Abstract: Programming language source code vulnerability mining is crucial to improving the security of software systems, but current research is mostly focused on the C language field, with little ...
This framework provides a comprehensive set of tools and utilities for implementing and experimenting with Extreme Learning Machines using Python and TensorFlow. ELMs are a type of machine learning ...
A minimal "getting start" tutorial is available at https://pynufft.readthedocs.io/en/latest/index.html. This package reimplements the min-max interpolator (Fessler ...
Abstract: Two-dimensional (2-D) array sets with good 2-D correlation properties have received considerable attention in wireless communication systems. This paper focuses on 2-D Z-complementary array ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results