Distributed Fusion Estimation for Stochastic Uncertain Systems With Network-Induced Complexity and Multiple Noise | 0 | 0.34 | 2022 |
Reducing CACC Platoon Disturbances Caused by State Jitters by Combining Two Stages Driving State Recognition With Multiple Platoons’ Strategies and Risk Prediction | 1 | 0.41 | 2022 |
An Improved Mean Teacher Based Method for Large Scale Weakly Labeled Semi-Supervised Sound Event Detection | 1 | 0.36 | 2021 |
Developing univariate neurodegeneration biomarkers with low-rank and sparse subspace decomposition | 0 | 0.34 | 2021 |
AN EFFECTIVE DEEP EMBEDDING LEARNING METHOD BASED ON DENSE-RESIDUAL NETWORKS FOR SPEAKER VERIFICATION | 0 | 0.34 | 2021 |
Optimal Control Of Distributed Multiagent Systems With Finite-Time Group Flocking | 0 | 0.34 | 2020 |
Event Coverage Hole Repair Algorithm Based on Multi-AUVs in Multi-Constrained Three-Dimensional Underwater Wireless Sensor Networks. | 0 | 0.34 | 2020 |
The Impact of Different Ocean Tide Loading Models on GNSS Estimated Zenith Tropospheric Delay Using Precise Point Positioning Technique. | 0 | 0.34 | 2020 |
Efficient and Secure Two-Party Distributed Signing Protocol for the GOST Signature Algorithm. | 0 | 0.34 | 2020 |
Estimating Crop LAI Using Spectral Feature Extraction and the Hybrid Inversion Method. | 0 | 0.34 | 2020 |
Residual Guided Deblocking With Deep Learning | 0 | 0.34 | 2020 |
An Effective Perturbation Based Semi-Supervised Learning Method for Sound Event Detection. | 0 | 0.34 | 2020 |
Application of Endoscopic Ultrasound Image Analysis in the Treatment of Digestive Tract Diseases and Nursing | 0 | 0.34 | 2020 |
On the Security of a Certificateless Public Verification Scheme for Cloud-Based Cyber-Physical-Social Systems. | 0 | 0.34 | 2020 |
EDGAN: motion deblurring algorithm based on enhanced generative adversarial networks | 0 | 0.34 | 2020 |
Attention-Based Knowledge Tracing with Heterogeneous Information Network Embedding. | 0 | 0.34 | 2020 |
Efficient Pilot Design Scheme For Ofdm-Based Full-Duplex Systems | 0 | 0.34 | 2020 |
Distributed Kalman Consensus Filtering Over Wireless Sensor Networks With Fdi Attacks | 0 | 0.34 | 2020 |
Bus passenger flow statistics algorithm based on deep learning | 1 | 0.36 | 2020 |
An Effective Speaker Recognition Method Based on Joint Identification and Verification Supervisions. | 0 | 0.34 | 2020 |
A System Architecture For Intelligent Agriculture Based On Edge Computing | 0 | 0.34 | 2020 |
Robust Controller Placement Based on Load Balancing in Software Defined Networks | 0 | 0.34 | 2020 |
Distributed Secure Estimation For Cyber-Physical Systems With Fading Measurements And False Data Injection Attacks | 0 | 0.34 | 2020 |
Probabilistic guided polycystic ovary syndrome recognition using learned quality kernel. | 0 | 0.34 | 2019 |
Part-Based Bilinear CNN For Person Re-Identification | 0 | 0.34 | 2019 |
Modeling of sound speed in UWASN | 0 | 0.34 | 2018 |
Distributed weighted fusion estimation for uncertain networked systems with transmission time-delay and cross-correlated noises. | 6 | 0.41 | 2017 |
Network Voronoi Diagram on uncertain objects for nearest neighbor queries | 6 | 0.43 | 2015 |
Network Voronoi Diagram on uncertain objects for nearest neighbor queries | 6 | 0.43 | 2015 |
Web Resources for Microbial Data. | 2 | 0.39 | 2015 |
Symbolic Analysis of an Electric Vehicle Charging Protocol | 1 | 0.36 | 2014 |
Customer satisfaction evaluation method for customized product development using Entropy weight and Analytic Hierarchy Process. | 8 | 0.58 | 2014 |
Ionospheric Polarimetric Dispersion Effect on Low-Frequency Spaceborne SAR Imaging | 3 | 0.44 | 2014 |
A Method of Same Name Disambiguation towards Literature Search | 0 | 0.34 | 2014 |
Subsurface deposits detection and shoreline feature interpretation of a vanished Lop Nur lake using multi-source SAR data. | 0 | 0.34 | 2014 |
Dynamic reducts computation analysis based on rough sets | 1 | 0.36 | 2014 |
Quality Ranking of Features in Software Product Line Engineering | 6 | 0.43 | 2014 |
Pectoral muscle detection in mammograms using local statistical features. | 4 | 0.41 | 2014 |
Optimized Design Of Relay Node Placement For Industrial Wireless Network | 2 | 0.42 | 2014 |
TAuth: Verifying Timed Security Protocols. | 3 | 0.41 | 2014 |
Combining frequent itemsets and statistical features for texture classification in relative phase domain | 0 | 0.34 | 2014 |
A Nonlocal Filter-Based Hybrid Strategy for Depth Map Enhancement | 0 | 0.34 | 2014 |
Ordered Reverse k Nearest Neighbor Search via On-demand Broadcast. | 0 | 0.34 | 2014 |
On Ergodic Sum Capacity of Fading Channels in OFDMA-Based Cognitive Radio Networks | 4 | 0.41 | 2014 |
A Semantic Knowledge Base Construction Method for Information Security | 1 | 0.36 | 2014 |
The Research on Credit Risk of Business Groups based on Related Guarantee. | 1 | 0.44 | 2013 |
Enhancing Iterative Decoding of Cyclic LDPC Codes Using Their Automorphism Groups | 2 | 0.38 | 2013 |
A Multipath Routing Algorithm Based on OSPF Routing Protocol | 1 | 0.36 | 2012 |
A mobile health system design for home and community use. | 5 | 0.68 | 2012 |
Analysis the Speciality of Modulation Format in WDM-PON System. | 0 | 0.34 | 2011 |