Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 60 matches
- 2019
- Pandian Vasant, Ivan Zelinka, Gerhard-Wilhelm Weber:
Intelligent Computing & Optimization, ICO 2018, Pattaya, Thailand, 4-5 October, 2018. Advances in Intelligent Systems and Computing 866, Springer 2019, ISBN 978-3-030-00978-6 [contents] - 2018
- Khalid Abdulrahman, Abdulghani Ali Ahmed, Muamer N. Mohammed:
Investigation Model for Locating Data Remnants on Cloud Storage. ICO 2018: 246-256 - B. Bazeer Ahamed, D. Yuvaraj:
Framework for Faction of Data in Social Network Using Link Based Mining Process. ICO 2018: 300-309 - Ahmad Salah Al-Ahmad, Hasan Kahtan:
Fuzz Test Case Generation for Penetration Testing in Mobile Cloud Computing Applications. ICO 2018: 267-276 - Lamia Alam, Mohammed Moshiul Hoque:
Vision-Based Driver's Attention Monitoring System for Smart Vehicles. ICO 2018: 196-209 - Kamal Mohammed Alhendawi, Ala Aldeen Al-Janabi:
An Intelligent Expert System for Management Information System Failure Diagnosis. ICO 2018: 257-266 - Mohammed Hasan Ali, Mohamed Fadli Bin Zolkipli:
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System. ICO 2018: 146-157 - Tun Myat Aung, Kaung Htet Myint, Ni Ni Hla:
A Data Confidentiality Approach to SMS on Android. ICO 2018: 505-514 - Ayoob Azeez Ayoob, Gang Su, Muamer N. Mohammed:
Vehicular Ad Hoc Network: An Intensive Review. ICO 2018: 158-167 - Anan Banharnsakun:
Artificial Bee Colony Algorithm for Solving the Knight's Tour Problem. ICO 2018: 129-138 - Cinzia Bellone, Vasiliki Geropanta:
The 'Smart' as a Project for the City Smart Technologies for Territorial Management Planning Strategies. ICO 2018: 66-75 - Cinzia Bellone, Pietro Ranucci, Vasiliki Geropanta:
The 'Governance' for Smart City Strategies and Territorial Planning. ICO 2018: 76-86 - Mohammed Tarik Benmessaoud, A. Boudghene Stambouli, Pandian Vasant, S. Flazi, H. Koinuma, Mustapha Tioursi:
New Smart Power Management Hybrid System Photovoltaic-Fuel Cell. ICO 2018: 476-486 - Kalpesh Borse, Prasit G. Agnihotri:
Prediction of Crop Yields Based on Fuzzy Rule-Based System (FRBS) Using the Takagi Sugeno-Kang Approach. ICO 2018: 438-447 - Dmitry Budnikov, Alexey N. Vasilyev:
The Model of Optimization of Grain Drying with Use of Eletroactivated Air. ICO 2018: 139-145 - Sunarin Chanta, Ornurai Sangsawang:
A Single Allocation P-Hub Maximal Covering Model for Optimizing Railway Station Location. ICO 2018: 522-530 - Phuc Do, Phu Pham, Trung Phan, Thuc Nguyen:
T-MPP: A Novel Topic-Driven Meta-path-Based Approach for Co-authorship Prediction in Large-Scale Content-Based Heterogeneous Bibliographic Network in Distributed Computing Framework by Spark. ICO 2018: 87-97 - Nishant Doshi:
Analysis of Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid of IoT. ICO 2018: 515-521 - Ahmed Mohammed Fahad, Abdulghani Ali Ahmed, Abdullah Hussein Al-Ghushami, Sameer Alani:
Detection of Black Hole Attacks in Mobile Ad Hoc Networks via HSA-CBDS Method. ICO 2018: 46-55 - Ahmed Mohammed Fahad, Abdulghani Ali Ahmed, Mohd Nizam Mohmad Kahar:
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing. ICO 2018: 56-65 - Wan Nor Ashikin Wan Ahmad Fatthi, Mea Haslina Mohd Haris, Hasan Kahtan:
Application of Travelling Salesman Problem for Minimizing Travel Distance of a Two-Day Trip in Kuala Lumpur via Go KL City Bus. ICO 2018: 277-284 - Diriba Kajela Geleta, Mukhdeep Singh Manshahia:
Optimization of Hybrid Wind and Solar Renewable Energy System by Iteration Method. ICO 2018: 98-107 - Kaoutar Ghazi, Laurent Beaudou, Olivier Raynaud:
Algorithms for a Bit-Vector Encoding of Trees. ICO 2018: 418-427 - Ashish Guruji, Prasit G. Agnihotri:
Land Use Land Cover Analysis of Khapri Watershed in Dang District Using Remote Sensing (RS) and Geographical Information System (GIS). ICO 2018: 448-454 - Tham Vo Thi Hong, Phuc Do:
SAR: A Graph-Based System with Text Stream Burst Detection and Visualization. ICO 2018: 35-45 - Sabir Hossain, Abdur Razzaq Fayjie, Doukhi Oualid, Deok-Jin Lee:
CAIAS Simulator: Self-driving Vehicle Simulator for AI Research. ICO 2018: 187-195 - Valeriy Kharchenko, Boris Nikitin, Pavel Tikhonov, Vladimir Panchenko, Pandian Vasant:
Evaluation of the Silicon Solar Cell Parameters. ICO 2018: 328-336 - P. K. Kumar, S. Nandagopalan, L. N. Swamy:
Investigation of Emotions on Purchased Item Reviews Using Machine Learning Techniques. ICO 2018: 409-417 - Pavel Kuznetsov, Leonid Yuferev:
Feature of Operation PV Installations with Parallel and Mixed Commutation Photocells. ICO 2018: 231-238 - Gilberto Pérez Lechuga, Francisco Martínez Sánchez:
Modeling and Optimization of Flexible Manufacturing Systems: A Stochastic Approach. ICO 2018: 539-546
skipping 30 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-05 06:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint