Found: 25
Select item for more details and to access through your institution.
VGA‐Net: Vessel graph based attentional U‐Net for retinal vessel segmentation.
- Published in:
- IET Image Processing (Wiley-Blackwell), 2024, v. 18, n. 8, p. 2191, doi. 10.1049/ipr2.13102
- By:
- Publication type:
- Article
Deep recurrent–convolutional neural network for classification of simultaneous EEG–fNIRS signals.
- Published in:
- IET Signal Processing (Wiley-Blackwell), 2020, v. 14, n. 3, p. 142, doi. 10.1049/iet-spr.2019.0297
- By:
- Publication type:
- Article
ResBCDU-Net: A Deep Learning Framework for Lung CT Image Segmentation.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 1, p. 268, doi. 10.3390/s21010268
- By:
- Publication type:
- Article
XACBench: a XACML policy benchmark.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 21, p. 16081, doi. 10.1007/s00500-020-04925-5
- By:
- Publication type:
- Article
The effect of methenamine on vascular development: Experimental investigation using in vivo and insilico methods.
- Published in:
- International Journal of Reproductive Biomedicine, 2020, v. 18, n. 8, p. 579, doi. 10.18502/ijrm.v13i8.7497
- By:
- Publication type:
- Article
Printed Persian OCR system using deep learning.
- Published in:
- IET Image Processing (Wiley-Blackwell), 2020, v. 14, n. 15, p. 3920, doi. 10.1049/iet-ipr.2019.0728
- By:
- Publication type:
- Article
Printed Persian OCR system using deep learning.
- Published in:
- IET Image Processing (Wiley-Blackwell), 2020, v. 14, n. 15, p. 3920, doi. 10.1049/iet-ipr.2019.0728
- By:
- Publication type:
- Article
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/9428457
- By:
- Publication type:
- Article
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/9428457
- By:
- Publication type:
- Article
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/9428457
- By:
- Publication type:
- Article
MHiC, an integrated user-friendly tool for the identification and visualization of significant interactions in Hi-C data.
- Published in:
- BMC Genomics, 2020, v. 21, n. 1, p. 1, doi. 10.1186/s12864-020-6636-7
- By:
- Publication type:
- Article
Parametric investigation of the dynamic response of a circular plate excited by a two-degree-of-freedom moving oscillator with inclusion of surface roughness.
- Published in:
- Archive of Applied Mechanics, 2024, v. 94, n. 2, p. 347, doi. 10.1007/s00419-023-02524-y
- By:
- Publication type:
- Article
A Deep Learning Approach for Botnet Detection Using Raw Network Traffic Data.
- Published in:
- Journal of Network & Systems Management, 2022, v. 30, n. 3, p. 1, doi. 10.1007/s10922-022-09655-7
- By:
- Publication type:
- Article
Amperometric biosensor for detection of triglyceride tributyrin based on zero point charge of activated carbon.
- Published in:
- Turkish Journal of Biology, 2017, v. 41, n. 2, p. 268, doi. 10.3906/biy-1607-24
- By:
- Publication type:
- Article
Lung CT Image Segmentation Using Reinforcement Learning.
- Published in:
- International Journal on Artificial Intelligence Tools, 2021, v. 30, n. 2, p. N.PAG, doi. 10.1142/S0218213021500056
- By:
- Publication type:
- Article
Analyzing XACML policies using answer set programming.
- Published in:
- International Journal of Information Security, 2019, v. 18, n. 4, p. 465, doi. 10.1007/s10207-018-0421-5
- By:
- Publication type:
- Article
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2015, v. 12, n. 1, p. 98, doi. 10.1109/TDSC.2014.2316816
- By:
- Publication type:
- Article
Truss decomposition using triangle graphs.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2022, v. 26, n. 1, p. 55, doi. 10.1007/s00500-021-06468-9
- By:
- Publication type:
- Article
Subspace Clustering for High-Dimensional Data Using Cluster Structure Similarity.
- Published in:
- International Journal of Intelligent Information Technologies, 2018, v. 14, n. 3, p. 38, doi. 10.4018/IJIIT.2018070103
- By:
- Publication type:
- Article
Scalable THz Network-On-Chip Architecture for Multichip Systems.
- Published in:
- Journal of Computer Networks & Communications, 2020, p. 1, doi. 10.1155/2020/8823938
- By:
- Publication type:
- Article
Scalable THz Network-On-Chip Architecture for Multichip Systems.
- Published in:
- Journal of Computer Networks & Communications, 2020, p. 1, doi. 10.1155/2020/8823938
- By:
- Publication type:
- Article
Persian printed text line detection based on font size.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 2, p. 2393, doi. 10.1007/s11042-022-13243-x
- By:
- Publication type:
- Article
A Reinforcement Learning-Based Configuring Approach in Next-Generation Wireless Networks Using Software-Defined Metasurface.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5587656
- By:
- Publication type:
- Article
A New Method of Coding for Steganography Based on LSB Matching Revisited.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6610678
- By:
- Publication type:
- Article
YAICD: Yet Another IMSI Catcher Detector in GSM.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/8847803
- By:
- Publication type:
- Article