![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2019
- B. R. Tapas Bapu, L. C. Siddanna Gowd:
Malicious node detection through run time self-healing algorithm in WSN. Int. J. Adv. Intell. Paradigms 12(1/2): 45-56 (2019) - M. Bhagyavathi, Vankadara Saritha:
Energy and velocity-based multipath routing protocol for VANET. Int. J. Adv. Intell. Paradigms 12(3/4): 239-253 (2019) - Mehdi Dadkhah
, Vyacheslav V. Lyashenko
, Zhanna V. Deineko, Shahaboddin Shamshirband, Mohammad Davarpanah Jazi:
Methodology of wavelet analysis in research of dynamics of phishing attacks. Int. J. Adv. Intell. Paradigms 12(3/4): 220-238 (2019) - Arindam Dey
, Anita Pal:
Computing the shortest path with words. Int. J. Adv. Intell. Paradigms 12(3/4): 355-369 (2019) - Soumi Ghosh, Ajay Rana
, Vineet Kansal:
A statistical comparison for evaluating the effectiveness of linear and nonlinear manifold detection techniques for software defect prediction. Int. J. Adv. Intell. Paradigms 12(3/4): 370-391 (2019) - N. Haripriya, P. Kavitha, Seshadhri Srinivasan, Juri Belikov:
Evolutionary optimisation-based fractional order controller for web transport systems in process industries. Int. J. Adv. Intell. Paradigms 12(3/4): 317-330 (2019) - S. Beulah Hemalatha, T. Vigneswaran:
Reconfigurable communication wrapper for QoS demand for network on chip. Int. J. Adv. Intell. Paradigms 12(1/2): 24-32 (2019) - D. Shiny Irene
, T. Sethukarasi:
Perlustration on existing techniques and applications in cloud computing for smart buildings using IoT. Int. J. Adv. Intell. Paradigms 12(1/2): 147-163 (2019) - Bindiya Jain, Gursewak Brar, Jyoteesh Malhotra
:
AMST-MAC: adaptive sleeping multi-frames selective data transmission control for wireless sensor networks. Int. J. Adv. Intell. Paradigms 12(3/4): 279-294 (2019) - R. Jayanthi, John Singh K
:
Image encryption techniques for data transmission in networks: a survey. Int. J. Adv. Intell. Paradigms 12(1/2): 178-191 (2019) - T. K. Kandavel, T. Ashok Kumar, D. Vijay, S. Ashwanth Samraj:
Application of artificial neural network on deformation and densification behaviour of sintered Fe-C steel under cold upsetting. Int. J. Adv. Intell. Paradigms 12(3/4): 266-278 (2019) - Rijwan Khan
, Mohd Amjad:
Mutation-based genetic algorithm for efficiency optimisation of unit testing. Int. J. Adv. Intell. Paradigms 12(3/4): 254-265 (2019) - Kourosh Kiani, Arash Mousavi, Shahaboddin Shamshirband:
A new fractal watermarking method for images of text. Int. J. Adv. Intell. Paradigms 12(3/4): 207-219 (2019) - D. Naga Ravi Kiran, Chandrashekhar G. Dethe
:
Fuzzy rule selection using artificial bee colony optimisation algorithm. Int. J. Adv. Intell. Paradigms 12(1/2): 164-177 (2019) - Priyan Malarvizhi Kumar, Usha Devi Gandhi:
A survey on internet of vehicles: applications, technologies, challenges and opportunities. Int. J. Adv. Intell. Paradigms 12(1/2): 98-119 (2019) - Shashi Mehrotra
, Shruti Kohli, Aditi Sharan:
An intelligent clustering approach for improving search result of a website. Int. J. Adv. Intell. Paradigms 12(3/4): 295-304 (2019) - R. K. Nadesh, M. Aramudhan:
MMSI: a multi-mode service invocation algorithm to improve the connectivity in accessing cloud services in heterogeneous mobile cloud. Int. J. Adv. Intell. Paradigms 12(1/2): 33-44 (2019) - V. Nagaraju
, L. C. Siddanna Gowd:
Radio spectrum collision avoidness in cluster cognitive network through gazer nodes. Int. J. Adv. Intell. Paradigms 12(1/2): 120-133 (2019) - K. P. Rama Prabha, N. Jeyanthi:
Intelligent intrusion detection techniques for secure communications in wireless networks: a survey. Int. J. Adv. Intell. Paradigms 12(1/2): 134-146 (2019) - Selvaraj Priya:
A novel approach for secured transmission of DICOM images. Int. J. Adv. Intell. Paradigms 12(1/2): 68-76 (2019) - S. Rajeshwari, Arumugam Chandrasekar
:
Real time MAF-based multi level access restriction approach for collaborative environment using ontology. Int. J. Adv. Intell. Paradigms 12(1/2): 14-23 (2019) - K. Ramkumar, G. Gunasekaran:
Preserving security using crisscross AES and FCFS scheduling in cloud computing. Int. J. Adv. Intell. Paradigms 12(1/2): 77-85 (2019) - J. Ravisankar:
Binary honey bee mating partial transmit sequence to improve OFDM. Int. J. Adv. Intell. Paradigms 12(1/2): 86-97 (2019) - Aarti Singh, Dimple Juneja, Rashmi Singh, Saurabh Mukherjee:
A clustered neighbourhood consensus algorithm for a generic agent interaction protocol. Int. J. Adv. Intell. Paradigms 12(3/4): 305-316 (2019) - Yacine Slimani
, Abdelouaheb Moussaoui, Yves Lechevallier, Ahlem Drif:
Discovering communities for web usage mining systems. Int. J. Adv. Intell. Paradigms 12(3/4): 331-354 (2019) - S. Thaiyalnayaki, Sasikala Jayaraman, R. Ponraj:
Detecting near-duplicate images using segmented minhash algorithm. Int. J. Adv. Intell. Paradigms 12(1/2): 192-206 (2019) - Monika Verma, Vikash Yadav, Vandana Dixit Kaushik, Vinay Kumar Pathak:
Multiple polynomial regression for solving atmospheric scattering model. Int. J. Adv. Intell. Paradigms 12(3/4): 400-410 (2019) - Velayutham Vimala, K. Ramar:
Classification of neonatal epileptic seizures using support vector machine. Int. J. Adv. Intell. Paradigms 12(1/2): 57-67 (2019) - F. Sangeetha Francelin Vinnarasi
, Arumugam Chandrasekar
:
VANET routing protocol with traffic aware approach. Int. J. Adv. Intell. Paradigms 12(1/2): 3-13 (2019) - Vikash Yadav, Vandana Dixit Kaushik:
A study on automatic early detection of skin cancer. Int. J. Adv. Intell. Paradigms 12(3/4): 392-399 (2019)
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-25 20:09 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint