Search

Showing total 2 results
2 results

Search Results

1. Modulation recognition network compression based on a randomly perturbation convolutional kernel activation mapping method.

2. Authentication of multiple transaction using enhanced Elman spike neural network optimized with glowworm swarm optimization.