Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijict/ijict21.bht:"
@article{DBLP:journals/ijict/Bani-SalamehBH22, author = {Hani Bani{-}Salameh and Muntaha Bnyan and Fatima Abu Hjeela}, title = {Finding and identifying expert team members in open source environments}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {4}, pages = {350--368}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2021.10036634}, doi = {10.1504/IJICT.2021.10036634}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/Bani-SalamehBH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/Chen22, author = {Junning Chen}, title = {Information sharing model of upstream supply chain based on embedded technology}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {4}, pages = {412--428}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.10051125}, doi = {10.1504/IJICT.2022.10051125}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijict/Chen22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/CuiMLW22, author = {Ajun Cui and Yan{-}hong Ma and Chen Li and Xiao{-}ming Wang}, title = {Retrieval method for multi-level network malicious intrusion information based on sequential logic model}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {4}, pages = {386--397}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.10051126}, doi = {10.1504/IJICT.2022.10051126}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijict/CuiMLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/DinK22, author = {Muhammad Salah Ud Din and Byung{-}Seo Kim}, title = {Performance evaluation of SDWNs in cloud systems}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {4}, pages = {445--456}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.10051129}, doi = {10.1504/IJICT.2022.10051129}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijict/DinK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/FanM22, author = {Yue Fan and Zhiyuan Ma}, title = {A fast radar target recognition based on single Gaussian background model}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {2}, pages = {181--196}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.10047496}, doi = {10.1504/IJICT.2022.10047496}, timestamp = {Wed, 21 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/FanM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/He22, author = {Guan He}, title = {The walking stability control method of robots based on sensing quantitative fusion tracking}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {1}, pages = {49--62}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.124332}, doi = {10.1504/IJICT.2022.124332}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/He22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/JiaH22, author = {Yaozeng Jia and Ye Hu}, title = {Research on fault signal detection method of mechanical vibration based on Kalman filtering algorithm}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {3}, pages = {272--289}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.10044157}, doi = {10.1504/IJICT.2022.10044157}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/JiaH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/Li22, author = {Le Li}, title = {Abnormal detection method of accounting data based on information extraction technology}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {1}, pages = {63--78}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.124337}, doi = {10.1504/IJICT.2022.124337}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/Li22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/Li22a, author = {Ximeng Li}, title = {Research on financial information disclosure risk management method based on internet of things}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {3}, pages = {213--228}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.10044926}, doi = {10.1504/IJICT.2022.10044926}, timestamp = {Mon, 17 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/Li22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/Liu22a, author = {Qiuxia Liu}, title = {Research on the application of data fusion technology in the security of wireless sensor networks}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {1}, pages = {37--48}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.124323}, doi = {10.1504/IJICT.2022.124323}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/Liu22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/Liu22b, author = {Jinwen Liu}, title = {Energy consumption region sensing in sensor networks based on multi-objective greedy localisation algorithm}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {2}, pages = {137--153}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2021.10041542}, doi = {10.1504/IJICT.2021.10041542}, timestamp = {Wed, 21 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/Liu22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/Liu22c, author = {Shuo Liu}, title = {Research on the classification method of artistic painting image style based on naive Bayesian}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {4}, pages = {398--411}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.10051128}, doi = {10.1504/IJICT.2022.10051128}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijict/Liu22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/Lu22, author = {Yuping Lu}, title = {A multi-objective optimisation algorithm for rural tourism route recommendation}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {2}, pages = {197--212}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.10047054}, doi = {10.1504/IJICT.2022.10047054}, timestamp = {Wed, 21 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/Lu22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/MaWSM22, author = {Zhili Ma and Feng Wei and Xi Song and Zhicheng Ma}, title = {Design and implementation of smart power firefighting IoT based on massive heterogeneous terminals}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {3}, pages = {304--316}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2021.10037556}, doi = {10.1504/IJICT.2021.10037556}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/MaWSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/MaWSM22a, author = {Zhili Ma and Feng Wei and Xi Song and Zhicheng Ma}, title = {Design of fire protection information collection and transmission module compatible with multiple protocols}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {4}, pages = {333--349}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.10051127}, doi = {10.1504/IJICT.2022.10051127}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijict/MaWSM22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/MitropoulosTD22, author = {Sarandis Mitropoulos and Vassilis Toulas and Christos Douligeris}, title = {A prototype network monitoring information system: modelling, design, implementation and evaluation}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {2}, pages = {111--136}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2021.10042018}, doi = {10.1504/IJICT.2021.10042018}, timestamp = {Wed, 21 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/MitropoulosTD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/OuLL22, author = {Yu{-}Feng Ou and Yan{-}Xi Li and Wei{-}Guo Liu}, title = {Research on interactive data packet storage algorithm for Hadoop cloud computing platform}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {3}, pages = {241--252}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2021.10038709}, doi = {10.1504/IJICT.2021.10038709}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/OuLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/Saeed22, author = {Faisal Saeed}, title = {Machine learning methods for predicting the biological activities of molecules in high diverse databases}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {2}, pages = {170--180}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.10048852}, doi = {10.1504/IJICT.2022.10048852}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/Saeed22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/SainiSK22, author = {Trilok Kumar Saini and Subhash C. Sharma and Ram Kumar}, title = {Random waypoint mobility and two-ray path loss model to analyse multiple routing protocols in mobile ad hoc networks}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {1}, pages = {1--19}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.124326}, doi = {10.1504/IJICT.2022.124326}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/SainiSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/ShiZ22, author = {Xiaofeng Shi and Yaohong Zhao}, title = {Traffic flow prediction model of urban traffic congestion period based on internet of vehicles technology}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {4}, pages = {429--444}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2021.10038452}, doi = {10.1504/IJICT.2021.10038452}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijict/ShiZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/SunLKS22, author = {Tiebo Sun and Jinhao Liu and Jiangming Kan and Tingting Sui}, title = {Research on target classification method for dense matching point cloud based on improved random forest algorithm}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {3}, pages = {290--303}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2021.10037307}, doi = {10.1504/IJICT.2021.10037307}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/SunLKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/Tian22, author = {Mi Tian}, title = {Research on lossless restoration method of digital media image based on regularisation method}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {2}, pages = {93--110}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2021.10037901}, doi = {10.1504/IJICT.2021.10037901}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/Tian22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/Wang22, author = {Shuming Wang}, title = {{RFID} data cleaning method in heterogeneous space based on linear probabilistic motion state model}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {1}, pages = {79--92}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.124330}, doi = {10.1504/IJICT.2022.124330}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/Wang22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/Wang22a, author = {Ping Wang}, title = {Spatial texture feature classification algorithm for high resolution 3D images}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {3}, pages = {229--240}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2021.10036872}, doi = {10.1504/IJICT.2021.10036872}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/Wang22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/Wang22b, author = {Hai Wang}, title = {Study on extraction method of image's line shape feature parameters based on Canny operator}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {4}, pages = {369--385}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.10051124}, doi = {10.1504/IJICT.2022.10051124}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijict/Wang22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/WangLZLJ22, author = {Wenjin Wang and Xinghua Liu and Yuxin Zhang and Jia Liu and Ping Jiang}, title = {Study on the detection and recovery algorithm of important financial information tampering}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {3}, pages = {317--332}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.10049663}, doi = {10.1504/IJICT.2022.10049663}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/WangLZLJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/WuHZF22, author = {Lingang Wu and Shengliang Hu and Jun Zhang and Xueman Fan}, title = {Research on the target recognition of marine surveillance radar based on ensemble learning}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {1}, pages = {20--36}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.124327}, doi = {10.1504/IJICT.2022.124327}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/WuHZF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/Yu22, author = {Qingmin Yu}, title = {Construction of accounting information distortion evaluation model based on artificial intelligence technology}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {3}, pages = {253--271}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.10049664}, doi = {10.1504/IJICT.2022.10049664}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/Yu22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/ZhangCLZW22, author = {Haigang Zhang and Xuan Chen and Piao Liu and Decheng Zhao and Bulai Wang}, title = {Research on control strategy of permanent magnet synchronous motor based on improved {MRAS}}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {2}, pages = {154--169}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2021.10042986}, doi = {10.1504/IJICT.2021.10042986}, timestamp = {Wed, 21 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/ZhangCLZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.