Search

Showing total 266 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal connection science Remove constraint Journal: connection science Publisher taylor & francis ltd Remove constraint Publisher: taylor & francis ltd
266 results

Search Results

1. DOE: a dynamic object elimination scheme based on geometric and semantic constraints.

2. UAV mission scheduling with completion time, flight distance, and resource consumption constraints.

3. Evaluating machine and deep learning techniques in predicting blood sugar levels within the E-health domain.

4. Time anomaly detection in the duration of civil trials in Italian justice.

5. Particle-based simulation technique for medical applications.

6. MoCoUTRL: a momentum contrastive framework for unsupervised text representation learning.

7. PrivBCS: a privacy-preserving and efficient crowdsourcing system with fine-grained worker selection based on blockchain.

8. Image super-resolution reconstruction based on multi-scale dual-attention.

9. Microservice combination optimisation based on improved gray wolf algorithm.

10. Network security situation assessment based on dual attention mechanism and HHO-ResNeXt.

11. Dynamic activation and enhanced image contour features for object detection.

12. A lightweight and style-robust neural network for autonomous driving in end side devices.

13. Exploring graph representation strategies for text classification.

14. The algorithm and implementation of an extension to LLVM for solving the blocking between instruction sink and division-modulo combine.

15. Accelerating AI performance with the incorporation of TVM and MediaTek NeuroPilot.

16. CFSE: a Chinese short text classification method based on character frequency sub-word enhancement.

17. Design of advanced intrusion detection systems based on hybrid machine learning techniques in hierarchically wireless sensor networks.

18. High-performance computing for static security assessment of large power systems.

19. Neighbor interaction-based personalised transfer for cross-domain recommendation.

20. Comparative relation mining of customer reviews based on a hybrid CSR method.

21. An efficiency control strategy of dual-motor multi-gear drive algorithm.

22. CPW-DICE: a novel center and pixel-based weighting for damage segmentation.

23. NAS-YOLOX: a SAR ship detection using neural architecture search and multi-scale attention.

24. Detecting susceptible communities and individuals in hospital contact networks: a model based on social network analysis.

25. Exploring latent weight factors and global information for food-oriented cross-modal retrieval.

26. The node importance evaluation method based on graph convolution in multilayer heterogeneous networks.

27. Recommending third-party APIs via using lightweight graph convolutional neural networks.

28. A multimodal hybrid parallel network intrusion detection model.

29. CGRS: Collaborative Knowledge Propagation Graph Attention Network for Recipes Recommendation.

30. Empirical study of privacy inference attack against deep reinforcement learning models.

31. A GCC-based checker for compliance with MISRA-C's single-translation-unit rules.

32. Low cost network traffic measurement and fast recovery via redundant row subspace-based matrix completion.

33. A collaborative auditing scheme with dynamic data updates based on blockchain.

34. BFG: privacy protection framework for internet of medical things based on blockchain and federated learning.

35. Trajectory privacy data publishing scheme based on local optimisation and R-tree.

36. A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth.

37. Blockchain-assisted data sharing supports deduplication for cloud storage.

38. Integrate computation intelligence with Bayes theorem into complex construction installation: a heuristic two-stage resource scheduling optimisation approach.

39. Active learning for deep object detection by fully exploiting unlabeled data.

40. Quality medical data management within an open AI architecture – cancer patients case.

41. MS_HGNN: a hybrid online fraud detection model to alleviate graph-based data imbalance.

42. Ontology-based semantic data interestingness using BERT models.

43. Multi-branch feature learning based speech emotion recognition using SCAR-NET.

44. Impartial competitive learning in multi-layered neural networks.

45. Monocular vision guided deep reinforcement learning UAV systems with representation learning perception.

46. Isolated toughness and fractional (a,b,n)-critical graphs.

47. Monocular vision based on the YOLOv7 and coordinate transformation for vehicles precise positioning.

48. Reward estimation with scheduled knowledge distillation for dialogue policy learning.

49. A remote sensing encrypted data search method based on a novel double-chain.

50. An enhanced text classification model by the inverted attention orthogonal projection module.