nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Access patterns mining from massive spatio-temporal data in a smart city
|
Xiong, Lian |
|
2018 |
22 |
Suppl 1 |
p. 6031-6041 |
artikel |
2 |
Accurate detection of user interest data in cloud computing environment
|
Yu, Qiang |
|
2017 |
22 |
Suppl 1 |
p. 1169-1178 |
artikel |
3 |
A cloud system model employing random space vector pulse width modulation for noise reduction in VSI fed induction motor
|
Mohan Das, R. |
|
2018 |
22 |
Suppl 1 |
p. 347-360 |
artikel |
4 |
A fuzzy multi-objective immune genetic algorithm for the strategic location planning problem
|
Zhao, Xiao |
|
2018 |
22 |
Suppl 1 |
p. 3621-3641 |
artikel |
5 |
A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environment
|
Ren, Yongjun |
|
2018 |
22 |
Suppl 1 |
p. 1805-1814 |
artikel |
6 |
A hybrid cluster head selection model for Internet of Things
|
Praveen Kumar Reddy, M. |
|
|
22 |
Suppl 1 |
p. 13095-13107 |
artikel |
7 |
A joint deep model of entities and documents for cumulative citation recommendation
|
Ma, Lerong |
|
2017 |
22 |
Suppl 1 |
p. 5435-5446 |
artikel |
8 |
A method of evaluating the three-dimensional damage effect of strong electromagnetic pulse on the box based on the triangular-element FDTD method
|
Cao, Bing |
|
|
22 |
Suppl 1 |
p. 15321-15327 |
artikel |
9 |
Analysis of farmers’ land transfer willingness and satisfaction based on SPSS analysis of computer software
|
Sun, Shanhui |
|
|
22 |
Suppl 1 |
p. 9123-9131 |
artikel |
10 |
Analysis of the structure of hive files and the implementation of pivotal operations for distributed computing environment
|
Su, Qing |
|
2017 |
22 |
Suppl 1 |
p. 5675-5689 |
artikel |
11 |
An efficient approach to circumvent black hole nodes in manets
|
Tamilselvi, P. |
|
|
22 |
Suppl 1 |
p. 11401-11409 |
artikel |
12 |
An efficient system for customer churn prediction through particle swarm optimization based feature selection model with simulated annealing
|
Vijaya, J. |
|
|
22 |
Suppl 1 |
p. 10757-10768 |
artikel |
13 |
A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services
|
Elmisery, Ahmed M. |
|
2017 |
22 |
Suppl 1 |
p. 1611-1638 |
artikel |
14 |
A new local and nonlocal total variation regularization model for image denoising
|
Chen, Mingju |
|
2018 |
22 |
Suppl 1 |
p. 7611-7627 |
artikel |
15 |
A new localization technique for node positioning in wireless sensor networks
|
Sivasakthiselvan, S. |
|
2018 |
22 |
Suppl 1 |
p. 4027-4034 |
artikel |
16 |
A new method for sensorless control of brushless DC motor
|
Sun, Lihui |
|
2017 |
22 |
Suppl 1 |
p. 2793-2800 |
artikel |
17 |
An improved routing algorithm for advanced metering infrastructure in smart grid
|
Gao, Jing |
|
2018 |
22 |
Suppl 1 |
p. 3453-3462 |
artikel |
18 |
An improved task scheduling algorithm for scientific workflow in cloud computing environment
|
Geng, Xiaozhong |
|
2018 |
22 |
Suppl 1 |
p. 7539-7548 |
artikel |
19 |
Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment
|
Yang, Chen |
|
|
22 |
Suppl 1 |
p. 8309-8317 |
artikel |
20 |
A novel improved deep convolutional neural network model for medical image fusion
|
Xia, Kai-jian |
|
2018 |
22 |
Suppl 1 |
p. 1515-1527 |
artikel |
21 |
A novel low complexity downlink linear precoding algorithm for massive MIMO systems
|
Subitha, D. |
|
|
22 |
Suppl 1 |
p. 13645-13652 |
artikel |
22 |
A novel of multi-hop transmission in integrated network of WLAN IEEE 802.11n and IEEE 802.11g using Riverbed Modeler 17.5
|
Samuthira Pandi, V. |
|
|
22 |
Suppl 1 |
p. 10679-10686 |
artikel |
23 |
A novel short-term multi-input–multi-output prediction model of wind speed and wind power with LSSVM based on improved ant colony algorithm optimization
|
Yang, Jingxian |
|
2018 |
22 |
Suppl 1 |
p. 3293-3300 |
artikel |
24 |
A preliminary study of automatic generation of credibility test cases based on immune algorithm
|
Yu, Xuejun |
|
|
22 |
Suppl 1 |
p. 14867-14875 |
artikel |
25 |
A programmable shared-memory system for an array of processing-in-memory devices
|
Lee, Sangkuen |
|
2018 |
22 |
Suppl 1 |
p. 385-398 |
artikel |
26 |
A robust wavelet based decomposition of facial images to improve recognition accuracy in standard appearance based statistical face recognition methods
|
Senthilkumar, R. |
|
|
22 |
Suppl 1 |
p. 12785-12794 |
artikel |
27 |
A study on performance measures for auto-scaling CPU-intensive containerized applications
|
Casalicchio, Emiliano |
|
2019 |
22 |
Suppl 1 |
p. 995-1006 |
artikel |
28 |
A universal power-law model for wind speed uncertainty
|
Wan, Jie |
|
|
22 |
Suppl 1 |
p. 10347-10359 |
artikel |
29 |
Authentication based on blind signature and ring signature algorithms during vertical handover in heterogeneous wireless networks
|
Kalpana, S. |
|
|
22 |
Suppl 1 |
p. 12037-12047 |
artikel |
30 |
Black–Litterman asset allocation model based on principal component analysis (PCA) under uncertainty
|
Lei, Ding |
|
2018 |
22 |
Suppl 1 |
p. 4299-4306 |
artikel |
31 |
Buyback and stockout penalty newsvendor model based on reference point prospect theory
|
Cao, Zhiqiang |
|
2018 |
22 |
Suppl 1 |
p. 4989-4999 |
artikel |
32 |
Change detection methods based on low-rank sparse representation for multi-temporal remote sensing imagery
|
Wu, Shulei |
|
|
22 |
Suppl 1 |
p. 9951-9966 |
artikel |
33 |
Classification of sentence level sentiment analysis using cloud machine learning techniques
|
Arulmurugan, R. |
|
2017 |
22 |
Suppl 1 |
p. 1199-1209 |
artikel |
34 |
Concepts recommendation for searching scientific papers
|
Chi, Yang |
|
|
22 |
Suppl 1 |
p. 8669-8675 |
artikel |
35 |
Context-aware adaptive resource provisioning for mobile clients in intra-cloud environment
|
Durga, S. |
|
|
22 |
Suppl 1 |
p. 9915-9928 |
artikel |
36 |
Contrastive analysis of English literature comparative literature based on Bayesian clustering approach to big data
|
Li, Jiang |
|
2018 |
22 |
Suppl 1 |
p. 7031-7037 |
artikel |
37 |
Cost-effectiveness analysis and evaluation of a ‘three-old’ reconstruction project based on smart system
|
Wang, Dong |
|
|
22 |
Suppl 1 |
p. 7895-7905 |
artikel |
38 |
Damaged region filling by improved criminisi image inpainting algorithm for thangka
|
Yao, Fan |
|
|
22 |
Suppl 1 |
p. 13683-13691 |
artikel |
39 |
Defining the threshold bounds for effective modelling of aggregated IDS
|
Priya, N. |
|
|
22 |
Suppl 1 |
p. 11765-11771 |
artikel |
40 |
Design and development of sports training system based on image processing technology
|
Liang, Bo |
|
2018 |
22 |
Suppl 1 |
p. 3699-3706 |
artikel |
41 |
Design and implementation of an efficient attack resilient computation algorithm in WSN nodes
|
Saravanaselvan, A. |
|
2018 |
22 |
Suppl 1 |
p. 3301-3311 |
artikel |
42 |
Design and implementation of OpenGL SC 2.0 rendering pipeline
|
Baek, Nakhoon |
|
2017 |
22 |
Suppl 1 |
p. 931-936 |
artikel |
43 |
Design and implementation of skiplist-based key-value store on non-volatile memory
|
Chen, Qichen |
|
2019 |
22 |
Suppl 1 |
p. 361-371 |
artikel |
44 |
Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: a trust-aware routing framework for wireless sensor networks
|
Udhayavani, M. |
|
|
22 |
Suppl 1 |
p. 11919-11927 |
artikel |
45 |
Distinguishing investment changes in metro construction project based on a factor space algorithm
|
Wang, Dong |
|
|
22 |
Suppl 1 |
p. 9357-9370 |
artikel |
46 |
Effect of carbon emission policy on fresh aquatic product carriers in augmented reality respective: a parallel simulation research based on genetic algorithm
|
Peng, Minjing |
|
|
22 |
Suppl 1 |
p. 15335-15345 |
artikel |
47 |
Efficient analysis of water quality measurement reporting system using IOT based system in WSN
|
Parameswari, M. |
|
|
22 |
Suppl 1 |
p. 12193-12201 |
artikel |
48 |
Efficient group authentication in RFID using secret sharing scheme
|
Liu, Yanxiao |
|
|
22 |
Suppl 1 |
p. 8605-8611 |
artikel |
49 |
Efficient parallel implementation of DDDAS inference using an ensemble Kalman filter with shrinkage covariance matrix estimation
|
Nino-Ruiz, Elias D. |
|
2017 |
22 |
Suppl 1 |
p. 2211-2221 |
artikel |
50 |
Efficient performance upsurge in live migration with downturn in the migration time and downtime
|
Kumar, A. Vishnu |
|
|
22 |
Suppl 1 |
p. 12737-12747 |
artikel |
51 |
Efficient task allocation approach using genetic algorithm for cloud environment
|
Rekha, P. M. |
|
2019 |
22 |
Suppl 1 |
p. 1241-1251 |
artikel |
52 |
Enhanced continuous and discrete multi objective particle swarm optimization for text summarization
|
Priya, V. |
|
2018 |
22 |
Suppl 1 |
p. 229-240 |
artikel |
53 |
Enhanced hierarchical attribute based encryption with modular padding for improved public auditing in cloud computing using semantic ontology
|
Kalaivani, A. |
|
2018 |
22 |
Suppl 1 |
p. 3783-3790 |
artikel |
54 |
Failure prediction using machine learning in a virtualised HPC system and application
|
Mohammed, Bashir |
|
2019 |
22 |
Suppl 1 |
p. 471-485 |
artikel |
55 |
Fairness evaluation method of resource allocation based on BPSO multidimensional perspective
|
Lei, Jiao |
|
2018 |
22 |
Suppl 1 |
p. 4283-4290 |
artikel |
56 |
$$FC^{2}$$FC2: cloud-based cluster provisioning for distributed machine learning
|
Ta, Nguyen Binh Duong |
|
2019 |
22 |
Suppl 1 |
p. 1299-1315 |
artikel |
57 |
Feature selection for software effort estimation with localized neighborhood mutual information
|
Liu, Qin |
|
2018 |
22 |
Suppl 1 |
p. 6953-6961 |
artikel |
58 |
FFBF: cluster-based Fuzzy Firefly Bayes Filter for noise identification and removal from grayscale images
|
Kumar, S. Vijaya |
|
2018 |
22 |
Suppl 1 |
p. 1289-1311 |
artikel |
59 |
Firefly load balancing based energy optimized routing for multimedia data delivery in wireless mesh network
|
Raja, G. P. |
|
|
22 |
Suppl 1 |
p. 12077-12090 |
artikel |
60 |
Fuzzy hierarchical ant colony optimization routing for weighted cluster in MANET
|
Mani Kandan, J. |
|
|
22 |
Suppl 1 |
p. 9637-9649 |
artikel |
61 |
Fuzzy neural network model construction based on shortest path parallel algorithm
|
Wang, Junfeng |
|
2018 |
22 |
Suppl 1 |
p. 3413-3418 |
artikel |
62 |
Fuzzy Rough Set Inspired Rate Adaptation and resource allocation using Hidden Markov Model (FRSIRA-HMM) in mobile ad hoc networks
|
Suganya, R. |
|
|
22 |
Suppl 1 |
p. 9875-9888 |
artikel |
63 |
Gabor wavelet multi-linear discriminant analysis for data extraction in ECG signals
|
Velmurugan, S. |
|
|
22 |
Suppl 1 |
p. 14219-14229 |
artikel |
64 |
Gesture recognition based on an improved local sparse representation classification algorithm
|
He, Yang |
|
|
22 |
Suppl 1 |
p. 10935-10946 |
artikel |
65 |
High performance decoding aware FPGA bit-stream compression using RG codes
|
Satheesh Kumar, J. |
|
|
22 |
Suppl 1 |
p. 15007-15013 |
artikel |
66 |
High-performance internet file system based on multi-download for convergence computing in mobile communication systems
|
Moon, Youngjun |
|
2018 |
22 |
Suppl 1 |
p. 1057-1071 |
artikel |
67 |
High resolution DPWM clustered architecture for digitally controlled DC–DC converter using FPGA
|
Radhika, V. |
|
2018 |
22 |
Suppl 1 |
p. 4421-4430 |
artikel |
68 |
How does local government’s information affect farmers’ agricultural investment: based on theoretical and empirical analysis
|
Zhu, Bao |
|
|
22 |
Suppl 1 |
p. 15091-15102 |
artikel |
69 |
Identify and analyze key industries and basic economic structures using interregional industry network
|
Xiao, Wen-wen |
|
|
22 |
Suppl 1 |
p. 10041-10051 |
artikel |
70 |
Identifying key influential parameters of high profile criminals through statistical correlation
|
Wadood, Danish |
|
2017 |
22 |
Suppl 1 |
p. 7135-7148 |
artikel |
71 |
Improved elliptical curve cryptography and Abelian group theory to resolve linear system problem in sensor-cloud cluster computing
|
Thangarasu, N. |
|
|
22 |
Suppl 1 |
p. 13185-13194 |
artikel |
72 |
Improved image compression using effective lossless compression technique
|
Raghavendra, C. |
|
2018 |
22 |
Suppl 1 |
p. 3911-3916 |
artikel |
73 |
Improved pharma education system in the field of medical images using compression techniques
|
Reddy, M. Rajasekhar |
|
|
22 |
Suppl 1 |
p. 15049-15057 |
artikel |
74 |
Improved swarm intelligence algorithm for protein folding prediction
|
Wang, Shigang |
|
|
22 |
Suppl 1 |
p. 14125-14134 |
artikel |
75 |
Information security model of block chain based on intrusion sensing in the IoT environment
|
Li, Daming |
|
2018 |
22 |
Suppl 1 |
p. 451-468 |
artikel |
76 |
Innovation and entrepreneurship guidance system based on clustering algorithm
|
Han, Xuefei |
|
|
22 |
Suppl 1 |
p. 9081-9088 |
artikel |
77 |
Intelligent evaluation algorithm for the structural integrity testing of pipe welds defects
|
Cui, Wei |
|
|
22 |
Suppl 1 |
p. 7953-7963 |
artikel |
78 |
Intelligent optimization of active power output of wind farm during fault recovery with wake effect
|
Li, Jingyu |
|
2018 |
22 |
Suppl 1 |
p. 4085-4090 |
artikel |
79 |
Internet of Things network cognition and traffic management system
|
Sharif, Abida |
|
|
22 |
Suppl 1 |
p. 13209-13217 |
artikel |
80 |
Interrupt protection control of anti-interference nodes in network based on band sampling decision filter modulation
|
Zhang, Kun |
|
2018 |
22 |
Suppl 1 |
p. 7569-7576 |
artikel |
81 |
Intuitionistic fuzzy social network position and role analysis
|
Wang, Hua |
|
|
22 |
Suppl 1 |
p. 8099-8108 |
artikel |
82 |
Joint deadline-constrained and influence-aware design for allocating MapReduce jobs in cloud computing systems
|
Lin, Jenn-Wei |
|
2018 |
22 |
Suppl 1 |
p. 6963-6976 |
artikel |
83 |
Laser-based measurement for micro-unbalance of cylindrical rollers of the high-speed precision rolling bearings
|
Sui, Xin |
|
|
22 |
Suppl 1 |
p. 9159-9167 |
artikel |
84 |
Lightweight and universal intelligent service platform in indoor environment
|
Wan, Zheng |
|
|
22 |
Suppl 1 |
p. 9187-9198 |
artikel |
85 |
Local convolutional features and metric learning for SAR image registration
|
Guo, Qiangliang |
|
2018 |
22 |
Suppl 1 |
p. 3103-3114 |
artikel |
86 |
Lossless and robust privacy preservation of association rules in data sanitization
|
Navale, Geeta S. |
|
2018 |
22 |
Suppl 1 |
p. 1415-1428 |
artikel |
87 |
Management of access privileges for dynamic access control
|
Zhu, Nafei |
|
|
22 |
Suppl 1 |
p. 8899-8917 |
artikel |
88 |
Map-Reduce framework based cluster architecture for academic student’s performance prediction using cumulative dragonfly based neural network
|
VeeraManickam, M. R. M. |
|
2018 |
22 |
Suppl 1 |
p. 1259-1275 |
artikel |
89 |
MCCFG: an MOF-based multiple condition control flow graph for automatic test case generation
|
Son, Hyun Seung |
|
2016 |
22 |
Suppl 1 |
p. 2461-2470 |
artikel |
90 |
Mitigation of mutual exclusion problem in 5G new radio standards by token and non token based algorithms
|
Saravanan, M. |
|
|
22 |
Suppl 1 |
p. 11319-11327 |
artikel |
91 |
Mobility-based sinknode-aided routing in disaster network under the background of big data
|
Ma, Chuang |
|
|
22 |
Suppl 1 |
p. 11583-11590 |
artikel |
92 |
Modeling and analysis for stock return movements along with exchange rates and interest rates in Markov regime-switching models
|
Kim, Suyi |
|
2017 |
22 |
Suppl 1 |
p. 2039-2048 |
artikel |
93 |
More efficient and effective tricks for deep action recognition
|
Liu, Zheyuan |
|
2017 |
22 |
Suppl 1 |
p. 819-826 |
artikel |
94 |
Multi-biometric authentication system using finger vein and iris in cloud computing
|
Ilankumaran, S. |
|
2018 |
22 |
Suppl 1 |
p. 103-117 |
artikel |
95 |
Multi-level dataset decomposition for parallel frequent itemset mining on a cluster of personal computers
|
Huang, Chun-Hong |
|
2018 |
22 |
Suppl 1 |
p. 2851-2863 |
artikel |
96 |
Multi-stage generation and transmission coordinated planning method with a modified fireworks algorithm facing to energy internet
|
Liu, Dunnan |
|
|
22 |
Suppl 1 |
p. 8985-8997 |
artikel |
97 |
No projection in the residual network
|
Wen, Huanglu |
|
2017 |
22 |
Suppl 1 |
p. 7359-7368 |
artikel |
98 |
No user left behind: dynamic bottleneck-aware allocation of multiple resources
|
Liu, Jun |
|
|
22 |
Suppl 1 |
p. 10219-10227 |
artikel |
99 |
Novel architecture and implementation of low power oriented full search block motion estimation
|
Basha, S. Mahaboob |
|
2018 |
22 |
Suppl 1 |
p. 4503-4509 |
artikel |
100 |
Novel routing protocol scheme for real-time applications in mobile Ad Hoc networks
|
Lee, Dong Chun |
|
2017 |
22 |
Suppl 1 |
p. 977-988 |
artikel |
101 |
Numerical simulation of the composite foundation of cement soil mixing piles using FLAC3D
|
Lu, Xiaohui |
|
|
22 |
Suppl 1 |
p. 7965-7974 |
artikel |
102 |
OMBM: optimized memory bandwidth management for ensuring QoS and high server utilization
|
Sung, Hanul |
|
2018 |
22 |
Suppl 1 |
p. 161-174 |
artikel |
103 |
Online product purchasing decision through IoT platform: based on normal stochastic multi-criteria decision method and vertical projection distance
|
Yang, Zaoli |
|
|
22 |
Suppl 1 |
p. 8161-8169 |
artikel |
104 |
Operational modal analysis of rigid frame bridge with data from navigation satellite system measurements
|
Ma, Qinglu |
|
2017 |
22 |
Suppl 1 |
p. 5535-5545 |
artikel |
105 |
Optimization and improvement of data mining algorithm based on efficient incremental kernel fuzzy clustering for large data
|
Zhang, Cuifen |
|
2018 |
22 |
Suppl 1 |
p. 3001-3010 |
artikel |
106 |
Optimized dynamic source routing protocol for MANETs
|
Prasath, N. |
|
|
22 |
Suppl 1 |
p. 12397-12409 |
artikel |
107 |
Optimized routing in wireless sensor networks by establishing dynamic topologies based on genetic algorithm
|
Ragavan, P. Srinivasa |
|
|
22 |
Suppl 1 |
p. 12119-12125 |
artikel |
108 |
Pattern mining model based on improved neural network and modified genetic algorithm for cloud mobile networks
|
Zhang, Peng |
|
|
22 |
Suppl 1 |
p. 9651-9660 |
artikel |
109 |
Power prediction method of lithium-ion battery for unmanned vehicles based on combined constraint intelligence algorithm
|
Cheng, Ze |
|
|
22 |
Suppl 1 |
p. 8553-8560 |
artikel |
110 |
Predicting the content of camelina protein using FT-IR spectroscopy coupled with SVM model
|
Liu, Jun |
|
|
22 |
Suppl 1 |
p. 8401-8406 |
artikel |
111 |
Prediction of mutual fund net value based on data mining model
|
Pan, Wen-Tsao |
|
|
22 |
Suppl 1 |
p. 9455-9460 |
artikel |
112 |
Preference risk assessment method based on grey multi index kernel support vector machine model
|
Zhang, Zhengyang |
|
2018 |
22 |
Suppl 1 |
p. 4323-4329 |
artikel |
113 |
Product pricing considering the consumer preference based on Internet of Things
|
Pan, Xin-yu |
|
|
22 |
Suppl 1 |
p. 15379-15385 |
artikel |
114 |
Quantization based wavelet transformation technique for digital image compression with removal of multiple artifacts and noises
|
Kumar, S. Suresh |
|
|
22 |
Suppl 1 |
p. 11271-11284 |
artikel |
115 |
Relative entropy-based Kalman filter for seamless indoor/outdoor multi-source fusion positioning with INS/TC-OFDM/GNSS
|
Hu, Enwen |
|
|
22 |
Suppl 1 |
p. 8351-8361 |
artikel |
116 |
Relative radiometric correction of high-resolution remote sensing images based on feature category
|
He, Hao |
|
|
22 |
Suppl 1 |
p. 7933-7941 |
artikel |
117 |
Research and implementation of synchronization for ultra-wide bandwidth receiver within enclosed metal cabin
|
Xu, Zhan |
|
2018 |
22 |
Suppl 1 |
p. 5869-5880 |
artikel |
118 |
Research on a large-scale community detection algorithm based on non-weighted graph
|
Fang-ju, AI |
|
2017 |
22 |
Suppl 1 |
p. 2555-2562 |
artikel |
119 |
Research on concurrency comparison modeling based on $$\uppi $$π calculus in future computer technology
|
Bu, Hao |
|
2018 |
22 |
Suppl 1 |
p. 623-634 |
artikel |
120 |
Research on coupling relationship between environmental quality and regional economic growth based on VAR model
|
Jingfeng, Zhao |
|
2018 |
22 |
Suppl 1 |
p. 5881-5891 |
artikel |
121 |
Research on data mining of permissions mode for Android malware detection
|
Wang, Chao |
|
|
22 |
Suppl 1 |
p. 13337-13350 |
artikel |
122 |
Research on health monitoring and sensing technology based on vulnerability analysis
|
Quan-wei, Wang |
|
2017 |
22 |
Suppl 1 |
p. 5323-5332 |
artikel |
123 |
Research on hot news discovery model based on user interest and topic discovery
|
Li, Jianting |
|
|
22 |
Suppl 1 |
p. 8483-8491 |
artikel |
124 |
Research on innovation path of school ideological and political work based on large data
|
Wang, Shile |
|
2018 |
22 |
Suppl 1 |
p. 3375-3383 |
artikel |
125 |
Research on modal parameters identification of bridge structure based on adaptive signal de-noising method
|
Ye, Xijun |
|
|
22 |
Suppl 1 |
p. 14377-14387 |
artikel |
126 |
Research on the interaction between quantum entanglement and thinking consciousness
|
Yibin, Xiang |
|
2018 |
22 |
Suppl 1 |
p. 6599-6607 |
artikel |
127 |
Research on the interactive relationship between information communication technology and manufacturing industry
|
Gao, Yang |
|
2017 |
22 |
Suppl 1 |
p. 5719-5729 |
artikel |
128 |
Research on the single image super-resolution method based on sparse Bayesian estimation
|
Yang, Yong-qiang |
|
2018 |
22 |
Suppl 1 |
p. 1505-1513 |
artikel |
129 |
Research on visual 3D assembly process design and simulation for marine diesel engine
|
Hui, Zhang |
|
2017 |
22 |
Suppl 1 |
p. 5505-5519 |
artikel |
130 |
Restructuring AMS to reduce synchronization overheads on android system
|
Chao, Li |
|
|
22 |
Suppl 1 |
p. 9551-9559 |
artikel |
131 |
RETRACTED ARTICLE: A fuzzy multi-objective immune genetic algorithm for the strategic location planning problem
|
Zhao, Xiao |
|
|
22 |
Suppl 1 |
p. 3621-3641 |
artikel |
132 |
RETRACTED ARTICLE: A new localization technique for node positioning in wireless sensor networks
|
Sivasakthiselvan, S. |
|
|
22 |
Suppl 1 |
p. 4027-4034 |
artikel |
133 |
RETRACTED ARTICLE: Classification of sentence level sentiment analysis using cloud machine learning techniques
|
Arulmurugan, R. |
|
|
22 |
Suppl 1 |
p. 1199-1209 |
artikel |
134 |
RETRACTED ARTICLE: Efficient analysis of water quality measurement reporting system using IOT based system in WSN
|
Parameswari, M. |
|
|
22 |
Suppl 1 |
p. 12193-12201 |
artikel |
135 |
RETRACTED ARTICLE: Fuzzy neural network model construction based on shortest path parallel algorithm
|
Wang, Junfeng |
|
|
22 |
Suppl 1 |
p. 3413-3418 |
artikel |
136 |
RETRACTED ARTICLE: Improved image compression using effective lossless compression technique
|
Raghavendra, C. |
|
|
22 |
Suppl 1 |
p. 3911-3916 |
artikel |
137 |
RETRACTED ARTICLE: Improved swarm intelligence algorithm for protein folding prediction
|
Wang, Shigang |
|
|
22 |
Suppl 1 |
p. 14125-14134 |
artikel |
138 |
RETRACTED ARTICLE: Information security model of block chain based on intrusion sensing in the IoT environment
|
Li, Daming |
|
|
22 |
Suppl 1 |
p. 451-468 |
artikel |
139 |
RETRACTED ARTICLE: Pattern mining model based on improved neural network and modified genetic algorithm for cloud mobile networks
|
Zhang, Peng |
|
|
22 |
Suppl 1 |
p. 9651-9660 |
artikel |
140 |
RETRACTED ARTICLE: Research on innovation path of school ideological and political work based on large data
|
Wang, Shile |
|
|
22 |
Suppl 1 |
p. 3375-3383 |
artikel |
141 |
RETRACTED ARTICLE: Research on the interaction between quantum entanglement and thinking consciousness
|
Yibin, Xiang |
|
|
22 |
Suppl 1 |
p. 6599-6607 |
artikel |
142 |
RETRACTED ARTICLE: Visualization model of big data based on self-organizing feature map neural network and graphic theory for smart cities
|
Chen, Xiaowei |
|
|
22 |
Suppl 1 |
p. 13293-13305 |
artikel |
143 |
Revamping data access privacy preservation method against inside attacks in wireless sensor networks
|
Babu, S. Sathees |
|
2018 |
22 |
Suppl 1 |
p. 65-75 |
artikel |
144 |
Scalable distributed data cube computation for large-scale multidimensional data analysis on a Spark cluster
|
Lee, Suan |
|
2018 |
22 |
Suppl 1 |
p. 2063-2087 |
artikel |
145 |
Secure and reliable communication scheme for MANET using ECMS cluster head-based certificate revocation
|
Venkata Swaroop, G. |
|
|
22 |
Suppl 1 |
p. 11513-11525 |
artikel |
146 |
Secure provable data possession scheme with replication support in the cloud using Tweaks
|
Ali, S. Ahamed |
|
2017 |
22 |
Suppl 1 |
p. 1113-1123 |
artikel |
147 |
Sequential-index pattern mining for lifecare telecommunication platform
|
Kim, Joo-Chang |
|
2018 |
22 |
Suppl 1 |
p. 1039-1048 |
artikel |
148 |
Sequential mining of real time moving object by using fast frequence pattern algorithm
|
Venkatavara Prasad, D. |
|
|
22 |
Suppl 1 |
p. 9489-9494 |
artikel |
149 |
SFabric: a scalable SDN based large layer 2 data center network fabric
|
Lu, Xiaoyuan |
|
2018 |
22 |
Suppl 1 |
p. 6657-6668 |
artikel |
150 |
Shape adaptive DCT compression for high quality surveillance using wireless sensor networks
|
Jamunarani, M. |
|
2018 |
22 |
Suppl 1 |
p. 3737-3747 |
artikel |
151 |
Sliding mode control based on U model for nonlinear discrete system with modeling uncertainties
|
Xu, Fengxia |
|
2018 |
22 |
Suppl 1 |
p. 7471-7480 |
artikel |
152 |
SOC estimation optimization method based on parameter modified particle Kalman Filter algorithm
|
Zhang, Shouzhen |
|
2018 |
22 |
Suppl 1 |
p. 6009-6018 |
artikel |
153 |
Software defect prediction techniques using metrics based on neural network classifier
|
Jayanthi, R. |
|
2018 |
22 |
Suppl 1 |
p. 77-88 |
artikel |
154 |
Software engineering: risk features in requirement engineering
|
Bhukya, Shankar Nayak |
|
|
22 |
Suppl 1 |
p. 14789-14801 |
artikel |
155 |
Sorted or pooled? Optimal tournament design for heterogeneous contestants
|
Wei, Guangxing |
|
|
22 |
Suppl 1 |
p. 12641-12648 |
artikel |
156 |
Study on risk assessment of overseas merger and acquisition knowledge integration based on character-weighted set pair
|
Ang, Liu |
|
2017 |
22 |
Suppl 1 |
p. 2689-2700 |
artikel |
157 |
Study on the application of cloud computing and speech recognition technology in English teaching
|
Wei, Lili |
|
|
22 |
Suppl 1 |
p. 9241-9249 |
artikel |
158 |
Study on VSC-HVDC grid topology of offshore wind farms
|
Yen, Nguyen Thi Hong |
|
|
22 |
Suppl 1 |
p. 14803-14810 |
artikel |
159 |
Teaching expansion analysis based on computer assisted diversified teaching
|
Tian, Qing |
|
|
22 |
Suppl 1 |
p. 13739-13744 |
artikel |
160 |
The longitudinal analysis of the genetic effects on craniofacial morphology in posterior–anterior and lateral cephalograms of female twins aged from 6 to 12 years
|
Jing, Lv |
|
2018 |
22 |
Suppl 1 |
p. 4957-4969 |
artikel |
161 |
The metal thickness detection using pulsed eddy-current computation and detection method
|
Zhao, Liang |
|
2018 |
22 |
Suppl 1 |
p. 6551-6562 |
artikel |
162 |
The precision of Mach–Zehnder interferometer in the presence of bit-phase flip
|
Xie, Duan |
|
|
22 |
Suppl 1 |
p. 7885-7894 |
artikel |
163 |
The quality analysis of GNSS satellite positioning data
|
Zuo, Xiaoqing |
|
2018 |
22 |
Suppl 1 |
p. 6693-6708 |
artikel |
164 |
The resource running time manager for integrated environment
|
Jung, Daeyong |
|
2017 |
22 |
Suppl 1 |
p. 1777-1786 |
artikel |
165 |
The software system design model based on digital PCR fluorescence detector
|
Li, Xinxin |
|
|
22 |
Suppl 1 |
p. 8623-8627 |
artikel |
166 |
Toward a new approach for sorting extremely large data files in the big data era
|
Shatnawi, Ali |
|
2018 |
22 |
Suppl 1 |
p. 819-828 |
artikel |
167 |
Trust based resource selection with optimization technique
|
Saravana Kumar, E. |
|
2018 |
22 |
Suppl 1 |
p. 207-213 |
artikel |
168 |
Virtual teaching and learning environments: automatic evaluation with artificial neural networks
|
Lino, Adriano |
|
2017 |
22 |
Suppl 1 |
p. 7217-7227 |
artikel |
169 |
Visualization model of big data based on self-organizing feature map neural network and graphic theory for smart cities
|
Chen, Xiaowei |
|
|
22 |
Suppl 1 |
p. 13293-13305 |
artikel |
170 |
Weighted pooling for image recognition of deep convolutional neural networks
|
Zhu, Xiaoning |
|
|
22 |
Suppl 1 |
p. 9371-9383 |
artikel |
171 |
Wide-sense nonblocking multicast in optical WDM networks
|
Sabrigiriraj, M. |
|
|
22 |
Suppl 1 |
p. 13021-13026 |
artikel |