|
Issue |
Title |
|
Vol 37, No 1 (2013) |
Data Stream Mining: the Bounded Rationality |
Abstract
PDF
|
João Gama |
|
Vol 39, No 4 (2015) |
Data-intensive Service Mashup based on Game theory and Hybrid Fireworks Optimization Algorithm in the Cloud |
Abstract
PDF
|
Wanchun Yang, Chenxi Zhang, Bin Mu |
|
Vol 43, No 4 (2019) |
Decision Tree Algorithm Based University Graduate Employment Trend Prediction |
Abstract
PDF
|
Fen Yang |
|
Vol 41, No 3 (2017) |
Decision Tree based Data Reconstruction for Privacy Preserving Classification Rule Mining |
Abstract
PDF
|
G. Kalyani, M.V.P. Chandra Sekhara Rao, B. Janakiramaiah |
|
Vol 37, No 3 (2013) |
Decision-Making in Determining the Level of Knowledge of Students in The Learning Process Under Uncertainty |
Abstract
PDF
|
Sh.N. Shahbazova |
|
Vol 44, No 4 (2020) |
DecisionTree for Classification and Regression: A State-of-the Art Review |
Abstract
PDF
|
Monalisa Jena, Satchidananda Dehuri |
|
Vol 45, No 7 (2021): Online-only issue |
Deep Learning Based Techniques for Sentiment Analysis: A Survey |
Abstract
PDF
|
Wael Etaiwi, Dima Suleiman, Arafat Awajan |
|
Vol 46, No 2 (2022) |
Deep Reinforcement Learning-based anomaly detection for Video Surveillance |
Abstract
PDF
|
Sabrina Aberkane, Mohamed Elarbi-Boudihir |
|
Vol 42, No 3 (2018) |
Defect Features Recognition in 3D Industrial CT Images |
Abstract
PDF
|
Haina Jiang |
|
Vol 41, No 2 (2017) |
Defense Strategies against Byzantine Attacks in a Consensus-Based Network Intrusion Detection System |
Abstract
PDF
|
Michel Toulouse, Hai Le, Cao Vien Phung, Denis Hock |
|
Vol 32, No 2 (2008) |
Demographic Analysis of Fertility Using Data Mining Tools |
Abstract
PDF
|
M. Gams, J. Krivec |
|
Vol 32, No 2 (2008) |
Demographic Pressure on the Public Pension System |
Abstract
PDF
|
J. Sambt, M. Cok |
|
Vol 39, No 3 (2015) |
Denoising Human-Motion Trajectories Captured with Ultra-Wideband Real-time Location System |
Abstract
PDF
|
Rok Piltaver, Božidara Cvetković, Boštjan Kaluža |
|
Vol 36, No 4 (2012) |
Design and Implementation of a Caching Algorithm Applicable to Mobile Clients |
Abstract
PDF
|
Pavel Bžoch, Luboš Matějka, Ladislav Pešička, Jiří Šafařík |
|
Vol 46, No 3 (2022) |
Design and implementation of a new intelligent warehouse management system based on MySQL database technology |
Abstract
PDF
|
Ying Zhang, Feng Pan |
|
Vol 39, No 4 (2015) |
Design and Implementation of Advanced Bayesian Networks with Comparative Probability |
Abstract
PDF
|
Ali Hilal Ali |
|
Vol 46, No 3 (2022) |
Design and Study of Urban Rail Transit Security System Based on Face Recognition Technology |
Abstract
PDF
|
Zhan Guo, Zuming Xiao, Roobaea Alroobaea, Abdullah M. Baqasah, Anas Althobaiti, Harsimranjit Singh Gill |
|
Vol 40, No 4 (2016) |
Design of an Asynchronous Processor with Bundled-data Implementation on a Commercial Field Programmable Gate Array |
Abstract
PDF
|
Jukiya Furushima, Masamitsu Nakajima, Hiroshi Saito |
|
Vol 43, No 2 (2019) |
Design of Intelligent English Writing Self-evaluation Auxiliary System |
Abstract
PDF
|
Man Liu |
|
Vol 44, No 1 (2020) |
Design Optimization Average-Based Algorithm |
Abstract
PDF
|
Artur Barreiros, João Barradas Cardoso |
|
Vol 37, No 2 (2013) |
Design Science Perspective on NFC Research: Review and Research Agenda |
Abstract
PDF
|
Mehmet N. Aydin, Busra Ozdenizci |
|
Vol 39, No 3 (2015) |
Designing Effective Mobile Augmented Reality Interactions |
Abstract
PDF
|
Klen Čopič Pucihar |
|
Vol 44, No 3 (2020) |
Designing Hybrid Intelligence based Recommendation Algorithms: An Experience through Machine Learning Metaphor |
Abstract
PDF
|
Arup Roy |
|
Vol 31, No 1 (2007) |
Designing New Ways for Selling Airline Tickets |
Abstract
PDF
|
M. Vukmirovic, M. Szymczak, M. Gawinecki, M. Ganzha, M. Paprzycki |
|
Vol 46, No 7 (2022): Online-only issue |
Detect and Mitigate Blockchain-Based DDoS Attacks Using Machine Learning and Smart Contracts |
Abstract
PDF
|
Yaser Issam Aljanabi, Aso Ahmed Majeed, Kamal H. Jihad, Banaz Anwer Qader |
|
376 - 400 of 1118 Items |
<< < 11 12 13 14 15 16 17 18 19 20 > >> |