36 results on '"Cai, Xiaohao"'
Search Results
2. Research on access strategy of autonomous scheduling service of communication polling system based on DQN technology
3. Chromatographic analysis of typical decomposition products of sulfur hexafluoride
4. Research on the influence of music on human society based on the cosine similarity algorithm
5. Simulation and impact analysis of network security attack on digital relay protection devices
6. Prediction and optimization model of C4 olefin production based on random forest and chaotic particle swarm optimization
7. Three-dimensional stowage optimization of general cargo ships considering stevedoring complexity in multiple ports
8. Research on package task price strategy based on dynamic expectation and gray analysis
9. Application of reliefF feature selection in trust evaluation of user abnormal behavior
10. Research on communication channel transmission characteristics of human body surface with different body mass index
11. Research on active reflective panel of FAST based on genetic algorithm
12. Recognition of handwritten digits on blackboard using Resnet model
13. Analytical derivation of transient and steady state process of electro-thermal model considering temperature non-linearity of SF6 gas insulated structural material
14. A study of unsupervised image super-resolution based on deep network prior
15. Research on event capture method for network security testbed based on trusted execution environment
16. Research on privacy preservation of location in wireless sensor networks
17. A remote attestation model and protocol for multimedia mobile edge computing security
18. Deployment strategy of resource optimized service function chain in NFV environment
19. Hierarchical density-based clustering of unknown protocol message
20. Generative image steganography based on VAE-GAN
21. Communication transmitter individual identification based on GAF-ResNet
22. Service function chain deployment algorithm based on availability perception and cost optimization
23. An improved fingerprint matching algorithm to detect malware encrypted traffic based on weighted Bayes
24. Combined with the dual-attention and the long short-term memory intrusion detection research
25. Density peak-based clustering of industrial control protocols for reverse engineering
26. Use transformer encoder for KPI anomaly detection
27. Some results on the Z2Z4[u]-additive codes
28. Study on applicability of multimode communication in electric information acquisition system
29. Analysis and implementation of man-in-the-middle attack on Microsoft's PPTP
30. Research on service security isolation method of intelligent distribution terminal
31. Precoding design of low-orbit satellite communication based on energy efficiency
32. A trusted remote attestation protocol based on attributes for containerized virtual network functions
33. Analysis of phase noise impact on velocity measurement in TT&C systems
34. Front Matter: Volume 12245
35. DS-CBIoT: a generic framework on data sharing based on consortium blockchain and IoT
36. Research on principle ordering and transportation scheme of production enterprise based on the improved TOPSIS and clustering algorithm
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.