566 results on '"Su, Ruidan"'
Search Results
2. Searching for Textual Adversarial Examples with Learned Strategy
3. Blockchain-based trust management for verifiable time synchronization service in IoT
4. Multistrategy boosted multicolony whale virtual parallel optimization approaches
5. Optimization of segmentation for true lumen, false lumen, and false lumen thrombus in type B aortic dissection using the 2D fine-tuning U-Net method
6. Animation style background production based on GAN
7. Development of a roadway crack detection system tailored for specific environments
8. Multi-band magnitude complementary crossover network by using Q-Bernstein filter
9. A real-time computer vision-based autonomous bitter gourd robot harvester
10. The relationship between pitch, intensity, and breathing reset amplitude in readings of Cantonese loaded sentences
11. Pitch estimation for noisy speech signals using synthetic bone-conducted speech
12. Unsupervised monocular depth estimation algorithm integrated with IMU
13. A preliminary study of functional reconstruction of paralysed hand based on Mediapipe and deep learning for motor intention recognition
14. Reconstruction of 3D interventional cardiovascular device geometries using biplanar x-ray fluoroscopic images
15. Using the first moments for orienting 2D projections
16. Spotsecure: parking reservation system with plate number recognition through image processing
17. Deep-learning-assisted analysis and prediction for detecting the bearing degradation
18. The role of synthetic data in mitigating imbalance in deep-learning-based arrhythmia classification: a comparative study
19. Public sentiment identification in social media for code-mixed English-Bangla and Banglish text analysis with machine learning
20. A multimodal transformer model for fish vitality prediction using time-series water temperature data and underwater videos
21. RTNet: relational-temporal classification network for multivariate time series
22. TriMoFaceNet: a trimmed MobileFaceNet architecture for resource-constrained environments
23. Detection and recognition of rice leaf diseases using deep neural networks
24. SSOCNet: a state space model-based small object counting neural network for object counting with cluttered background
25. Research on generative artificial intelligence data authorization mode and strategy: from the perspective of user data value
26. An improved zero-resource black-box framework for detecting hallucinations in 100 billion+ parameter generative pre-trained large language models
27. A Deep Reinforcement Learning Approach for Portfolio Management in Non‐Short‐Selling Market.
28. Automated accurate registration method between UAV image and Google satellite map
29. Visual analytics towards axle health of high-speed train based on large-scale scatter image
30. A Deep Temporal Factor Analysis Method for Large Scale Financial Portfolio Selection
31. Hybrid clinical decision support for cardiology: architectural foundations for integrations
32. Mind the gap: towards building a more seamless sim-to-real platform for robotic grasping and manipulation
33. Transformer-based vehicle re-identification with multiple details
34. A new complete construction method for the system K
35. Prosodic features of “Douju” in reading discourse of Cantonese based on the method of natural clustering
36. Simple and fast TSP initialization by Delaunay graph
37. Two key factors in handwriting analysis for personality prediction
38. Control priorities of signal on-ramps metering based on chaos state identification
39. Visual analysis of research hotspots and development trends in industrial software
40. DL-assisted tradeoff design for multi-UAV real-time video streaming transmission
41. Study on the visual appeal of character elements in digital human guides in tourism
42. Calibration method for driving behavior parameters in simulation model of asphalt pavement with different gradations
43. Data-driven gradient mapping adjustment method for color optimization in digital illustrations
44. Data-Driven Granular Computing Systems and Applications
45. ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device
46. Guest editorial special issue on “ICEEEE-21”
47. Secure and private key management scheme in big data networking
48. An ultra-lightweight RFID authentication scheme for mobile commerce
49. Design and Implementation of a Parallel Crypto Server
50. ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.