researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IJICT
Home
Index
Info
Issue
Volume
18
, Issue
2
125
--
141
Ying Li
.
Security protocol of internet of things based on NTRU encryption model
142
--
159
Haiying Wang
.
Machine learning method based on improved drosophila optimisation algorithm
160
--
174
Zhang Xu
.
Research on blurred edge information segmentation of image based on computer vision
175
--
188
Yujiang Fei
.
Multi-tag cleaning software for cyclic redundant data stream based on RFID in cloud computing
189
--
206
Junjie Niu
.
Intelligent evaluation model of e-commerce transaction volume based on the combination of k-means and SOM algorithms
207
--
223
Lijun Zhao
,
Bin Liu
,
Jinling Ma
.
Virtual machine allocation method for cloud computing based on multi-objective evolutionary algorithm
224
--
241
Santar Pal Singh
,
S. C. Sharma
.
A PSO-based improved clustering algorithm for lifetime maximisation in wireless sensor networks