nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A collaborative filtering recommendation algorithm based on the influence sets of e-learning group’s behavior
|
Liu, Xiuju |
|
2017 |
22 |
Suppl 6 |
p. 2823-2833 |
artikel |
2 |
A community-based algorithm for influence blocking maximization in social networks
|
Lv, Jiaguo |
|
2017 |
22 |
Suppl 6 |
p. 5587-5602 |
artikel |
3 |
Adaptive QoE-based architecture on cloud mobile media for live streaming
|
Felici-Castell, Santiago |
|
2018 |
22 |
Suppl 6 |
p. 679-692 |
artikel |
4 |
A FCM cluster: cloud networking model for intelligent transportation in the city of Macau
|
Cai, Zhiming |
|
2017 |
22 |
Suppl 6 |
p. 1219-1228 |
artikel |
5 |
A hybird filtering approach for mri image with multiresolution
|
Murugan, K. |
|
2018 |
22 |
Suppl 6 |
p. 3835-3840 |
artikel |
6 |
A light weight FFT based enciphering system for extending the lifetime of mobile ad hoc networks
|
Kavitha, T. |
|
|
22 |
Suppl 6 |
p. 12339-12349 |
artikel |
7 |
A link-adding strategy for improving robustness and traffic capacity in large-scale wireless sensor networks
|
Zhang, Zhaohui |
|
2018 |
22 |
Suppl 6 |
p. 7687-7694 |
artikel |
8 |
Analysis of factors affecting investment efficiency based on analytic hierarchy process and support vector machine (SVM) model
|
Lina, Song |
|
2018 |
22 |
Suppl 6 |
p. 4367-4374 |
artikel |
9 |
Analyzing and visualizing comprehensive and personalized online product reviews
|
Kim, Jooyoung |
|
2018 |
22 |
Suppl 6 |
p. 2115-2128 |
artikel |
10 |
An efficient and improved multi-objective optimized replication management with dynamic and cost aware strategies in cloud computing data center
|
Edwin, E. Bijolin |
|
|
22 |
Suppl 6 |
p. 11119-11128 |
artikel |
11 |
An efficient city energy management system with secure routing communication using WSN
|
Kavitha, M. |
|
|
22 |
Suppl 6 |
p. 13131-13142 |
artikel |
12 |
An improved Markov model for idle time prediction based on spatiotemporal learning
|
Kui, Hailin |
|
2018 |
22 |
Suppl 6 |
p. 7637-7647 |
artikel |
13 |
An integrated data analysis of configurations of supply chain integration
|
Liu, Jiawen |
|
2018 |
22 |
Suppl 6 |
p. 6393-6404 |
artikel |
14 |
Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment
|
Yang, Chen |
|
|
22 |
Suppl 6 |
p. 8309-8317 |
artikel |
15 |
An optimized IS-APCPSO algorithm for large scale complex traffic network
|
Huang, Ke |
|
2018 |
22 |
Suppl 6 |
p. 3271-3284 |
artikel |
16 |
A novel complex network-based modeling method for heterogeneous product design
|
Zhang, Denghui |
|
|
22 |
Suppl 6 |
p. 7861-7872 |
artikel |
17 |
A novel construction paradigm of multimedia awareness system for mobile network
|
Liu, Feng |
|
|
22 |
Suppl 6 |
p. 9697-9713 |
artikel |
18 |
A novel method for adaptive fault tolerance during load balancing in cloud computing
|
Tamilvizhi, T. |
|
|
22 |
Suppl 6 |
p. 10425-10438 |
artikel |
19 |
An unsupervised user identification algorithm using network embedding and scalable nearest neighbour
|
Zhou, Xiaoping |
|
|
22 |
Suppl 6 |
p. 8677-8687 |
artikel |
20 |
A scheme for detecting outliers using sequential adjacency among entities
|
Kathiresan, V. |
|
|
22 |
Suppl 6 |
p. 13177-13183 |
artikel |
21 |
Association rules and deep learning for cryptographic algorithm in privacy preserving data mining
|
Rajesh, N. |
|
2018 |
22 |
Suppl 6 |
p. 119-131 |
artikel |
22 |
A study on secure user authentication and authorization in OAuth protocol
|
Chae, Cheol-Joo |
|
2017 |
22 |
Suppl 6 |
p. 1991-1999 |
artikel |
23 |
Automatic segmentation of coronary lumen based on minimum path and image fusion from cardiac computed tomography images
|
Liu, Liu |
|
2018 |
22 |
Suppl 6 |
p. 1559-1568 |
artikel |
24 |
A voxel based morphometry approach for identifying Alzheimer from MRI images
|
Saravanakumar, S. |
|
|
22 |
Suppl 6 |
p. 14081-14089 |
artikel |
25 |
Building the intelligent transportation systems based on the computation of driving velocity law of blasting fly-rock
|
Huang, Yong-hui |
|
2017 |
22 |
Suppl 6 |
p. 759-768 |
artikel |
26 |
Cloud platform wireless sensor network detection system based on data sharing
|
Xiao, Shuo |
|
|
22 |
Suppl 6 |
p. 14157-14168 |
artikel |
27 |
Cluster based-image descriptors and fractional hybrid optimization for medical image retrieval
|
Yadav, Poonam |
|
2018 |
22 |
Suppl 6 |
p. 1345-1359 |
artikel |
28 |
Cluster computing based optimization techniques for control of electrical drives
|
Subiramoniyan, S. |
|
2018 |
22 |
Suppl 6 |
p. 6837-6847 |
artikel |
29 |
Clustered entropy computing: a holoentropy based encoding scheme for high efficient computing systems
|
Munagala, Venkatesh |
|
2018 |
22 |
Suppl 6 |
p. 1429-1441 |
artikel |
30 |
Competent resource provisioning and distribution techniques for cloud computing environment
|
Suresh, A. |
|
|
22 |
Suppl 6 |
p. 11039-11046 |
artikel |
31 |
Composite braking AMT shift strategy for extended-range heavy commercial electric vehicle based on LHMM/ANFIS braking intention identification
|
Zhao, Xuan |
|
|
22 |
Suppl 6 |
p. 8513-8528 |
artikel |
32 |
Computationally efficient generic adaptive filter (CEGAF)
|
Abid, Muqaddas |
|
2017 |
22 |
Suppl 6 |
p. 7111-7121 |
artikel |
33 |
Construction and application of barrel finishing underlying database platform
|
Gao, Wei |
|
|
22 |
Suppl 6 |
p. 15367-15378 |
artikel |
34 |
Construction of employee training program evaluation system of three exponential forecast based on sliding window
|
Meng, Guo |
|
2018 |
22 |
Suppl 6 |
p. 4665-4671 |
artikel |
35 |
Continuous user authentication based score level fusion with hybrid optimization
|
Prakash, A. |
|
|
22 |
Suppl 6 |
p. 12959-12969 |
artikel |
36 |
Data replication strategy with satisfaction of availability, performance and tenant budget requirements
|
Limam, Said |
|
2019 |
22 |
Suppl 6 |
p. 1199-1210 |
artikel |
37 |
Delay-dependent robust resilient $$H_\infty $$H∞ control for uncertain singular time-delay system with Markovian jumping parameters
|
Gao, Huanli |
|
2018 |
22 |
Suppl 6 |
p. 6283-6294 |
artikel |
38 |
Design a management information system for financial risk control
|
Li, Yong |
|
|
22 |
Suppl 6 |
p. 8783-8791 |
artikel |
39 |
Design and evaluate intelligent control safety systems on the TOMI robot
|
Zhao, Chunhua |
|
2018 |
22 |
Suppl 6 |
p. 6435-6448 |
artikel |
40 |
Design and implementation of an analytical framework for interference aware job scheduling on Apache Spark platform
|
Wang, Kewen |
|
2017 |
22 |
Suppl 6 |
p. 2223-2237 |
artikel |
41 |
Design and implementation of an efficient attack resilient computation algorithm in WSN nodes
|
Saravanaselvan, A. |
|
2018 |
22 |
Suppl 6 |
p. 3301-3311 |
artikel |
42 |
Differential evolution with improved elite archive mutation and dynamic parameter adjustment
|
Lu, Zengquan |
|
|
22 |
Suppl 6 |
p. 9347-9356 |
artikel |
43 |
Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud
|
George, Ashok |
|
2018 |
22 |
Suppl 6 |
p. 1277-1288 |
artikel |
44 |
Dynamic key dependent AES S-box generation with optimized quality analysis
|
Partheeban, Pon. |
|
|
22 |
Suppl 6 |
p. 14731-14741 |
artikel |
45 |
E-commerce big data computing platform system based on distributed computing logistics information
|
Hu, Junmin |
|
|
22 |
Suppl 6 |
p. 13693-13702 |
artikel |
46 |
Electromechanical dynamic simulation and experiment for multi-stage gear transmission system with planetary gears
|
Wang, Yong |
|
2018 |
22 |
Suppl 6 |
p. 3031-3041 |
artikel |
47 |
Emotional component analysis and forecast public opinion on micro-blog posts based on maximum entropy model
|
Zhang, Mingchuan |
|
2018 |
22 |
Suppl 6 |
p. 6295-6304 |
artikel |
48 |
Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks
|
Sogani, Ayush |
|
|
22 |
Suppl 6 |
p. 10637-10648 |
artikel |
49 |
Enhanced perceptual psychopathology correlation mechanism model based on rough set and neural network
|
Yang, Xiaobing |
|
2018 |
22 |
Suppl 6 |
p. 4397-4403 |
artikel |
50 |
Escalating quality of services with channel assignment and traffic scheduling in wireless mesh networks
|
Selvakumar, K. |
|
|
22 |
Suppl 6 |
p. 11949-11955 |
artikel |
51 |
Evaluation of neighbor credit value based AODV routing algorithms for selfish node behavior detection
|
Rama Abirami, K. |
|
|
22 |
Suppl 6 |
p. 13307-13316 |
artikel |
52 |
Evaluation of software quality-in-use attributes based on analysis network process
|
Kim, Seung-Hee |
|
2018 |
22 |
Suppl 6 |
p. 2101-2114 |
artikel |
53 |
Expected value model of bus gas station site layout problem with fuzzy demand in supplementary fuel using genetic algorithm
|
Wei, Ming |
|
2017 |
22 |
Suppl 6 |
p. 809-818 |
artikel |
54 |
$$FC^{2}$$FC2: cloud-based cluster provisioning for distributed machine learning
|
Ta, Nguyen Binh Duong |
|
2019 |
22 |
Suppl 6 |
p. 1299-1315 |
artikel |
55 |
FDLA: Fractional Dragonfly based Load balancing Algorithm in cluster cloud model
|
Ashok Kumar, C. |
|
2018 |
22 |
Suppl 6 |
p. 1401-1414 |
artikel |
56 |
Feature selection for software effort estimation with localized neighborhood mutual information
|
Liu, Qin |
|
2018 |
22 |
Suppl 6 |
p. 6953-6961 |
artikel |
57 |
Genetic algorithm based sensor node classifications in wireless body area networks (WBAN)
|
Kalaiselvi, K. |
|
|
22 |
Suppl 6 |
p. 12849-12855 |
artikel |
58 |
Importance-based entropy measures of complex networks’ robustness to attacks
|
Jiang, Yu |
|
2018 |
22 |
Suppl 6 |
p. 3981-3988 |
artikel |
59 |
Improved group key management region based cluster protocol in cloud
|
Salma, B. Umi |
|
|
22 |
Suppl 6 |
p. 11699-11711 |
artikel |
60 |
Improving energy utilization using multi hop data aggregation with node switching in wireless sensor network
|
Sudha, L. |
|
|
22 |
Suppl 6 |
p. 12749-12757 |
artikel |
61 |
Intelligent computation techniques for optimization of the shortest path in an asynchronous network-on-chip
|
Ilamathi, K. |
|
2018 |
22 |
Suppl 6 |
p. 335-346 |
artikel |
62 |
Internet of Things: information security challenges and solutions
|
Miloslavskaya, Natalia |
|
2018 |
22 |
Suppl 6 |
p. 103-119 |
artikel |
63 |
Intuitionistic fuzzy social network position and role analysis
|
Wang, Hua |
|
|
22 |
Suppl 6 |
p. 8099-8108 |
artikel |
64 |
LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
|
Daniel, Esther |
|
2017 |
22 |
Suppl 6 |
p. 1247-1258 |
artikel |
65 |
Lightweight and universal intelligent service platform in indoor environment
|
Wan, Zheng |
|
|
22 |
Suppl 6 |
p. 9187-9198 |
artikel |
66 |
Linear and non-linear proximal support vector machine classifiers for wind speed prediction
|
Ranganayaki, V. |
|
2018 |
22 |
Suppl 6 |
p. 379-390 |
artikel |
67 |
Locating the critical slip surface in a slope stability analysis by enhanced fireworks algorithm
|
Xiao, Zeyun |
|
2017 |
22 |
Suppl 6 |
p. 719-729 |
artikel |
68 |
Map Reduce for big data processing based on traffic aware partition and aggregation
|
Venkatesh, G. |
|
|
22 |
Suppl 6 |
p. 12909-12915 |
artikel |
69 |
Masked 3D conditional generative adversarial network for rock mesh generation
|
Kuang, Ping |
|
|
22 |
Suppl 6 |
p. 15471-15481 |
artikel |
70 |
Modelling the spice parameters of SOI MOSFET using a combinational algorithm
|
Sarvaghad-Moghaddam, Moein |
|
2018 |
22 |
Suppl 6 |
p. 4683-4692 |
artikel |
71 |
M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks
|
Zhang, Zhaohui |
|
2018 |
22 |
Suppl 6 |
p. 7677-7685 |
artikel |
72 |
Multi-level dataset decomposition for parallel frequent itemset mining on a cluster of personal computers
|
Huang, Chun-Hong |
|
2018 |
22 |
Suppl 6 |
p. 2851-2863 |
artikel |
73 |
Multimodal computer image recognition based on depth neural network
|
Wang, Shan |
|
|
22 |
Suppl 6 |
p. 14819-14825 |
artikel |
74 |
Multi-objective constraint task scheduling algorithm for multi-core processors
|
Xie, Ying |
|
2018 |
22 |
Suppl 6 |
p. 953-964 |
artikel |
75 |
Multivariable bilinear subspace recursive likelihood identification for pumped storage motor
|
Xu, Zhuang |
|
2018 |
22 |
Suppl 6 |
p. 4527-4533 |
artikel |
76 |
Neural information coding on small-world spiking neuronal networks modulated by spike-timing-dependent plasticity under external noise stimulation
|
Guo, Lei |
|
2017 |
22 |
Suppl 6 |
p. 5217-5231 |
artikel |
77 |
Numerical simulation of the composite foundation of cement soil mixing piles using FLAC3D
|
Lu, Xiaohui |
|
|
22 |
Suppl 6 |
p. 7965-7974 |
artikel |
78 |
On the use of chaotic iterations to design keyed hash function
|
Lin, Zhuosheng |
|
2017 |
22 |
Suppl 6 |
p. 905-919 |
artikel |
79 |
Optimization on mixed-flow assembly u-line balancing problem
|
Wang, Ting |
|
|
22 |
Suppl 6 |
p. 8249-8257 |
artikel |
80 |
Optimizing communication performance in scale-out storage system
|
Song, Uiseok |
|
2018 |
22 |
Suppl 6 |
p. 335-346 |
artikel |
81 |
Parameter estimation of P-III distribution based on GA using rejection and interpolation mechanism
|
She, Wei |
|
2018 |
22 |
Suppl 6 |
p. 2159-2167 |
artikel |
82 |
Privacy preserving auditing protocol for remote data storage
|
Suguna, M. |
|
2018 |
22 |
Suppl 6 |
p. 6891-6898 |
artikel |
83 |
Proficient algorithms for enhancing topology control for dynamic clusters in MANET
|
Ramya, P. |
|
|
22 |
Suppl 6 |
p. 9715-9726 |
artikel |
84 |
Quantified comparative analysis of innovation and innovation based on multi orientation from the perspective of education and culture
|
Junting, Chen |
|
2018 |
22 |
Suppl 6 |
p. 4711-4718 |
artikel |
85 |
Redundant placement of phasor measurement unit using multi objective evolutionary algorithms based on modified spectral clustering
|
Rahamathullah, Nafeena |
|
|
22 |
Suppl 6 |
p. 12713-12725 |
artikel |
86 |
Registry service selection based secured Internet of Things with imperative control for industrial applications
|
Kanagaraju, P. |
|
|
22 |
Suppl 6 |
p. 12507-12519 |
artikel |
87 |
Research on agricultural products supply chain inspection system based on internet of things
|
Leng, Kaijun |
|
|
22 |
Suppl 6 |
p. 8919-8927 |
artikel |
88 |
Research on a reduced order closed-loop identification algorithms based on AIC for process with time delay
|
Zheng, Yimin |
|
|
22 |
Suppl 6 |
p. 13247-13260 |
artikel |
89 |
Research on leaf species identification based on principal component and linear discriminant analysis
|
Zhang, Lu |
|
|
22 |
Suppl 6 |
p. 7795-7804 |
artikel |
90 |
Research on precision of modular machine tool based on computer aided multi-body system method
|
Li, Hui-qin |
|
|
22 |
Suppl 6 |
p. 9145-9150 |
artikel |
91 |
Research on speech separation technology based on deep learning
|
Zhou, Yan |
|
|
22 |
Suppl 6 |
p. 8887-8897 |
artikel |
92 |
Research on the application of AVC theory in data analysis of urban affairs and planning method
|
Hou, Quanhua |
|
2017 |
22 |
Suppl 6 |
p. 5279-5292 |
artikel |
93 |
Research on the optimal cluster number of energy efficiency based on the block model of opportunistic signal
|
Wang, Tiancheng |
|
2018 |
22 |
Suppl 6 |
p. 5063-5069 |
artikel |
94 |
Research on time series data mining algorithm based on Bayesian node incremental decision tree
|
Xingrong, Sun |
|
|
22 |
Suppl 6 |
p. 10361-10370 |
artikel |
95 |
Resource allocation algorithm design of high quality of service based on chaotic neural network in wireless communication technology
|
Cui, Yongfeng |
|
|
22 |
Suppl 6 |
p. 11005-11017 |
artikel |
96 |
RETRACTED ARTICLE: A novel construction paradigm of multimedia awareness system for mobile network
|
Liu, Feng |
|
|
22 |
Suppl 6 |
p. 9697-9713 |
artikel |
97 |
RETRACTED ARTICLE: A scheme for detecting outliers using sequential adjacency among entities
|
Kathiresan, V. |
|
|
22 |
Suppl 6 |
p. 13177-13183 |
artikel |
98 |
RETRACTED ARTICLE: A voxel based morphometry approach for identifying Alzheimer from MRI images
|
Saravanakumar, S. |
|
|
22 |
Suppl 6 |
p. 14081-14089 |
artikel |
99 |
RETRACTED ARTICLE: Cloud platform wireless sensor network detection system based on data sharing
|
Xiao, Shuo |
|
|
22 |
Suppl 6 |
p. 14157-14168 |
artikel |
100 |
RETRACTED ARTICLE: Continuous user authentication based score level fusion with hybrid optimization
|
Prakash, A. |
|
|
22 |
Suppl 6 |
p. 12959-12969 |
artikel |
101 |
RETRACTED ARTICLE: Registry service selection based secured Internet of Things with imperative control for industrial applications
|
Kanagaraju, P. |
|
|
22 |
Suppl 6 |
p. 12507-12519 |
artikel |
102 |
RETRACTED ARTICLE: Researches on hybrid algorithm for moving target detection and tracking in sports video
|
Yan, Ruiqin |
|
|
22 |
Suppl 6 |
p. 3543-3552 |
artikel |
103 |
RETRACTED ARTICLE: Research on agricultural products supply chain inspection system based on internet of things
|
Leng, Kaijun |
|
|
22 |
Suppl 6 |
p. 8919-8927 |
artikel |
104 |
RETRACTED ARTICLE: Resource allocation algorithm design of high quality of service based on chaotic neural network in wireless communication technology
|
Cui, Yongfeng |
|
|
22 |
Suppl 6 |
p. 11005-11017 |
artikel |
105 |
RETRACTED ARTICLE: Smart hardware hybrid secure searchable encryption in cloud with IoT privacy management for smart home system
|
Liu, Hua |
|
|
22 |
Suppl 6 |
p. 1125-1135 |
artikel |
106 |
Routing algorithm of energy efficient wireless sensor network based on partial energy level
|
Wang, Yaning |
|
|
22 |
Suppl 6 |
p. 8629-8638 |
artikel |
107 |
Scalable top-k keyword search in relational databases
|
Xu, Yanwei |
|
2017 |
22 |
Suppl 6 |
p. 731-747 |
artikel |
108 |
Security analysis of prealigned fingerprint template using fuzzy vault scheme
|
Chitra, D. |
|
|
22 |
Suppl 6 |
p. 12817-12825 |
artikel |
109 |
Semi-Markov chain-based grey prediction-based mitigation scheme for vampire attacks in MANETs
|
Srikaanth, P. Balaji |
|
|
22 |
Suppl 6 |
p. 15541-15549 |
artikel |
110 |
Service ranking in service networks using parameters in complex networks: a comparative study
|
Zhou, Shiyuan |
|
2018 |
22 |
Suppl 6 |
p. 2921-2930 |
artikel |
111 |
Simulation of body extension motion based on dynamics virtualization
|
Wang, Yexian |
|
|
22 |
Suppl 6 |
p. 10175-10184 |
artikel |
112 |
SLAM estimation method for uncertain model noise parameters
|
Gao, Junchai |
|
|
22 |
Suppl 6 |
p. 9425-9434 |
artikel |
113 |
Smart hardware hybrid secure searchable encryption in cloud with IoT privacy management for smart home system
|
Liu, Hua |
|
2017 |
22 |
Suppl 6 |
p. 1125-1135 |
artikel |
114 |
Solving the time-dependent multi-trip vehicle routing problem with time windows and an improved travel speed model by a hybrid solution algorithm
|
Sun, Yan |
|
|
22 |
Suppl 6 |
p. 15459-15470 |
artikel |
115 |
Sparse multiband signal spectrum sensing with asynchronous coprime sampling
|
Zhao, Yijiu |
|
2018 |
22 |
Suppl 6 |
p. 4693-4702 |
artikel |
116 |
Spatial–temporal correlation dimension reduction and unsteady granger driving factor in regional varied earth surface in GIS
|
Zhu, Jin |
|
|
22 |
Suppl 6 |
p. 14669-14677 |
artikel |
117 |
Speech recognition system using enhanced mel frequency cepstral coefficient with windowing and framing method
|
Lokesh, S. |
|
|
22 |
Suppl 6 |
p. 11669-11679 |
artikel |
118 |
Stock market prediction using subtractive clustering for a neuro fuzzy hybrid approach
|
Chandar, S. Kumar |
|
|
22 |
Suppl 6 |
p. 13159-13166 |
artikel |
119 |
Stock price prediction based on error correction model and Granger causality test
|
Ning, Yang |
|
2018 |
22 |
Suppl 6 |
p. 4849-4858 |
artikel |
120 |
Systolic array multiplier for augmenting data center networks communication link
|
Subathradevi, S. |
|
|
22 |
Suppl 6 |
p. 13773-13783 |
artikel |
121 |
TASM: technocrat ARIMA and SVR model for workload prediction of web applications in cloud
|
Singh, Parminder |
|
2018 |
22 |
Suppl 6 |
p. 619-633 |
artikel |
122 |
Texture based medical image classification by using multi-scale gabor rotation-invariant local binary pattern (MGRLBP)
|
Murugappan, V. |
|
|
22 |
Suppl 6 |
p. 10979-10992 |
artikel |
123 |
The computation on $$\alpha $$α-connectedness index of uncertain graph
|
Gao, Xiulian |
|
2017 |
22 |
Suppl 6 |
p. 5691-5701 |
artikel |
124 |
The longitudinal analysis of the genetic effects on craniofacial morphology in posterior–anterior and lateral cephalograms of female twins aged from 6 to 12 years
|
Jing, Lv |
|
2018 |
22 |
Suppl 6 |
p. 4957-4969 |
artikel |
125 |
The method and application of big data mining for mobile trajectory of taxi based on MapReduce
|
Kong, Fansheng |
|
|
22 |
Suppl 6 |
p. 11435-11442 |
artikel |
126 |
The performance simulation analysis of material tribological behavior based on the machine sensing algorithm
|
Wang, Zhaoqiang |
|
2017 |
22 |
Suppl 6 |
p. 5127-5134 |
artikel |
127 |
The research of theoretical construction and effect of preschool wisdom education system in the background of big data
|
Liu, Hao |
|
|
22 |
Suppl 6 |
p. 13813-13819 |
artikel |
128 |
Track-sector-tree clustering scheme for dense wireless sensor networks
|
Naveen, J. |
|
|
22 |
Suppl 6 |
p. 12421-12428 |
artikel |
129 |
Vantage Point Latent Semantic Indexing for multimedia web document search
|
Srikanth, D. |
|
|
22 |
Suppl 6 |
p. 10587-10594 |
artikel |
130 |
Wind power generation fault diagnosis based on deep learning model in internet of things (IoT) with clusters
|
Chen, Fei |
|
|
22 |
Suppl 6 |
p. 14013-14025 |
artikel |
131 |
Word recommendation for English composition using big corpus data processing
|
Lee, Keon Myung |
|
2018 |
22 |
Suppl 6 |
p. 1911-1924 |
artikel |