default search action
Search dblp for Publications
export results for "toc:db/journals/ijcnis/ijcnis15.bht:"
@article{DBLP:journals/ijcnis/Aalsalem23, author = {Mohammed Y. Aalsalem}, title = {Mathematically Engineered Adams Optimizer for Energy Efficient and Optimal Routing Approach for the Wireless Sensor Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {3}, pages = {180--194}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i3.6244}, doi = {10.17762/IJCNIS.V15I3.6244}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Aalsalem23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdulazeezIA23, author = {Falah Amer Abdulazeez and Abdul Sttar Ismail and Rafid S. Abdulaziz}, title = {Using Gradient Descent to An Optimization Algorithm that uses the Optimal Value of Parameters (Coefficients) for a Differentiable Function}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {24--36}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5718}, doi = {10.17762/IJCNIS.V15I1.5718}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdulazeezIA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbousaberA23, author = {Inam Abousaber and Haitham Abdalla}, title = {Review of Using Technologies of Artificial Intelligence in Companies}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {217--228}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5743}, doi = {10.17762/IJCNIS.V15I1.5743}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AbousaberA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Ashabrawy23, author = {Mohamed Ashabrawy}, title = {role of Information System to measure the Cost and Performance Aware Scheduling Technique for Cloud Computing Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {83--93}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5732}, doi = {10.17762/IJCNIS.V15I1.5732}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Ashabrawy23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BarwaryJA23, author = {Mohammed Jameel Barwary and Karwan Jacksi and Adel Al{-}Zebari}, title = {Constructing a Multilingual E-Learning Ontology through Web Crawling and Scraping}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {3}, pages = {137--153}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i3.6241}, doi = {10.17762/IJCNIS.V15I3.6241}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/BarwaryJA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BawanehOAAS23, author = {Mohammad Jazi Bawaneh and Atef A. Obeidat and Obaida M. Al{-}hazaimeh and Malek Al{-}Nawashi and Amaal Rateb Shorman}, title = {An Adaptive Fractal Image Steganography Using Mandelbrot and Linear Congruent Generator}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {3}, pages = {99--112}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i3.6240}, doi = {10.17762/IJCNIS.V15I3.6240}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/BawanehOAAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ChenLYX23, author = {Yajing Chen and Yee Choy Leong and Lee Shin Yiing and Yunxia Xiao}, title = {Research on the Development and Innovative Strategy of Knowledge Payment Platform in the Internet Era}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {3}, pages = {226--242}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i3.6261}, doi = {10.17762/IJCNIS.V15I3.6261}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ChenLYX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ChenYYX23, author = {Yajing Chen and Choy Leong Yee and Lee Shin Yiing and Yunxia Xiao}, title = {Study on the Influence of Knowledge-driven Technology on predicting consumer Repurchase Behaviour}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {162--175}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5750}, doi = {10.17762/IJCNIS.V15I1.5750}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ChenYYX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ChengM23, author = {Ting Cheng and Azizan Marzuki}, title = {Research on the development of computer digital technology combined with commercial space landscape design in the theory of "design combined with nature"}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {176--193}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5720}, doi = {10.17762/IJCNIS.V15I1.5720}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ChengM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ChuH23, author = {Zichen Chu and Bo Han}, title = {Digital Engraving Digital Art Design Analysis Based on Spatial Expression Techniques}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {2}, pages = {143--158}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i2.6087}, doi = {10.17762/IJCNIS.V15I2.6087}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ChuH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/FaydheIK23, author = {Fatima Faydhe and Majida Saud Ibrahim and Kamal Y. Kamal}, title = {HaLow Wi-Fi performance in multiusers and channels environment with {MATLAB} Simulink}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {1--11}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5487}, doi = {10.17762/IJCNIS.V15I1.5487}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/FaydheIK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GKK23, author = {Sathisha G. and Subbaraya C. K and Ravikumar G. K}, title = {Vehicle Detection and Speed Estimation Using Semantic Segmentation with Low Latency}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {3}, pages = {70--85}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i3.6234}, doi = {10.17762/IJCNIS.V15I3.6234}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/GKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GNM23, author = {Prakasha G and Sunil Kumar K. N and A. S. R. Murthy}, title = {Clustering Based Energy Efficient Routing for Wireless Sensor Network Using Particle Swarm Optimization}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {3}, pages = {243--260}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i3.6268}, doi = {10.17762/IJCNIS.V15I3.6268}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/GNM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GSK23, author = {Sathisha G. and C. K. Subbaraya and Ravikumar G. K}, title = {Automated Speed and Lane Change decision-making Model using Support Vector Machine}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {3}, pages = {42--56}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i3.6222}, doi = {10.17762/IJCNIS.V15I3.6222}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/GSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GeJ23, author = {Shuqian Ge and Zhuo Jin}, title = {Research on the Application of Digital Design of Jinzuo Furniture Cultural Tourism Display Platform Based on Intangible Cultural Heritage}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {2}, pages = {1--12}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i2.5978}, doi = {10.17762/IJCNIS.V15I2.5978}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/GeJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KS23, author = {Priyanga K. K and Sabeen S}, title = {Optimization of Deep Convolutional Neural Network with the Integrated Batch Normalization and Global pooling}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {59--69}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5617}, doi = {10.17762/IJCNIS.V15I1.5617}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KaramtiA23, author = {Walid Karamti and Imad Al{-}Sgir}, title = {Intelligent agents Model with {JADE} for scheduling analysis and correction of Real-Time Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {107--119}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5762}, doi = {10.17762/IJCNIS.V15I1.5762}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KaramtiA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KrishnanRSSV23, author = {V. Gokula Krishnan and Pinagadi Venkateswara Rao and M. V. Vijaya Saradhi and K. Sathyamoorthy and V. Vijayaraja}, title = {Prediction of Alzheimer Disease using LeNet-CNN model with Optimal Adaptive Bilateral Filtering}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {12--23}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5706}, doi = {10.17762/IJCNIS.V15I1.5706}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KrishnanRSSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KrishnanSSHV23, author = {V. Gokula Krishnan and K. Sankar and M. V. Vijaya Saradhi and K. Hemapriya and V. Vijayaraja}, title = {Tom and Jerry Based Multipath Routing with Optimal K-medoids for choosing Best Clusterhead in {MANET}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {70--82}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5707}, doi = {10.17762/IJCNIS.V15I1.5707}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KrishnanSSHV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LiaoC23, author = {Linsen Liao and Xinghua Cao}, title = {Data Transmission Security and Legal Regulation in Clinical Application of Human Gene Editing from Perspective of Big Data}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {4}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i4.6345}, doi = {10.17762/IJCNIS.V15I4.6345}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/LiaoC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Liu23, author = {Dan Liu}, title = {Design of Digital Museum System Based on Optimized Virtual Reality Technology}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {194--203}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5885}, doi = {10.17762/IJCNIS.V15I1.5885}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Liu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Liu23a, author = {Shan Liu}, title = {Preserving the Integrity of Li Yu's Craft Aesthetics using the Digital Information Technology}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {4}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i4.6314}, doi = {10.17762/IJCNIS.V15I4.6314}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Liu23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LiuCYR23, author = {Huinan Liu and Feroz De Costa and Megat Al{-}lmran Bin Yasin and Qijie Ruan}, title = {An Improved and Optimized Gated Recurrent Unit and Long Short-Term Memory Model for Fake News Detection}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {4}, pages = {1--16}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i4.6283}, doi = {10.17762/IJCNIS.V15I4.6283}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/LiuCYR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LiuL23, author = {Eryong Liu and Yifei Li}, title = {Research on the implantation and dissemination strategy of short creative advertising videos in the new media era}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {146--161}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5713}, doi = {10.17762/IJCNIS.V15I1.5713}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/LiuL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LuS23, author = {Wenjie Lu and Ximing Sun}, title = {Research on Internet Technology Innovation and Information Security Challenges in New Vehicle Energy Sector}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {3}, pages = {86--98}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i3.6228}, doi = {10.17762/IJCNIS.V15I3.6228}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/LuS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MouY23, author = {Bo Mou and Xiaopei Yang}, title = {Analysis of the Role of Compliance Plan in {AI} Criminal Risk Prevention-Take {AI} Criminal Risk in Network Communication as Example}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {3}, pages = {154--167}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i3.6242}, doi = {10.17762/IJCNIS.V15I3.6242}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MouY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MusmuharamS23, author = {Musmuharam Musmuharam and Suharjito Suharjito}, title = {Detection of Distributed Denial of Service Attacks in Software Defined Networks by Using Machine Learning}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {3}, pages = {13--25}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i3.6214}, doi = {10.17762/IJCNIS.V15I3.6214}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MusmuharamS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/OmaraFKG23, author = {Mahmoud Omara and Mahmoud Fayez and Heba Khalid and Said Ghoniemy}, title = {Restrictive Voting Technique for Faces Spoofing Attack}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {204--216}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5738}, doi = {10.17762/IJCNIS.V15I1.5738}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/OmaraFKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/QinZ23, author = {Rongrong Qin and Min Zhao}, title = {Risk identification of {PPP} mode in stadiums and gymnasiums by ant colony algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {120--131}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5805}, doi = {10.17762/IJCNIS.V15I1.5805}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/QinZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SembatiNJ23, author = {Yassine Sembati and Najib Naja and Abdellah Jamali}, title = {Named Multipath Depth-First Search: An SDN-based Routing Strategy for Efficient Failure Handling and Content Delivery in {NDN}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {4}, pages = {17--29}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i4.6293}, doi = {10.17762/IJCNIS.V15I4.6293}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/SembatiNJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ShuZY23, author = {Pan Shu and Nurul Izzatul Lydia Binti Za'ba and Mohd Rashid Bin Ya'acob}, title = {Framework Design of Smart Contracts-Based Building Information Modeling Contracts Management in Material Supply Chain}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {49--58}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5737}, doi = {10.17762/IJCNIS.V15I1.5737}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ShuZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Taleb23, author = {Anas Abu Taleb}, title = {Using Minimum Connected Dominating Set for Mobile sink path planning in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {94--106}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5810}, doi = {10.17762/IJCNIS.V15I1.5810}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Taleb23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/VK23, author = {Channappa Gowda D. V and R. Kanagavalli}, title = {Video Semantic Segmentation Network with Low Latency Based on Deep Learning}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {3}, pages = {209--225}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i3.6266}, doi = {10.17762/IJCNIS.V15I3.6266}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/VK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/WuL23, author = {Ersilin Wu and Boi{-}Yee Liao}, title = {Realization of Vitality Optimization in Traditional Village Human Settlement Environment Supported by Intelligent Sensor Technology}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {4}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i4.6288}, doi = {10.17762/IJCNIS.V15I4.6288}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/WuL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/XuS23, author = {Wei Xu and Veerawat Sirivesmas}, title = {Study on Network Virtual Printing Sculpture Design using Artificial Intelligence}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {132--145}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5694}, doi = {10.17762/IJCNIS.V15I1.5694}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/XuS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/XuYP23, author = {Junping Xu and Chaemoon Yoo and Younghwan Pan}, title = {Prediction of user behavioral intentions based on structural equation modelling in {AI} painting cognitive conditions}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {1}, pages = {37--48}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i1.5788}, doi = {10.17762/IJCNIS.V15I1.5788}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/XuYP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YangGY23, author = {Aiyi Yang and Chu Hiang Goh and Lim Jing Yi}, title = {The Research into Dark Mode: {A} Systematic Review Using Two-Stage Approach and {S-O-R} Framework}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {4}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i4.6301}, doi = {10.17762/IJCNIS.V15I4.6301}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/YangGY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YangRZYHW23, author = {Yun Yang and Nur Aulia Rosni and Rosilawati Binti Zainol and Xiaohan Yang and Hang Hu and Ting Wang}, title = {Daily Activities of Elder Adults Using Optimized Deep Learning Model in China}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {3}, pages = {273--292}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i3.6270}, doi = {10.17762/IJCNIS.V15I3.6270}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/YangRZYHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YangWZ23, author = {Hongjuan Yang and Ningning Wang and Yadi Zheng}, title = {Revolutionizing the Industrialization of Buildings with {BIM} and {AI:} Factors Influencing Adoption and Development and Building Planning}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {2}, pages = {126--142}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i2.6068}, doi = {10.17762/IJCNIS.V15I2.6068}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/YangWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ZhangAXH23, author = {Shanshan Zhang and Albattat Ahmad and Heng Xu and Bing Han}, title = {Research on the Performance Strategy Choice of Low-carbon Operation of Tourism hotels from the Perspective of Network Management}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {2}, pages = {91--109}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i2.6035}, doi = {10.17762/IJCNIS.V15I2.6035}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ZhangAXH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ZhangL23, author = {Yiming Zhang and Che Ghing Lai}, title = {Impact of Social Network Sites on Developing Brand Communication in Xian City}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {3}, pages = {261--272}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i3.6269}, doi = {10.17762/IJCNIS.V15I3.6269}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ZhangL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ZhangL23a, author = {Yiming Zhang and Che Ching Lai}, title = {Optimize Urban Infrastructure Planning Based on Big Data and Enhance Xi'an's Urban Image}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {4}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i4.6337}, doi = {10.17762/IJCNIS.V15I4.6337}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ZhangL23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ZhangW23, author = {Shiyi Zhang and Song Wang}, title = {A Blockchain Framework for Preserving Music Intellectual Property Rights}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {3}, pages = {26--41}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i3.6213}, doi = {10.17762/IJCNIS.V15I3.6213}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ZhangW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.