Suggested Topics within your search.
Suggested Topics within your search.
- Information Science 4
- Information technology 3
- Internet in public administration 2
- Medical informatics 2
- Public administration 2
- Computer-assisted instruction 1
- Design 1
- Digital watermarking 1
- Electronic Health Records 1
- Human-computer interaction 1
- Industrial applications 1
- Information resources management 1
- Intellectual property infringement 1
- Interactive multimedia 1
- Language and languages 1
- Library 1
- Machine learning 1
- Management 1
- Medical Informatics 1
- Medical Informatics Applications 1
- Medical technology 1
- Medical telematics 1
- Multimedia systems 1
- Number theory 1
- Prevention 1
- Security measures 1
- Social aspects 1
- Technological innovations 1
- Telemedicine 1
- User interfaces (Computer systems) 1
-
401
-
402
CAF: Cluster Algorithm and A-Star with Fuzzy Approach for Lifetime Enhancement in Wireless Sensor Networks
Published 2014-01-01Get full text
Article -
403
-
404
Reinforced Cost-Sensitive Graph Network for Detecting Fraud Leaders in Telecom Fraud
Published 2024-01-01Get full text
Article -
405
Data Delivery Method Based on Neighbor Nodes’ Information in a Mobile Ad Hoc Network
Published 2014-01-01Get full text
Article -
406
The Study of Cooperative Obstacle Avoidance Method for MWSN Based on Flocking Control
Published 2014-01-01Get full text
Article -
407
-
408
A New Synergistic Forecasting Method for Short-Term Traffic Flow with Event-Triggered Strong Fluctuation
Published 2018-01-01Get full text
Article -
409
A Novel Differential Evolution Invasive Weed Optimization Algorithm for Solving Nonlinear Equations Systems
Published 2013-01-01Get full text
Article -
410
A Clustering Protocol for Wireless Sensor Networks Based on Energy Potential Field
Published 2013-01-01Get full text
Article -
411
-
412
-
413
Pattern Formation in a Cross-Diffusive Holling-Tanner Model
Published 2012-01-01Get full text
Article -
414
SVM Intrusion Detection Model Based on Compressed Sampling
Published 2016-01-01Get full text
Article -
415
Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading
Published 2021-01-01Get full text
Article -
416
Optimal Application Timing of Pest Control Tactics in Nonautonomous Pest Growth Model
Published 2014-01-01Get full text
Article -
417
Global Behavior of the Difference Equation xn+1=xn-1g(xn)
Published 2014-01-01Get full text
Article -
418
A Novel Robust Tracking Algorithm in Cluttered Environments for Distributed Sensor Network
Published 2013-12-01Get full text
Article -
419
Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies
Published 2014-01-01Get full text
Article -
420
Generalized Predator-Prey Model with Nonlinear Impulsive Control Strategy
Published 2014-01-01Get full text
Article