Picture for Dipankar Dasgupta

Dipankar Dasgupta

LSTM-Based Adaptive Vehicle Position Control for Dynamic Wireless Charging

Add code
May 21, 2022
Figure 1 for LSTM-Based Adaptive Vehicle Position Control for Dynamic Wireless Charging
Figure 2 for LSTM-Based Adaptive Vehicle Position Control for Dynamic Wireless Charging
Figure 3 for LSTM-Based Adaptive Vehicle Position Control for Dynamic Wireless Charging
Figure 4 for LSTM-Based Adaptive Vehicle Position Control for Dynamic Wireless Charging
Viaarxiv icon

Negative Selection Algorithm Research and Applications in the last decade: A Review

Add code
May 13, 2021
Figure 1 for Negative Selection Algorithm Research and Applications in the last decade: A Review
Figure 2 for Negative Selection Algorithm Research and Applications in the last decade: A Review
Figure 3 for Negative Selection Algorithm Research and Applications in the last decade: A Review
Figure 4 for Negative Selection Algorithm Research and Applications in the last decade: A Review
Viaarxiv icon

Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station

Add code
Apr 15, 2021
Figure 1 for Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station
Figure 2 for Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station
Figure 3 for Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station
Figure 4 for Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station
Viaarxiv icon

Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks

Add code
Jul 07, 2020
Figure 1 for Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks
Figure 2 for Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks
Figure 3 for Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks
Figure 4 for Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks
Viaarxiv icon

Artificial Immune Systems (INTROS 2)

Add code
Aug 23, 2013
Figure 1 for Artificial Immune Systems (INTROS 2)
Figure 2 for Artificial Immune Systems (INTROS 2)
Figure 3 for Artificial Immune Systems (INTROS 2)
Viaarxiv icon

Artificial Immune Systems

Add code
Oct 26, 2009
Figure 1 for Artificial Immune Systems
Figure 2 for Artificial Immune Systems
Figure 3 for Artificial Immune Systems
Viaarxiv icon

Artificial Immune Systems Tutorial

Add code
Mar 27, 2008
Figure 1 for Artificial Immune Systems Tutorial
Viaarxiv icon