Protein Secondary Structure Prediction Using CNN and Random Forest

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICAIS (6. : 2020 : Hohhot; Online) Artificial intelligence and security ; Part 3
1. Verfasser: Xu, Ying (VerfasserIn)
Weitere Verfasser: Cheng, Jinyong (VerfasserIn)
Pages:3
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Two-Way Quantum Key Distribution Based on Two Different States 2020 Xu, Shihuan
Fault-Tolerant Semi-quantum Secure Direct Communication Scheme in Noisy Environment 2020 Qiu, Chi
Research on Automated Vulnerability Mining of Embedded System Firmware 2020 Li, Xiaoyi
Attacking Naive Bayes Journal Recommendation Systems 2020 Wang, Sheng
Resnet-Based Slide Puzzle Captcha Automatic Response System 2020 Wu, Danni
Design of Robot Routing Controller Based on OpenWrt 2020 Ye, Hemin
Malware Classifications Based on Static-Dynamic Features and Factorization Machines 2020 Long, Haixing
A Review of Human Face Detection in Complex Environment 2020 Chen, Long
Securing Graph Steganography over Social Networks via Interaction Remapping 2020 Wu, Hanzhou
Electronic Health Record Data Sharing Cryptographic Algorithm Based on Blockchain 2020 Niu, Shufen
A New Kind Linear Analysis of Invariant Bias of Midori-64 Related Keys 2020 Ru, Hu Jun
Forensic Technology for Source Camera Identification 2020 Chen, Lan
An Improved Encoding Scheme for Distributed Video Coding Based on Wavelet Transform 2020 Zhang, Jian
Paper Recommend Based on LDA and PageRank 2020 Tao, Min
Aerodynamic Modeling and Transient Performance Improvement of a Free Jet Altitude Test Facility 2020 Wu, Feng
Power Data Security Protection Mechanism Based on Blockchain 2020 Wang, Xinyan
Security Protocol for Cloud Storage Based on Block-Chain 2020 Lv, Congdong
Improved Single Target Tracking Learning Detection Algorithm 2020 Zhu, Hongjin
Identity-Checking for Provable Data Possession Without Privacy Leakage 2020 Wang, Jiaqi
Adversarial Examples Generation System Based on Gradient Shielding of Restricted Region 2020 Hu, Weixiong
Alle Artikel auflisten