Search

Showing total 19 results

Search Constraints

Start Over You searched for: Topic computer Remove constraint Topic: computer Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years Journal symmetry Remove constraint Journal: symmetry
19 results

Search Results

1. Addressing Class Overlap under Imbalanced Distribution: An Improved Method and Two Metrics

2. The 1+5 Architectural Views Model in Designing Blockchain and IT System Integration Solutions

3. Smart Architecture Energy Management through Dynamic Bin-Packing Algorithms on Cloud

4. Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach

5. Robust Nonlinear Control Scheme for Electro-Hydraulic Force Tracking Control with Time-Varying Output Constraint

6. Three-Phase Feeder Load Balancing Based Optimized Neural Network Using Smart Meters

7. LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases

8. Mobile Expert System: Exploring Context-Aware Machine Learning Rules for Personalized Decision-Making in Mobile Applications

9. Similarity Analysis of Methods for Objective Determination of Weights in Multi-Criteria Decision Support Systems

10. Hybrid Ensemble Deep Learning-Based Approach for Time Series Energy Prediction

11. A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code

12. ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism

13. Plant Leaves Recognition Based on a Hierarchical One-Class Learning Scheme with Convolutional Auto-Encoder and Siamese Neural Network

14. Deep Neural Network Compression for Plant Disease Recognition

15. UAV-Assisted Three-Dimensional Spectrum Mapping Driven by Spectrum Data and Channel Model

16. Deep Convolutional Symmetric Encoder—Decoder Neural Networks to Predict Students’ Visual Attention

17. Performance Estimation in V2X Networks Using Deep Learning-Based M-Estimator Loss Functions in the Presence of Outliers

18. Improving A/B Testing on the Basis of Possibilistic Reward Methods: A Numerical Analysis

19. Feature Selection and Ensemble-Based Intrusion Detection System: An Efficient and Comprehensive Approach