Online Monitoring for Underground Power Cable Insulation Based on Resonance Frequency Analysis Under Chirp Signal Injection | 0 | 0.34 | 2023 |
Improved fuzzy sliding mode control in flexible manipulator actuated by PMAs | 0 | 0.34 | 2022 |
A Novel Online Monitoring Scheme for Underground Power Cable Insulation Based on Common-Mode Leakage Current Measurement | 0 | 0.34 | 2022 |
Meta-Knowledge and Multi-Task Learning-Based Multi-Scene Adaptive Crowd Counting | 0 | 0.34 | 2022 |
Plant Leaf Diseases Fine-Grained Categorization Using Convolutional Neural Networks | 0 | 0.34 | 2022 |
Clustering of Typical Wind Power Scenarios Based on K-Means Clustering Algorithm and Improved Artificial Bee Colony Algorithm | 0 | 0.34 | 2022 |
Deep Reinforcement Learning-Based Resource Allocation for Satellite Internet of Things with Diverse QoS Guarantee | 1 | 0.43 | 2022 |
Approximate Adiabatic Logic for Low-Power and Secure Edge Computing | 0 | 0.34 | 2022 |
On the s-hamiltonianicity of an hourglass-free line graph | 0 | 0.34 | 2022 |
Adiabatic Logic-based STT-MRAM Design for IoT | 0 | 0.34 | 2022 |
Intelligent Analysis For Medical Multi-Modal Data | 0 | 0.34 | 2021 |
Detection and Location of Aged Cable Segment in Underground Power Distribution System Using Deep Learning Approach | 0 | 0.34 | 2021 |
ReMOT: A model-agnostic refinement for multiple object tracking | 1 | 0.35 | 2021 |
Instance-Level Heterogeneous Domain Adaptation For Limited-Labeled Sketch-To-Photo Retrieval | 0 | 0.34 | 2021 |
Users' attitude on perceived security of enterprise systems mobility: an empirical study | 0 | 0.34 | 2021 |
SiamRCR - Reciprocal Classification and Regression for Visual Object Tracking. | 0 | 0.34 | 2021 |
Common-Mode (CM) Current Sensor Node Design for Distribution Grid Insulation Monitoring Framework Based on Multi-Objective Optimization | 1 | 0.37 | 2021 |
Video Region Annotation with Sparse Bounding Boxes | 0 | 0.34 | 2020 |
Dynamic Face Video Segmentation Via Reinforcement Learning | 2 | 0.36 | 2020 |
CARAM - A Content-Aware Hybrid PCM/DRAM Main Memory System Framework. | 0 | 0.34 | 2020 |
Learning the Kinematics of a Manipulator Based on VQTAM | 0 | 0.34 | 2020 |
Beyond Intra-modality - A Survey of Heterogeneous Person Re-identification. | 3 | 0.41 | 2020 |
LSimRank: Node Similarity in a Labeled Graph. | 0 | 0.34 | 2020 |
Robust Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks in the Presence of Jammers. | 0 | 0.34 | 2020 |
Throughput Maximization Of Uav-Enabled Wireless Network In The Presence Of Jammers: Joint Trajectory And Communication Design | 0 | 0.34 | 2019 |
A Memetic Algorithm For Community Detection In Bipartite Networks | 0 | 0.34 | 2019 |
Make Skeleton-based Action Recognition Model Smaller, Faster and Better. | 5 | 0.48 | 2019 |
A Satellite Handover Strategy Based on the Potential Game in LEO Satellite Networks | 0 | 0.34 | 2019 |
Time-Series Displacement of Land Subsidence in Fuzhou Downtown, Monitored by SBAS-InSAR Technique | 0 | 0.34 | 2019 |
Word Sense Disambiguation Using Cosine Similarity Collaborates with Word2vec and WordNet | 1 | 0.35 | 2019 |
Secure UAV Communication with Robust Communication and Trajectory Design | 0 | 0.34 | 2019 |
基于威胁情报平台的恶意URL检测研究 (Study on Malicious URL Detection Based on Threat Intelligence Platform). | 0 | 0.34 | 2018 |
An algorithm for correcting XSLT rules according to DTD updates. | 0 | 0.34 | 2016 |
A fused method for news recommendation | 0 | 0.34 | 2016 |
基于游程检测与快速傅里叶变换的加密比特流识别 (Identification of Encrypted Bit Stream Based on Runs Test and Fast Fourier Transform). | 0 | 0.34 | 2015 |
Towards modelling perfect forward secrecy in two‐message authenticated key exchange under ephemeral‐key revelation | 3 | 0.39 | 2015 |
A Real-Time Video Information Hiding Method Based on CAVLC Encoding. | 0 | 0.34 | 2015 |
Description-Discrimination Collaborative Tracking | 15 | 0.52 | 2014 |
Information Diffusion and Influence Measurement Based on Interaction in Microblogging | 1 | 0.37 | 2014 |
Dynamics of open-source software developer's commit behavior: an empirical investigation of subversion | 0 | 0.34 | 2013 |
Constructing Adaptive Complex Cells for Robust Visual Tracking | 29 | 0.73 | 2013 |
Low Mismatch Key Agreement Based On Wavelet-Transform Trend And Fuzzy Vault In Body Area Network | 9 | 0.50 | 2013 |
Probabilistic Salient Object Contour Detection Based On Superpixels | 2 | 0.36 | 2013 |
Class-Specified segmentation with multi-scale superpixels | 0 | 0.34 | 2012 |
An Improved FVS-KPCA Method of Fault Detection on TE Process | 2 | 0.47 | 2012 |
IAIR-CarPed: A psychophysically annotated dataset with fine-grained and layered semantic labels for object recognition | 6 | 0.44 | 2012 |
Object detection using discriminative photogrammetric context | 1 | 0.35 | 2011 |
Analysis Of Solution For Supervised Graph Embedding | 2 | 0.37 | 2008 |
Approximation Of Circular Arcs By C-2 Cubic Polynomial B-Splines | 0 | 0.34 | 2007 |
An Independent Component Analysis Approach To Perfusion Weighted Imaging | 0 | 0.34 | 2005 |