Works matching IS 00104620 AND DT 2023 AND VI 66 AND IP 4
Results: 17
Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 1040, doi. 10.1093/comjnl/bxac167
- By:
- Publication type:
- Article
Analysis Performance Of Image Processing Technique Its Application by Decision Support Systems On Covid-19 Disease Prediction Using Convolution Neural Network.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 1030, doi. 10.1093/comjnl/bxac154
- By:
- Publication type:
- Article
Cryptanalysis on Reduced-Round 3D and Saturnin.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 1017, doi. 10.1093/comjnl/bxac116
- By:
- Publication type:
- Article
Optimal Symmetric Ratcheting for Secure Communication.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 987, doi. 10.1093/comjnl/bxab209
- By:
- Publication type:
- Article
Low-Data Cryptanalysis On SKINNY Block Cipher.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 970, doi. 10.1093/comjnl/bxab208
- By:
- Publication type:
- Article
Impact of COVID-19 on the Human Personality: An Analysis Based on Document Modeling Using Machine Learning Tools.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 963, doi. 10.1093/comjnl/bxab207
- By:
- Publication type:
- Article
Customer Segmentation Using K-Means Clustering and the Hybrid Particle Swarm Optimization Algorithm.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 941, doi. 10.1093/comjnl/bxab206
- By:
- Publication type:
- Article
Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 924, doi. 10.1093/comjnl/bxab205
- By:
- Publication type:
- Article
On the Longest Common Cartesian Substring Problem.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 907, doi. 10.1093/comjnl/bxab204
- By:
- Publication type:
- Article
Human Visual System Guided Reversible Data Hiding Based On Multiple Histograms Modification.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 888, doi. 10.1093/comjnl/bxab203
- By:
- Publication type:
- Article
Taylor Sun Flower Optimization-Based Compressive Sensing for Image Compression and Recovery.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 873, doi. 10.1093/comjnl/bxab202
- By:
- Publication type:
- Article
Some Scheduling Problems With Job Rejection And A Learning Effect.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 866, doi. 10.1093/comjnl/bxab201
- By:
- Publication type:
- Article
Efficient Traceable Attribute-Based Signature With Update-Free Revocation For Blockchain.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 842, doi. 10.1093/comjnl/bxab199
- By:
- Publication type:
- Article
Cluster Connectivity And Super Cluster Connectivity Of DQcube.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 826, doi. 10.1093/comjnl/bxab198
- By:
- Publication type:
- Article
Sentiment Classification of Tourist's Opinion on Tourist Places of Interest in South India using Tweet Reviews.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 815, doi. 10.1093/comjnl/bxab197
- By:
- Publication type:
- Article
sasa: a SimulAtor of Self-stabilizing Algorithms.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 796, doi. 10.1093/comjnl/bxab196
- By:
- Publication type:
- Article
Pulmonary Lung Nodule Detection from Computed Tomography Images Using Two-Stage Convolutional Neural Network.
- Published in:
- Computer Journal, 2023, v. 66, n. 4, p. 785, doi. 10.1093/comjnl/bxab191
- By:
- Publication type:
- Article