default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 268 matches
- 2024
- Xudong Cao, Chenchen Chen, Lejia Zhang, Li Pan:
Estimation and Convergence Analysis of Traffic Structure Efficiency Based on an Undesirable Epsilon-Based Measure Model. Int. J. Inf. Technol. Syst. Approach 17(1): 1-25 (2024) - Tianlong Wang, Chaoyang Wang, Zhiqiang Liu, Shuai Ma, Huibo Yan:
Experiment Study and Industrial Application of Slotted Bluff-Body Burner Applied to Deep Peak Regulation. Int. J. Inf. Technol. Syst. Approach 17(1): 1-15 (2024) - 2023
- Wenbo Bai, Huajun Ran:
Optimization of Cogging Torque Based on the Improved Bat Algorithm. Int. J. Inf. Technol. Syst. Approach 16(2): 1-19 (2023) - Charity Yaa Mansa Baidoo, Winfred Yaokumah, Ebenezer Owusu:
Estimating Overhead Performance of Supervised Machine Learning Algorithms for Intrusion Detection. Int. J. Inf. Technol. Syst. Approach 16(1): 1-19 (2023) - Wanjun Chang, Yangbo Li, Qidong Du:
Microblog Emotion Analysis Using Improved DBN Under Spark Platform. Int. J. Inf. Technol. Syst. Approach 16(2): 1-16 (2023) - Jingjing Chen:
Intelligent System of Internet of Things-Oriented BIM in Project Management. Int. J. Inf. Technol. Syst. Approach 16(3): 1-14 (2023) - Bo Dong, Ting-jin Sha, Hou-ying Song, Hou-kai Zhao, Jian Shang:
Fault Analysis Method of Active Distribution Network Under Cloud Edge Architecture. Int. J. Inf. Technol. Syst. Approach 16(3): 1-16 (2023) - Ruiyun Duan:
An Empirical Study on the Landscape of Mining and Mineral Processing (MMP) With Big Data. Int. J. Inf. Technol. Syst. Approach 16(2): 1-22 (2023) - Xingliang Fan:
Artificial Intelligence Technology-Based Semantic Sentiment Analysis on Network Public Opinion Texts. Int. J. Inf. Technol. Syst. Approach 16(2): 1-14 (2023) - Ying Fan:
Dynamic Interaction and Visualization Design of Database Information Based on Artificial Intelligence. Int. J. Inf. Technol. Syst. Approach 16(3): 1-13 (2023) - Xingliang Fan, Ruimei Yang:
A Network Intrusion Detection Method Based on Improved Bi-LSTM in Internet of Things Environment. Int. J. Inf. Technol. Syst. Approach 16(3): 1-14 (2023) - Yan Huang, Minmin Li:
Design of Health Healing Lighting in a Medical Center Based on Intelligent Lighting Control System. Int. J. Inf. Technol. Syst. Approach 16(1): 1-15 (2023) - Jing Huang, Keyu Ma:
SRU-based Multi-angle Enhanced Network for Semantic Text Similarity Calculation of Big Data Language Model. Int. J. Inf. Technol. Syst. Approach 16(2): 1-20 (2023) - Yan Huang, Zhihui Xiao:
The Analysis of the Artistic Innovation of LED Lighting in Gymnasiums Based on Intelligent Lighting Control Systems. Int. J. Inf. Technol. Syst. Approach 16(3): 1-13 (2023) - Yan Huang, Yongfeng Zhang:
Design of Healthcare Lighting in Medical Centers Based on Power Carrier Communication. Int. J. Inf. Technol. Syst. Approach 16(3): 1-14 (2023) - Yanli Jia:
BTCBMA Online Education Course Recommendation Algorithm Based on Learners' Learning Quality. Int. J. Inf. Technol. Syst. Approach 16(1): 1-17 (2023) - Yanli Jia:
Attention-Based Time Sequence and Distance Contexts Gated Recurrent Unit for Personalized POI Recommendation. Int. J. Inf. Technol. Syst. Approach 16(2): 1-14 (2023) - Guiwen Jiang:
Security Detection Design for Laboratory Networks Based on Enhanced LSTM and AdamW Algorithms. Int. J. Inf. Technol. Syst. Approach 16(2): 1-13 (2023) - Lei Jiang:
Information Visualization Based on Visual Transmission and Multimedia Data Fusion. Int. J. Inf. Technol. Syst. Approach 16(3): 1-14 (2023) - Jiajia Jiao, Bo Chen:
A GCN- and Deep Biaffine Attention-Based Classification Model for Course Review Sentiment. Int. J. Inf. Technol. Syst. Approach 16(2): 1-18 (2023) - Min Jin:
Computer Network Information Security and Protection Strategy Based on Big Data Environment. Int. J. Inf. Technol. Syst. Approach 16(2): 1-14 (2023) - Minyan Jin:
Enterprise Collaboration Optimization in China Based on Supply Chain Resilience Enhancement: A PLS-ANN Method. Int. J. Inf. Technol. Syst. Approach 16(1): 1-18 (2023) - Zheng Kang, Hui Liu:
Social Welfare-Based Task Assignment in Mobile Crowdsensing. Int. J. Inf. Technol. Syst. Approach 16(3): 1-28 (2023) - Tianming Lan, Lei Guo:
Discovery of User Groups Densely Connecting Virtual and Physical Worlds in Event-Based Social Networks. Int. J. Inf. Technol. Syst. Approach 16(2): 1-23 (2023) - Ying Li:
Design of Library Archives Information Management Systems Based on Artificial Intelligence and Multimedia Technology. Int. J. Inf. Technol. Syst. Approach 16(3): 1-17 (2023) - Naigen Li:
The Construction of a Fire Monitoring System Based on Multi-Sensor and Neural Network. Int. J. Inf. Technol. Syst. Approach 16(3): 1-12 (2023) - Qiang Li:
Prediction of Ultimate Bearing Capacity of Oil and Gas Wellbore Based on Multi-Modal Data Analysis in the Context of Machine Learning. Int. J. Inf. Technol. Syst. Approach 16(3): 1-13 (2023) - Ning Li, Jingcai Lu, Xu Cheng, Zhi Tian:
Target Tracking Method for Transmission Line Moving Operation Based on Inspection Robot and Edge Computing. Int. J. Inf. Technol. Syst. Approach 16(3): 1-15 (2023) - Han Li, Zhenxiong Liu, Jixiang Niu, Zhongguo Yang, Sikandar Ali:
Trend-Aware Data Imputation Based on Generative Adversarial Network for Time Series. Int. J. Inf. Technol. Syst. Approach 16(3): 1-17 (2023) - Daren Li, Jie Shen, Jiarui Dai, Yifan Xia:
The Analysis of a Power Information Management System Based on Machine Learning Algorithm. Int. J. Inf. Technol. Syst. Approach 16(3): 1-14 (2023)
skipping 238 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-17 01:24 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint