Search

Showing total 706 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal connection science Remove constraint Journal: connection science Publisher taylor & francis ltd Remove constraint Publisher: taylor & francis ltd
706 results

Search Results

151. The algorithm and implementation of an extension to LLVM for solving the blocking between instruction sink and division-modulo combine.

152. High-performance computing for static security assessment of large power systems.

153. CFSE: a Chinese short text classification method based on character frequency sub-word enhancement.

154. CPW-DICE: a novel center and pixel-based weighting for damage segmentation.

155. NAS-YOLOX: a SAR ship detection using neural architecture search and multi-scale attention.

156. Comparative relation mining of customer reviews based on a hybrid CSR method.

157. An efficiency control strategy of dual-motor multi-gear drive algorithm.

158. Recommending third-party APIs via using lightweight graph convolutional neural networks.

159. A multimodal hybrid parallel network intrusion detection model.

160. Trajectory privacy data publishing scheme based on local optimisation and R-tree.

161. Research on the Uyghur morphological segmentation model with an attention mechanism.

162. Online incremental updating for model enhancement based on multi-perspective trusted intervals.

163. TCN enhanced novel malicious traffic detection for IoT devices.

164. Predicting algorithm of attC site based on combination optimization strategy.

165. Image semantic segmentation with hierarchical feature fusion based on deep neural network.

166. Security analysis of smart contract based rating and review systems: the perilous state of blockchain-based recommendation practices.

167. Matching heterogeneous ontologies with adaptive evolutionary algorithm.

168. A multi-factorial evolutionary algorithm concerning diversity information for solving the multitasking Robust Influence Maximization Problem on networks.

169. Reconstructing higher-resolution four-dimensional time-varying volumetric data.

170. Predicting adolescent violence in Wartegg-ZeichenTest drawing images based on deep learning.

171. Exploring the NFT market on ethereum: a comprehensive analysis and daily volume forecasting.

172. Automated threat modelling and risk analysis in e-Government using BPMN.

173. Security situational awareness of power information networks based on machine learning algorithms.

174. ScTCN-LightGBM: a hybrid learning method via transposed dimensionality-reduction convolution for loading measurement of industrial material.

175. On routing algorithms in the internet of vehicles: a survey.

176. Counting and measuring the size and stomach fullness levels for an intelligent shrimp farming system.

177. Dual conditional GAN based on external attention for semantic image synthesis.

178. Real-time reading system for pointer meter based on YolactEdge.

179. Early prediction of ransomware API calls behaviour based on GRU-TCN in healthcare IoT.

180. Optimal feature selection and invasive weed tunicate swarm algorithm-based hierarchical attention network for text classification.

181. An ensemble machine learning approach for classification tasks using feature generation.

182. Realised volatility prediction of high-frequency data with jumps based on machine learning.

183. Research on hybrid intrusion detection based on improved Harris Hawk optimization algorithm.

184. Discovery of process variants based on trace context tree.

185. Analyzing execution path non-determinism of the Linux kernel in different scenarios.

186. Lightweight multilayer interactive attention network for aspect-based sentiment analysis.

187. A data sharing method for remote medical system based on federated distillation learning and consortium blockchain.

188. A novel bias-alleviated hybrid ensemble model based on over-sampling and post-processing for fair classification.

189. Full-span named entity recognition with boundary regression.

190. A secure authentication and key agreement scheme with dynamic management for vehicular networks.

191. HDIEA: high dimensional color image encryption architecture using five-dimensional Gauss-logistic and Lorenz system.

192. Collaborative pursuit-evasion game of multi-UAVs based on Apollonius circle in the environment with obstacle.

193. GASN: gamma distribution test for driver genes identification based on similarity networks.

194. ZigZag transform with Durstenfeld shuffle for fast and secure image encryption.

195. Improving transaction safety via anti-fraud protection based on blockchain.

196. Cue prompt adapting model for relation extraction.

197. Re-LSTM: A long short-term memory network text similarity algorithm based on weighted word embedding.

198. Establishment and mapping of heterogeneous anomalies in network intrusion datasets.

199. Threat analysis model to control IoT network routing attacks through deep learning approach.

200. Exploiting high-order behaviour patterns for cross-domain sequential recommendation.