761 results
Search Results
52. SDEGNN: Signed graph neural network for link sign prediction enhanced by signed distance encoding
53. Identifying top-k influential nodes in social networks: a discrete hybrid optimizer by integrating butterfly optimization algorithm with differential evolution
54. An efficient graph embedding clustering approach for heterogeneous network
55. Fast tridiagonalization of (p, q)-pentadiagonal matrices and its applications
56. Pendant 3-tree-connectivity of augmented cubes
57. Quantifying response latency in video surveillance systems using object detection techniques
58. Iterative construction of energy and quality-efficient approximate multipliers utilizing lower bit-length counterparts
59. Hybrid Snake Optimizer Algorithm for Solving Economic Load Dispatch Problem with Valve Point Effect
60. Identifying influential users using homophily-based approach in location-based social networks
61. Elliptic curve encryption-based energy-efficient secured ACO routing protocol for wireless sensor networks
62. Fractional matchings on regular graphs
63. Dependency-position relation graph convolutional network with hierarchical attention mechanism for relation extraction
64. Steel surface defect detection based on MobileViTv2 and YOLOv8
65. A deep reinforcement learning approach for dynamic task scheduling of flight tests
66. Data-free adaptive structured pruning for federated learning
67. A hybrid recursive direct system for multi-step mortality rate forecasting
68. DGCQN: a RL and GCN combined method for DAG scheduling in edge computing
69. A secure VM live migration technique in a cloud computing environment using blowfish and blockchain technology
70. A sentiment-guided session-aware recommender system
71. Real-time microexpression recognition in educational scenarios using a dual-branch continuous attention network
72. An integrated CRITIC-MABAC model under 2-tuple linguistic cubic q-rung orthopair fuzzy information with advanced aggregation operators, designed for multiple attribute group decision-making
73. A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks
74. A learning-based efficient query model for blockchain in internet of medical things
75. Calculation and selection scheme of node reputation values for notary mechanism in cross-chain
76. Optimized Python library for reconstruction of ensemble-based gene co-expression networks using multi-GPU
77. Intelligent detection method of microparticle virus in silkworm based on YOLOv8 improved algorithm
78. Anomalies resolution and semantification of tabular data
79. Ant Mill: an adversarial traffic pattern for low-diameter direct networks
80. Harmony-driven technique for solving optimization and engineering problems
81. Qsmix: Q-learning-based task scheduling approach for mixed-critical applications on heterogeneous multi-cores
82. LC-PBFT: Layered cross-chain consensus algorithm based on forest topology
83. Pattern matching algorithms in blockchain for network fees reduction
84. Service placement in fog–cloud computing environments: a comprehensive literature review
85. DDSC-SMOTE: an imbalanced data oversampling algorithm based on data distribution and spectral clustering
86. Perception data fusion-based computation offloading in cooperative vehicle infrastructure systems
87. An effective spatial join method for blockchain-based geospatial data using hierarchical quadrant spatial LSM+ tree
88. HyperTuner: a cross-layer multi-objective hyperparameter auto-tuning framework for data analytic services
89. Cleaner fish optimization algorithm: a new bio-inspired meta-heuristic optimization algorithm
90. Order structure analysis of node importance based on the temporal inter-layer neighborhood homogeneity rate of the dynamic network
91. MS-HRNet: multi-scale high-resolution network for human pose estimation
92. A deep learning-based approach for predicting in-flight estimated time of arrival
93. ACANet: attention-based context-aware network for infrared small target detection
94. A novel RPL defense mechanism based on trust and deep learning for internet of things
95. Can GPU performance increase faster than the code error rate?
96. Simulating stellar merger using HPX/Kokkos on A64FX on Supercomputer Fugaku
97. Unilateral protection scheme for N-qubit GHZ states against decoherence: a resource-efficient approach
98. A novel optimization method: wave search algorithm
99. Distributed cache strategy based on LT codes under spark platform
100. Extra connectivity of the data center network—RRect
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.