Showing
1 - 5
results of
5
for search '
Lin, J.C
'
Skip to content
Home
Collections
High Impact Articles
Jawi Collection
Malay Medicine
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Lin, J.C
Showing
1 - 5
results of
5
for search '
Lin, J.C
'
, query time: 0.57s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
The Application of the Retirement Plan of the Current Labor Minimum Standard Laws (LMSL) to the Agent of Li fe Insurance Company on Taiwan
by
Lin
,
J.C
,
林瑞欽
Published 1999
Get full text
Others
2
Mitigating adversarial evasion attacks of ransomware using ensemble learning
by
Ahmed, U.
,
Lin
,
J.C
.-W
,
Srivastava, G.
Published 2022
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
Article
3
Intelligent deep fusion network for urban traffic flow anomaly identification
by
Belhadi, A.
,
Chen, H.-C
,
Djenouri, Y.
,
Lin
,
J.C
.-W
Published 2022
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
Article
4
Efficient Method for Mining High Utility Occupancy Patterns based on Indexed List Structure
by
Kim, H.
,
Kim, S.
,
Lee, C.
,
Lin
,
J.C
,
Ryu, T.
,
Vo, B.
,
Yun, U.
Published 2023
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
5
To Optimize Radiotherapeutic Plans for Superior Tumor Coverage Predicts Malignant Glioma Prognosis and Normal Tissue Complication Probability
by
Chou, Y.-C
,
Huang, D.Y.C
,
Kuo, C.-Y
,
Li, M.-H
,
Lin
,
J
.-
C
,
Liu, W.-H
,
Tsai, J.-T
Published 2022
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
Article
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
Adversarial evasion attack
Adversarial evasion attacks
Android (operating system)
Android ransomware
Anomaly detection
Anomaly identification
Attack mitigation
Convolution
Convolution neural network
Convolutional neural network
Convolutional neural networks
Cyber security
Cybersecurity
Data mining
Data structures
Databases
Decomposition
Decomposition strategy
Deep neural networks
Efficient decomposition
Ensemble learning
Flow data
IMRT
Indexes
Intelligent systems
Intelligent transportation systems
Intelligent vehicle highway systems
Learning architectures
Machine learning
Machine learning-based ensemble analyse
Loading...