280 results on '"Xian, Ming"'
Search Results
2. A Review of Kubernetes Scheduling and Load Balancing Methods
3. A Predictive Model of COVID-19 mRNA Vaccine Reactivity based on Dual Attention for Federated Learning Scenarios
4. An Automated Data Processing Pipeline for Coral Reef Monitoring
5. Delay-Dependent Stability Analysis of Load Frequency Control Systems With Electric Vehicles.
6. A Bibliometric Analysis and Visualization of Blockchain in Cyberspace Security
7. Research on 'Attack Graph' Development Trend
8. A Survey of Intelligent Optimization Algorithms for Weapon Target Assignment (WTA) Problem
9. Cyber Range Research Based on Scientific Knowledge Map
10. Scalable and Resilient Platooning Control of Cooperative Automated Vehicles.
11. A small LAN Zero Trust network model based on Elastic Stack
12. Construction of Network Scene Generation System Based on OpenStack
13. Intrusion Detection System in Cloud Computing Environment
14. Research and application of Chinese Entity Relation Extraction Based on Cyberspace Security
15. A Small Sample DDoS Attack Detection Method Based on Deep Transfer Learning
16. Distributed Observer-Based Cooperative Control Approach for Uncertain Nonlinear MASs Under Event-Triggered Communication.
17. Additive-State-Decomposition-Based Repetitive Control for a Class of Nonlinear Systems with Multiple Mismatched Disturbances.
18. Cluster Consensus of Multiagent Systems With Weighted Antagonistic Interactions.
19. Monitoring System of OpenStack Cloud Platform Based on Prometheus
20. Research on the Development of Cloud Computing
21. Docker Container Log Collection and Analysis System Based on ELK
22. Feasibility analysis of network security teaching platform based on KVM and GNS3
23. Receding Horizon Synchronization of Delayed Neural Networks Using a Novel Inequality on Quadratic Polynomial Functions.
24. Secure and Efficient Outsourced k-Means Clustering using Fully Homomorphic Encryption With Ciphertext Packing Technique.
25. Position-Based Synchronization of Networked Harmonic Oscillators With Asynchronous Sampling and Communication Delays.
26. Improved Stability Criteria for Delayed Neural Networks Using a Quadratic Function Negative-Definiteness Approach.
27. Event-Triggered Output Feedback Synchronization of Master–Slave Neural Networks Under Deception Attacks.
28. Observation of Soliton Explosions in an Anomalous-Dispersion Fibre Laser
29. Extended Dissipativity Analysis of Delayed Memristive Neural Networks Based on A Parameter-Dependent Lyapunov Functional
30. Experiment of Voltage Response During Mode Switching in a Unitized Regenerative Fuel Cell with Parallel Flow Field
31. Chaotic behavior of pulsating soliton in a fiber laser
32. An IoT-Applicable Access Control Model Under Double-Layer Blockchain.
33. Active Control Design for Networked Offshore Platforms
34. Controller Design for Takagi-Sugeno Fuzzy Systems with Nonlinear Consequent Part Via Sampled-Data Measurements
35. A High Efficiency Accelerator for Deep Neural Networks
36. Efficient Compiler Code Generation for Deep Learning Snowflake Co-Processor
37. The Application of Big Data in Cyberspace: A Survey
38. Research on "Cyberspace Security Testing and Evaluation" Technology Development Trend
39. The Development Trend Analysis of 5G Network
40. The Assignment of Crowdsourcing Tasks with Verifiable Capability
41. Privacy-Preserving Interest-Ability Based Task Allocation in Crowdsourcing
42. Efficient Outsourced Data Access Control with User Revocation for Cloud-Based IoT
43. Extended Dissipativity Analysis of Delayed Memristive Neural Networks Based on A Parameter-Dependent Lyapunov Functional
44. Experiment of Voltage Response During Mode Switching in a Unitized Regenerative Fuel Cell with Parallel Flow Field
45. A Local Coupling Multitrace Domain Decomposition Method for Electromagnetic Scattering From Multilayered Dielectric Objects.
46. Dynamic Event-Triggered Distributed Coordination Control and its Applications: A Survey of Trends and Techniques.
47. Resilient Control Design Based on a Sampled-Data Model for a Class of Networked Control Systems Under Denial-of-Service Attacks.
48. Snowflake: An efficient hardware accelerator for convolutional neural networks
49. Hardware accelerators for recurrent neural networks on FPGA
50. A novel iterative linear solver for 3-D magnetostatic problems using edge elements
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.