researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IJAACS
Home
Index
Info
Volume
Volume
15
, Issue
4
279
--
294
Yun Zhang
.
An evaluation model of e-commerce credit information based on social big data
295
--
311
Rongtao Liao
,
Zhihua Xiao
,
Yixi Wang
,
Dangdang Dai
.
Security state monitoring method for perception node in the power internet of things based on a low rank model
312
--
330
Dongliang Li
.
Research on coverage holes repair in wireless sensor networks based on an improved artificial fish swarm algorithm
331
--
344
Xuan Yao
.
An adaptive prediction model for sparse data forecasting
345
--
360
Enwei Cao
.
A personalised recommendation algorithm for e-commerce network information based on two-dimensional correlation
361
--
378
Xiang Li
.
Dynamic acquisition method of a user's implicit information demand based on association rule mining
Volume
15
, Issue
3
185
--
201
Liang Ma
,
Jie Zhou 0016
,
Bintai Xu
,
Youxiang Zhu
,
Yingjie Jiang
.
State scheduling method of redundant nodes in power communication network based on least square method
202
--
219
Gang Qiao
.
Hotspot prediction of e-commerce network users based on improved K-nearest neighbour algorithm
220
--
234
Dacong Jiang
.
Research on remote monitoring method of smart classroom based on internet of things
235
--
248
Degang Lai
,
Ke Wang
.
A new digital material sharing method of multimedia network teaching based on 5G communication technology
249
--
265
Dongmei Xia
,
Wei Chen
,
Yingji Li
,
Xuan Fu
.
Research on the detection of privacy information sharing behaviour of e-commerce users based on big data
266
--
278
Jianguo Huang
,
Sihan Fu
.
Low beacon node localisation algorithm in sensor networks based on multi-space key distribution algorithm
Volume
15
, Issue
2
93
--
105
Xinjian Dai
,
Zhichao Zeng
.
Research on spectral clustering algorithm for network communication big data based on wavelet analysis
106
--
125
Shanshan Guo
,
Zhanyou Ma
,
Xiangran Yu
,
Li Chen
.
c queueing model with preemptive priority and asynchronous working vacation
126
--
139
Rajendra Kumar Dwivedi
,
Rakesh Kumar
,
Rajkumar Buyya
.
A multi agent based energy and fault aware scheme for WSN of hard-to-reach territories
140
--
153
Yong Li
.
Optimisation method of hierarchical heterogeneous clustering topology based on energy iteration
154
--
165
Xuehong Liu
,
Xuefeng Ding
.
Integration method of wireless sensor network ciphertext database based on internet of things
166
--
183
Meini Wang
,
Wei Zhao
,
Ying Li
.
Encryption of ciphertext data in Internet of Things based on HECRT key management
Volume
15
, Issue
1
1
--
17
Chao Zhang
,
Qingyan Zhao
.
Research on the wake-up method for active sleeping node in wireless sensor networks
18
--
31
Dong He
,
Hongbing Huang
,
Yiyang Yao
,
Weiqiang Qi
,
Hong Li
,
Dong Mao
.
Resource monitoring method of the expandable cloud platform based on micro-service architecture
32
--
45
Linlin Li
.
The intrusion data mining method for distributed network based on fuzzy kernel clustering algorithm
46
--
62
Xian Luo
,
Rongtao Liao
,
Huanjun Hu
,
Yuxuan Ye
.
Research on digital forensics method of 5G communication system in the future based on direct intermediate frequency sampling
63
--
77
Chen Fang
.
The automatic positioning method for defect data of 5G mobile communication based on cloud computing
78
--
92
Bolu Lei
,
Liya Li
.
Capacity detection of massive MIMO channel in 5G environment based on symmetric correlation matrix