Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             132 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Cloud-IOT Based Decision Support System for Potato Pest Prevention Foughali, Karim

160 C p. 616-623
artikel
2 A Comparative Study of Predictive Approaches for Load Forecasting in Smart Buildings Hadri, S.

160 C p. 173-180
artikel
3 A Conceptual Model for a Metric Based Framework for the Monitoring of Information Security Tasks’ Efficiency Sönmez, Ferda Özdemir

160 C p. 181-188
artikel
4 Affiliated Workshops
160 C p. 432
artikel
5 A GraphQL approach to Healthcare Information Exchange with HL7 FHIR Mukhiya, Suresh Kumar

160 C p. 338-345
artikel
6 An Agent-based Approach to Physical Rehabilitation of Patients affected by Neurological Diseases Vallejo, D.

160 C p. 346-353
artikel
7 Analysis of Creative Industries Activities in Europеan Union Countries Dronyuk, Ivanna

160 C p. 479-484
artikel
8 Analysis of robust weed detection techniques based on the Internet of Things (IoT) Dankhara, Fenil

160 C p. 696-701
artikel
9 Analytical service for processing behavioral, psychological and communicative features in the online communication Fedushko, Solomiia

160 C p. 509-514
artikel
10 An Approach Towards Image Encryption and Decryption using Quaternary Fractional-Linear Operations Kovalchuk, Anatoliy

160 C p. 491-496
artikel
11 An Architecture for Providing Data Usage and Access Control in Data Sharing Ecosystems Munoz-Arcentales, Andres

160 C p. 590-597
artikel
12 An Efficient Image Encryption Scheme using Projective Transformations Kovalchuk, Anatoliy

160 C p. 584-589
artikel
13 An Enhancement of Greedy Perimeter Stateless Routing Protocol in VANET Houmer, Meriem

160 C p. 101-108
artikel
14 An Extended-Input GRNN and its Application Izonin, Ivan

160 C p. 578-583
artikel
15 A novel approach for improving MPLS VPN security by adopting the software defined network paradigm Bensalah, Faycal

160 C p. 831-836
artikel
16 Anticipatory Session Management and User Plane Function Placement for AI-Driven Beyond 5G Networks Peters, Sebastian

160 C p. 214-223
artikel
17 A Platform of Services to Support Community-Dwelling Older Adults Integrating FHIR and Complex Security Mechanisms Rosa, Marco

160 C p. 314-321
artikel
18 Application of Integrated Building Information Modeling, IoT and Blockchain Technologies in System Design of a Smart Building Lokshina, Izabella V.

160 C p. 497-502
artikel
19 Application Partitioning for Offloading in Mobile Pervasive Environments Jungum, Nevin Vunka

160 C p. 206-213
artikel
20 A Review of Smart Parking Using Internet of Things (IoT) Rupani, Sahil

160 C p. 706-711
artikel
21 A Secure Multi-User Database-as-a-Service Approach for Cloud Computing Privacy Gahi, Youssef

160 C p. 811-818
artikel
22 Asistranto: An Assistive Educational Platform for Promotion of Interest in Autistic Children Lima, Roceli Pereira

160 C p. 385-393
artikel
23 As They Like It - Outcome Of A User-Centric Design Approach For An Online Health- And Well-Being Service Platform For Transition-Agers Kaimer, Fabian

160 C p. 445-450
artikel
24 A Survey of Smart City infrastructure via Case study on New York Shah, Jigar

160 C p. 702-705
artikel
25 A Survey on Blockchain Technology and its Proposed Solutions Dave, Dharmin

160 C p. 740-745
artikel
26 A Systematic Review of Smart Cities’ Applications to Support Active Ageing Rocha, Nelson

160 C p. 306-313
artikel
27 Ateb-Gabor Filtering Method in Fingerprint Recognition Nazarkevych, Mariya

160 C p. 30-37
artikel
28 Automatically detect diagnostic patterns based on clinical notes through Text Mining Ribeiro, João

160 C p. 684-689
artikel
29 Bayesian Classifier Applied to Higher Education Dropout Viloria, Amelec

160 C p. 573-577
artikel
30 Benchmarking Business Analytics Techniques in Big Data Oliveira, Catia

160 C p. 690-695
artikel
31 Big Data analysis in development of personalized medical system Shakhovska, Natalia

160 C p. 229-234
artikel
32 Big Data Aplication for Selecting Theses Topics Silva, Jesus

160 C p. 538-542
artikel
33 Big Data Processing Technologies in Distributed Information Systems Shakhovska, Nataliya

160 C p. 561-566
artikel
34 Characterizing Instructional Leader Interactions in a Social Learning Management System using Social Network Analysis Llantos, Orven E.

160 C p. 149-156
artikel
35 Clustering of Top 50 Latin American Universities in SIR, QS, ARWU, and Webometrics Rankings Torres-Samuel, Maritza

160 C p. 467-472
artikel
36 Comparative Study of Ontologies Based ISO 27000 Series Security Standards Meriah, Ines

160 C p. 85-92
artikel
37 COMPETENCY QUESTIONS FOR BIOMEDICAL ONTOLOGY REUSE Azzi, Sabrina

160 C p. 362-368
artikel
38 Contents
160 C p. iii-x
artikel
39 Context-aware Gossip in Ad hoc Vehicular Networks Bennakhi, Ahmad

160 C p. 157-164
artikel
40 Conversational Agent in mHealth to empower people managing the Parkinson’s Disease Macedo, Patrícia

160 C p. 402-408
artikel
41 Convolutional Neural Network Biometric Cryptosystem for the Protection of the Blockchain’s Private Key Albakri, Alfaisal

160 C p. 235-240
artikel
42 Correlation Analysis as a Thyroid Gland, Adrenal Glands, and Liver Relationship Tool for Correcting Hypothyroidism with Organic and Inorganic Iodine Ryabukha, Olha

160 C p. 598-603
artikel
43 Cost effective FPGA Implementation of Right-to-Left Modular Exponentiation with NAF-Representation Marouf, Ibrahim

160 C p. 549-554
artikel
44 Data-driven prediction system for an environmental smartification approach to child fall accident prevention in a daily living space Nose, Tsubasa

160 C p. 126-133
artikel
45 Data exchanges based on blockchain in m-Health applications Clim, Antonio

160 C p. 281-288
artikel
46 Detection of Timestamps Tampering in NTFS using Machine Learning Mohamed, Alji

160 C p. 778-784
artikel
47 Determinants of Pro-Environmental Activity-Travel Behavior Using GPS-Based Application and SEM Approach Adnan, Muhammad

160 C p. 109-117
artikel
48 Development of a Computer Player for Seejeh (A.K.A Seega, Siga, Kharbga) Board Game with Deep Reinforcement Learning Aljaafreh, Ahmad

160 C p. 241-247
artikel
49 Device to Guide Hand Rehabilitation Routines Based on Pressure Signals Solís-Peña, M.

160 C p. 659-664
artikel
50 Distributed Trust & Reputation Models using Blockchain Technologies for Tourism Crowdsourcing Platforms Veloso, Bruno

160 C p. 457-460
artikel
51 Efficiently Predicting Frequent Patterns over Uncertain Data Streams Liu, Chuan-Ming

160 C p. 15-22
artikel
52 Energy-efficient Sensor-based EEG Features’ Extraction for Epilepsy Detection Alhassan, Sarah

160 C p. 273-280
artikel
53 Environment Influence on Organizational Development Poplavska, Zhanna

160 C p. 485-490
artikel
54 Evaluating the spasticity level during the rehabilitation process: a survey of traditional methods and a new trend Marques, Isabela A.

160 C p. 647-652
artikel
55 Evaluating the Usability and Usefulness of a Mobile Application for Training Visual Mnemonic Techniques in Participants with Subjective Cognitive Decline: An Exploratory Pilot Study Hermes, Sebastian

160 C p. 439-444
artikel
56 Evaluation of Task Workload and Intrinsic Motivation in a Virtual Reality Simulator of Electric-Powered Wheelchairs Rivera-Flor, Hamilton

160 C p. 641-646
artikel
57 Exploiting stack-based buffer overflow using modern day techniques Nicula, Ștefan

160 C p. 9-14
artikel
58 Factorial Analysis in the Intellectual capital’s dimensions on micro, small, and medium-sized export enterprises Castillo, Adalberto Escobar

160 C p. 567-572
artikel
59 FMD and Mastitis Disease Detection in Cows Using Internet of Things (IOT) Vyas, Shivank

160 C p. 728-733
artikel
60 Fog IoT for Health: A new Architecture for Patients and Elderly Monitoring. Debauche, Olivier

160 C p. 289-297
artikel
61 Formal Verification of Confidentiality in DNSSEC and E-DNSSEC Protocols using pi-calculus and ProVerif Chetioui, Kaouthar

160 C p. 752-757
artikel
62 Fuzzy Approach for Locating Sensors in Industrial Internet of Things Hamdi, Sarah El

160 C p. 772-777
artikel
63 Fuzzy Single-commodity model in Wireless Sensor Networks Oudani, Mustapha

160 C p. 797-802
artikel
64 Generative Adversarial Network (GANs) based training set enhancement for Stomach Adenocarcinoma Computed Tomography (CT) scan Sharma, Paawan

160 C p. 377-384
artikel
65 Grey Wolf Algorithm based Energy-Efficient Data Transmission in Internet of Things Manshahia, Mukhdeep Singh

160 C p. 604-609
artikel
66 Implementing Hy-IDS, Mobiles Agents and Virtual Firewall to Enhance the Security in IaaS Cloud Toumi, Hicham

160 C p. 819-824
artikel
67 Information Protection Service using Topological Image Coverage Kovalchuk, Anatoliy

160 C p. 503-508
artikel
68 Inline detection of Denial of Service Attacks in Software Defined Networking using the Hotelling Chart Bensalah, Faycal

160 C p. 785-790
artikel
69 Integration Between ATIoT Architecture and Wearable Device Applied to Assistive Technologies Guimarães Jr, Carlos Solon Soares

160 C p. 653-658
artikel
70 Intellectual Property and Static and Dynamic Proximity in Colombian Museum Networks: A Representation by Iconography of Correlations Lis-Gutiérrez, Jenny Paola

160 C p. 555-560
artikel
71 IoT-Based Home and Community Energy Management System in Jordan Al-Oudat, Naeem

160 C p. 142-148
artikel
72 JavaNeighbors: Improving ChuckyJava’s neighborhood discovery algorithm Ouairy, Léopold

160 C p. 70-76
artikel
73 Keynote I
160 C p. 6
artikel
74 Keynote II
160 C p. 7
artikel
75 Learning Style Preferences of College Students Using Big Data Viloria, Amelec

160 C p. 461-466
artikel
76 Manifesto for Improved Foundations of Relational Model Litwin, Witold

160 C p. 624-628
artikel
77 Medical card data imputation and patient psychological and behavioral profile construction Fedushko, Solomiia

160 C p. 354-361
artikel
78 Method for Behavior Normalization to Enable Comparative Understanding of Interactions of Elderly Persons with Consumer Products using a Behavior Video Database Hirano, Kei

160 C p. 409-416
artikel
79 Method for Estimating Height in People using Multivariable Statistics Viloria, Amelec

160 C p. 224-228
artikel
80 Mixture Structural Equation Models for Classifying University Student Dropout in Latin America Viloria, Amelec

160 C p. 629-634
artikel
81 Mobile AdHoc networks for Intelligent Transportation System: Comparative Analysis of the Routing protocols Zemrane, Hamza

160 C p. 758-765
artikel
82 Model and Simulation of a Distribution Logistic System for Learning Silva, Jesus

160 C p. 635-640
artikel
83 Model and Simulation of Structural Equations for Determining the Student Satisfaction Viloria, Amelec

160 C p. 527-531
artikel
84 Modeling and Graph Analysis for Enhancing Resilience in Smart Homes Modarresi, Amir

160 C p. 197-205
artikel
85 Neural controller for smart house security subsystem Teslyuk, Vasyl

160 C p. 394-401
artikel
86 New context-based node acceptance CBNA framework for MitM detection in SDN Architecture Sebbar, Anass

160 C p. 825-830
artikel
87 NSGA-II based Joint Topology and Routing Optimization of Mesh Networks with Flying Access Points Sabino, Sérgio

160 C p. 165-172
artikel
88 Obturator ring fracture detection using anteroposterior view x-ray Damien, Pascal

160 C p. 369-376
artikel
89 Open Communication Protocols for Building Automation Systems Lohia, Karan

160 C p. 723-727
artikel
90 Optimal placement of Charging Stations for Electric Vehicles in large-scale Transportation Networks Fredriksson, Henrik

160 C p. 77-84
artikel
91 Performance Analysis of 128-bit Modular Inverse Based Extended Euclidean Using Altera FPGA Kit Asad, Mohammad M.

160 C p. 543-548
artikel
92 Personalized Micro-Service Recommendation System for Online News Asenova, Marchela

160 C p. 610-615
artikel
93 Platform to Support the Codification of Clinical Information According to the International Classification of Functioning, Disability and Health Mendes, Ana

160 C p. 298-305
artikel
94 Predicting Lung Healthiness Risk Scores to Identify Probability of an Asthma Attack Do, Quan

160 C p. 424-431
artikel
95 Preface
160 C p. 1-3
artikel
96 Preface
160 C p. 4-5
artikel
97 Prevention-oriented ECG Teleconsulting That Involves Consumer Wearables: Exploration of Service Adoption Patterns and Institutional Impact Dolezel, Michal

160 C p. 417-423
artikel
98 Proceeding
160 C p. 8
artikel
99 Protection of Images based on Fractal Geometry Dronyuk, Ivanna

160 C p. 515-520
artikel
100 Pso Based Intrusion Detection: A Pre-Implementation Discussion Bekri, Mohamed El

160 C p. 837-842
artikel
101 Quantum Computers for Optimization the Performance Abdullah, Radhwan Mohamed

160 C p. 54-60
artikel
102 Recovery of Incomplete IoT Sensed Data using High-Performance Extended-Input Neural-Like Structure Izonin, Ivan

160 C p. 521-526
artikel
103 Risk Analysis of Using Big Data in Computer Sciences Silva, Jesus

160 C p. 532-537
artikel
104 Robust Hybrid-Security Protocol for HealthCare Systems Albarki, Ibrahim

160 C p. 843-848
artikel
105 Secure Tilted-Rectangular-Shaped Request Zone Location-Aided Routing Protocol (STRS-RZLAR) for Vehicular Ad Hoc Networks Saleh, Ma’en

160 C p. 248-253
artikel
106 Security and Privacy Issues in Cloud, Fog and Edge Computing Parikh, Shalin

160 C p. 734-739
artikel
107 Semantic analysis for information and communication threats detection of online service users Fedushko, Solomiia

160 C p. 254-259
artikel
108 Semantic Interpretation of the map with Diabetes-Related Websites Shi, Hongyi

160 C p. 330-337
artikel
109 Signaling Game-Inspired Model for Ubiquitous Security in VANETs Mabrouk, Abdelfettah

160 C p. 791-796
artikel
110 SmartCGMS as an Environment for an Insulin-Pump Development with FDA-Accepted In-Silico Pre-Clinical Trials Ubl, Martin

160 C p. 322-329
artikel
111 Smart cities-A case study of Porto and Ahmedabad Solanki, Aniket Singh

160 C p. 718-722
artikel
112 Smart Contracts and Internet of Things: A Qualitative Content Analysis using the Technology-Organization-Environment Framework to Identify Key-Determinants Schmitt, Gregor

160 C p. 189-196
artikel
113 Smart Farming using IoT, a solution for optimally monitoring farming conditions Doshi, Jash

160 C p. 746-751
artikel
114 Smart Home Is Not Smart Enough to Protect You - Protocols, Challenges and Open Issues Yassein, Muneer Bani

160 C p. 134-141
artikel
115 Smart logistics: Study of the application of blockchain technology Issaoui, Yassine

160 C p. 266-271
artikel
116 Study of Named Entity Recognition methods in biomedical field Śniegula, Anna

160 C p. 260-265
artikel
117 The COVCRAV project: Architecture and design of a cooperative V2V crash avoidance system Outay, Fatma

160 C p. 473-478
artikel
118 The Effect of Cybersickness of an Immersive Wheelchair Simulator Salgado, Débora P.

160 C p. 665-670
artikel
119 The Impact of Big Data Quality on Sentiment Analysis Approaches Alaoui, Imane El

160 C p. 803-810
artikel
120 The Nonparametric Method for Differentiation of Phonostatistical Structures of Authorial Style Khomytska, Iryna

160 C p. 38-45
artikel
121 The Raising Role of Virtual Reality in Accessibility Systems Teófilo, Mauro R.S.

160 C p. 671-677
artikel
122 The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare
160 C p. 272
artikel
123 Towards PWA in Healthcare Rêgo, Felipe

160 C p. 678-683
artikel
124 Trackify: A Robust System For Preserving Money Transactions Mohamed, Kareem

160 C p. 118-125
artikel
125 Unique Message Authentication Security Approach based Controller Area Network (CAN) for Anti-lock Braking System (ABS) in Vehicle Network Ishak, Mohamad Khairi

160 C p. 93-100
artikel
126 University Clusters from SIR IBER Indicators of Innovation Factor 2016-2019 Vasquez-Stanescu, Carmen

160 C p. 451-456
artikel
127 Unmanned Aerial Vehicle in the Machine Learning Environment Khan, Asharul Islam

160 C p. 46-53
artikel
128 User-oriented cache deletion algorithm in a delayed update-tolerant web cache server for supporting a non-formal education Kurashita, Yudai

160 C p. 61-69
artikel
129 Validation of SDN policies: a property-based testing perspective Castro, Laura M.

160 C p. 23-29
artikel
130 Voice-Controlled Autonomous Vehicle Using IoT Sachdev, Sumeet

160 C p. 712-717
artikel
131 Wavelength Assignment Vs. Wavelength Converter Placement in Wavelength-Routed Optical WDM Networks Zakouni, Amiyne

160 C p. 766-771
artikel
132 Why do I feel younger? – A critical view on cognitive age and IT adoption Haug, Maximilian

160 C p. 433-438
artikel
                             132 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland