


default search action
International Journal of Information and Communication Technology, Volume 17
Volume 17, Number 1, 2020
- Bai Yun, Wandong Cai:
Trust circle recommended model based on different fields. 1-21 - Yucai Zhou, Zhimin Lv, Yuelin Li, Jiangchun Mo:
Research on highway vehicle detection algorithm based on video image. 22-36 - Chiyu Pan:
Parallel mining method for symbol application features of complex network images. 37-52 - Li Li, Ya-fang Zhai, Hong-jie Li:
Research on improved modulation routing and spectrum allocation algorithm in elastic optical networks. 53-64 - Vivekanand Jha
, Amar Kumar Mohapatra, Nupur Prakash:
An energy efficient and load balanced sink mobility for wireless sensor networks. 65-90 - Bin Dai:
Research on security monitoring system for wind-solar complementary power generation based on internet of things. 91-106
Volume 17, Number 2, 2020
- Yingjie Wang, Kuanjiu Zhou, Jie Pan, Mingchu Li:
Interrupt nesting method based on time slice in embedded software. 107-128 - Zohra Hmidi, Laïd Kahloul, Saber Benharzallah
:
Using priced timed automata for the specification and verification of CSMA/CA in WSNs. 129-145 - Pu Chuan Hsian
, Ezra Morris Abraham Gnanamuthu, Fook Loong Lo, Mau-Luen Tham
:
Reduced complexity per-survivor iterative timing recovery using max-log-MAP algorithm. 146-163 - Shu Xu:
Research on anomaly detection method for hybrid big data subarea based on ant colony algorithm. 164-177 - Lishou Zhang, Yiyi Liu, Shaojun Shen:
Construction of performance monitoring model for cloud computing service platform based on label technology. 178-193 - Xiaofeng Liu:
Symbolic feature extraction of art graphics based on time constraint. 194-209
Volume 17, Number 3, 2020
- Jianfeng Che, Bo Wang, Shitao Chen:
Analysis of data mining method for short-term wind measurement of wind farm based on multi-technology fusion. 211-225 - Tianming Feng, Lin Chen, Dahang Fan:
Network teaching target classification system based on cloud computing technology. 226-241 - Chao-sheng Han:
Modelling the impact of communication technology on e-commerce operation mode. 242-256 - Hao Yang, Wen Cai, Yibo Xia, Wenhua Ouyang, Xin Xie:
Identity authentication system for mobile terminal equipment based on SDN network. 257-273 - Tu-Trinh Thi Nguyen
, Dinh-Thuan Do:
Impact of co-channel interference on performance of power domain-based multiple access. 274-287 - Guiming Zhu:
Research on detection method of abnormal capital transfer in electronic commerce based on machine learning. 288-305
Volume 17, Number 4, 2020
- Savita, D. K. Lobiyal:
Inter-contact delay and location information-based routing with adaptive threshold buffer management for delay tolerant networks. 307-328 - Xiang Sun, Qianmu Li:
Research on automatic annotation of pathological image detail information based on machine learning. 329-342 - Mridusmita Sharma
, Kandarpa Kumar Sarma:
Deep features-based dialect and mood recognition using Assamese telephonic speech. 343-363 - Minh-Sang Van Nguyen
, Thi-Anh Hoang, Dinh-Thuan Do:
MISO assisted multiple access by removing orthogonal: enabling D2D transmission and performance analysis. 364-379 - Ahmed Ghenabzia, Okba Kazar
, Abdelhak Merizig
, Zaoui Sayah, Merouane Zoubeidi:
Multi-agent approach for data mining-based bagging ensembles to improve the decision process for big data. 380-402 - Rosy Swami, Prodipto Das
:
An effective secure data retrieval approach using trust evaluation: HBSEE-CBC. 403-421

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.