|
Issue |
Title |
|
Vol 47, No 5 (2023): Online-only issue |
PrivyKG: Security and Privacy Preservation of Knowledge Graphs Using BlockChain Technology |
Abstract
PDF
|
Ala Djeddai, Roufaida Khemaissia |
|
Vol 39, No 1 (2015) |
Probabilistic 2D Point Interpolation and Extrapolation via Data
Modeling |
Abstract
PDF
|
Dariusz Jacek Jakóbczak |
|
Vol 44, No 4 (2020) |
Probabilistic Weighted induced Multi-Class Support Vector Machines for Face Recognition |
Abstract
PDF
|
Aniruddha Dey, Shiladitya Chowdhury |
|
Vol 42, No 2 (2018) |
Probability matrix decomposition based collaborative filtering recommendation algorithm |
Abstract
PDF
|
Yili Tan, Huijuan Zhao, Yourong Wang, Min Qiu |
|
Vol 48, No 11 (2024): Online-only issue |
Profit Estimation Model and Financial Risk Prediction Combining Multi-scale Convolutional Feature Extractor and BGRU Model |
Abstract
PDF
|
Yangyan Liu, Bolin Pan |
|
Vol 46, No 9 (2022): Online-only issue |
Programming models-based method for deriving profits allocation scheme with interval-valued cooperative games |
Abstract
PDF
PDF
|
Jian Li, LI-li Niu, Jiubing Liu, Qiongxia Chen, Yong-Jun Liu |
|
Vol 35, No 2 (2011) |
Programming the Story: Interactive Storytelling System |
Abstract
PDF
|
S. Kim, S. Moon, S. Han, J. Chan |
|
Vol 49, No 21 (2025): Online-only issue |
Prophet Actor-Critic-Based Deep Reinforcement Learning for Obstacle Avoidance in Robotic Arm Control |
Abstract
PDF
|
Jiangtao Wang |
|
Vol 40, No 2 (2016) |
Protected Elastic-tree topology for Survivable and Energy-efficient Data Center |
Abstract
PDF
|
Dieu-Linh Truong, Elena Ouro, Thanh-Chung Nguyen |
|
Vol 38, No 3 (2014) |
Prototype Implementation of a Scalable Real-Time Dynamic Carpooling and Ride-Sharing Application |
Abstract
PDF
|
Dejan Dimitrijević, Vladimir Dimitrieski, Nemanja Nedić |
|
Vol 47, No 8 (2023): Online-only issue |
Provably Efficient Multi-Cancer Image Segmentation Based on Multi-Class Fuzzy Entropy |
Abstract
PDF
|
Hend Muslim Jasim, Mudhafar Jalil Jassim Ghrabat, Luqman Qader Abdulrahman, Vincent Omollo Nyangaresi, Junchao Ma, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel |
|
Vol 47, No 6 (2023): Online-only issue |
Provably-Secure LED Block Cipher Diffusion and Confusion based on Chaotic Maps |
Abstract
PDF
|
Hussain M. Al-Saadi, Imad Alshawi |
|
Vol 47, No 9 (2023): Online-only issue |
PrSChain: A Blockchain Based Privacy Preserving Approach for Data Service Composition |
Abstract
PDF
|
Rofaida Khemaissia, Makhlouf Derdour, Mohamed Amine Ferrag, Mohammed Mounir Bouhamed |
|
Vol 37, No 3 (2013) |
Pruning the Computation of Distributed Shortest Paths in Power-law Networks |
Abstract
PDF
|
G. D'Angelo, M. D'Emidio, D. Frigioni |
|
Vol 42, No 2 (2018) |
PSO with crossover operator applied to feature selection problem in classification |
Abstract
PDF
|
Houassi Hichem, Mahdaoui Rafik, Maarouk Toufik Mesaaoud |
|
Vol 48, No 11 (2024): Online-only issue |
Psychological Fitness Education Driven by Artificial Intelligence Technology and Its Influence on Education Assessment |
Abstract
PDF
|
Yan Zhang |
|
Vol 37, No 2 (2013) |
QoS Prediction forWeb Services Based on Similarity-Aware Slope One Collaborative Filtering |
Abstract
PDF
|
Chengying Mao, Jifu Chen |
|
Vol 49, No 1 (2025) |
Q-Rung Orthopair Fuzzy Sets-Enhanced FMEA for COVID-19 Risk Assessment |
Abstract
PDF
|
Lazim Abdullah, Noor Azzah Awang, Muhammad Qiyas |
|
Vol 42, No 3 (2018) |
Qualitative and Quantitative Optimization for Dependability Analysis |
Abstract
PDF
|
Leila Boucerredj, NasrEddine Debbache |
|
Vol 42, No 1 (2018) |
Quantitative Score for Assessing the Quality of Feature Rankings |
Abstract
PDF
|
Ivica Slavkov, Matej Petković, Dragi Kocev, Sašo Džeroski |
|
Vol 37, No 2 (2013) |
Quaternion Based Fuzzy Neural Network Classifier for MPIK Dataset's View-invariant Color Face Image Recognition |
Abstract
PDF
|
Wai Kit Wong, Gin Chong Lee, Chu Kiong Loo, Raymond Lock |
|
Vol 35, No 3 (2011) |
Query Preserving Relational Database Watermarking |
Abstract
PDF
|
S.A. Shah, S. Xingming, H. Ali, M. Abdul |
|
Vol 48, No 11 (2024): Online-only issue |
Radio Frequency Fingerprint Identification Technology Considering Strong Interference of Electromagnetic Noise |
Abstract
PDF
|
Yang Kong, Rongwei Dong |
|
Vol 33, No 2 (2009) |
Rajan Transform and its uses in Pattern Recognition |
Abstract
PDF
|
E.N. Mandalapu, E.G. Rajan |
|
Vol 49, No 17 (2025): Online-only issue |
Random Forest-Based Decision Tree Framework for Hazard Management in University Laboratories |
Abstract
PDF
|
Yunan Zhang, Xiaoyu Wang |
|
1526 - 1550 of 1910 Items |
<< < 57 58 59 60 61 62 63 64 65 66 > >> |