Sfoglia per Rivista NEURAL COMPUTING & APPLICATIONS
Mostrati risultati da 1 a 5 di 5
Colour image encryption based on customized neural network and DNA encoding
2021-01-01 Patel, Sakshi; Thanikaiselvan, V.; Pelusi, Danilo; Nagaraj, B.; Arunkumar, R.; Amirtharajan, R.
EEG data analysis with stacked differentiable neural computers
2018-01-01 Ming, Yurui; Pelusi, Danilo; Fang, Chieh-Ning; Prasad, Mukesh; Wang, Yu-Kai; Wu, Dongrui; Lin, Chin-Teng
A framework for crime data analysis using relationship among named entities
2019-01-01 Das, Priyanka; Das, Asit Kumar; Nayak, Janmenjoy; Pelusi, Danilo
Special issue on machine learning for security and privacy: advancing the state-of-the-art applications
2022-01-01 Nayak, Janmenjoy; Al-Dabass, David; Pelusi, Danilo; Mishra, Manohar
Special issue on “Soft computing techniques: applications and challenges” neural computing and applications
2020-01-01 Nayak, Janmenjoy; Chandrasekhar, G. T.; Naik, Bighnaraj; Pelusi, Danilo; Abraham, A.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Colour image encryption based on customized neural network and DNA encoding | 1-gen-2021 | Patel, Sakshi; Thanikaiselvan, V.; Pelusi, Danilo; Nagaraj, B.; Arunkumar, R.; Amirtharajan, R. | |
EEG data analysis with stacked differentiable neural computers | 1-gen-2018 | Ming, Yurui; Pelusi, Danilo; Fang, Chieh-Ning; Prasad, Mukesh; Wang, Yu-Kai; Wu, Dongrui; Lin, Chin-Teng | |
A framework for crime data analysis using relationship among named entities | 1-gen-2019 | Das, Priyanka; Das, Asit Kumar; Nayak, Janmenjoy; Pelusi, Danilo | |
Special issue on machine learning for security and privacy: advancing the state-of-the-art applications | 1-gen-2022 | Nayak, Janmenjoy; Al-Dabass, David; Pelusi, Danilo; Mishra, Manohar | |
Special issue on “Soft computing techniques: applications and challenges” neural computing and applications | 1-gen-2020 | Nayak, Janmenjoy; Chandrasekhar, G. T.; Naik, Bighnaraj; Pelusi, Danilo; Abraham, A. |
Mostrati risultati da 1 a 5 di 5
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile