nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analysis and improvement of a key exchange and authentication protocol in client-server environment
|
Li, Yuting |
|
|
11 |
9 |
p. 3787-3799 |
artikel |
2 |
Analysis of MAC protocol of wireless sensor network based on random multi-address access and three-probability joint-control
|
Wang, Xinchun |
|
|
11 |
9 |
p. 3597-3606 |
artikel |
3 |
An eigendecomposition method based on deep learning and probabilistic graph model
|
Li, Xin |
|
|
11 |
9 |
p. 3627-3637 |
artikel |
4 |
A neutral mutated operator applied for DE algorithms
|
Ma, Chuan |
|
|
11 |
9 |
p. 3559-3574 |
artikel |
5 |
An evaluation method of scientific research team influence based on heterogeneity and node similarity of content and structure
|
Wenbin, Zhao |
|
|
11 |
9 |
p. 3617-3626 |
artikel |
6 |
An evolutionary computation-based approach for feature selection
|
Moslehi, Fateme |
|
|
11 |
9 |
p. 3757-3769 |
artikel |
7 |
An improved evidential DEMATEL identify critical success factors under uncertain environment
|
Shang, Xueqian |
|
|
11 |
9 |
p. 3659-3669 |
artikel |
8 |
Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm
|
Alamiedy, Taief Alaa |
|
|
11 |
9 |
p. 3735-3756 |
artikel |
9 |
Bid evaluation decision for major project based on analytic hierarchy process and data envelopment analysis cross-efficiency model
|
Zhao, Liang |
|
|
11 |
9 |
p. 3639-3647 |
artikel |
10 |
CIADL: cloud insider attack detector and locator on multi-tenant network isolation: an OpenStack case study
|
Zhan, Jing |
|
|
11 |
9 |
p. 3473-3495 |
artikel |
11 |
Constraint programming based techniques for medical resources optimization: medical internships planning
|
Benamrane, Amine |
|
|
11 |
9 |
p. 3801-3810 |
artikel |
12 |
Construction of ontology for auto-interpretable tolerance semantics in skin model
|
Peng, Zhiguo |
|
|
11 |
9 |
p. 3545-3558 |
artikel |
13 |
Criteria evaluation and selection in non-native language MBA students admission based on machine learning methods
|
Wu, Xiaojun |
|
|
11 |
9 |
p. 3521-3533 |
artikel |
14 |
Differential evolution optimization of intertwining logistic map-DNA based image encryption technique
|
Dua, Mohit |
|
|
11 |
9 |
p. 3771-3786 |
artikel |
15 |
Efficient data delivery in dense reader environment of passive sensor network
|
Nawaz, Faiza |
|
|
11 |
9 |
p. 3707-3715 |
artikel |
16 |
Energy consumption analysis of different routing protocols in a Delay Tolerant Network
|
Spaho, Evjola |
|
|
11 |
9 |
p. 3833-3839 |
artikel |
17 |
Expected stock return and mixed frequency variance risk premium data
|
Liu, Ruobing |
|
|
11 |
9 |
p. 3585-3596 |
artikel |
18 |
Green building design based on BIM and value engineering
|
Wei, Taibing |
|
|
11 |
9 |
p. 3699-3706 |
artikel |
19 |
I-DEEC: improved DEEC for blanket coverage in heterogeneous wireless sensor networks
|
Nehra, Vibha |
|
|
11 |
9 |
p. 3687-3698 |
artikel |
20 |
Implementation and evaluation of a visualization and analysis system for historical disaster records
|
Ishida, Tomoyuki |
|
|
11 |
9 |
p. 3671-3686 |
artikel |
21 |
Intelligent algorithm in a smart wearable device for predicting and alerting in the danger of vehicle collision
|
Wang, Zexue |
|
|
11 |
9 |
p. 3841-3852 |
artikel |
22 |
Logistics forum based prediction on stock index using intelligent data analysis and processing of online web posts
|
Zhao, Jinghua |
|
|
11 |
9 |
p. 3575-3584 |
artikel |
23 |
Multiple-attribute decision making problems based on SVTNH methods
|
Jana, Chiranjibe |
|
|
11 |
9 |
p. 3717-3733 |
artikel |
24 |
Reconfiguring IVHF-TOPSIS decision making method with parameterized reference solutions and a novel distance for corporate carbon performance evaluation
|
Peng, Ding-Hong |
|
|
11 |
9 |
p. 3811-3832 |
artikel |
25 |
Research on application of athlete gesture tracking algorithms based on deep learning
|
Long, Teng |
|
|
11 |
9 |
p. 3649-3657 |
artikel |
26 |
Research on distribution network reconfiguration based on microgrid
|
Wang, Xuejie |
|
|
11 |
9 |
p. 3607-3615 |
artikel |
27 |
Research on intelligent classification of multi-attribute safety information and determination of operating environment
|
Qi, Xiaofeng |
|
|
11 |
9 |
p. 3509-3520 |
artikel |
28 |
Research on the green total factor productivity and its influencing factors based on system GMM model
|
Ren, Yangjun |
|
|
11 |
9 |
p. 3497-3508 |
artikel |
29 |
Research on the tenacity survivability of wireless sensor networks
|
Yu, Jintao |
|
|
11 |
9 |
p. 3535-3544 |
artikel |
30 |
Special issue on multi-modal information learning and analytics for smart city
|
Xu, Zheng |
|
|
11 |
9 |
p. 3471-3472 |
artikel |
31 |
State dependent queueing models under admission control F-policy: a survey
|
Jain, Madhu |
|
|
11 |
9 |
p. 3873-3891 |
artikel |
32 |
Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach
|
Rao, Routhu Srinivasa |
|
|
11 |
9 |
p. 3853-3872 |
artikel |