoj, Bayat, Parichehr
Applications of machine learning and deep learning in antenna design, optimization, and selection : a review
- Sarker, Nayan, Podder, Prajoy, Mondal, M., Shafin, Sakib, Kamruzzaman, Joarder
Blockchain technology and application : an overview
- Dong, Shi, Abbas, Khushnood, Li, Meixi, Kamruzzaman, Joarder
Bundle enrichment method for nonsmooth difference of convex programming problems
- Gaudioso, Manilo, Taheri, Sona, Bagirov, Adil, Karmitsa, Napsu
Data evolution governance for ontology-based digital twin product lifecycle management
- Ren, Zijie, Shi, Jianhua, Imran, Muhammad
Deep learning : survey of environmental and camera impacts on internet of things images
- Kaur, Roopdeep, Karmakar, Gour, Xia, Feng, Imran, Muhammad
Deep learning-based digital image forgery detection using transfer learning
- Qazi, Emad, Zia, Tanveer, Imran, Muhammad, Faheem, Muhammad
Defending SDN against packet injection attacks using deep learning
- Phu, Anh, Li, Bo, Ullah, Faheem, Ul Huque, Tanvir, Naha, Ranesh, Babar, Muhammad, Nguyen, Hung
EAGLE : contrastive learning for efficient graph anomaly detection
- Ren, Jing, Hou, Mingliang, Liu, Zhixuan, Bai, Xiaomei
Enhancing ultimate bearing capacity prediction of cohesionless soils beneath shallow foundations with grey box and hybrid AI models
- Kiany, Katayoon, Baghbani, Abolfazl, Abuel-Naga, Hossam, Baghbani, Hasan, Arabani, Mahyar, Shalchian, Mohammad
External business knowledge transmission : a conceptual framework
- Labas, Alan, Courvisanos, Jerry
Are you sure you would like to clear your session, including search history and login status?