|
Issue |
Title |
|
Vol 42, No 3 (2018) |
Defect Features Recognition in 3D Industrial CT Images |
Abstract
PDF
|
Haina Jiang |
|
Vol 41, No 2 (2017) |
Defense Strategies against Byzantine Attacks in a Consensus-Based Network Intrusion Detection System |
Abstract
PDF
|
Michel Toulouse, Hai Le, Cao Vien Phung, Denis Hock |
|
Vol 32, No 2 (2008) |
Demographic Analysis of Fertility Using Data Mining Tools |
Abstract
PDF
|
M. Gams, J. Krivec |
|
Vol 32, No 2 (2008) |
Demographic Pressure on the Public Pension System |
Abstract
PDF
|
J. Sambt, M. Cok |
|
Vol 39, No 3 (2015) |
Denoising Human-Motion Trajectories Captured with Ultra-Wideband Real-time Location System |
Abstract
PDF
|
Rok Piltaver, Božidara Cvetković, Boštjan Kaluža |
|
Vol 47, No 7 (2023): Online-only issue |
Derivation of Optimized Threshold of Semantic Alignment Metrics for Intepretation of Interoperability and Reusability of Cross-enterprise Vehicle Service Interface Models |
Abstract
PDF
|
Sangita De, Premek Brada, Juergen Mottok |
|
Vol 47, No 7 (2023): Online-only issue |
Design and Application of Neural Network-based Bp Algorithm in Speech Translation Robot |
Abstract
PDF
|
Yuhan Jie |
|
Vol 47, No 2 (2023) |
Design and Development of Mobile Terminal Application Based on Android |
Abstract
PDF
|
Wen Yang, Ming Zhan, Zhijun Huang, Wei Sha |
|
Vol 36, No 4 (2012) |
Design and Implementation of a Caching Algorithm Applicable to Mobile Clients |
Abstract
PDF
|
Pavel Bžoch, Luboš Matějka, Ladislav Pešička, Jiří Šafařík |
|
Vol 46, No 3 (2022) |
Design and implementation of a new intelligent warehouse management system based on MySQL database technology |
Abstract
PDF
|
Ying Zhang, Feng Pan |
|
Vol 39, No 4 (2015) |
Design and Implementation of Advanced Bayesian Networks with Comparative Probability |
Abstract
PDF
|
Ali Hilal Ali |
|
Vol 46, No 3 (2022) |
Design and Study of Urban Rail Transit Security System Based on Face Recognition Technology |
Abstract
PDF
|
Zhan Guo, Zuming Xiao, Roobaea Alroobaea, Abdullah M. Baqasah, Anas Althobaiti, Harsimranjit Singh Gill |
|
Vol 40, No 4 (2016) |
Design of an Asynchronous Processor with Bundled-data Implementation on a Commercial Field Programmable Gate Array |
Abstract
PDF
|
Jukiya Furushima, Masamitsu Nakajima, Hiroshi Saito |
|
Vol 47, No 2 (2023) |
Design of Ecological Land Remediation Planning and Remediation Mode Based on Spatial Clustering Algorithm |
Abstract
PDF
|
Yuzhuo Yao |
|
Vol 43, No 2 (2019) |
Design of Intelligent English Writing Self-evaluation Auxiliary System |
Abstract
PDF
|
Man Liu |
|
Vol 44, No 1 (2020) |
Design Optimization Average-Based Algorithm |
Abstract
PDF
|
Artur Barreiros, João Barradas Cardoso |
|
Vol 37, No 2 (2013) |
Design Science Perspective on NFC Research: Review and Research Agenda |
Abstract
PDF
|
Mehmet N. Aydin, Busra Ozdenizci |
|
Vol 47, No 10 (2023): Online-only issue |
Designing A Blockchain Approach to Secure Firefighting Stations Based Internet of Things |
Abstract
PDF
|
Samaher Ahmed Yousiff, Raad A Muhajjar, Mishall H Al-Zubaidie |
|
Vol 47, No 3 (2023) |
Designing A Permissioned Blockchain Network For The Insurance Claim Process Using Hyperledger Fabric And Composer |
Abstract
PDF
|
Archana Hombalimath, Neha Mangla, Arun Balodi |
|
Vol 39, No 3 (2015) |
Designing Effective Mobile Augmented Reality Interactions |
Abstract
PDF
|
Klen Čopič Pucihar |
|
Vol 44, No 3 (2020) |
Designing Hybrid Intelligence based Recommendation Algorithms: An Experience through Machine Learning Metaphor |
Abstract
PDF
|
Arup Roy |
|
Vol 31, No 1 (2007) |
Designing New Ways for Selling Airline Tickets |
Abstract
PDF
|
M. Vukmirovic, M. Szymczak, M. Gawinecki, M. Ganzha, M. Paprzycki |
|
Vol 46, No 7 (2022): Online-only issue |
Detect and Mitigate Blockchain-Based DDoS Attacks Using Machine Learning and Smart Contracts |
Abstract
PDF
|
Yaser Issam Aljanabi, Aso Ahmed Majeed, Kamal H. Jihad, Banaz Anwer Qader |
|
Vol 47, No 9 (2023): Online-only issue |
Detecting Breast Cancer in X-RAY images using image segmentation algorithm and neural networks |
Abstract
PDF
|
Rasha Talib Gdeeb |
|
Vol 47, No 2 (2023) |
Detecting Temporal and Spatial Anomalies in Users’ Activities for Security Provisioning in Computer Networks |
Abstract
PDF
|
Aleks Huč |
|
451 - 475 of 1274 Items |
<< < 14 15 16 17 18 19 20 21 22 23 > >> |