![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 235 matches
- 2005
- Hassan Baghgar Bostan Abad, Ali Yazdian Varjani, Taheri Asghar:
Using Fuzzy Controller in Induction Motor Speed Control with Constant Flux. WEC (5) 2005: 307-310 - Ibrahim Abu-Alshaikh:
A New Iterative Method for Solving Nonlinear Equations. WEC (5) 2005: 190-193 - Mustafa A. Abusalah, John Tait, Michael P. Oakes:
Literature Review of Cross Language Information Retrieval. WEC (2) 2005: 175-177 - Olivier Adam, Maciej Lopatka, Christophe Laplanche, Jean-François Motsch:
Sperm Whale Signal Analysis: Comparison Using the AutoRegressive Model and the Daubechies 15 Wavelets Transform. WEC (2) 2005: 188-195 - Wael Adi, Khaled E. A. Negm, Ali Mabrouk, Heykel Ghraieb:
Authenticated Mobile Device Proxy Service. WEC (5) 2005: 114-119 - Kamil R. Aida-zade, Cemal Ardil:
The Feedback Control for Distributed Systems. IEC (Prague) 2005: 318-320 - Kawtar Benghazi Akhlaki, Manuel I. Capel Tuñón:
Combining the Description Features of UMLRT and CSP+T Specifications Applied to a Complete Design of Real- Time Systems. IEC (Prague) 2005: 193-198 - Ahmed Al-Ani:
Ant Colony Optimization for Feature Subset Selection. WEC (2) 2005: 35-38 - Mothd Belal Al-Daoud:
A New Algorithm for Cluster Initialization. WEC (2) 2005: 74-76 - Ahmad T. Al-Taani:
An Expert System for Car Failure Diagnosis. IEC (Prague) 2005: 457-560 - Ahmad T. Al-Taani, Noor Aldeen K. Al-Awad:
A Comparative Study of Web-pages Classification Methods using Fuzzy Operators Applied to Arabic Web-pages. IEC (Prague) 2005: 33-35 - Abdullah AlKalbany, Hussein Ahmad Al Hassan, Magdy Saeb:
FPGA Implementation of the "PYRAMIDS" Block Cipher. WEC (5) 2005: 267-273 - Mehdi Alilou, Mehdi Dehghan:
Upgrading Performance of DSR Routing Protocol in Mobile Ad Hoc Networks. WEC (5) 2005: 38-40 - Alaa Alwani, Hassan Artail, Haïdar Safa, Ayman Abi Abdallah, Bashir Basha, Tarek Abdel Khalek:
Managing Handheld Devices in Ad-Hoc Collaborative Computing Environments. WEC (5) 2005: 167-170 - Andrews Samraj, Ramaswamy Palaniappan, Nidal S. Kamel:
Extracting Single Trial Visual Evoked Potentials using Selective Eigen-Rate Principal Components. IEC (Prague) 2005: 330-333 - Muhammad Almas Anjum, Muhammad Younus Javed, Abdul Basit:
Face Recognition Using Double Dimension Reduction. WEC (2) 2005: 43-46 - S. Annadurai, P. Geetha:
Efficient Secured Lossless Coding of Medical Images - Using Modified Runlength Coding for Character Representation. IEC (Prague) 2005: 385-389 - Ahmed Arara, Robert Laurini:
Formal Contextual Ontologies for Intelligent Information Systems. WEC (5) 2005: 303-306 - Ali Asadian, Behzad Moshiri, Ali Khaki-Sedigh, Caro Lucas:
Optimized Data Fusion in an Intelligent Integrated GPS/INS System Using Genetic Algorithm. WEC (5) 2005: 221-224 - Taheri Asghar, Mohammad Reza Tarihi, Hassan Baghgar Bostan Abad, Hassan Bababeyk:
Fuzzy Hidden Markov Models for Speech Recognition on Based FEM Algorithm. WEC (2) 2005: 59-61 - Vahid Reza Asghari, Mehrdad Ardebilipour:
Spread Spectrum Code Estimation by Particle Swarm Algorithm. IEC (Prague) 2005: 207-210 - Adil M. Asiri, Mohammad S. Khorsheed:
Automatic Processing of Handwritten Arabic Forms using Neural Networks. IEC (Prague) 2005: 313-317 - Gideon Avigad, Amiram Moshaiov, Neima Brauner:
Interactive Concept-based Search using MOEA: The Hierarchical Preferences Case. IEC (Prague) 2005: 307-312 - Neeta Awasthy, Jai Prakash Saini, Digvijay Singh Chauhan:
Mfcc APplied Independent Component Analysis (MAPICA): A New Approach to Parametric Representation of Speech. WEC (2) 2005: 178-181 - Fadl Mutaher Ba-Alwi, Kamal Kant Bharadwaj:
Discovery of Production Rules with Fuzzy Hierarchy. WEC (2) 2005: 77-80 - Costin Badica, Maria Ganzha, Marcin Paprzycki:
Two Approaches to Code Mobility in an Agent-based E-commerce System. IEC (Prague) 2005: 101-107 - Pablo Barrera, José María Cañas, Vicente Matellán:
Visual Object Tracking in 3D with Color Based Particle Filter. WEC (2) 2005: 200-203 - Abdul Basit, Muhammad Younus Javed, Muhammad Almas Anjum:
Efficient Iris Recognition Method for Human Identification. WEC (2) 2005: 24-26 - Mustafa Resa Becan:
Fuzzy Boundary Layer Solution to Nonlinear Hydraulic Position Control Problem. WEC (5) 2005: 206-208 - Mustafa Resa Becan:
Sliding Mode Control with Fuzzy Boundary Layer to Air-Air Interception Problem. IEC (Prague) 2005: 108-111
skipping 205 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-12 20:59 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint