default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 96 matches
- 2020
- Heba M. Afify, Ashraf Darwish, Kamel K. Mohammed, Aboul Ella Hassanien:
An Automated CAD System of CT Chest Images for COVID-19 Based on Genetic Algorithm and K-Nearest Neighbor Classifier. Ingénierie des Systèmes d Inf. 25(5): 589-594 (2020) - Xiuyan Bai:
A Hierarchical Model of E-Commerce Sellers Based on Data Mining. Ingénierie des Systèmes d Inf. 25(1): 119-125 (2020) - Subramanian Balaji, Yesudhas Harold Robinson, Eanoch Golden Julie:
Channel-Based Encrypted Binary Arithmetic Coding in Wireless Sensor Networks. Ingénierie des Systèmes d Inf. 25(2): 199-206 (2020) - Subramanian Balaji, Yesudhas Harold Robinson, Eanoch Golden Julie:
A Unique Data Identification System for Wireless Sensor Networks Based on Enhanced Arithmetic Coding. Ingénierie des Systèmes d Inf. 25(5): 619-627 (2020) - Bhanu Prakash Battula, Balaganesh Duraisamy:
Prediction of Hospital Re-admission Using Firefly Based Multi-layer Perceptron. Ingénierie des Systèmes d Inf. 25(4): 527-533 (2020) - Jyostna Devi Bodapati, Annepu Vijay, Naralasetti Veeranjaneyulu:
Brain Tumor Detection Using Deep Features in the Latent Space. Ingénierie des Systèmes d Inf. 25(2): 259-265 (2020) - Riyadh Bouddou, Farid Benhamida, Mekki Haba, Moussa Belgacem, Mohammed Amine Meziane:
Simulated Annealing Algorithm for Dynamic Economic Dispatch Problem in the Electricity Market Incorporating Wind Energy. Ingénierie des Systèmes d Inf. 25(6): 719-727 (2020) - Heni Bouhamed:
COVID-19, Bacille Calmette-Guérin (BCG) and Tuberculosis: Cases and Recovery Previsions with Deep Learning Sequence Prediction. Ingénierie des Systèmes d Inf. 25(2): 165-172 (2020) - Samir Bouldjadj, Zibouda Aliouat:
High Throughput and Thermal Aware Routing Protocol (HTTRP) for Wireless Body Area Networks. Ingénierie des Systèmes d Inf. 25(1): 41-48 (2020) - Suneetha Bulla, Venkata Rami Reddy Chirra, Panguluri Padmavathi, Turaka Padmasri:
Analytical Evaluation of Resource Estimation in Web Application Services. Ingénierie des Systèmes d Inf. 25(5): 683-690 (2020) - Suvarna Buradagunta, Jyostna Devi Bodapati, Nirupama Bhat Mundukur, Shaik Salma:
Performance Comparison of Sorting Algorithms with Random Numbers as Inputs. Ingénierie des Systèmes d Inf. 25(1): 113-117 (2020) - Zhongqiu Cao:
Classification of Digital Teaching Resources Based on Data Mining. Ingénierie des Systèmes d Inf. 25(4): 521-526 (2020) - Samir Chabbi, Rachid Boudour, Fouzi Semchedine:
A Secure Cloud Password and Secure Authentication Protocol for Electronic NFC Payment Between ATM and Smartphone. Ingénierie des Systèmes d Inf. 25(2): 139-152 (2020) - Fei Chen, Rui Cheng, Yayun Zhu, Siwei Miao, Liang Zhou:
An Intrusion Detection Method for Enterprise Network Based on Backpropagation Neural Network. Ingénierie des Systèmes d Inf. 25(3): 377-382 (2020) - Ajaegbu Chigozirim, Vivian O. Nwaocha, Nzenwata Uchenna, Adesegun Oreoluwa:
A Patient Monitoring System Using Internet of Things Technology. Ingénierie des Systèmes d Inf. 25(3): 351-357 (2020) - Ahmet Çinar, Muhammed Yildirim:
Classification of Malaria Cell Images with Deep Learning Architectures. Ingénierie des Systèmes d Inf. 25(1): 35-39 (2020) - Ligang Cong, Huamin Yang, Yanghui Wang:
Routing Algorithm for Delay-Tolerant Network Based on Price Game. Ingénierie des Systèmes d Inf. 25(1): 131-137 (2020) - Fengwei Dai:
A Data Management Strategy for Property Management Information System Based on the Internet of Things. Ingénierie des Systèmes d Inf. 25(3): 337-343 (2020) - Nalabala Deepika, Mundukur Nirupamabhat:
An Optimized Machine Learning Model for Stock Trend Anticipation. Ingénierie des Systèmes d Inf. 25(6): 783-792 (2020) - Joy Dhar, Asoke Kumar Jodder:
An Effective Recommendation System to Forecast the Best Educational Program Using Machine Learning Classification Algorithms. Ingénierie des Systèmes d Inf. 25(5): 559-568 (2020) - Yasser Abd Djawad, Hamza Ur Rehman, Oslan Jumadi, Muhammad Tufail, Shahzad Anwar, Nathalie Bourgougnon:
Discrimination of Nitrogen Concentration of Fertilized Corn with Extracted Algae and Polymer Based on Its Leaf Color Images. Ingénierie des Systèmes d Inf. 25(3): 303-309 (2020) - Anjelus Doni, Thankappan Sasipraba:
LSTM-RNN Based Approach for Prediction of Dengue Cases in India. Ingénierie des Systèmes d Inf. 25(3): 327-335 (2020) - Min Du, Danlei Du:
Incentive Mechanism for P2P Networks Based on Feature Weighting and Game Theory. Ingénierie des Systèmes d Inf. 25(1): 93-100 (2020) - Amrul Faruq, Hudan Pandu Arsa, Shamsul Faisal Mohd Hussein, Che Munira Che Razali, Aminaton Marto, Shahrum Shah Abdullah:
Deep Learning-Based Forecast and Warning of Floods in Klang River, Malaysia. Ingénierie des Systèmes d Inf. 25(3): 365-370 (2020) - Samir Fenanir, Fouzi Semchedine, Saad Harous, Abderrahmane Baadache:
A Semi-supervised Deep Auto-encoder Based Intrusion Detection for IoT. Ingénierie des Systèmes d Inf. 25(5): 569-577 (2020) - Juan Geng, Liang Yan, Yichao Liu:
A Novel Log-Based Tensor Completion Algorithm. Ingénierie des Systèmes d Inf. 25(2): 153-163 (2020) - Prashanti Guttikonda, Nirupama Bhat Mundukur:
Secret Sharing with Reduced Share Size and Data Integrity. Ingénierie des Systèmes d Inf. 25(2): 227-237 (2020) - Fairouz Hadi, Zibouda Aliouat, Sarra Hammoudi:
Efficient Platform as a Service (PaaS) Model on Public Cloud for CBIR System. Ingénierie des Systèmes d Inf. 25(2): 215-225 (2020) - Yongda Hu, Xiyuan Li:
An Evaluation Model of Comprehensive Human Resources Quality of Financial Enterprises Based on Deep Neural Network. Ingénierie des Systèmes d Inf. 25(5): 629-636 (2020) - Mohammed Hussain, Balaganesh Duraisamy:
Preventing Malicious Packet Drops in MANETs by Counter Based Authenticated Acknowledgement. Ingénierie des Systèmes d Inf. 25(2): 173-181 (2020)
skipping 66 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-21 04:50 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint