nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Achieving energy efficient wireless sensor network by choosing effective cluster head
|
Shalini, V. Baby |
|
|
22 |
Suppl 5 |
p. 7761-7768 |
artikel |
2 |
A coverage hole detection and repair algorithm in wireless sensor networks
|
Feng, Xin |
|
|
22 |
Suppl 5 |
p. 12473-12480 |
artikel |
3 |
Adaptive PID controller for cloud smart city system stability control based on chaotic neural network
|
Zhu, Xuebiao |
|
|
22 |
Suppl 5 |
p. 13067-13075 |
artikel |
4 |
A dynamic clustering based method in community detection
|
Zhang, Rui |
|
2017 |
22 |
Suppl 5 |
p. 5703-5717 |
artikel |
5 |
Agricultural product monitoring system supported by cloud computing
|
Jinbo, Chen |
|
|
22 |
Suppl 5 |
p. 8929-8938 |
artikel |
6 |
A hybrid multi-layer intrusion detection system in cloud
|
Manickam, M. |
|
2018 |
22 |
Suppl 5 |
p. 3961-3969 |
artikel |
7 |
An adaptive fuzzy filter for image denoising
|
Zhang, Weiping |
|
|
22 |
Suppl 5 |
p. 14107-14124 |
artikel |
8 |
Analysis of Blockchain technology: pros, cons and SWOT
|
Niranjanamurthy, M. |
|
|
22 |
Suppl 5 |
p. 14743-14757 |
artikel |
9 |
Analysis of intelligent evaluation algorithm based on english diagnostic system
|
Huo, Yanyan |
|
|
22 |
Suppl 5 |
p. 13821-13826 |
artikel |
10 |
Analysis on key dimension’s measurement error in high speed computing
|
Zhang, Jin |
|
2017 |
22 |
Suppl 5 |
p. 769-779 |
artikel |
11 |
An early intelligent diagnosis model for drilling overflow based on GA–BP algorithm
|
Liang, Haibo |
|
|
22 |
Suppl 5 |
p. 10649-10668 |
artikel |
12 |
An efficient personalized trust based hybrid recommendation (TBHR) strategy for e-learning system in cloud computing
|
Bhaskaran, S. |
|
2017 |
22 |
Suppl 5 |
p. 1137-1149 |
artikel |
13 |
An effiecient human tracking system using Haar-like and hog feature extraction
|
Prasanna, Dinesh |
|
2018 |
22 |
Suppl 5 |
p. 2993-3000 |
artikel |
14 |
An energy aware competition based clustering for cluster head selection in wireless sensor network with mobility
|
Narendran, M. |
|
|
22 |
Suppl 5 |
p. 11019-11028 |
artikel |
15 |
A new concept of Cosine similarity measures based on dual hesitant fuzzy sets and its possible applications
|
Zhang, Yutao |
|
|
22 |
Suppl 5 |
p. 15483-15492 |
artikel |
16 |
An exponent based error detection mechanism against DXDOS attack for improving the security in cloud
|
Vijayalakshmi, J. |
|
2018 |
22 |
Suppl 5 |
p. 3749-3758 |
artikel |
17 |
Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment
|
Yang, Chen |
|
|
22 |
Suppl 5 |
p. 8309-8317 |
artikel |
18 |
A novel algorithm for real time task scheduling in multiprocessor environment
|
Josephson, Joel |
|
|
22 |
Suppl 5 |
p. 13761-13771 |
artikel |
19 |
A novel flip-flop based error free, area efficient and low power pipeline architecture for finite impulse recursive system
|
Krishnamoorthy, Raja |
|
|
22 |
Suppl 5 |
p. 15137-15147 |
artikel |
20 |
A novel fuzzy scheduler for cell-edge users in LTE-advanced networks using Voronoi algorithm
|
Radhakrishnan, S. |
|
|
22 |
Suppl 5 |
p. 9625-9635 |
artikel |
21 |
A novel WSNs routing algorithm based on game theory and energy consumption balance
|
Lei, Shi |
|
2018 |
22 |
Suppl 5 |
p. 4271-4276 |
artikel |
22 |
Application of an intelligent early-warning method based on DBSCAN clustering for drilling overflow accident
|
Haibo, Liang |
|
|
22 |
Suppl 5 |
p. 12599-12608 |
artikel |
23 |
Application of ARIMA and SVM mixed model in agricultural management under the background of intellectual agriculture
|
Wen, Qing |
|
|
22 |
Suppl 5 |
p. 14349-14358 |
artikel |
24 |
Application of computerized numerical modeling in multi-state wet wheel hub heat simulations
|
Liu, Sheng |
|
2018 |
22 |
Suppl 5 |
p. 1569-1580 |
artikel |
25 |
A rough set calibration scheme for energy effective routing protocol in mobile ad hoc networks
|
Sathish Kumar, S. |
|
|
22 |
Suppl 5 |
p. 13957-13963 |
artikel |
26 |
A smart power saving protocol for IoT with wireless energy harvesting technique
|
Madhurikkha, S. |
|
2018 |
22 |
Suppl 5 |
p. 3313-3324 |
artikel |
27 |
Async-LCAM: a lock contention aware messenger for Ceph distributed storage system
|
Jeong, Bodon |
|
2018 |
22 |
Suppl 5 |
p. 373-384 |
artikel |
28 |
Attribute weights-based clustering centres algorithm for initialising K-modes clustering
|
Peng, Liwen |
|
2018 |
22 |
Suppl 5 |
p. 6171-6179 |
artikel |
29 |
Black hole detection using evolutionary algorithm for IDS/IPS in MANETs
|
Thanuja, R. |
|
2018 |
22 |
Suppl 5 |
p. 3131-3143 |
artikel |
30 |
Brain image feature recognition method for Alzheimer’s disease
|
He, Xiaoying |
|
|
22 |
Suppl 5 |
p. 8109-8117 |
artikel |
31 |
Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing
|
Thanga Revathi, S. |
|
2018 |
22 |
Suppl 5 |
p. 3521-3530 |
artikel |
32 |
Brain tumor detection using optimisation classification based on rough set theory
|
Rajesh, T. |
|
|
22 |
Suppl 5 |
p. 13853-13859 |
artikel |
33 |
Cause-chain analysis of coal-mine gas explosion accident based on Bayesian network model
|
Li, Xiangong |
|
2018 |
22 |
Suppl 5 |
p. 1549-1557 |
artikel |
34 |
Cellular planning for next generation wireless mobile network using novel energy efficient CoMP
|
Dastoor, Sarosh K. |
|
2018 |
22 |
Suppl 5 |
p. 4611-4623 |
artikel |
35 |
Chatbot-based heathcare service with a knowledge base for cloud computing
|
Chung, Kyungyong |
|
2018 |
22 |
Suppl 5 |
p. 1925-1937 |
artikel |
36 |
Clock node capacity minimization using lookup table based controller for ultrasound and medical imaging processor
|
Titus, T. Joby |
|
2018 |
22 |
Suppl 5 |
p. 4129-4134 |
artikel |
37 |
Competition and the stepping-stone theory in the broadband access market
|
Jiang, Yanyan |
|
2018 |
22 |
Suppl 5 |
p. 5071-5087 |
artikel |
38 |
Consensus disturbance rejection with channel uncertainties in directed leader-following network system
|
Cao, Haozhe |
|
|
22 |
Suppl 5 |
p. 14487-14493 |
artikel |
39 |
Cost-sensitive large margin distribution machine for fault detection of wind turbines
|
Tang, Mingzhu |
|
2018 |
22 |
Suppl 5 |
p. 7525-7537 |
artikel |
40 |
Design and development of high performance MOS current mode logic (MCML) processor for fast and power efficient computing
|
Pradeep, K. P. Sai |
|
|
22 |
Suppl 5 |
p. 13387-13395 |
artikel |
41 |
Design of high performance filter bank multi-carrier transmitter
|
Radhika, P. |
|
|
22 |
Suppl 5 |
p. 12521-12527 |
artikel |
42 |
Detection of denial of service attacks by domination graph application in wireless sensor networks
|
Balaji, S. |
|
|
22 |
Suppl 5 |
p. 15121-15126 |
artikel |
43 |
Distinguishing investment changes in metro construction project based on a factor space algorithm
|
Wang, Dong |
|
|
22 |
Suppl 5 |
p. 9357-9370 |
artikel |
44 |
Distributed SVM face recognition based on Hadoop
|
Zhang, Boping |
|
2017 |
22 |
Suppl 5 |
p. 827-834 |
artikel |
45 |
Driving style estimation by fusing multiple driving behaviors: a case study of freeway in China
|
Ma, Yulin |
|
|
22 |
Suppl 5 |
p. 8259-8269 |
artikel |
46 |
DSM: a dynamic scheduling method for concurrent workflows in cloud environment
|
Xue, Shengjun |
|
2017 |
22 |
Suppl 5 |
p. 693-706 |
artikel |
47 |
Efficient computation of the transitive closure size
|
Tang, Xian |
|
2018 |
22 |
Suppl 5 |
p. 6517-6527 |
artikel |
48 |
Enhanced sentiment labeling and implicit aspect identification by integration of deep convolution neural network and sequential algorithm
|
Feng, Jinzhan |
|
2018 |
22 |
Suppl 5 |
p. 5839-5857 |
artikel |
49 |
Enhancing 4G Co-existence with Wi-Fi/IoT using cognitive radio
|
Sumathi, A. C. |
|
|
22 |
Suppl 5 |
p. 11295-11305 |
artikel |
50 |
Evolving neural networks using bird swarm algorithm for data classification and regression applications
|
Aljarah, Ibrahim |
|
2019 |
22 |
Suppl 5 |
p. 1317-1345 |
artikel |
51 |
Feature selection for software effort estimation with localized neighborhood mutual information
|
Liu, Qin |
|
2018 |
22 |
Suppl 5 |
p. 6953-6961 |
artikel |
52 |
Forward looking infrared target matching algorithm based on depth learning and matrix double transformation
|
Zeng, Rui |
|
2018 |
22 |
Suppl 5 |
p. 7055-7062 |
artikel |
53 |
FPGA implementation of modified error normalized LMS adaptive filter for ECG noise removal
|
Venkatesan, C. |
|
|
22 |
Suppl 5 |
p. 12233-12241 |
artikel |
54 |
Fuzzy based edge enhanced text detection algorithm using MSER
|
Thilagavathy, A. |
|
|
22 |
Suppl 5 |
p. 11681-11687 |
artikel |
55 |
Fuzzy TOPSIS analytic hierarchy process based cooperative development of cultural soft power
|
YanHong, Wang |
|
2018 |
22 |
Suppl 5 |
p. 4719-4727 |
artikel |
56 |
Gesture recognition based on binocular vision
|
Jiang, Du |
|
|
22 |
Suppl 5 |
p. 13261-13271 |
artikel |
57 |
Grey three index prediction method based on data assimilation preprocessing
|
Tian, Zhouyu |
|
2018 |
22 |
Suppl 5 |
p. 4859-4867 |
artikel |
58 |
Hearing aid speech signal enhancement via N-parallel FIR-multiplying polynomials for Tamil language dialect syllable ripple and transition variation
|
Shanmugaraj, G. |
|
2018 |
22 |
Suppl 5 |
p. 3863-3874 |
artikel |
59 |
Hierarchical cluster based evaluation system for computer courses
|
Bai, Wei |
|
2018 |
22 |
Suppl 5 |
p. 4135-4140 |
artikel |
60 |
High performance decoding aware FPGA bit-stream compression using RG codes
|
Satheesh Kumar, J. |
|
|
22 |
Suppl 5 |
p. 15007-15013 |
artikel |
61 |
High-performance internet file system based on multi-download for convergence computing in mobile communication systems
|
Moon, Youngjun |
|
2018 |
22 |
Suppl 5 |
p. 1057-1071 |
artikel |
62 |
Identifying key influential parameters of high profile criminals through statistical correlation
|
Wadood, Danish |
|
2017 |
22 |
Suppl 5 |
p. 7135-7148 |
artikel |
63 |
Improved continuous query plan with cluster weighted dominant querying in synthetic datasets
|
Madhankumar, M. |
|
2017 |
22 |
Suppl 5 |
p. 1239-1246 |
artikel |
64 |
Improved eigensystem realization algorithm and its application on ocean platforms
|
Xin, Junfeng |
|
2018 |
22 |
Suppl 5 |
p. 3643-3650 |
artikel |
65 |
Improving image steganalyser performance through curvelet transform denoising
|
Hemalatha, J. |
|
|
22 |
Suppl 5 |
p. 11821-11839 |
artikel |
66 |
Improving medical diagnosis performance using hybrid feature selection via relieff and entropy based genetic search (RF-EGA) approach: application to breast cancer prediction
|
Sangaiah, Ilangovan |
|
2018 |
22 |
Suppl 5 |
p. 6899-6906 |
artikel |
67 |
Investigation on application of association rule algorithm in English teaching logistics information
|
Li, Min |
|
|
22 |
Suppl 5 |
p. 13703-13709 |
artikel |
68 |
Items assignment optimization for complex automated picking Systems
|
Liu, Debao |
|
2017 |
22 |
Suppl 5 |
p. 5787-5797 |
artikel |
69 |
Lightweight and universal intelligent service platform in indoor environment
|
Wan, Zheng |
|
|
22 |
Suppl 5 |
p. 9187-9198 |
artikel |
70 |
Load-deflection model for T-section rail press straightening process under lateral loads
|
Song, Y. |
|
2018 |
22 |
Suppl 5 |
p. 2955-2961 |
artikel |
71 |
Low-level control technology of micro autonomous underwater vehicle based on intelligent computing
|
Zhang, Lanyong |
|
|
22 |
Suppl 5 |
p. 8569-8580 |
artikel |
72 |
Map-Reduce framework based cluster architecture for academic student’s performance prediction using cumulative dragonfly based neural network
|
VeeraManickam, M. R. M. |
|
2018 |
22 |
Suppl 5 |
p. 1259-1275 |
artikel |
73 |
Matrix decomposition model for robust based on M estimate and its application
|
Zhang, Zhengyang |
|
2018 |
22 |
Suppl 5 |
p. 4315-4322 |
artikel |
74 |
Model transformation using logical prediction from sequence diagram: an experimental approach
|
Mythily, M. |
|
|
22 |
Suppl 5 |
p. 12351-12362 |
artikel |
75 |
M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks
|
Zhang, Zhaohui |
|
2018 |
22 |
Suppl 5 |
p. 7677-7685 |
artikel |
76 |
Moving average multi directional local features for speaker recognition
|
Mahmood, Awais |
|
2018 |
22 |
Suppl 5 |
p. 2145-2157 |
artikel |
77 |
Multi-biometric authentication system using finger vein and iris in cloud computing
|
Ilankumaran, S. |
|
2018 |
22 |
Suppl 5 |
p. 103-117 |
artikel |
78 |
Network-aware energy saving multi-objective optimization in virtualized data centers
|
Al-Tarazi, Motassem |
|
2018 |
22 |
Suppl 5 |
p. 635-647 |
artikel |
79 |
Novel algorithm for generating basis convex hexagonal polygons and polyhedrons
|
Khan, Mohd. Sherfuddin |
|
|
22 |
Suppl 5 |
p. 14253-14267 |
artikel |
80 |
Obstacles detection and depth estimation from monocular vision for inspection robot of high voltage transmission line
|
Cheng, Li |
|
2017 |
22 |
Suppl 5 |
p. 2611-2627 |
artikel |
81 |
On efficient virtual network function chaining in NFV-based telecommunications networks
|
Galdamez, Carlos |
|
2018 |
22 |
Suppl 5 |
p. 693-703 |
artikel |
82 |
Online customer service quality of online shopping: evidence from Dangdang.com
|
Huang, Zhengwei |
|
|
22 |
Suppl 5 |
p. 15285-15293 |
artikel |
83 |
Optimized cognitive radio network (CRN) using genetic algorithm and artificial bee colony algorithm
|
Arun, J. |
|
2018 |
22 |
Suppl 5 |
p. 3801-3810 |
artikel |
84 |
Optimized energy efficient route assigning method using related node discovery algorithm in MANET
|
Aruna, R. |
|
2018 |
22 |
Suppl 5 |
p. 469-479 |
artikel |
85 |
Optimized neural network for spectrum prediction using genetic algorithm in cognitive radio networks
|
Supraja, P. |
|
2018 |
22 |
Suppl 5 |
p. 157-163 |
artikel |
86 |
Optimized traffic control and data processing using IoT
|
Kuppusamy, P. |
|
2018 |
22 |
Suppl 5 |
p. 2169-2178 |
artikel |
87 |
Optimized virtual space vector modulation for three-phase three-level T-type converter
|
Xia, Yan |
|
|
22 |
Suppl 5 |
p. 14679-14687 |
artikel |
88 |
Pairwise relative ranking technique for efficient opinion mining using sentiment analysis
|
Manivannan, P. |
|
|
22 |
Suppl 5 |
p. 13487-13497 |
artikel |
89 |
Partial least squares regression analysis to factor of influence for ecological footprint
|
Huang, Zhiqi |
|
2018 |
22 |
Suppl 5 |
p. 6425-6433 |
artikel |
90 |
Pattern synthesis of a practical conformal hydrophone array via second-order cone programming
|
Liu, Dali |
|
|
22 |
Suppl 5 |
p. 8379-8386 |
artikel |
91 |
Performance analysis of sub-interleaver based turbo codes
|
Devi, M. Rajani |
|
|
22 |
Suppl 5 |
p. 14091-14097 |
artikel |
92 |
Performance of adaptive MIMO switching for cognitive MC-CDMA system
|
Leela, S. |
|
|
22 |
Suppl 5 |
p. 7723-7731 |
artikel |
93 |
Performance of image transmission over MC-CDMA based on super resolution technique
|
Raj, P. T. Vasanth |
|
|
22 |
Suppl 5 |
p. 7943-7951 |
artikel |
94 |
Personalized information recommendation based on synonymy tag optimization
|
Wei, Jianliang |
|
2017 |
22 |
Suppl 5 |
p. 5467-5478 |
artikel |
95 |
Physical-traffic attentive vigorous routing (P-TAVR) and hot-spot detection to reduce the bottleneck in WSN
|
Praghash, K. |
|
2018 |
22 |
Suppl 5 |
p. 4201-4212 |
artikel |
96 |
Product pricing considering the consumer preference based on Internet of Things
|
Pan, Xin-yu |
|
|
22 |
Suppl 5 |
p. 15379-15385 |
artikel |
97 |
Reconfigurable unique key generation using variable duty cycle PUF
|
Narasimhan, Sivasankari |
|
|
22 |
Suppl 5 |
p. 11339-11349 |
artikel |
98 |
Reliability improved, high performance FIR filter design using new computation sharing multiplier: suitable for signal processing applications
|
Umadevi, S. |
|
|
22 |
Suppl 5 |
p. 13669-13681 |
artikel |
99 |
Repeated game analysis of power suppliers based on dynamic coopetition process and slightly altruistic factor
|
Lanxiang, Jiang |
|
2017 |
22 |
Suppl 5 |
p. 4075-4084 |
artikel |
100 |
Research on data mining of permissions mode for Android malware detection
|
Wang, Chao |
|
|
22 |
Suppl 5 |
p. 13337-13350 |
artikel |
101 |
Research on discontinuous guidance and hardware-in-the-loop simulation for unmanned underwater vehicle
|
Shao, Zhiyu |
|
|
22 |
Suppl 5 |
p. 7975-7982 |
artikel |
102 |
Research on subgraph distribution algorithm based on label null model
|
Wang, Zhisong |
|
2017 |
22 |
Suppl 5 |
p. 5521-5533 |
artikel |
103 |
Research on the thermal network optimization of wet axle based on high performance computing and wireless data transmission
|
Liu, Sheng |
|
2018 |
22 |
Suppl 5 |
p. 1479-1493 |
artikel |
104 |
RETRACTED ARTICLE: A dynamic clustering based method in community detection
|
Zhang, Rui |
|
|
22 |
Suppl 5 |
p. 5703-5717 |
artikel |
105 |
RETRACTED ARTICLE: Agricultural product monitoring system supported by cloud computing
|
Jinbo, Chen |
|
|
22 |
Suppl 5 |
p. 8929-8938 |
artikel |
106 |
RETRACTED ARTICLE: A hybrid multi-layer intrusion detection system in cloud
|
Manickam, M. |
|
|
22 |
Suppl 5 |
p. 3961-3969 |
artikel |
107 |
RETRACTED ARTICLE: Analysis of intelligent evaluation algorithm based on english diagnostic system
|
Huo, Yanyan |
|
|
22 |
Suppl 5 |
p. 13821-13826 |
artikel |
108 |
RETRACTED ARTICLE: An effiecient human tracking system using Haar-like and hog feature extraction
|
Prasanna, Dinesh |
|
|
22 |
Suppl 5 |
p. 2993-3000 |
artikel |
109 |
RETRACTED ARTICLE: Application of ARIMA and SVM mixed model in agricultural management under the background of intellectual agriculture
|
Wen, Qing |
|
|
22 |
Suppl 5 |
p. 14349-14358 |
artikel |
110 |
RETRACTED ARTICLE: Computer electromagnetic radiation carcinogenic doses based on Monte Carlo algorithm
|
Hou, Haoli |
|
|
22 |
Suppl 5 |
p. 9047 |
artikel |
111 |
RETRACTED ARTICLE: Investigation on application of association rule algorithm in English teaching logistics information
|
Li, Min |
|
|
22 |
Suppl 5 |
p. 13703-13709 |
artikel |
112 |
RETRACTED ARTICLE: IoT based industrial safety measures monitoring and reporting system using accident reduction model (ARM) control algorithm
|
Rajmohan, Palanivelu |
|
|
22 |
Suppl 5 |
p. 11259-11269 |
artikel |
113 |
RETRACTED ARTICLE: The application researches of visualized data mining technique in urban underground space based on GIS
|
Zhang, Fayong |
|
|
22 |
Suppl 5 |
p. 14827-14833 |
artikel |
114 |
RFTL: improving performance of selective caching-based page-level FTL through replication
|
Mativenga, Ronnie |
|
2018 |
22 |
Suppl 5 |
p. 25-41 |
artikel |
115 |
Secure and efficient data forwarding in untrusted cloud environment
|
Ramachandran, Balamanigandan |
|
2018 |
22 |
Suppl 5 |
p. 3727-3735 |
artikel |
116 |
Secure and optimal authentication framework for cloud management using HGAPSO algorithm
|
Selvarani, P. |
|
2018 |
22 |
Suppl 5 |
p. 4007-4016 |
artikel |
117 |
Secure error-correcting (SEC) schemes for network coding through McEliece cryptosystem
|
Zhang, Guangzhi |
|
|
22 |
Suppl 5 |
p. 11047-11055 |
artikel |
118 |
Self-healing reconfiguration scheme for distribution network with distributed generations based on multi-agent systems
|
Hongbin, Sun |
|
2017 |
22 |
Suppl 5 |
p. 5293-5303 |
artikel |
119 |
Semantic feature hierarchical clustering algorithm based on improved regional merging strategy
|
yu-feng, Yao |
|
2018 |
22 |
Suppl 5 |
p. 1495-1503 |
artikel |
120 |
Sensor fault localization with accumulated residual contribution rate for bridge SHM
|
Li, Lili |
|
|
22 |
Suppl 5 |
p. 7821-7829 |
artikel |
121 |
Soft computing approaches based bookmark selection and clustering techniques for social tagging systems
|
Tolba, Amr |
|
2018 |
22 |
Suppl 5 |
p. 3183-3189 |
artikel |
122 |
SORD: a new strategy of online replica deduplication in Cloud-P2P
|
Sun, ShengYao |
|
2018 |
22 |
Suppl 5 |
p. 1-23 |
artikel |
123 |
Spatial task management method for location privacy aware crowdsourcing
|
Li, Yan |
|
2017 |
22 |
Suppl 5 |
p. 1797-1803 |
artikel |
124 |
Structure Characteristics Analysis of Diesel Sales in Complex Network Method
|
Zhou, Datong |
|
2017 |
22 |
Suppl 5 |
p. 5635-5645 |
artikel |
125 |
Study of spectral reflectance reconstruction based on regularization matrix R method
|
Wang, Ke |
|
2017 |
22 |
Suppl 5 |
p. 493-502 |
artikel |
126 |
Study on safety early warning system of miner’s physiological indexes
|
Jing, Guoxun |
|
|
22 |
Suppl 5 |
p. 9151-9157 |
artikel |
127 |
Study on the construction and application of discrete space fault tree modified by fuzzy structured element
|
Cui, Tie-Jun |
|
2018 |
22 |
Suppl 5 |
p. 6563-6577 |
artikel |
128 |
Study on the relationship between system reliability and influencing factors under big data and multi-factors
|
Cui, Tie-Jun |
|
|
22 |
Suppl 5 |
p. 10275-10297 |
artikel |
129 |
The application researches of visualized data mining technique in urban underground space based on GIS
|
Zhang, Fayong |
|
|
22 |
Suppl 5 |
p. 14827-14833 |
artikel |
130 |
The first-principle calculation method for thermal structure stability analysis based on the simulation and sensing on cohesive energy
|
Li, Jiahui |
|
2018 |
22 |
Suppl 5 |
p. 6197-6208 |
artikel |
131 |
The linear regression method of the influencing factors of cultural industry based on the classification of structural data sources
|
Honggang, Cao |
|
2018 |
22 |
Suppl 5 |
p. 6123-6132 |
artikel |
132 |
The longitudinal analysis of the genetic effects on craniofacial morphology in posterior–anterior and lateral cephalograms of female twins aged from 6 to 12 years
|
Jing, Lv |
|
2018 |
22 |
Suppl 5 |
p. 4957-4969 |
artikel |
133 |
The research on compensation algorithm of infrared temperature measurement based on intelligent sensors
|
Wei, Shaoliang |
|
2018 |
22 |
Suppl 5 |
p. 6091-6100 |
artikel |
134 |
Towards data storage in cryptographic systems: an efficient hardware architecture based on multivariate scheme for secure storage applications
|
Yi, Haibo |
|
|
22 |
Suppl 5 |
p. 8639-8646 |
artikel |
135 |
Towards mobile cloud authentication and gait based security using time warping technique
|
Merlin, S. Sengole |
|
|
22 |
Suppl 5 |
p. 10595-10604 |
artikel |
136 |
Towards optimal resource provisioning for Hadoop-MapReduce jobs using scale-out strategy and its performance analysis in private cloud environment
|
Ramanathan, Ramakrishnan |
|
|
22 |
Suppl 5 |
p. 14061-14071 |
artikel |
137 |
Tsallis entropy: as a new single feature with the least computation time for classification of epileptic seizures
|
Thilagaraj, M. |
|
|
22 |
Suppl 5 |
p. 15213-15221 |
artikel |
138 |
Turtle edge encoding and flood fill based image compression scheme
|
Arockia Raj, Y. |
|
2018 |
22 |
Suppl 5 |
p. 361-377 |
artikel |
139 |
Validation of multicast routing in cyber physical systems monitoring air quality
|
Amuthadevi, C. |
|
2018 |
22 |
Suppl 5 |
p. 3917-3923 |
artikel |
140 |
Virtual reality technology applied in digitalization of cultural heritage
|
Donghui, Cao |
|
|
22 |
Suppl 5 |
p. 10063-10074 |
artikel |
141 |
Word recommendation for English composition using big corpus data processing
|
Lee, Keon Myung |
|
2018 |
22 |
Suppl 5 |
p. 1911-1924 |
artikel |
142 |
W-Scheduler: whale optimization for task scheduling in cloud computing
|
Sreenu, Karnam |
|
2017 |
22 |
Suppl 5 |
p. 1087-1098 |
artikel |