Publication | Date of Publication | Type |
---|
A novel Devaney chaotic map with uniform trajectory for color image encryption | 2023-10-13 | Paper |
Saliency Detection via Depth-Induced Cellular Automata on Light Field | 2022-09-16 | Paper |
LFNet: Light Field Fusion Network for Salient Object Detection | 2022-09-16 | Paper |
Bending and vibration of two-dimensional decagonal quasicrystal nanoplates via modified couple-stress theory | 2022-08-25 | Paper |
Dynamic discrete-time portfolio selection for defined contribution pension funds with inflation risk | 2022-02-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4984266 | 2021-04-26 | Paper |
Algebraic and modal methods for computing high-order sensitivities in asymmetrical undamped system | 2020-08-28 | Paper |
Feasibility and a fast algorithm for Euclidean distance matrix optimization with ordinal constraints | 2020-05-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q5209293 | 2020-01-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q5195412 | 2019-10-02 | Paper |
Note on the invariance properties of operator products involving generalized inverses | 2019-02-14 | Paper |
Dynamical Analysis and Homogenization Process of Unimodal Chaotic Mapping Utilized for Pseudo-Random Sequences | 2019-01-24 | Paper |
Mean-variance portfolio selection with regime switching under shorting prohibition | 2019-01-11 | Paper |
A posteriori truncated regularization method for identifying unknown heat source on a spherical symmetric domain | 2018-12-07 | Paper |
Asymptotic estimates for the solution of stochastic differential equations driven By G-Brownian motion | 2018-09-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q3132376 | 2018-01-29 | Paper |
A 60-GHz Band Compact-Range Gigabit Wireless Access System Using Large Array Antennas | 2017-10-30 | Paper |
Involutiveness of linear combinations of a quadratic or tripotent matrix and an arbitrary matrix | 2017-10-25 | Paper |
A sufficient condition for planar graphs with girth 5 to be \((1,7)\)-colorable | 2017-06-22 | Paper |
Further results on the reverse order law for the group inverse in rings | 2017-06-09 | Paper |
An image encryption algorithm based on the perturbed high-dimensional chaotic map | 2016-12-16 | Paper |
Mean-variance asset-liability management under constant elasticity of variance process | 2016-12-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q2824890 | 2016-10-06 | Paper |
Quasi-B-mode generated by high-frequency gravitational waves and corresponding perturbative photon fluxes | 2016-10-05 | Paper |
A law of large numbers under the nonlinear expectation | 2016-05-04 | Paper |
Almost Periodic Solutions for Stochastic Differential Equations Driven By G-Brownian Motion | 2016-01-05 | Paper |
A quasi-boundary value regularization method for identifying an unknown source in the Poisson equation | 2015-02-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q2923886 | 2014-11-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q2865369 | 2013-11-29 | Paper |
Bi-variable damage model for fatigue life prediction of metal components | 2013-08-30 | Paper |
New chaotic image encryption algorithm based on cross-mapping | 2013-06-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4929067 | 2013-06-13 | Paper |
Attack on the improved quantum blind signature protocol | 2013-04-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q3020851 | 2011-08-05 | Paper |
Study of control effects of vortex generators on a supercritical wing | 2011-01-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q3061549 | 2011-01-03 | Paper |
Tasks mapping in grid computing environment based on ACO algorithm | 2010-02-20 | Paper |
Extracting symbolic rules from support vector machines based on the heuristic information | 2009-11-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3512822 | 2008-08-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q3501885 | 2008-06-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q3501888 | 2008-06-03 | Paper |
New periodic wave solutions to nonlinear evolution equations by the extended mapping method | 2007-06-29 | Paper |
The mechanism about key and credential on trusted computing platform and the application study | 2007-06-01 | Paper |
A trusted host's authentication access and control model faced on user action | 2007-06-01 | Paper |
A new segmentation method for phase change thermography sequence | 2007-05-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q5475229 | 2006-06-16 | Paper |