Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 135 matches
- 2019
- Muhammad Sharif, Jamal Hussain Shah:
Automatic screening of retinal lesions for grading diabetic retinopathy. Int. Arab J. Inf. Technol. 16(4): 766-774 (2019) - Yang Lu, Quanling Zhang, Jiguo Li:
A certificate-based AKA protocol secure against public key replacement attacks. Int. Arab J. Inf. Technol. 16(4): 754-765 (2019) - Zeinab Abbas, Ali Saad, Mohammad Ayache, Chadi Fakih:
Applications of logistic regression and artificial neural network for ICSI prediction. Int. Arab J. Inf. Technol. 16(3A): 557-564 (2019) - Aisha Adel, Nazlia Omar, Mohammed Albared, Adel Al-Shabi:
Feature selection method based on statistics of compound words for arabic text classification. Int. Arab J. Inf. Technol. 16(2): 178-185 (2019) - Kassem Ahmad, Omar Mohammad, Mirna Atieh, Hussein Ramadan:
Enhanced performance and faster response using new IoT litetechnique. Int. Arab J. Inf. Technol. 16(3A): 548-556 (2019) - Nadeem Akhtar, Saima Khan:
Formal architecture and verification of a smart flood monitoring system-of-systems. Int. Arab J. Inf. Technol. 16(2): 211-216 (2019) - Omar Al-Harbi:
Classifying sentiment of dialectal arabic reviews: a semi-supervised approach. Int. Arab J. Inf. Technol. 16(6): 995-1002 (2019) - Suhair AlHajHassan, Mohammed Odeh, Stewart Green, Asem Mansour:
An ontology-based i*goal-oriented referential integrity model in systems of systems context. Int. Arab J. Inf. Technol. 16(3A): 565-576 (2019) - Mubashir Ali, Shehzad Khalid, Muhammad Saleemi:
Comprehensive stemmer for morphologically rich urdu language. Int. Arab J. Inf. Technol. 16(1): 138-147 (2019) - Emel Alkim, Yalçin Çebi:
Machine translation infrastructure for turkic languages (MT-Turk). Int. Arab J. Inf. Technol. 16(3): 380-388 (2019) - Noureddine Aloui, Souha Bousselmi, Adnene Cherif:
New algorithm for speech compression based on discrete hartley transform. Int. Arab J. Inf. Technol. 16(1): 156-162 (2019) - Rafat Alshorman:
Toward proving the correctness of TCP protocol using CTL. Int. Arab J. Inf. Technol. 16(3): 407-414 (2019) - Musa Alyaman, Alaa Abd-Raheem, Farah AlDeiri:
Design of an automated extraoral photogrammetry 3D scanner. Int. Arab J. Inf. Technol. 16(3A): 533-539 (2019) - Zaylaa Amer, Ahmad Diab, Mohamad Khalil, Catherine Marque:
Automatic monodimensional EHG contractions' segmentation. Int. Arab J. Inf. Technol. 16(3A): 609-615 (2019) - Heithem Amich, Mohamed Ben Mohamed, Mounir Zrigui:
Multi-level improvement for a transcription generated by automatic speech recognition system for arabic. Int. Arab J. Inf. Technol. 16(3): 460-466 (2019) - Belal Amro, Albert Levi, Yücel Saygin:
Flexible fair and collusion resistant pseudonym providing system. Int. Arab J. Inf. Technol. 16(1): 80-87 (2019) - Meera Annamalai, Swamynathan Sankaranarayanan:
Cloud data center design using delay tolerant based priority queuing model. Int. Arab J. Inf. Technol. 16(3): 482-491 (2019) - Tanvi Arora:
A novel approach for segmentation of human metaphase chromosome images using region based active contours. Int. Arab J. Inf. Technol. 16(1): 132-137 (2019) - Shaheen Ayyub, Praveen Kaushik:
Secure searchable image encryption in cloud using hyper chaos. Int. Arab J. Inf. Technol. 16(2): 251-259 (2019) - Muhammad Waqar Aziz, Syed Abdul Baqi Shah:
Evolutionary testing for timing analysis of parallel embedded software. Int. Arab J. Inf. Technol. 16(3): 415-423 (2019) - Brijesh Bakariya, Ghanshyam Singh Thakur:
An efficient algorithm for extracting infrequent itemsets from weblog. Int. Arab J. Inf. Technol. 16(2): 275-280 (2019) - Balamurugan Balasubramanian, Kamalraj Durai, Jegadeswari Sathyanarayanan, Sugumaran Muthukumarasamy:
Tree based fast similarity query search indexing onoutsourced cloud data streams. Int. Arab J. Inf. Technol. 16(5): 871-878 (2019) - Khadidja Belbachir, Redouane Tlemsani:
Temporal neural system applied to arabic online characters recognition. Int. Arab J. Inf. Technol. 16(3A): 514-524 (2019) - Gibran Benitez-Garcia, Mariko Nakano-Miyatake, Jesus Olivares-Mercado, Héctor Pérez-Meana, Gabriel Sanchez-Perez:
A low complexity face recognition scheme based on down sampled local binary patterns. Int. Arab J. Inf. Technol. 16(3): 338-347 (2019) - Krishna Bhowal, Debasree Chanda Sarkar, Sushanta Biswas, Partha Pratim Sarkar:
An efficient steganographic approach to hide information in digital audio using modulus operation. Int. Arab J. Inf. Technol. 16(4): 703-711 (2019) - Mohamed Biniz, Mohamed Fakir:
An ontology alignment hybrid method based on decision rules. Int. Arab J. Inf. Technol. 16(6): 1114-1120 (2019) - Saihua Cai, Shangbo Hao, Ruizhi Sun, Gang Wu:
Mining recent maximal frequent itemsets over data streams with sliding window. Int. Arab J. Inf. Technol. 16(6): 961-969 (2019) - Soong Chen, Tiagrajah Janahiraman, Azizah Suliman:
Enhancement of human visual perception-based image quality analyzer for assessment of contrast enhancement methods. Int. Arab J. Inf. Technol. 16(1): 41-47 (2019) - Xiaorong Cheng, Tianqi Li:
A trusted virtual network construction method based on data sources dependence. Int. Arab J. Inf. Technol. 16(5): 889-893 (2019) - Le Cheng, Yanhong Song, Yuetang Bian:
Cockroach swarm optimization using aneighborhood-based strategy. Int. Arab J. Inf. Technol. 16(4): 784-790 (2019)
skipping 105 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-12 11:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint