![Open access](/images/ico/o.png)
![](/images/ico/ico5.png)
Author: Rexha Blerim Shala Gresa Xhafa Valon
Publisher: MDPI
E-ISSN: 1999-5903|10|2|17-17
ISSN: 1999-5903
Source: Future Internet, Vol.10, Iss.2, 2018-02, pp. : 17-17
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/o.png)
![](/images/ico/ico5.png)
An Effective Authentication Scheme Using DCT for Mobile Devices
By Chang Chin-Chen Lu Tzu-Chuen Zhu Zhao-Hua Tian Hui
Symmetry, Vol. 10, Iss. 1, 2018-01 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Simulating the behavior of poorly understood continua using neural networks
AI EDAM, Vol. 10, Iss. 5, 1996-11 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Adaptive control of a robot using neural networks
Robotica, Vol. 12, Iss. 6, 1994-11 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Solving the motion planning problem by using neural networks
Robotica, Vol. 12, Iss. 4, 1994-07 ,pp. :