Found: 38
Select item for more details and to access through your institution.
Discrimination of various upper structures and vehicles using radar cross section of frequency‐modulated continuous‐wave radar.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2024, v. 60, n. 7, p. 1, doi. 10.1049/ell2.13149
- By:
- Publication type:
- Article
A New Model for Building Energy Modeling and Management Using Predictive Analytics: Partitioned Hierarchical Multitask Regression (PHMR).
- Published in:
- Indoor Air, 2024, v. 2024, p. 1, doi. 10.1155/2024/5595459
- By:
- Publication type:
- Article
Correlation enhanced distribution adaptation for prediction of fall risk.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-54053-5
- By:
- Publication type:
- Article
Detection of Fall Risk Behaviors in Patients with Severe Mobility Issues Using FMCW Radar: Sitting Up and Sitting on the Side of the Bed.
- Published in:
- Journal of Electromagnetic Engineering & Science, 2024, v. 24, n. 1, p. 65, doi. 10.26866/jees.2024.1.r.206
- By:
- Publication type:
- Article
Why is sub‐Saharan Africa an attractive destination to foreign land grabbers? Evidence from country characteristics.
- Published in:
- African Development Review / Revue Africaine de Développement, 2022, v. 34, n. 2, p. 280, doi. 10.1111/1467-8268.12632
- By:
- Publication type:
- Article
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4714899
- By:
- Publication type:
- Article
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4714899
- By:
- Publication type:
- Article
Prediction of fall risk among community-dwelling older adults using a wearable system.
- Published in:
- Scientific Reports, 2021, v. 11, n. 1, p. 1, doi. 10.1038/s41598-021-00458-5
- By:
- Publication type:
- Article
Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers.
- Published in:
- KSII Transactions on Internet & Information Systems, 2021, v. 15, n. 9, p. 3243, doi. 10.3837/tiis.2021.09.009
- By:
- Publication type:
- Article
Classification score approach for detecting adversarial example in deep neural network.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 7, p. 10339, doi. 10.1007/s11042-020-09167-z
- By:
- Publication type:
- Article
CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks †.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 5, p. 1495, doi. 10.3390/s20051495
- By:
- Publication type:
- Article
Multipath transmission control protocol–based multi-access traffic steering solution for 5G multimedia-centric network: Design and testbed system implementation.
- Published in:
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 2, p. 1, doi. 10.1177/1550147720909759
- By:
- Publication type:
- Article
Hybrid approach of parallel implementation on CPU–GPU for high-speed ECDSA verification.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 8, p. 4329, doi. 10.1007/s11227-019-02744-6
- By:
- Publication type:
- Article
Integration of machine learning and mechanistic models accurately predicts variation in cell density of glioblastoma using multiparametric MRI.
- Published in:
- Scientific Reports, 2019, v. 9, n. 1, p. N.PAG, doi. 10.1038/s41598-019-46296-4
- By:
- Publication type:
- Article
Selective Poisoning Attack on Deep Neural Networks †.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 7, p. 892, doi. 10.3390/sym11070892
- By:
- Publication type:
- Article
An efficient multi-path pipeline transmission for a bulk data transfer in IEEE 802.15.4 multi-hop networks.
- Published in:
- Wireless Networks (10220038), 2019, v. 25, n. 1, p. 117, doi. 10.1007/s11276-017-1542-x
- By:
- Publication type:
- Article
Secure mobile device structure for trust IoT.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 12, p. 6646, doi. 10.1007/s11227-017-2155-y
- By:
- Publication type:
- Article
Random Untargeted Adversarial Example on Deep Neural Network †.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 12, p. 738, doi. 10.3390/sym10120738
- By:
- Publication type:
- Article
NIMG-12. RADIOGENOMICS ON VENUS AND MARS: IMPACT OF SEX-DIFFERENCES ON MRI AND GENETIC CORRELATIONS IN GLIOBLASTOMA.
- Published in:
- Neuro-Oncology, 2018, v. 20, p. vi178, doi. 10.1093/neuonc/noy148.739
- By:
- Publication type:
- Article
A Simple and Enriched Closed-Form Formula for Cell Residence Time in 5G Heterogeneous Networks.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 1, p. 491, doi. 10.1007/s11277-018-5701-x
- By:
- Publication type:
- Article
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6751042
- By:
- Publication type:
- Article
Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks.
- Published in:
- Applied Sciences (2076-3417), 2017, v. 7, n. 11, p. 1186, doi. 10.3390/app7111186
- By:
- Publication type:
- Article
RM-MAC: a reservation based multi-channel MAC protocol for wireless sensor networks.
- Published in:
- Wireless Networks (10220038), 2016, v. 22, n. 8, p. 2727, doi. 10.1007/s11276-015-1121-y
- By:
- Publication type:
- Article
Channel-quality-aware multihop broadcast for asynchronous multi-channel wireless sensor networks.
- Published in:
- Wireless Networks (10220038), 2016, v. 22, n. 7, p. 2143, doi. 10.1007/s11276-015-1088-8
- By:
- Publication type:
- Article
Efficient Packet Routing in Highly Mobile Wireless Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 2, p. 1265, doi. 10.1007/s11277-015-2687-5
- By:
- Publication type:
- Article
Design of a Secure System Considering Quality of Service.
- Published in:
- Symmetry (20738994), 2014, v. 6, n. 4, p. 938, doi. 10.3390/sym6040938
- By:
- Publication type:
- Article
Partition and Cooperation for Crowded Multi-rate WLANs.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 2, p. 1511, doi. 10.1007/s11277-014-1943-4
- By:
- Publication type:
- Article
A novel routing protocol for cognitive radio networks with cooperation process.
- Published in:
- KSII Transactions on Internet & Information Systems, 2014, v. 8, n. 11, p. 3860, doi. 10.3837/tiis.2014.11.011
- By:
- Publication type:
- Article
On the Design of Delay based Admission Control in Hierarchical Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2014, v. 8, n. 3, p. 997, doi. 10.3837/tiis.2014.03.016
- By:
- Publication type:
- Article
A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage.
- Published in:
- Scientific World Journal, 2014, p. 1, doi. 10.1155/2014/820391
- By:
- Publication type:
- Article
A secure and efficient audit mechanism for dynamic shared data in cloud storage.
- Published in:
- 2014
- By:
- Publication type:
- journal article
A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 918, doi. 10.1007/s11227-013-0928-5
- By:
- Publication type:
- Article
Base station association schemes to reduce unnecessary handovers using location awareness in femtocell networks.
- Published in:
- Wireless Networks (10220038), 2013, v. 19, n. 5, p. 741, doi. 10.1007/s11276-012-0498-0
- By:
- Publication type:
- Article
Congestion control for sudden bandwidth changes in TCP Congestion control for sudden bandwidth changes in TCP.
- Published in:
- International Journal of Communication Systems, 2012, v. 25, n. 12, p. 1550, doi. 10.1002/dac.1322
- By:
- Publication type:
- Article
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks.
- Published in:
- Mobile Networks & Applications, 2010, v. 15, n. 5, p. 680, doi. 10.1007/s11036-009-0191-4
- By:
- Publication type:
- Article
A practical approach of ID-based cryptosystem in ad hoc networks.
- Published in:
- Wireless Communications & Mobile Computing, 2007, v. 7, n. 7, p. 909, doi. 10.1002/wcm.500
- By:
- Publication type:
- Article
An effective traffic management scheme using adaptive handover time in next-generation cellular networks.
- Published in:
- International Journal of Network Management, 2007, v. 17, n. 2, p. 139, doi. 10.1002/nem.641
- By:
- Publication type:
- Article
FREE SUBMESH LIST STRATEGY: A BEST FIT SUBMESH ALLOCATION IN MESH CONNECTED MULTICOMPUTERS.
- Published in:
- Parallel Processing Letters, 1996, v. 6, n. 1, p. 75, doi. 10.1142/S0129626496000091
- By:
- Publication type:
- Article