Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 107 matches
- 2020
- Alhusain Abdalla, Nouraldeen Ahmed, Sarada Dakua, Shidin Balakrishnan, Julien Abinahed:
A Surgical-Oriented Liver Segmentation Approach Using Deep Learning. ICIoT 2020: 318-322 - Mohamed Abdou, Abdelkarim Erradi:
Crowd Counting: A Survey of Machine Learning Approaches. ICIoT 2020: 48-54 - Eman Mohamed H. Abouzohri, Mohamed M. Abdallah:
Performance of Hybrid Cognitive RF/VLC Systems in Vehicle-to-Vehicle Communications. ICIoT 2020: 429-434 - Abdularahman Hasan Abunada, Ahmed Yousif Osman, Amith Khandakar, Muhammad Enamul Hoque Chowdhury, Tamer Khattab, Farid Touati:
Design and Implementation of a RF Based Anti-Drone System. ICIoT 2020: 35-42 - Najoua Achoura, Ridha Bouallegue:
Downlink user selection for massive-MIMO-OFDM systems using ZF precoding. ICIoT 2020: 351-354 - Sabbir H. M. Ahmad, Nader Meskin:
Cyber Attack Detection for a Nonlinear Binary Crude Oil Distillation Column. ICIoT 2020: 212-218 - Maroua Ahmid, Okba Kazar, Saber Benharzallah, Laïd Kahloul, Abdelhak Merizig:
An Intelligent and Secure Health Monitoring System Based on Agent. ICIoT 2020: 291-296 - Younes Akbari, Hanadi Hassen, Nandhini Subramanian, Jayakanth Kunhoth, Somaya Al-Máadeed, Wael K. M. Alhajyaseen:
A vision-based zebra crossing detection method for people with visual impairments. ICIoT 2020: 118-123 - Muhammed Samir Al-Ali, Hasan Abbas Al-Mohammed, Mahdi Alkaeed:
Reputation Based Traffic Event Validation and Vehicle Authentication using Blockchain Technology. ICIoT 2020: 451-456 - Sara Al-Emadi, Felwa Al-Senaid:
Drone Detection Approach Based on Radio-Frequency Using Convolutional Neural Network. ICIoT 2020: 29-34 - Sara Al-Emadi, Aisha Al-Mohannadi, Felwa Al-Senaid:
Using Deep Learning Techniques for Network Intrusion Detection. ICIoT 2020: 171-176 - Eman Al-Fadala, Fodil Fadli:
Smart City Applications: Promoting comfort, health and well-being through Sustainable Smart Urban Design (S2UD) in Msheireb Downtown. ICIoT 2020: 254-261 - Amena Jassim Al-Haider, Sakina Mansour Al-Sharshani, Hamean Salem Al-Sheraim, Nandhini Subramanian, Somaya Al-Máadeed, Mohamed Zied Chaari:
Smart Medicine Planner for Visually Impaired People. ICIoT 2020: 361-366 - Mohammed A. Al-Hitmi, Atif Iqbal, S. Rahman, Pandav Kiran Maroti, Mohammad Meraj, Hassan Mehrjerdi:
A Dual Active Bridge based Wireless Power Transfer System for EV Battery Charging Controlled Using High Speed FPGA. ICIoT 2020: 372-376 - Noora Al-Maslamani, Mohamed M. Abdallah:
Malicious Node Detection in Wireless Sensor Network using Swarm Intelligence Optimization. ICIoT 2020: 219-224 - Sara Al-Rasbi, Tamer Elsayed:
Can We Build a Search Engine over Spark? ICIoT 2020: 345-350 - Lina Al-Sahan, Fatima Al-Jabiri, Nora Abdelsalam, Amr Mohamed, Tarek Elfouly, Mohamed Abdallah:
Public Security Surveillance System Using Blockchain Technology and Advanced Image Processing Techniques. ICIoT 2020: 104-111 - Khaled A. Al-Thelaya, Tamim S. Al-Nethary, Emad Y. Ramadan:
Social Networks Spam Detection Using Graph-Based Features Analysis and Sequence of Interactions Between Users. ICIoT 2020: 206-211 - Mariam Al Ali AlMaadeed, Deepalekshmi Ponnamma:
Role of Research and Higher Education on Industry 4.0, Material Science as an example. ICIoT 2020: 435-439 - Noora AlNaimi, Uvais Qidwai:
IoT Based on-the-fly Visual Defect Detection in Railway Tracks. ICIoT 2020: 627-631 - Amal AlQamash, Saleh Alhazbi:
Machine Learning Approach for Detecting News Agencies' Linguistic Style in Arabic. ICIoT 2020: 504-510 - Abdullatif Albaseer, Bekir Sait Ciftler, Mohamed M. Abdallah:
Performance Evaluation of Physical Attacks against E2E Autoencoder over Rayleigh Fading Channel. ICIoT 2020: 177-182 - Alkhzami Alharami, Yin Yang, Dena Al-Thani, Chen Shoushun, Amine Bermak:
Early Image Detection Using Event Based Vision. ICIoT 2020: 146-149 - Saleh S. Alhazbi, Ahmed Ben Said, Alanoud Al-Maadid:
Using Deep Learning to Predict Stock Movements Direction in Emerging Markets: The Case of Qatar Stock Exchange. ICIoT 2020: 440-444 - Mohamed A. Ali, Ali Jaoua, Somaya Ali Al-Máadeed:
A novel Conceptual Machine Learning Method using Random Conceptual Decomposition. ICIoT 2020: 18-22 - Mohammad Al Ja'afreh, Somaya Al-Máadeed, Jihad M. Alja'am, Abdulmotaleb El-Saddik:
Towards a Comprehensive Study of Fatigue Deducing Techniques for Evaluating the Quality of Experience of Haptic-Visual Applications. ICIoT 2020: 339-344 - Mhd Saria Allahham, Tamer Khattab, Amr Mohamed:
Deep Learning for RF-Based Drone Detection and Identification: A Multi-Channel 1-D Convolutional Neural Networks Approach. ICIoT 2020: 112-117 - Hajar Saif Alsaadi, Rachid Hedjam, Abderezak Touzene, Abdelhamid Abdessalem:
Fast Binary Network Intrusion Detection based on Matched Filter Optimization. ICIoT 2020: 195-199 - Lina Alsahan, Noureddine Lasla, Mohamed Abdallah:
Local Bitcoin Network Simulator for Performance Evaluation using Lightweight Virtualization. ICIoT 2020: 355-360 - Sara Amin, Tooba Salahuddin, Abdelaziz Bouras:
Cyber Physical Systems and Smart Homes in Healthcare: Current State and Challenges. ICIoT 2020: 302-309
skipping 77 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-05 04:33 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint