DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 4,104,856
1.
  • Data Compression Data Compression
    Salomon, David 2007, 2006, 2007-03-30
    eBook

    "This book provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, analysis of most common methods, and discussions ...
Full text
Available for: UL
2.
Full text

PDF
3.
  • Blockchain Basics Blockchain Basics
    Drescher, Daniel 2017, 2017-03-14T00:00:00, 2017-03-14, 2017.
    eBook

    In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, ...
Full text
Available for: CEKLJ
4.
  • YOLOv7: Trainable Bag-of-Freebies Sets New State-of-the-Art for Real-Time Object Detectors
    Wang, Chien-Yao; Bochkovskiy, Alexey; Liao, Hong-Yuan Mark 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2023-June
    Conference Proceeding
    Open access

    Real-time object detection is one of the most important research topics in computer vision. As new approaches regarding architecture optimization and training optimization are continually being ...
Full text
Available for: UL
5.
  • A Survey of Convolutional N... A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects
    Li, Zewen; Liu, Fan; Yang, Wenjie ... IEEE transaction on neural networks and learning systems, 12/2022, Volume: 33, Issue: 12
    Journal Article
    Open access

    A convolutional neural network (CNN) is one of the most significant networks in the deep learning field. Since CNN made impressive achievements in many areas, including but not limited to computer ...
Full text
Available for: UL

PDF
6.
  • Big data and IoT-based appl... Big data and IoT-based applications in smart environments: A systematic review
    Hajjaji, Yosra; Boulila, Wadii; Farah, Imed Riadh ... Computer science review, February 2021, 2021-02-00, Volume: 39
    Journal Article
    Open access

    This paper reviews big data and Internet of Things (IoT)-based applications in smart environments. The aim is to identify key areas of application, current trends, data architectures, and ongoing ...
Full text
Available for: UL

PDF
7.
  • Power Analysis Attacks Power Analysis Attacks
    Mangard, Stefan; Oswald, Elisabeth; Popp, Thomas 2007
    eBook

    Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic ...
Full text
Available for: UL
8.
  • A Survey of the Usages of D... A Survey of the Usages of Deep Learning for Natural Language Processing
    Otter, Daniel W.; Medina, Julian R.; Kalita, Jugal K. IEEE transaction on neural networks and learning systems, 2021-Feb., 2021-02-00, 2021-2-00, 20210201, Volume: 32, Issue: 2
    Journal Article
    Open access

    Over the last several years, the field of natural language processing has been propelled forward by an explosion in the use of deep learning models. This article provides a brief introduction to the ...
Full text
Available for: UL

PDF
9.
  • Conceptual and empirical co... Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE)
    Anowar, Farzana; Sadaoui, Samira; Selim, Bassant Computer science review, 20/May , Volume: 40
    Journal Article

    Feature Extraction Algorithms (FEAs) aim to address the curse of dimensionality that makes machine learning algorithms incompetent. Our study conceptually and empirically explores the most ...
Full text
Available for: UL
10.
Full text
Available for: UL

PDF
1 2 3 4 5
hits: 4,104,856

Load filters