


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 43 matches
- 2023
- Mohammed Y. Aalsalem:
Mathematically Engineered Adams Optimizer for Energy Efficient and Optimal Routing Approach for the Wireless Sensor Network. Int. J. Commun. Networks Inf. Secur. 15(3): 180-194 (2023) - Falah Amer Abdulazeez, Abdul Sttar Ismail, Rafid S. Abdulaziz:
Using Gradient Descent to An Optimization Algorithm that uses the Optimal Value of Parameters (Coefficients) for a Differentiable Function. Int. J. Commun. Networks Inf. Secur. 15(1): 24-36 (2023) - Inam Abousaber, Haitham Abdalla:
Review of Using Technologies of Artificial Intelligence in Companies. Int. J. Commun. Networks Inf. Secur. 15(1): 217-228 (2023) - Mohamed Ashabrawy:
role of Information System to measure the Cost and Performance Aware Scheduling Technique for Cloud Computing Environment. Int. J. Commun. Networks Inf. Secur. 15(1): 83-93 (2023) - Mohammed Jameel Barwary, Karwan Jacksi, Adel Al-Zebari:
Constructing a Multilingual E-Learning Ontology through Web Crawling and Scraping. Int. J. Commun. Networks Inf. Secur. 15(3): 137-153 (2023) - Mohammad Jazi Bawaneh, Atef A. Obeidat
, Obaida M. Al-hazaimeh, Malek Al-Nawashi, Amaal Rateb Shorman
:
An Adaptive Fractal Image Steganography Using Mandelbrot and Linear Congruent Generator. Int. J. Commun. Networks Inf. Secur. 15(3): 99-112 (2023) - Yajing Chen, Yee Choy Leong, Lee Shin Yiing, Yunxia Xiao:
Research on the Development and Innovative Strategy of Knowledge Payment Platform in the Internet Era. Int. J. Commun. Networks Inf. Secur. 15(3): 226-242 (2023) - Yajing Chen, Choy Leong Yee, Lee Shin Yiing, Yunxia Xiao:
Study on the Influence of Knowledge-driven Technology on predicting consumer Repurchase Behaviour. Int. J. Commun. Networks Inf. Secur. 15(1): 162-175 (2023) - Ting Cheng, Azizan Marzuki:
Research on the development of computer digital technology combined with commercial space landscape design in the theory of "design combined with nature". Int. J. Commun. Networks Inf. Secur. 15(1): 176-193 (2023) - Zichen Chu, Bo Han:
Digital Engraving Digital Art Design Analysis Based on Spatial Expression Techniques. Int. J. Commun. Networks Inf. Secur. 15(2): 143-158 (2023) - Fatima Faydhe, Majida Saud Ibrahim, Kamal Y. Kamal:
HaLow Wi-Fi performance in multiusers and channels environment with MATLAB Simulink. Int. J. Commun. Networks Inf. Secur. 15(1): 1-11 (2023) - Sathisha G.
, Subbaraya C. K, Ravikumar G. K:
Vehicle Detection and Speed Estimation Using Semantic Segmentation with Low Latency. Int. J. Commun. Networks Inf. Secur. 15(3): 70-85 (2023) - Prakasha G, Sunil Kumar K. N, A. S. R. Murthy:
Clustering Based Energy Efficient Routing for Wireless Sensor Network Using Particle Swarm Optimization. Int. J. Commun. Networks Inf. Secur. 15(3): 243-260 (2023) - Sathisha G.
, C. K. Subbaraya, Ravikumar G. K:
Automated Speed and Lane Change decision-making Model using Support Vector Machine. Int. J. Commun. Networks Inf. Secur. 15(3): 42-56 (2023) - Shuqian Ge, Zhuo Jin:
Research on the Application of Digital Design of Jinzuo Furniture Cultural Tourism Display Platform Based on Intangible Cultural Heritage. Int. J. Commun. Networks Inf. Secur. 15(2): 1-12 (2023) - Priyanga K. K
, Sabeen S:
Optimization of Deep Convolutional Neural Network with the Integrated Batch Normalization and Global pooling. Int. J. Commun. Networks Inf. Secur. 15(1): 59-69 (2023) - Walid Karamti, Imad Al-Sgir:
Intelligent agents Model with JADE for scheduling analysis and correction of Real-Time Systems. Int. J. Commun. Networks Inf. Secur. 15(1): 107-119 (2023) - V. Gokula Krishnan
, Pinagadi Venkateswara Rao, M. V. Vijaya Saradhi, K. Sathyamoorthy
, V. Vijayaraja:
Prediction of Alzheimer Disease using LeNet-CNN model with Optimal Adaptive Bilateral Filtering. Int. J. Commun. Networks Inf. Secur. 15(1): 12-23 (2023) - V. Gokula Krishnan, K. Sankar, M. V. Vijaya Saradhi, K. Hemapriya, V. Vijayaraja:
Tom and Jerry Based Multipath Routing with Optimal K-medoids for choosing Best Clusterhead in MANET. Int. J. Commun. Networks Inf. Secur. 15(1): 70-82 (2023) - Linsen Liao, Xinghua Cao:
Data Transmission Security and Legal Regulation in Clinical Application of Human Gene Editing from Perspective of Big Data. Int. J. Commun. Networks Inf. Secur. 15(4) (2023) - Dan Liu
:
Design of Digital Museum System Based on Optimized Virtual Reality Technology. Int. J. Commun. Networks Inf. Secur. 15(1): 194-203 (2023) - Shan Liu:
Preserving the Integrity of Li Yu's Craft Aesthetics using the Digital Information Technology. Int. J. Commun. Networks Inf. Secur. 15(4) (2023) - Huinan Liu, Feroz De Costa, Megat Al-lmran Bin Yasin, Qijie Ruan:
An Improved and Optimized Gated Recurrent Unit and Long Short-Term Memory Model for Fake News Detection. Int. J. Commun. Networks Inf. Secur. 15(4): 1-16 (2023) - Eryong Liu, Yifei Li:
Research on the implantation and dissemination strategy of short creative advertising videos in the new media era. Int. J. Commun. Networks Inf. Secur. 15(1): 146-161 (2023) - Wenjie Lu, Ximing Sun:
Research on Internet Technology Innovation and Information Security Challenges in New Vehicle Energy Sector. Int. J. Commun. Networks Inf. Secur. 15(3): 86-98 (2023) - Bo Mou, Xiaopei Yang:
Analysis of the Role of Compliance Plan in AI Criminal Risk Prevention-Take AI Criminal Risk in Network Communication as Example. Int. J. Commun. Networks Inf. Secur. 15(3): 154-167 (2023) - Musmuharam Musmuharam, Suharjito Suharjito:
Detection of Distributed Denial of Service Attacks in Software Defined Networks by Using Machine Learning. Int. J. Commun. Networks Inf. Secur. 15(3): 13-25 (2023) - Mahmoud Omara
, Mahmoud Fayez
, Heba Khalid
, Said Ghoniemy
:
Restrictive Voting Technique for Faces Spoofing Attack. Int. J. Commun. Networks Inf. Secur. 15(1): 204-216 (2023) - Rongrong Qin, Min Zhao:
Risk identification of PPP mode in stadiums and gymnasiums by ant colony algorithm. Int. J. Commun. Networks Inf. Secur. 15(1): 120-131 (2023) - Yassine Sembati
, Najib Naja, Abdellah Jamali:
Named Multipath Depth-First Search: An SDN-based Routing Strategy for Efficient Failure Handling and Content Delivery in NDN. Int. J. Commun. Networks Inf. Secur. 15(4): 17-29 (2023)
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-03-14 17:27 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint