761 results
Search Results
2. Data transmission optimization in edge computing using multi-objective reinforcement learning
3. A comparative study of energy routing algorithms to optimize energy transmission in energy internet
4. An efficient ODE-solving method based on heuristic and statistical computations: αII-(2 + 3)P method
5. FNNet: a secure ensemble-based approach for fake news detection using blockchain
6. Assessing edge importance in social networks: an importance indicator based on the k-sup structure
7. Three kinds of connectivity of folded spined cubes
8. Improved YOLOv5s combining enhanced backbone network and optimized self-attention for PCB defect detection
9. Controller placement issue in software-defined networks with different goals: a comprehensive survey
10. Timestamp system for causal broadcast communication
11. Community detection based on improved user interaction degree, weighted quasi-local path-based similarity and frequent pattern mining
12. A survey of appearance-based approaches for human gait recognition: techniques, challenges, and future directions
13. A federated learning approach to network intrusion detection using residual networks in industrial IoT networks
14. Design of a multilayer reversible ALU in QCA technology
15. SPD-YOLOv8: an small-size object detection model of UAV imagery in complex scene
16. Finite difference method for the Riesz space distributed-order advection–diffusion equation with delay in 2D: convergence and stability
17. The Egyptian national HPC grid (EN-HPCG): open-source Slurm implementation from cluster to grid approach
18. Evolving random weight neural networks based on oversampled-segmented examples for IoT intrusion detection
19. Construction and analysis of students’ physical health portrait based on principal component analysis improved Canopy-K-means algorithm
20. Blockchain-based autonomous decentralized trust management for social network
21. Feature-based point cloud simplification method: an effective solution for balancing accuracy and efficiency
22. End-to-end probability analysis method for multi-core distributed systems
23. A container optimal matching deployment algorithm based on CN-Graph for mobile edge computing
24. An energy-temperature aware routing protocol in wireless body area network: a fuzzy-based approach
25. NM-polynomial-based topological indices and graph entropies of porphyrazine
26. Metric learning with adversarial hard negative samples for tag recommendation
27. An efficient model for vehicular ad hoc networks using machine learning and high-performance computing
28. A CUDA-based parallel optimization method for SM3 hash algorithm
29. Visual and semantic guided scene text retrieval
30. A decomposition-based multi-objective evolutionary algorithm with Q-learning for adaptive operator selection
31. AD-autoformer: decomposition transformers with attention distilling for long sequence time-series forecasting
32. Time and value aware influence blocking maximization in geo-social networks
33. EDFIDepth: enriched multi-path vision transformer feature interaction networks for monocular depth estimation
34. An alternative bounded distribution: regression model and applications
35. A trust management system for fog computing using improved genetic algorithm
36. Enhancing EV lithium-ion battery management: automated machine learning for early remaining useful life prediction with innovative multi-health indicators
37. A sustainable decision-making framework and a mixed-integer formulation for the project portfolio selection problem
38. SAR-ShipSwin: enhancing SAR ship detection with robustness in complex environment
39. Smart GAN: a smart generative adversarial network for limited imbalanced dataset
40. Performance analysis of mining pool with power-saving, fault and mining competition
41. Optimizing network slicing in 6G networks through a hybrid deep learning strategy
42. A sequence recommendation method based on external reinforcement and position separation
43. ETRS: efficient turn restrictions setting method for boundary routers in chiplet-based systems
44. Cluster knowledge-driven vertical federated learning
45. Optimizing sparse general matrix–matrix multiplication for DCUs
46. Bayesian optimization of histogram of oriented gradients (HOG) parameters for facial recognition
47. Identifying cloud internet of things requirements in healthcare: a Delphi-based study
48. Influence maximization in community-structured social networks: a centrality-based approach
49. Future locations prediction with multi-graph attention networks based on spatial–temporal LSTM framework
50. Double firefly based efficient clustering for large-scale wireless sensor networks
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.