Machine Learning Approach for the Classification of Violent Attack based on Fabric Sensors. | 0 | 0.34 | 2021 |
Using Simulated Work-Integrated Learning in Mechatronics Courses. | 0 | 0.34 | 2021 |
Mining Cancer Cell Line-Based Drugs to Benefit KRAS(G12D) Pancreatic Adenocarcinoma Patients. | 0 | 0.34 | 2021 |
Malware Detection Using Machine Learning. | 0 | 0.34 | 2020 |
A Deep Learning based Framework to Detect and Recognize Humans using Contactless Palmprints in the Wild. | 0 | 0.34 | 2018 |
Corrections to "Area-Efficient Low-Noise Low-Spur Architecture for an Analog PLL Working From a Low Frequency Reference". | 0 | 0.34 | 2014 |
Understanding Human Driving Behavior through Computational Cognitive Modeling. | 0 | 0.34 | 2014 |
1 × 8 signal router using cascading the Mach-Zehnder interferometers | 0 | 0.34 | 2013 |
Addressing biometrics security and privacy related challenges in China | 1 | 0.39 | 2012 |
Contactless finger knuckle identification using smartphones | 14 | 0.70 | 2012 |
On the Company We Keep: Combined Scale-and-Scope Externalities in the Growth of IT Industry Co-agglomerations | 0 | 0.34 | 2008 |
The New Economic Geography of IT Industries: The Impacts of the Internet on their Market Linkages and Agglomeration. | 0 | 0.34 | 2007 |
Algorithms and Hardware Implementation of Real Time Automatic Gain Control Feature for Thermal Imager | 0 | 0.34 | 2004 |
Compact high-order schemes for the Euler equations | 9 | 2.18 | 1988 |