858 results on '"Yaling An"'
Search Results
2. Transmit Beampattern Optimization for MIMO-ISAC Systems with Hybrid Beamforming.
3. SRAM-Based Digital CIM Macro for Linear Interpolation and MAC.
4. When ChatGPT Meets Vulnerability Management: The Good, the Bad, and the Ugly.
5. Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning.
6. Dual-Branch Attention Network and Swin Spatial Pyramid Pooling for Retinopathy of Prematurity Classification.
7. Study on the Operating efficiency of Listed Exhibition Companies in China Based on Super-SBM model.
8. Preliminary Experiment of Gait Synchronization Control in Human-Supernumerary Robotic Leg System Based on Phase Variables.
9. Hybrid Beamforming Design for MIMO-ISAC Systems via Consensus-ADMM.
10. Online Unsupervised Anomaly Detection in Stream Data with Spiking Neural Networks Using Dynamic Scoring.
11. DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks.
12. A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration.
13. Collaborative Learning for Cross-Organizational Data Sharing Using Hyperledger Fabric.
14. Reversible Data Hiding Based on Adaptive Embedding with Local Complexity.
15. Reversible Data Hiding in Encrypted Images Based on Image Reprocessing and Polymorphic Compression.
16. Dual-branch Feature Interaction Network with Structure Information Learning for Retinopathy of Prematurity Classification.
17. Understanding Client Reactions in Online Mental Health Counseling.
18. CLIP4VideoCap: Rethinking Clip for Video Captioning with Multiscale Temporal Fusion and Commonsense Knowledge.
19. Demonstration of 5G-Underlay Signal Co-existence.
20. Enhanced Non-preemptive Support of URLLC using Spread Spectrum Underlay Signalling.
21. Underlay-based 5G Sidelink with Co-channel Interference Cancellation.
22. Reversible Data Hiding in Encrypted Images Based on a Multi-Granularity Adaptive Classification Mechanism.
23. MA-TGNN: Multiple Aggregators Graph-Based Model for Text Classification.
24. Robot Person Following Under Partial Occlusion.
25. An End-To-End Generative Classification Model for Hyperspectral Image.
26. Privacy Protection Against Shoulder Surfing in Mobile Environments.
27. Research on the Factors Influencing the Financing Efficiency of China's Tourism Listed Companies Based on Logit Model.
28. An Experimental Study of Keypoint Descriptor Fusion.
29. Single stock trading with deep reinforcement learning: A comparative study.
30. Can the Translation Memory Principle Benefit Neural Machine Translation? A Series of Extensive Experiments with Input Sentence Annotation.
31. Research on Blockchain Usage for 5G Message Service.
32. Algorithm for Integrating Multi-Proximity for Trust-Based Group Recommendation in Ridesharing.
33. Design of Communication Controller Chip Based on FlexRay Bus.
34. Hero-Gang Neural Model For Named Entity Recognition.
35. Penetration Effect of Informatization on Technological Progress in Logistics Industry: Empirical Evidence from Inter-provincial Panel Data in China.
36. Biparted Hyperboloid and Sphere Intersection Algorithm.
37. Research on Key Technologies of Human Upper Limb Bone Diagnosis based on Convolutional Neural Network.
38. Weld Image Recognition based on Deep Learning.
39. Research on GA-KNN Image Classification Algorithm.
40. Attention-based Broad Self-guided Network for Low-light Image Enhancement.
41. TDOA/FDOA Joint Positioning Method for Wireless Charging Vehicle.
42. A Portfolio-Based Approach to Select Efficient Variable Ordering Heuristics for Constraint Satisfaction Problems.
43. A differential privacy federated learning framework for accelerating convergence.
44. Memory-Effective Parallel Mining of Incremental Frequent Itemsets Based on Multi-scale.
45. The Development in Emotional Content of Children's Writing: Are Children Getting Less Happy?
46. Research on Defect Location Method of C Language Code Based on Deep Learning.
47. AI-Enabled Quality Prediction of 5G Wireless Network in Smart Grid.
48. Task Delay Minimization in Wireless Powered Mobile Edge Computing Networks: A Deep Reinforcement Learning Approach.
49. A fine-grained petri model for SQL time-blind injection.
50. Signature Scheme Based on The SM2 Algorithm in Fabric.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.