779 results on '"Lee, Cheng-Chi"'
Search Results
2. Correction to: Focused ultrasound combined with radiotherapy for malignant brain tumor: a preclinical and clinical study
3. Module lattice based post quantum secure blockchain empowered vehicle to vehicle communication in the internet of vehicles
4. Machine learning assisted snort and zeek in detecting DDoS attacks in software-defined networking
5. Long-term follow-up and comparison of programmable and non-programmable ventricular cerebrospinal fluid shunts among adult patients with different hydrocephalus etiologies: a retrospective cohort study
6. Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network
7. Correlation between initial tumor enlargement and magnetic resonance imaging characteristics following linear accelerator-based stereotactic radiosurgery for acoustic neuromas
8. Rathke’s cleft cyst classification and outcomes after endoscopic endonasal approach
9. An improved user authentication and key agreement scheme for roaming service in ubiquitous network
10. Using a continuous electrocardiographic patch with heart rhythm analysis in the subacute stage of aneurysmal subarachnoid hemorrhage: The feasibility verification
11. The Impact of Tumor Resection on Survival and Functional Outcomes for Patients with Primary Central Nervous System Lymphoma
12. The Prognostic Impacts of Body Mass Index and Distance to the Peritoneal Bottom on Laparoscopic Ventriculoperitoneal Shunt Placement
13. An efficient cluster head selection for wireless sensor network-based smart agriculture systems
14. AutoML-ID: automated machine learning model for intrusion detection using wireless sensor network
15. Neuropsychological performances in patients with infiltrative non-GBM gliomas after postoperative adjuvant photon or proton radiotherapy: A prospective and preliminary investigation.
16. Deep Transfer Learning Models for Mobile-Based Ocular Disorder Identification on Retinal Images.
17. Recognition of High-Grade Invasiveness and Achievement of Gross Total Resection via an Endoscopic Endonasal Transsphenoidal Approach Promise Favorable Outcomes in Growth Hormone Pituitary Adenomas: 16 Years of Experience in a Single Institute
18. On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications
19. Minimally invasive endoscopic evacuation with the novel, portable Axonpen neuroendoscopic system for spontaneous intracerebral hemorrhage
20. Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function
21. Predictive Value of Swab Cultures for Cryopreserved Flaps During Delayed Cranioplasties
22. Clinical outcomes of fractionated stereotactic radiosurgery in treating perioptic meningiomas and schwannomas: A single-institutional experience
23. Privacy-Preserving Techniques in Cloud/Fog and Internet of Things
24. Different causes and diverse outcomes of extremely rare septic cavernous sinus thrombosis complicated with internal carotid artery stenosis
25. An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem
26. An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
27. A Novel Group Ownership Delegate Protocol for RFID Systems
28. A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System
29. A novel group ownership transfer protocol for RFID systems
30. Machine learning assisted snort and zeek in detecting DDoS attacks in software-defined networking
31. Pressure-sensitive paint measurements on the cavity with passive control devices under transonic flow
32. Cryptanalysis of 'An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System'
33. Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems
34. An improved E-DRM scheme for mobile environments
35. Anterior Skull Base Tumor Resection by Transciliary Supraorbital Keyhole Craniotomy: A Single Institutional Experience
36. Seizures in surgically resected atypical and malignant meningiomas: Long-term outcome analysis
37. An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
38. Awake craniotomies for epileptic gliomas: intraoperative and postoperative seizure control and prognostic factors
39. Some New Properties of Convex Fuzzy-Number-Valued Mappings on Coordinates Using Up and Down Fuzzy Relations and Related Inequalities
40. Performance Analysis of Two Famous Cryptographic Algorithms on Mixed Data
41. Optimizing the Quality of Service of Mobile Broadband Networks for a Dense Urban Environment
42. Non-Orthogonal Multiple Access Enabled Mobile Edge Computing in 6G Communications: A Systematic Literature Review
43. An Efficient Fractional Chebyshev Chaotic Map-Based Three-Factor Session Initiation Protocol for the Human-Centered IoT Architecture
44. CBFISKD: A Combinatorial-Based Fuzzy Inference System for Keylogger Detection
45. Effectiveness of dose-escalated topiramate monotherapy and add-on therapy in neurosurgery-related epilepsy: A prospective study
46. Occipitocervical fusion complicated with cerebellar abscess: a case report
47. An Efficient Mobile-Healthcare Emergency Framework
48. Weighted Fractional Hermite–Hadamard Integral Inequalities for up and down Ԓ-Convex Fuzzy Mappings over Coordinates.
49. Optimal Radio Propagation Modeling and Parametric Tuning Using Optimization Algorithms.
50. Interacting Molecular Loops in the Mammalian Circadian Clock
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.