


default search action
International Journal of Information and Communication Technology, Volume 17
Volume 17, Number 1, 2020
- Bai Yun, Wandong Cai:

Trust circle recommended model based on different fields. 1-21 - Yucai Zhou, Zhimin Lv, Yuelin Li, Jiangchun Mo:

Research on highway vehicle detection algorithm based on video image. 22-36 - Chiyu Pan:

Parallel mining method for symbol application features of complex network images. 37-52 - Li Li, Ya-fang Zhai, Hong-jie Li:

Research on improved modulation routing and spectrum allocation algorithm in elastic optical networks. 53-64 - Vivekanand Jha

, Amar Kumar Mohapatra, Nupur Prakash:
An energy efficient and load balanced sink mobility for wireless sensor networks. 65-90 - Bin Dai:

Research on security monitoring system for wind-solar complementary power generation based on internet of things. 91-106
Volume 17, Number 2, 2020
- Yingjie Wang, Kuanjiu Zhou, Jie Pan, Mingchu Li:

Interrupt nesting method based on time slice in embedded software. 107-128 - Zohra Hmidi, Laid Kahloul, Saber Benharzallah

:
Using priced timed automata for the specification and verification of CSMA/CA in WSNs. 129-145 - Pu Chuan Hsian

, Ezra Morris Abraham Gnanamuthu, Fook Loong Lo, Mau-Luen Tham
:
Reduced complexity per-survivor iterative timing recovery using max-log-MAP algorithm. 146-163 - Shu Xu:

Research on anomaly detection method for hybrid big data subarea based on ant colony algorithm. 164-177 - Lishou Zhang, Yiyi Liu, Shaojun Shen:

Construction of performance monitoring model for cloud computing service platform based on label technology. 178-193 - Xiaofeng Liu:

Symbolic feature extraction of art graphics based on time constraint. 194-209
Volume 17, Number 3, 2020
- Jianfeng Che, Bo Wang, Shitao Chen:

Analysis of data mining method for short-term wind measurement of wind farm based on multi-technology fusion. 211-225 - Tianming Feng, Lin Chen, Dahang Fan:

Network teaching target classification system based on cloud computing technology. 226-241 - Chao-sheng Han:

Modelling the impact of communication technology on e-commerce operation mode. 242-256 - Hao Yang, Wen Cai, Yibo Xia, Wenhua Ouyang, Xin Xie:

Identity authentication system for mobile terminal equipment based on SDN network. 257-273 - Tu-Trinh Thi Nguyen

, Dinh-Thuan Do:
Impact of co-channel interference on performance of power domain-based multiple access. 274-287 - Guiming Zhu:

Research on detection method of abnormal capital transfer in electronic commerce based on machine learning. 288-305
Volume 17, Number 4, 2020
- Savita, D. K. Lobiyal:

Inter-contact delay and location information-based routing with adaptive threshold buffer management for delay tolerant networks. 307-328 - Xiang Sun, Qianmu Li:

Research on automatic annotation of pathological image detail information based on machine learning. 329-342 - Mridusmita Sharma

, Kandarpa Kumar Sarma:
Deep features-based dialect and mood recognition using Assamese telephonic speech. 343-363 - Minh-Sang Van Nguyen

, Thi-Anh Hoang, Dinh-Thuan Do:
MISO assisted multiple access by removing orthogonal: enabling D2D transmission and performance analysis. 364-379 - Ahmed Ghenabzia, Okba Kazar

, Abdelhak Merizig
, Zaoui Sayah, Merouane Zoubeidi:
Multi-agent approach for data mining-based bagging ensembles to improve the decision process for big data. 380-402 - Rosy Swami, Prodipto Das

:
An effective secure data retrieval approach using trust evaluation: HBSEE-CBC. 403-421

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














