International Journal of Autonomous and Adaptive Communications Systems

短名IJAACS
Journal Impact0.53
国际分区TELECOMMUNICATIONS(Q4)
ISSN1754-8632, 1754-8640
h-index14
涉及主题计算机科学工程类操作系统计算机网络数学电信计算机安全人工智能物理算法生物分布式计算程序设计语言万维网电气工程量子力学统计无线嵌入式系统经济政治学法学机器学习地理
出版信息出版商: Inderscience Enterprises Ltd出版周期: 期刊类型: journal
基本数据创刊年份: 2008原创研究文献占比100.00%自引率:0.00%Gold OA占比: 1.14%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

DSHS: A Secure Decentralized Smart Healthcare System using Smart Contract

2025-1-1

Classification of Insect's Acoustic Signals Using a Hybrid Approach: Mel-Frequency Hilbert-Huang Transformation

2025-1-1

Optimal Microstrip MIMO Antenna design: An optimisation based approach

2025-1-1

Security Vulnerability Analysis and Formal Verification of Smart Contracts: A Review

2025-1-1

Robust Watermarking Algorithm for Screen-Shooting Images Based on Pattern Complexity JND Model

2025-1-1

ASER with QAM techniques for SISO communication system over Fisher-Snedecor F fading channels

2025-1-1

IoT Based Vehicular Accident Detection Using Deep Learning Model

2025-1-1

Survey on Sport Video Analysis and Event Detection

2025-1-1

A Theoretical Framework for Key Factors Affecting Adoption of E-procurement

2025-1-1

An improved salp swarm algorithm for collaborative scheduling of discrete manufacturing logistics with multiple depots

2025-1-1

Face Forgery Detection with Cross-Level Attention

2025-1-1

Reversible Data Hiding in Encrypted Images Based on Histogram Shifting and Prediction Error Block Coding

2025-1-1

Detection of Primary User Emulation Attack using the Share and hunt optimization based deep CNN classifier

2025-1-1

Cyber Security Automation and Managing Cyber Threats in Network through Smart Techniques: An Intelligent Approach for Future Gen. Systems

2025-1-1

Joint 5G NR Polar Code-Convolutional Code design for Massive MIMO-UFMC system

2025-1-1

DDoS attack detection and prevention model using Pipit Flying Fox optimization-based Deep Neural network

2025-1-1

Deepfake Detection Based on Single-Domain Data Augmentation

2025-1-1

ADMET Property Prediction Model Based on Feature Selection and Data Mining Techniques

2025-1-1

Analysis of secrecy performance under double shadowed -

2025-1-1

Dual-scale Dual-rate Video Compressive Sensing for Edge Surveillance Device

2025-1-1

A Deep Neural Network for Fashion Retrieval Based on Multi-Attention Attribute Manipulation

2025-1-1

Enhancing Malayalam Question Classification in Question Answering Systems: A Comparative Study of SVM, KNN, and Multinomial NB

2025-1-1

A Deep Neural Network for Fashion Retrieval Based on Multi-Attention Attribute Manipulation

2024-6-29

Dual-scale Dual-rate Video Compressive Sensing for Edge Surveillance Device

2024-6-15

Analysis of secrecy performance under double shadowed -

2024-6-15

DDoS attack detection and prevention model using Pipit Flying Fox optimization-based Deep Neural network

2024-5-10

Joint 5G NR Polar Code-Convolutional Code design for Massive MIMO-UFMC system

2024-5-10

Cyber Security Automation and Managing Cyber Threats in Network through Smart Techniques: An Intelligent Approach for Future Gen. Systems

2024-5-7

An improved salp swarm algorithm for collaborative scheduling of discrete manufacturing logistics with time windows

2024-1-1

A multi-level autopoietic system to develop an artificial embryogenesis process

2024-1-1

Detection of False Data Attack in Sensor Networks Based on APIT Location Algorithm

2024-1-1

Automated Anomaly Detection and Multi-label Anomaly Classification in Crowd Scenes based on Optimal Thresholding and Deep Learning Strategy

2024-1-1

E-commerce Live Streaming Impact Analysis Based on Stimulus-Organism Response Theory

2024-1-1

Optimal Load Balancing Strategy-based Centralized Sensor for WSN-based Cloud-IoT Framework using Hybrid Meta-heuristic Strategy

2024-1-1

Energy Harvesting based Performance analysis in Nakagami-m fading channels

2024-1-1

An optimal matching algorithm of e-commerce recommendation information based on matrix decomposition

2024-1-1

Memetic Grey Wolf Optimizer Algorithm for Solving the Cumulative CVRP

2024-1-1

Energy harvesting based performance analysis in Nakagami-m fading channels

2024-1-1

Antenna Performance Enhancement Using Inter-Coupling Effect Reducing Mechanisms

2024-1-1

ASER analysis of DF relay-assisted communication systems with diversity receivers at destinations subject to Nakagami-<i>m</i> fading channels

2024-1-1

Energy-efficient techniques in 5G communication

2024-1-1

Adaptive channel equalisation using different hybrid metaheuristic algorithms in digital communication

2024-1-1

An abnormal behaviour recognition of MOOC online learning based on multidimensional data mining

2024-1-1

Deepfake detection and localisation based on illumination inconsistency

2024-1-1

An improved salp swarm algorithm for collaborative scheduling of discrete manufacturing logistics with time windows

2024-1-1

Analysis and optimisation of RON loss via compound variable selection and BP neural network

2024-1-1

Face forgery detection with cross-level attention

2024-1-1

A Survey on Neural Network-based Image Data Hiding for Secure Communication

2024-1-1

A discrete bat algorithm for collaborative scheduling of discrete manufacturing logistics

2024-1-1

Deepfake detection and localization based on illumination inconsistency

2024-1-1

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司