Processing math: 100%
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    Day-Ahead Prediction of Wind Speed with Deep Feature Learning

  • articleNo Access

    Cascading failure with preferential redistribution on bus–subway coupled network

  • articleOpen Access

    Enhancing Robustness of Medical Image Segmentation Model with Neural Memory Ordinary Differential Equation

  • articleNo Access

    ENHANCING NETWORK PERFORMANCE BY EDGE ADDITION

  • articleNo Access

    A NEW ROBUST AND HIGH-PERFORMANCE HYBRID FULL ADDER CELL

  • articleNo Access

    Free Parameter Optimization of DTMDs Based on Improved Hybrid Genetic-Simulated Annealing Algorithm

  • chapterNo Access

    PHYSICAL PRINCIPLES OF EFFICIENT EXCITATION TRANSFER IN LIGHT HARVESTING

  • articleNo Access

    Approximation error estimates and inverse inequalities for B-splines of maximum smoothness

  • articleNo Access

    ON THE CORRELATION BETWEEN FRACTAL DIMENSION AND ROBUSTNESS OF COMPLEX NETWORKS

    Fractals01 Jun 2019
  • articleNo Access

    INVESTIGATING LONG-TERM EFFECTS OF FEATURE EXTRACTION METHODS FOR CONTINUOUS EMG PATTERN CLASSIFICATION

  • articleNo Access

    Multimodal Biometric-Based Authentication with Secured Templates

  • chapterNo Access

    ONCOGENETIC TREES

  • articleNo Access

    Approaches to improve the robustness on interdependent networks against cascading failures with load-based model

  • articleNo Access

    Enhancing the power grid robustness against cascading failures under node-based attacks

  • articleNo Access

    Image Hybrid Encryption Based on Matrix Nonlinear Operation and Generalized Arnold Transformation

  • articleNo Access

    Design of Lagrangian-Based FOPID Controller for Desired Closed Loop System

  • articleNo Access

    KFGRNI: A robust method to inference gene regulatory network from time-course gene data based on ensemble Kalman filter

  • articleOpen Access

    Asymptotic behavior of non-autonomous fractional p-Laplacian equations driven by additive noise on unbounded domains

  • articleNo Access

    Control of a Double-Pendulum Overhead Crane System Based on Hierarchical Sliding Mode Control Techniques

  • chapterNo Access

    AUTOMATED IMAGE SEGMENTATION: ISSUES AND APPLICATIONS