![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 39 matches
- 2023
- Minh Tran Binh, Long Nguyen, Dinh Nguyen Duc:
An Approach to Maintain the Balance between Exploitation and Exploration of the Evolutionary Process in Multi-objective Algorithms. ICICT 2023: 29-34 - Eric Blancaflor, Harold Kobe S. Billo, Bianca Ysabel P. Saunar, John Michael P. Dignadice, Philip T. Domondon:
Penetration assessment and ways to combat attack on Android devices through StormBreaker - a social engineering tool. ICICT 2023: 220-225 - Marco B. Caminati, Juliana Küster Filipe Bowles
:
Representation Theorems Obtained by Mining across Web Sources for Hints. ICICT 2023: 203-210 - Milos Cuculovic, Frédéric Fondement, Maxime Devanne, Jonathan Weber, Michel Hassenforder:
Named Entity Recognition for peer-review disambiguation in academic publishing. ICICT 2023: 105-114 - Abhishek Deokar, Mohamed El-Sharkawy:
Deployment of Proposed EfficientNeXt on NXP i.MX 8M Mini. ICICT 2023: 167-170 - Joshua Edwards, Gülüstan Dogan, Narcisa G. Pricope
:
Comparison of Machine and Deep Learning Models for the Prediction of Land Degradation. ICICT 2023: 5-12 - Ty Edwards, Ridwan Rashid Noel:
Detecting Fake News Using Machine Learning Based Approaches. ICICT 2023: 121-126 - Md. Imdadul Haque Emon, Khondoker Nazia Iqbal, Istinub Azad, Amena Akter Aporna, Nibraj Safwan Amlan, Md Saiful Islam, Rafeed Rahman:
Intracranial Brain Hemorrhage Diagnosis and Classification: A Hybrid Approach. ICICT 2023: 95-99 - Emre Gures, Ibraheem Shayea
, Sawsan Ali Saad, Ayman A. El-Saleh:
Adaptive Handover Decision Algorithm for Load Balancing in 5G Heterogeneous Networks. ICICT 2023: 177-181 - Timothy Hamilton, Elif Sahin, Andrew Ayers, Alexander Cossifos, Gülüstan Dogan, Eric Moore:
Human Wellness in the Cape Fear River Basin Based on CAFO Data. ICICT 2023: 1-4 - Bikhtiyar Hasan, Amine Boufaied:
Educational Group Formation Problem Resolution Based on an Improved Swarm Particle Optimization Using Fuzzy Knowledge. ICICT 2023: 13-21 - Daria Hemmerling
, Magdalena Wójcik-Pedziwiatr, Pawel Jaciów, Bartosz Ziólko, Magdalena Igras-Cybulska
:
Monitoring of Parkinson's Disease Progression based on Speech Signal. ICICT 2023: 132-137 - Ifedotun Roseline Idowu, Ayisat Wuraola Asaju-Gbolagade, Kazeem Alagbe Gbolagade:
An Optimal Machine Learning Framework for the Enhancement of Intrusion Detection in Wireless Sensor Network Using Metaheuristic and RNS Technique. ICICT 2023: 171-176 - Ardian Isufi, Marika Apostolova:
Risk Assessment of Cloud Infrastructure and Services for Software Development Startups. ICICT 2023: 150-155 - Djamel Khadraoui, Christophe Feltus:
Development of Build-MaaS Architecture, a Mobility-as-a-Service platform for the Construction Sector. ICICT 2023: 156-161 - Mapula Elisa Maeko, Dustin van der Haar:
Ethical implications of using artificial intelligence for multimodal biometric selection model evaluation. ICICT 2023: 232-238 - Rajkumar Maharaju, Rama Valupadasu:
Lung Cancer Classification and Prediction of Disease Severity Score Using Deep Learning. ICICT 2023: 100-104 - Zhao Mei, Mingjie Li:
Research on Supermarket Marketing Data Analysis Based on Business Intelligence. ICICT 2023: 22-28 - Laura Mukhamadiyeva, Aiman Moldagulova:
A Combined Method for Face Recognition. ICICT 2023: 84-88 - Mubashar Mustafa, Feng Zeng, Usama Manzoor, Lin Meng:
Discovering Coherent Topics from Urdu Text: A Comparative Study of Statistical Models, Clustering Techniques and Word Embedding. ICICT 2023: 127-131 - Sami Naqvi, Mohamed El-Sharkawy:
SE-RCN: An Economical Capsule Network. ICICT 2023: 60-65 - Judah Nava, Hanku Lee:
mpiPython: Prospects for Node Performance. ICICT 2023: 182-187 - Eron Neill, Gülüstan Dogan:
Rainfall Forecasting with Variational Autoencoders and LSTMs. ICICT 2023: 35-40 - Tjada Nelson, Cory Nance, Cherie Noteboom:
Web Injection and Banking Trojan Malware -A Systematic Literature Review. ICICT 2023: 45-53 - Dorfell Parra, Carlos Camargo:
Design Methodology for Single-Channel CNN-Based FER Systems. ICICT 2023: 89-94 - Phornsawan Roemsri, Supadchaya Puangpontip, Rattikorn Hewett:
On Detecting Crypto Ransomware Attacks: Can Simple Strategies be Effective? ICICT 2023: 138-143 - Danny Salto-Sumba, Juan Vazquez-Verdugo, Juan Diego Jara, Juan Pablo Bermeo:
Time-series method for predicting human traffic flow: A case study of Cañar, Ecuador. ICICT 2023: 54-59 - Makoto Sato, Tomohiro Takagi:
Improved Consistency in Price Negotiation Dialogue System Using Parameterized Action Space with Generative Adversarial Imitation Learning. ICICT 2023: 188-197 - Jonathan Daniel Sturdivant, Nicholas Morris, Tiara Hendricks, Gülüstan Dogan, Michel Heijnen:
Using Artificial Intelligence to Detect Falls. ICICT 2023: 41-44 - Ryuya Uda, Taeko Kotani:
Consideration for Creation of Training Samples for Targeted Malware Detection by Machine Learning. ICICT 2023: 144-149
skipping 9 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-24 12:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint