Search alternatives:
name a » name _ (Expand Search), same a (Expand Search), named ah (Expand Search)
review » reviewed (Expand Search)
name a » name _ (Expand Search), same a (Expand Search), named ah (Expand Search)
review » reviewed (Expand Search)
-
1
-
2
A proxy signature-based handover authentication scheme for LTE wireless networks
Published 2017Get full text
Get full text
Journal Article -
3
Further studies of extreme learning machine and compressed signal detection
Published 2013“…The main contributions of the proposed WNN comparing with traditional ones are using composite functions at the hidden nodes and applying ELM algorithm to WNN as a learning algorithm. …”
Get full text
Thesis -
4
-
5
Holistic teaching workload allocation for research-intensive universities
Published 2024“…To allocate tutorials and labs to faculty members, the proposed techniques based on the Hungarian Algorithm were further extended to incorporate the additional constraints for allocating tutorials and lab sessions to faculty members. Noting that uncontrolled allocation of tutorials and labs may lead to a higher teaching workload due to the involvement in multiple courses, multiple tutorials and lab sessions of a course were grouped to minimize fragmentation. …”
Get full text
Thesis-Master by Research -
6
Spectral variation of normalised laplacian for various network models
Published 2024Get full text
Article -
7