Search

Your search keyword '"Park, James J."' showing total 4,142 results

Search Constraints

Start Over You searched for: Author "Park, James J." Remove constraint Author: "Park, James J."
4,142 results on '"Park, James J."'

Search Results

201. Triple-Path RNN Network: A Time-and-Frequency Joint Domain Speech Separation Model

202. Security Challenges and Lightweight Cryptography in IoT: Comparative Study and Testing Method for PRESENT-32bit Cipher

203. Deep Reinforcement Learning Based Multi-WiFi Offloading of UAV Traffic

204. Effective Density-Based Concept Drift Detection for Evolving Data Streams

205. ε-Maximum Critic Deep Deterministic Policy Gradient for Multi-agent Reinforcement Learning

206. Fine Time Granularity Allocation Optimization of Multiple Networks Industrial Chains in Task Processing Systems

207. SSR-MGTI: Self-attention Sequential Recommendation Algorithm Based on Movie Genre Time Interval

208. A Blockchain System for Fake News Detection

209. An End-to-End Multiple Hyper-parameters Prediction Method for Distributed Constraint Optimization Problem

210. Research on Psychological Testing Methods of Criminal Suspects Based on Multi-features of EEG

211. A Fuzzy Logical RAT Selection Scheme in SDN-Enabled 5G HetNets

212. Insider Trading Detection Algorithm in Industrial Chain Based on Logistics Time Interval Characteristics

213. Link Attributes Based Multi-service Routing for Software-Defined Satellite Networks

214. A Data-Centric Approach for Efficient and Scalable CFD Implementation on Multi-GPUs Clusters

215. Artificial Intelligence Based Electronic Healthcare Solution

216. An Improved DBSCAN Method Considering Non-spatial Similarity by Using Min-Hash

217. Blockchain-Based Multi-fogcloud Authentication System

218. A Location-Based Solution for Social Network Service and Android Marketing Using Augmented Reality

219. Deep Learning-Based Experimentation for Predicting Secondary Structure of Amino Acid Sequence

220. A Study on Vulnerabilities of Linux Password and Countermeasures

221. IoT Malware Dynamic Analysis Scheme Using the CNN Model

222. Efficient Data Noise-Reduction for Cyber Threat Intelligence System

223. Performance Analysis of Single-Pulse Modulation in Factory Environment Based on LiFi Standard

224. Optimal Location Recommendation System for Offshore Floating Wind Power Plant Using Big Data Analysis

225. Robust 3D Reconstruction Through Noise Reduction of Ultra-Fast Images

226. A Design of Improvement Method of Central Patch Controlled Security Platform Using Blockchain

227. A Suggestion for ERP Software Customization Model Using Module Modification Factors

228. Activity-Recognition Model for Violence Behavior Using LSTM

229. Pedestrian Detection Using Regression-Based Feature Selection and Disparity Map

230. Restore Fingerprints Using Pix2Pix

231. CNN-GRU-Based Feature Extraction Model of Multivariate Time-Series Data for Regional Clustering

232. Static Analysis for Malware Detection with Tensorflow and GPU

233. Design and Implementation of Real-Time Vehicle Recognition and Detection System Based on YOLO

234. Blockchain Based Authentication Method for ThingsBoard

235. Web Site Usage History Management System Using Blockchain

236. Generation of Fake Iris Images Using CycleGAN

237. Intelligent Digital Signage Using Deep Learning Based Recommendation System in Edge Environment

238. Deep Learning Based Character Recognition Platform in Complex Situations

239. Design of Restricted Coulomb Energy Neural Network Processor for Multi-modal Sensor Fusion

240. Secure Management of Patient Medical Data Using QR Code and CP-ABE

241. A Study on the Implementation of GRU Autoencoder Model for Detecting Insider Anomaly Behavior

242. Dynamic Mitigation of Catastrophic Forgetting Using the Sampling Network

243. Inflight Tracking Method with Beacon System and Scouting Drone

244. Low Complexity Pipelined FFT Processor for Radar Applications

245. A Real-Time Human Posture Recognition System Using Internet of Things (IoT) Based on LoRa Wireless Network

246. Purchase Predictive Design Using Skeleton Model and Purchase Record

247. An Approach to Improving Software Security Through Access Control for Data in Programs

248. Implementation of a Container-Based Interactive Environment for Big-Data Analysis on Supercomputer

249. L-RDFDiversity: Distributed De-Identification for Large RDF Data with Spark

250. Deep Learning Based Malware Analysis

Catalog

Books, media, physical & digital resources