33,951 results on '"Hassan"'
Search Results
2. Feature Fusion for Human Activity Recognition using Parameter-Optimized Multi-Stage Graph Convolutional Network and Transformer Models.
3. Invited Paper: A Pseudo-Differential Architecture for Low-Power Voltage-to-Time Converters.
4. AfriMTE and AfriCOMET: Enhancing COMET to Embrace Under-resourced African Languages.
5. Carrier Phase Based Relative Positioning Using MUSIC-Based ToA Estimation with High Resolution.
6. Routing optimization based on DRL and Generative Adversarial Networks for SDN environments.
7. Identification of Technical and Vocational Education and Training (TVET) trainee's personality attributes which impact skills learning.
8. On the Performance of Multi-IRS-Assisted Networks Across Real Urban, Suburban, and Rural Environments.
9. Single Versus Double IRS-Assisted Networks: A Comparative Analysis Using Practical Phase Shifting.
10. Identifying Two-Reset Conditions for Closed-Loop Sinusoidal Input Reset Control Systems.
11. An Optimized CNN-LSTM Model for Detecting Cardiac Arrhythmias.
12. A One-Class Autoencoder for Porcelain Art Authentication.
13. Decoding and Answering Developers' Questions About Web Services Managed by Marketplaces.
14. A Bibliometric Analysis and Research Landscape of Artificial Intelligence in Education.
15. ASCENT: A Context-Aware Spectrum Coexistence Design and Implementation Toolset for Policymakers in Satellite Bands.
16. KGPRUNE: A Web Application to Extract Subgraphs of Interest from Wikidata with Analogical Pruning.
17. Mitigating Security Issues in GitHub Actions.
18. Automatic Recognition of Food Ingestion Environment from the AIM-2 Wearable Sensor.
19. MaskCLR: Attention-Guided Contrastive Learning for Robust Action Representation Learning.
20. Semantic-Aware Multi-Label Adversarial Attacks.
21. Vim4Path: Self-Supervised Vision Mamba for Histopathology Images.
22. CDAD-Net: Bridging Domain Gaps in Generalized Category Discovery.
23. All You Need is Unary: End-to-End Unary Bit-stream Processing in Hyperdimensional Computing.
24. A Generalized Multi-Level Structure for High-Precision Binary Decoders.
25. Hardware Implementation of an a-Trimmed Adaptive Median Mean Filter.
26. A Sub-THz CMOS Transceiver IC and System for Medium-Reach Guided Wave and Short-Reach Wireless Communication Links.
27. Cryogenic Alternative: CMOS Versus Dynamic-Based Logic.
28. ScreenAI: A Vision-Language Model for UI and Infographics Understanding.
29. Capacitively Isolated 400 Mbps Data Transfer System with 2 Ns Propagation Delay and 5 kV /µs Common Mode Transient Immunity.
30. The Use of Deep Learning in the Diagnosis and Prediction of Heart Failure: A scoping review.
31. Sahara Pioneers at FIGNEWS 2024 Shared Task: Data Annotation Guidelines for Propaganda Detection in News Items.
32. Service and End of Rally Detection in Badminton Videos.
33. Power Consumption Analysis of a Reconfigurable Intelligent Surface for Self-Sustained Operations.
34. A Random Access Protocol for Mixed-Traffic in LEO Satellite-Based IoT Communication.
35. The Capacity of Symmetric Private Information Retrieval with Private Noisy Side Information.
36. Concise Analysis of Intangible Cultural Heritage Practices in Connection with Sustainable Development Goals.
37. Intraoperative Registration by Cross-Modal Inverse Neural Rendering.
38. Learning to Match 2D Keypoints Across Preoperative MR and Intraoperative Ultrasound.
39. Unsupervised Physics-Inspired Shear Wave Speed Estimation in Ultrasound Elastography.
40. Latent Pollution Model: The Hidden Carbon Footprint in 3D Image Synthesis.
41. Can Deep Learning Detect Fake News Better when Adding Context Features?
42. Not just Atmosphere: Game Music Design for Accessible In-Game Information Communication.
43. Inclusive VR gaming with older adults: Accessibility of entertainment and educational VR games.
44. Transparent Transaction Ordering in Blockchain-Based Collaborative Processes.
45. DeepApprox: Rapid Deep Learning based Design Space Exploration of Approximate Circuits via Check-pointing.
46. Anomaly Detection for Real-World Cyber-Physical Security Using Quantum Hybrid Support Vector Machines.
47. Predicting Stress in Older Adults with RNN and LSTM from Time Series Sensor Data and Cortisol.
48. Exploring the 'Freedom to be Me' through Design Sprints with Neurodivergent Scholars.
49. Towards a Rich Format for Closed-Captioning.
50. Comparison of Regression Methods to Predict the First Spike Latency in Response to an External Stimulus in Intracellular Recordings for Cerebellar Cells.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.