nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A CAVE-based stereoscopic displaying approach of reconstructing simulated endoscope scene
|
Chen, Zhanfang |
|
|
22 |
Suppl 3 |
p. 9007-9011 |
artikel |
2 |
A fog based load forecasting strategy for smart grids using big electrical data
|
Rabie, Asmaa H. |
|
2018 |
22 |
Suppl 3 |
p. 241-270 |
artikel |
3 |
A fusion framework based on fuzzy integrals for passive-blind image tamper detection
|
Kaur, Mandeep |
|
|
22 |
Suppl 3 |
p. 11363-11378 |
artikel |
4 |
A joint deep model of entities and documents for cumulative citation recommendation
|
Ma, Lerong |
|
2017 |
22 |
Suppl 3 |
p. 5435-5446 |
artikel |
5 |
A matching model for plant growth environment based on weighted multi-dimensional tree designed for big data
|
Jing, Xiao-ping |
|
2018 |
22 |
Suppl 3 |
p. 6461-6469 |
artikel |
6 |
A method for obtaining authenticated scalable and efficient group key agreement for wireless ad-hoc networks
|
Alphonse, P. J. A. |
|
2018 |
22 |
Suppl 3 |
p. 3145-3151 |
artikel |
7 |
An adaptive signal strength based localization approach for wireless sensor networks
|
Kiruthiga, G. |
|
|
22 |
Suppl 3 |
p. 10439-10448 |
artikel |
8 |
An algebraic complex event processing method for cyber-physical system
|
Zhou, Cheng |
|
|
22 |
Suppl 3 |
p. 15169-15177 |
artikel |
9 |
Analysis on the effect of assignment system of track and field web course based on software programming method
|
Lin, Weiliang |
|
|
22 |
Suppl 3 |
p. 15023-15036 |
artikel |
10 |
Analyzing cloud based reviews for product ranking using feature based clustering algorithm
|
Gobi, N. |
|
2018 |
22 |
Suppl 3 |
p. 6977-6984 |
artikel |
11 |
A navigation algorithm of the mobile robot in the indoor and dynamic environment based on the PF-SLAM algorithm
|
Yan, YuPei |
|
|
22 |
Suppl 3 |
p. 14207-14218 |
artikel |
12 |
An effective pose invariant face recognition system with the aid of ABC optimized ANFIS
|
Anantha Padmanabhan, S. |
|
2018 |
22 |
Suppl 3 |
p. 177-187 |
artikel |
13 |
An efficient seed points selection approach in dominant color descriptors (DCD)
|
Pavithra, L. K. |
|
2019 |
22 |
Suppl 3 |
p. 1225-1240 |
artikel |
14 |
An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment
|
Senthilnathan, T. |
|
|
22 |
Suppl 3 |
p. 12839-12847 |
artikel |
15 |
An extended multi-phase lattice model with consideration of optimal current changes with memory
|
Zhai, Cong |
|
2018 |
22 |
Suppl 3 |
p. 7447-7457 |
artikel |
16 |
An heuristic cloud based segmentation technique using edge and texture based two dimensional entropy
|
Jaganathan, M. |
|
|
22 |
Suppl 3 |
p. 12767-12776 |
artikel |
17 |
An improved framework for authorship identification in online messages
|
Srinivasan, L. |
|
|
22 |
Suppl 3 |
p. 12101-12110 |
artikel |
18 |
An improved preference method for the FAST TCP protocol parameter
|
Wang, Weibin |
|
|
22 |
Suppl 3 |
p. 14845-14853 |
artikel |
19 |
An integrated approach for knowledge management in the context of product innovation
|
Deng, Yuan |
|
|
22 |
Suppl 3 |
p. 9385-9396 |
artikel |
20 |
Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment
|
Yang, Chen |
|
|
22 |
Suppl 3 |
p. 8309-8317 |
artikel |
21 |
An on-line detection method for outliers of dynamic unstable measurement data
|
Su, Weixing |
|
|
22 |
Suppl 3 |
p. 7831-7839 |
artikel |
22 |
An optimization framework of video advertising: using deep learning algorithm based on global image information
|
Luo, Cheng |
|
|
22 |
Suppl 3 |
p. 8939-8951 |
artikel |
23 |
A novel algorithm for threshold image denoising based on wavelet construction
|
Jianhua, Zhang |
|
|
22 |
Suppl 3 |
p. 12443-12450 |
artikel |
24 |
A novel flip-flop based error free, area efficient and low power pipeline architecture for finite impulse recursive system
|
Krishnamoorthy, Raja |
|
|
22 |
Suppl 3 |
p. 15137-15147 |
artikel |
25 |
A novel 3- level energy heterogeneity clustering protocol with hybrid routing for a concentric circular wireless sensor network
|
Chithra, A. |
|
|
22 |
Suppl 3 |
p. 11101-11108 |
artikel |
26 |
A novel method to find important apps base on the analysis of components relationship
|
Li, Qi |
|
2017 |
22 |
Suppl 3 |
p. 5479-5489 |
artikel |
27 |
Application of chaos discrete particle swarm optimization algorithm on pavement maintenance scheduling problem
|
Ahmed, Kawther |
|
2018 |
22 |
Suppl 3 |
p. 4647-4657 |
artikel |
28 |
Application of multivariate Gaussian model for discovery of healthcare services in cloud
|
Bhama, S. |
|
2018 |
22 |
Suppl 3 |
p. 3087-3094 |
artikel |
29 |
A tooth surface section lofting method of exact spur face gear model based on complex tooth surface grid planning principle
|
Cao, Yan |
|
|
22 |
Suppl 3 |
p. 8171-8179 |
artikel |
30 |
A trust based security framework with anonymous authentication system using multiple attributes in decentralized cloud
|
Usha, S. |
|
2018 |
22 |
Suppl 3 |
p. 3883-3892 |
artikel |
31 |
Closed-loop subspace identification of multivariable dynamic errors-in-variables models based on ORT
|
She, Minghong |
|
2018 |
22 |
Suppl 3 |
p. 4907-4915 |
artikel |
32 |
Cluster and cloud computing framework for scientific metrology in flow control
|
Wang, Yumin |
|
2017 |
22 |
Suppl 3 |
p. 1189-1198 |
artikel |
33 |
Cluster computing data mining based on massive intrusion interference constraints in hybrid networks
|
Zhang, Kun |
|
2018 |
22 |
Suppl 3 |
p. 7481-7489 |
artikel |
34 |
Clustering of near duplicate images using bundled features
|
Kalaiarasi, G. |
|
|
22 |
Suppl 3 |
p. 11997-12007 |
artikel |
35 |
Collective behavior simulation based on agent with artificial emotion
|
Zhu, Yong-bin |
|
2017 |
22 |
Suppl 3 |
p. 5457-5465 |
artikel |
36 |
Computer art design based on artificial intelligence
|
Wang, Fang |
|
|
22 |
Suppl 3 |
p. 13881-13887 |
artikel |
37 |
Construction of employee training program evaluation system of three exponential forecast based on sliding window
|
Meng, Guo |
|
2018 |
22 |
Suppl 3 |
p. 6865-6870 |
artikel |
38 |
Correction to: A variable neighborhood search based genetic algorithm for flexible job shop scheduling problem
|
Zhang, Guohui |
|
|
22 |
Suppl 3 |
p. 11573 |
artikel |
39 |
Cost-effectiveness analysis and evaluation of a ‘three-old’ reconstruction project based on smart system
|
Wang, Dong |
|
|
22 |
Suppl 3 |
p. 7895-7905 |
artikel |
40 |
Cost-efficient parallel processing of irregularly structured problems in cloud computing environments
|
Haussmann, Jens |
|
2018 |
22 |
Suppl 3 |
p. 887-909 |
artikel |
41 |
Cost-sensitive large margin distribution machine for fault detection of wind turbines
|
Tang, Mingzhu |
|
2018 |
22 |
Suppl 3 |
p. 7525-7537 |
artikel |
42 |
Criterion for realizing state-delayed digital filters subjected to external interference employing saturation arithmetic
|
Kokil, Priyanka |
|
|
22 |
Suppl 3 |
p. 15187-15194 |
artikel |
43 |
Damaged region filling by improved criminisi image inpainting algorithm for thangka
|
Yao, Fan |
|
|
22 |
Suppl 3 |
p. 13683-13691 |
artikel |
44 |
Data mining algorithm for correlation analysis of industrial alarms
|
Li, Tingshun |
|
|
22 |
Suppl 3 |
p. 10133-10143 |
artikel |
45 |
Design and implementation of an analytical framework for interference aware job scheduling on Apache Spark platform
|
Wang, Kewen |
|
2017 |
22 |
Suppl 3 |
p. 2223-2237 |
artikel |
46 |
Design and implementation of an efficient attack resilient computation algorithm in WSN nodes
|
Saravanaselvan, A. |
|
2018 |
22 |
Suppl 3 |
p. 3301-3311 |
artikel |
47 |
Design and implementation of an efficient multi cloud storage approach for resource constrained mobile devices
|
Bedi, Rajeev Kumar |
|
|
22 |
Suppl 3 |
p. 13143-13157 |
artikel |
48 |
Designing low power magentic flip flop in 45 nm FDSOI technology for large scale cluster based engineering application
|
Sakthimurugan, K. |
|
2018 |
22 |
Suppl 3 |
p. 6907-6912 |
artikel |
49 |
Design of horizontal airspace dividing radar antenna array
|
Li, Wei |
|
2018 |
22 |
Suppl 3 |
p. 6767-6780 |
artikel |
50 |
Deterministic compressed sensing based channel estimation for MIMO OFDM systems
|
Wang, Kai |
|
2018 |
22 |
Suppl 3 |
p. 2971-2980 |
artikel |
51 |
Distinct model on privacy protection of dynamic data publication
|
Ren, Xun-yi |
|
|
22 |
Suppl 3 |
p. 15127-15136 |
artikel |
52 |
Distinguishing investment changes in metro construction project based on a factor space algorithm
|
Wang, Dong |
|
|
22 |
Suppl 3 |
p. 9357-9370 |
artikel |
53 |
Dynamics analysis and simulation of six DOF parafoil system
|
Zhang, Zhixiang |
|
|
22 |
Suppl 3 |
p. 12669-12680 |
artikel |
54 |
Edge detection of satellite image using fuzzy logic
|
Dhivya, R. |
|
|
22 |
Suppl 3 |
p. 11891-11898 |
artikel |
55 |
Efficient data collection in wireless sensor networks with block-wise compressive path constrained sensing in mobile sinks
|
Lakshminarayanan, R. |
|
|
22 |
Suppl 3 |
p. 9755-9766 |
artikel |
56 |
Electronic commerce commodity entity identities based on hierarchical probability model
|
Zhang, Sheng-fu |
|
|
22 |
Suppl 3 |
p. 7787-7794 |
artikel |
57 |
Energy and cluster based efficient routing for broadcasting in mobile ad hoc networks
|
Venu, Sivakumar |
|
2018 |
22 |
Suppl 3 |
p. 661-671 |
artikel |
58 |
Energy-aware RAID scheduling methods in distributed storage applications
|
Pirahandeh, Mehdi |
|
2018 |
22 |
Suppl 3 |
p. 445-454 |
artikel |
59 |
Energy efficient parallel hybrid adder architecture for 3X generation in radix-8 booth encoding
|
Nirmaladevi, R. |
|
|
22 |
Suppl 3 |
p. 10709-10716 |
artikel |
60 |
Evaluating algorithms of removing EOG artifacts with experimental data in brain computer interface
|
Qi, Wen |
|
|
22 |
Suppl 3 |
p. 10371-10384 |
artikel |
61 |
Evaluation method based on neural network differential evolution
|
Li, Jiang |
|
2018 |
22 |
Suppl 3 |
p. 4869-4875 |
artikel |
62 |
Evolutionary design optimization of MEMS: a review of its history and state-of-the-art
|
Wang, Pan |
|
|
22 |
Suppl 3 |
p. 9105-9111 |
artikel |
63 |
Exploring eye-tracking analyses of EFL learners’ cognitive processing of reduced relative clause
|
Zhai, Xuesong |
|
|
22 |
Suppl 3 |
p. 14181-14192 |
artikel |
64 |
Fairness evaluation method of resource allocation based on BPSO multidimensional perspective
|
Lei, Jiao |
|
2018 |
22 |
Suppl 3 |
p. 4283-4290 |
artikel |
65 |
Fault diagnosis of a transformer based on polynomial neural networks
|
Zou, Ajin |
|
|
22 |
Suppl 3 |
p. 9941-9949 |
artikel |
66 |
Feature extraction using LR-PCA hybridization on twitter data and classification accuracy using machine learning algorithms
|
Murugan, N. Senthil |
|
|
22 |
Suppl 3 |
p. 13965-13974 |
artikel |
67 |
Feature selection for software effort estimation with localized neighborhood mutual information
|
Liu, Qin |
|
2018 |
22 |
Suppl 3 |
p. 6953-6961 |
artikel |
68 |
Feature selection using firefly algorithm in software defect prediction
|
Anbu, M. |
|
|
22 |
Suppl 3 |
p. 10925-10934 |
artikel |
69 |
FPGA based direct torque control with speed loop Pseudo derivative controller for PMSM drive
|
A, Karthikeyan |
|
|
22 |
Suppl 3 |
p. 13511-13519 |
artikel |
70 |
Hash based manifold learning technique to generating random fields for image segmentation
|
Pemula, Rambabu |
|
|
22 |
Suppl 3 |
p. 14877-14888 |
artikel |
71 |
HHSRP: a cluster based hybrid hierarchical secure routing protocol for wireless sensor networks
|
Deepa, C. |
|
|
22 |
Suppl 3 |
p. 10449-10465 |
artikel |
72 |
High performance decoding aware FPGA bit-stream compression using RG codes
|
Satheesh Kumar, J. |
|
|
22 |
Suppl 3 |
p. 15007-15013 |
artikel |
73 |
High-performance internet file system based on multi-download for convergence computing in mobile communication systems
|
Moon, Youngjun |
|
2018 |
22 |
Suppl 3 |
p. 1057-1071 |
artikel |
74 |
High performance Viterbi decoder design
|
Kavitha, V. |
|
2018 |
22 |
Suppl 3 |
p. 7063-7068 |
artikel |
75 |
High resolution DPWM clustered architecture for digitally controlled DC–DC converter using FPGA
|
Radhika, V. |
|
2018 |
22 |
Suppl 3 |
p. 4421-4430 |
artikel |
76 |
Hybrid aggregated signcryption scheme using multi-constraints differential evolution algorithm for security
|
Sivasundari, A. |
|
2018 |
22 |
Suppl 3 |
p. 3201-3211 |
artikel |
77 |
Hybrid evolutionary computing algorithms and statistical methods based optimal fragmentation in smart cloud networks
|
Rani, K. Sasi Kala |
|
2017 |
22 |
Suppl 3 |
p. 241-254 |
artikel |
78 |
Identify and analyze key industries and basic economic structures using interregional industry network
|
Xiao, Wen-wen |
|
|
22 |
Suppl 3 |
p. 10041-10051 |
artikel |
79 |
Implementing self adaptiveness in whale optimization for cluster head section in Internet of Things
|
Reddy, M. Praveen Kumar |
|
2018 |
22 |
Suppl 3 |
p. 1361-1372 |
artikel |
80 |
Improving Adhoc wireless sensor networks security using distributed automaton
|
Venkatraman, S. |
|
|
22 |
Suppl 3 |
p. 14551-14557 |
artikel |
81 |
Intelligent Bézier curve-based path planning model using Chaotic Particle Swarm Optimization algorithm
|
Tharwat, Alaa |
|
2018 |
22 |
Suppl 3 |
p. 4745-4766 |
artikel |
82 |
Intelligent churn prediction for telecom using GP-AdaBoost learning and PSO undersampling
|
Idris, Adnan |
|
2017 |
22 |
Suppl 3 |
p. 7241-7255 |
artikel |
83 |
Intelligent evaluation algorithm for the structural integrity testing of pipe welds defects
|
Cui, Wei |
|
|
22 |
Suppl 3 |
p. 7953-7963 |
artikel |
84 |
Intelligent innovative knowledge management integration method based on user generated content
|
Yuan, Deng |
|
2018 |
22 |
Suppl 3 |
p. 4793-4803 |
artikel |
85 |
IoT based industrial safety measures monitoring and reporting system using accident reduction model (ARM) control algorithm
|
Rajmohan, Palanivelu |
|
|
22 |
Suppl 3 |
p. 11259-11269 |
artikel |
86 |
Joint deadline-constrained and influence-aware design for allocating MapReduce jobs in cloud computing systems
|
Lin, Jenn-Wei |
|
2018 |
22 |
Suppl 3 |
p. 6963-6976 |
artikel |
87 |
Knowledge diffusion simulation of knowledge networks: based on complex network evolutionary algorithms
|
Zhang, Li |
|
|
22 |
Suppl 3 |
p. 15255-15265 |
artikel |
88 |
Landscape pattern analysis based on GIS technology and index analysis
|
He, Xin |
|
2017 |
22 |
Suppl 3 |
p. 5749-5762 |
artikel |
89 |
Lightweight and universal intelligent service platform in indoor environment
|
Wan, Zheng |
|
|
22 |
Suppl 3 |
p. 9187-9198 |
artikel |
90 |
Local convolutional features and metric learning for SAR image registration
|
Guo, Qiangliang |
|
2018 |
22 |
Suppl 3 |
p. 3103-3114 |
artikel |
91 |
Low power NoC architecture based dynamic reconfigurable system
|
Nirmaladevi, K. |
|
|
22 |
Suppl 3 |
p. 11489-11500 |
artikel |
92 |
Map Reduce for big data processing based on traffic aware partition and aggregation
|
Venkatesh, G. |
|
|
22 |
Suppl 3 |
p. 12909-12915 |
artikel |
93 |
Millimeter wave CMOS minimum noise amplifier for automotive radars in the frequency band (60–66 GHZ)
|
Suganthi, K. |
|
|
22 |
Suppl 3 |
p. 11755-11764 |
artikel |
94 |
Minimizing movement for network connectivity in mobile sensor networks: an adaptive approach
|
Jagtap, Arvind Madhukar |
|
2018 |
22 |
Suppl 3 |
p. 1373-1383 |
artikel |
95 |
Moving average multi directional local features for speaker recognition
|
Mahmood, Awais |
|
2018 |
22 |
Suppl 3 |
p. 2145-2157 |
artikel |
96 |
Multiclass SVM active learning algorithm based on decision directed acyclic graph and one versus one
|
Xu, Hailong |
|
2018 |
22 |
Suppl 3 |
p. 6241-6251 |
artikel |
97 |
Multiple parameter algorithm approach for adult image identification
|
Balamurali, R. |
|
|
22 |
Suppl 3 |
p. 11909-11917 |
artikel |
98 |
Named entity recognition based on conditional random fields
|
Song, Shengli |
|
2017 |
22 |
Suppl 3 |
p. 5195-5206 |
artikel |
99 |
Near lossless medical image compression using block BWT–MTF and hybrid fractal compression techniques
|
Devadoss, C. Peter |
|
|
22 |
Suppl 3 |
p. 12929-12937 |
artikel |
100 |
Near-surface snowmelt detection on the Greenland ice sheet from FengYun-3 MWRI data
|
Wang, Xingdong |
|
|
22 |
Suppl 3 |
p. 8301-8308 |
artikel |
101 |
New solutions for exposing clustered applications deployed in the cloud
|
Łaskawiec, Sebastian |
|
2018 |
22 |
Suppl 3 |
p. 829-838 |
artikel |
102 |
Non-rigid registration of multi-phase liver CT data using fully automated landmark detection and TPS deformation
|
Zhang, Xuejun |
|
|
22 |
Suppl 3 |
p. 15305-15319 |
artikel |
103 |
Online handwritten signature verification based on the most stable feature and partition
|
Yang, Li |
|
2018 |
22 |
Suppl 3 |
p. 1691-1701 |
artikel |
104 |
Optimization method based on big data in business process management
|
Li, Tingshun |
|
2017 |
22 |
Suppl 3 |
p. 5357-5365 |
artikel |
105 |
Optimization on mixed-flow assembly u-line balancing problem
|
Wang, Ting |
|
|
22 |
Suppl 3 |
p. 8249-8257 |
artikel |
106 |
Optimization using Artificial Bee Colony based clustering approach for big data
|
Ilango, S. Sudhakar |
|
|
22 |
Suppl 3 |
p. 12169-12177 |
artikel |
107 |
Performance enhancement of IPv6 low power wireless personal area networks (6LoWPAN) by Lamport’s algorithm
|
Rajesh, R. |
|
|
22 |
Suppl 3 |
p. 7745-7750 |
artikel |
108 |
Predicting the content of camelina protein using FT-IR spectroscopy coupled with SVM model
|
Liu, Jun |
|
|
22 |
Suppl 3 |
p. 8401-8406 |
artikel |
109 |
Preference-driven yield-and-quality optimization for high-sulfur gas sweetening process by extreme learning machine model
|
Shang, Jianfeng |
|
2018 |
22 |
Suppl 3 |
p. 6371-6381 |
artikel |
110 |
Researches on hybrid algorithm for moving target detection and tracking in sports video
|
Yan, Ruiqin |
|
2018 |
22 |
Suppl 3 |
p. 3543-3552 |
artikel |
111 |
Research of manipulator trajectory tracking based on adaptive robust iterative learning control
|
Wang, Xiaokan |
|
2018 |
22 |
Suppl 3 |
p. 3079-3086 |
artikel |
112 |
Research on clustering analysis of Internet public opinion
|
Chen, XueGang |
|
2018 |
22 |
Suppl 3 |
p. 5997-6007 |
artikel |
113 |
Research on computer technical assistance tools for special children for music therapy
|
Yin, Tingrong |
|
2018 |
22 |
Suppl 3 |
p. 3605-3612 |
artikel |
114 |
Research on coupling relationship between environmental quality and regional economic growth based on VAR model
|
Jingfeng, Zhao |
|
2018 |
22 |
Suppl 3 |
p. 5881-5891 |
artikel |
115 |
Research on evaluation of public sports service in stadiums based on FNN algorithm
|
Jin, Zhixiang |
|
|
22 |
Suppl 3 |
p. 13835-13842 |
artikel |
116 |
Research on image tagging algorithm on internet
|
Zhang, Junyang |
|
|
22 |
Suppl 3 |
p. 13619-13625 |
artikel |
117 |
Research on multi-feature fusion algorithm for subject words extraction and summary generation of text
|
Xu, Gui-Xian |
|
|
22 |
Suppl 3 |
p. 10883-10895 |
artikel |
118 |
Research on risk assessment in the early development of state-level new areas based on the improved fuzzy comprehensive evaluation model
|
Chen, Yanyu |
|
2018 |
22 |
Suppl 3 |
p. 3431-3444 |
artikel |
119 |
Research on the effect of psychological stress intervention in music students based on Diffie–Hellman key exchange algorithm
|
Bai, Ye |
|
|
22 |
Suppl 3 |
p. 13723-13729 |
artikel |
120 |
Research on the interactive relationship between information communication technology and manufacturing industry
|
Gao, Yang |
|
2017 |
22 |
Suppl 3 |
p. 5719-5729 |
artikel |
121 |
Research on the strategic alliance innovation system evolution mechanism: the perspective of knowledge flow
|
Zhao, Jianyu |
|
|
22 |
Suppl 3 |
p. 9209-9227 |
artikel |
122 |
Research on visual 3D assembly process design and simulation for marine diesel engine
|
Hui, Zhang |
|
2017 |
22 |
Suppl 3 |
p. 5505-5519 |
artikel |
123 |
Research trend analysis on convergence and joint research of Korea using scientific papers
|
Yoo, Suhyeon |
|
2017 |
22 |
Suppl 3 |
p. 1939-1948 |
artikel |
124 |
RETRACTED ARTICLE: A trust based security framework with anonymous authentication system using multiple attributes in decentralized cloud
|
Usha, S. |
|
|
22 |
Suppl 3 |
p. 3883-3892 |
artikel |
125 |
RETRACTED ARTICLE: Cluster and cloud computing framework for scientific metrology in flow control
|
Wang, Yumin |
|
|
22 |
Suppl 3 |
p. 1189-1198 |
artikel |
126 |
RETRACTED ARTICLE: Discrete Noetherian ring variational pattern feature sets for space-air-ground network protocol monitoring
|
Lin, Wenliang |
|
|
22 |
Suppl 3 |
p. 7805-7814 |
artikel |
127 |
RETRACTED ARTICLE: Edge detection of satellite image using fuzzy logic
|
Dhivya, R. |
|
|
22 |
Suppl 3 |
p. 11891-11898 |
artikel |
128 |
RETRACTED ARTICLE: Electronic commerce commodity entity identities based on hierarchical probability model
|
Zhang, Sheng-fu |
|
|
22 |
Suppl 3 |
p. 7787-7794 |
artikel |
129 |
RETRACTED ARTICLE: Hybrid aggregated signcryption scheme using multi-constraints differential evolution algorithm for security
|
Sivasundari, A. |
|
|
22 |
Suppl 3 |
p. 3201-3211 |
artikel |
130 |
RETRACTED ARTICLE: IoT based industrial safety measures monitoring and reporting system using accident reduction model (ARM) control algorithm
|
Rajmohan, Palanivelu |
|
|
22 |
Suppl 3 |
p. 11259-11269 |
artikel |
131 |
RETRACTED ARTICLE: Researches on hybrid algorithm for moving target detection and tracking in sports video
|
Yan, Ruiqin |
|
|
22 |
Suppl 3 |
p. 3543-3552 |
artikel |
132 |
RETRACTED ARTICLE: Research on computer technical assistance tools for special children for music therapy
|
Yin, Tingrong |
|
|
22 |
Suppl 3 |
p. 3605-3612 |
artikel |
133 |
RETRACTED ARTICLE: The application of target tracking method in power load analysis based on computer vision in complex scenes
|
Liu, Dunnan |
|
|
22 |
Suppl 3 |
p. 11457-11465 |
artikel |
134 |
RETRACTED ARTICLE: The relationship analysis between online reviews and online shopping based on B2C platform technology
|
Hu, Fagang |
|
|
22 |
Suppl 3 |
p. 3365-3373 |
artikel |
135 |
Risk prediction and evaluation of transnational transmission of financial crisis based on complex network
|
Liu, Chang |
|
2018 |
22 |
Suppl 3 |
p. 4307-4313 |
artikel |
136 |
Safety analysis of traffic flow characteristics of highway tunnel based on artificial intelligence flow net algorithm
|
Tian, Lingling |
|
2018 |
22 |
Suppl 3 |
p. 573-582 |
artikel |
137 |
Scalable distributed data cube computation for large-scale multidimensional data analysis on a Spark cluster
|
Lee, Suan |
|
2018 |
22 |
Suppl 3 |
p. 2063-2087 |
artikel |
138 |
Secured and reliable data transmission on multi-hop wireless sensor network
|
Kavitha, R. J. |
|
|
22 |
Suppl 3 |
p. 10915-10924 |
artikel |
139 |
Semantic query graph based SPARQL generation from natural language questions
|
Song, Shengli |
|
2017 |
22 |
Suppl 3 |
p. 847-858 |
artikel |
140 |
SFabric: a scalable SDN based large layer 2 data center network fabric
|
Lu, Xiaoyuan |
|
2018 |
22 |
Suppl 3 |
p. 6657-6668 |
artikel |
141 |
Software engineering: risk features in requirement engineering
|
Bhukya, Shankar Nayak |
|
|
22 |
Suppl 3 |
p. 14789-14801 |
artikel |
142 |
Study on multiple targets tracking algorithm based on multiple sensors
|
Wang, Biao |
|
|
22 |
Suppl 3 |
p. 13283-13291 |
artikel |
143 |
Study on relationship between green logistics activity and logistics performance
|
Wang, Xu |
|
2018 |
22 |
Suppl 3 |
p. 6579-6588 |
artikel |
144 |
Study on seismic safety evaluation of water supply pipeline networks
|
Li, Qian |
|
2018 |
22 |
Suppl 3 |
p. 6647-6656 |
artikel |
145 |
Study on the transform method of estimating discrete frequency from continuous variable: ratemaking for car repair insurance based on SAS system coding
|
Xie, Yuantao |
|
|
22 |
Suppl 3 |
p. 15493-15503 |
artikel |
146 |
The application of target tracking method in power load analysis based on computer vision in complex scenes
|
Liu, Dunnan |
|
|
22 |
Suppl 3 |
p. 11457-11465 |
artikel |
147 |
The power load’s signal analysis and short-term prediction based on wavelet decomposition
|
Wang, Huan |
|
|
22 |
Suppl 3 |
p. 11129-11141 |
artikel |
148 |
The probabilistic model and forecasting of power load based on JMAP-ML and Gaussian process
|
Gao, Wengen |
|
|
22 |
Suppl 3 |
p. 8589-8596 |
artikel |
149 |
The relationship analysis between online reviews and online shopping based on B2C platform technology
|
Hu, Fagang |
|
2018 |
22 |
Suppl 3 |
p. 3365-3373 |
artikel |
150 |
The research of the plant leaves identification method based on 3-layers BP neutral network
|
Huang, Feijiang |
|
|
22 |
Suppl 3 |
p. 11143-11152 |
artikel |
151 |
The simulation by using bivariate splines for solving two dimensional non-classical diffusion problem
|
Qu, Kai |
|
|
22 |
Suppl 3 |
p. 8131-8139 |
artikel |
152 |
Time orient LEAD based polling point selection algorithm for efficient data aggregation in wireless sensor networks
|
Yuvaraj, R. |
|
2018 |
22 |
Suppl 3 |
p. 3339-3346 |
artikel |
153 |
Topographic surface roughness analysis based on image processing of terrestrial planet
|
Li, Jiaqi |
|
|
22 |
Suppl 3 |
p. 8689-8702 |
artikel |
154 |
TOPSIS–PSO inspired non-preemptive tasks scheduling algorithm in cloud environment
|
Panwar, Neelam |
|
2019 |
22 |
Suppl 3 |
p. 1379-1396 |
artikel |
155 |
Towards mobile cloud authentication and gait based security using time warping technique
|
Merlin, S. Sengole |
|
|
22 |
Suppl 3 |
p. 10595-10604 |
artikel |
156 |
Towards Sustainable High-Performance Transaction Processing in Cloud-based DBMS
|
Sul, Woong |
|
2018 |
22 |
Suppl 3 |
p. 135-145 |
artikel |
157 |
Virtual teaching and learning environments: automatic evaluation with artificial neural networks
|
Lino, Adriano |
|
2017 |
22 |
Suppl 3 |
p. 7217-7227 |
artikel |
158 |
Visualization of security event logs across multiple networks and its application to a CSOC
|
Song, Boyeon |
|
2017 |
22 |
Suppl 3 |
p. 1861-1872 |
artikel |
159 |
WCET optimization strategy based on source code refactoring
|
Meng, Fanqi |
|
2017 |
22 |
Suppl 3 |
p. 5563-5572 |
artikel |
160 |
Weighted pooling for image recognition of deep convolutional neural networks
|
Zhu, Xiaoning |
|
|
22 |
Suppl 3 |
p. 9371-9383 |
artikel |
161 |
Word sense disambiguation based on dependency constraint knowledge
|
Lu, Wenpeng |
|
2018 |
22 |
Suppl 3 |
p. 7549-7557 |
artikel |