nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A BIM-IoT and intelligent compaction integrated framework for advanced road compaction quality monitoring and management
|
Han, Tao |
|
|
100 |
C |
p. |
artikel |
2 |
A biometric secured anonymous communication protocol for Vehicular Ad hoc Network
|
P., Remya krishnan |
|
|
100 |
C |
p. |
artikel |
3 |
A buffer-aware dynamic UAV trajectory design for data collection in resource-constrained IoT frameworks
|
Mazumdar, Nabajyoti |
|
|
100 |
C |
p. |
artikel |
4 |
A comprehensive intrusion detection framework using boosting algorithms
|
Kilincer, Ilhan Firat |
|
|
100 |
C |
p. |
artikel |
5 |
A decentralized autonomous personal data management system in banking sector
|
Anna Gustina Zainal, Dr. M |
|
|
100 |
C |
p. |
artikel |
6 |
A deep learning-based microgrid market modeling with planning assumptions
|
Zeng, Yijun |
|
|
100 |
C |
p. |
artikel |
7 |
Advance learning technique for the electricity market attack detection
|
Huang, Yikun |
|
|
100 |
C |
p. |
artikel |
8 |
A Dynamic Control Methodology for DC Fault Ride Through of Modular Multilevel Converter based High Voltage Direct Current Systems
|
Inwumoh, Jude |
|
|
100 |
C |
p. |
artikel |
9 |
A Feature Similarity Machine Learning Model for DDoS Attack Detection in Modern Network Environments for Industry 4.0
|
Sambangi, Swathi |
|
|
100 |
C |
p. |
artikel |
10 |
A grasping posture estimation method based on 3D detection network
|
Ge, Junyan |
|
|
100 |
C |
p. |
artikel |
11 |
A lifelong framework for data quality monitoring of roadside sensors in cooperative vehicle-infrastructure systems
|
Du, Yuchuan |
|
|
100 |
C |
p. |
artikel |
12 |
A lightweight authentication scheme with privacy preservation for vehicular networks
|
Rawat, Gopal Singh |
|
|
100 |
C |
p. |
artikel |
13 |
All-round improvement in DCT-based blind image watermarking with visual enhancement via denoising autoencoder
|
Hu, Hwai-Tsu |
|
|
100 |
C |
p. |
artikel |
14 |
A Machine Learning Approach for Human Breath Diagnosis with Soft Sensors
|
Suresh, K.C. |
|
|
100 |
C |
p. |
artikel |
15 |
Ambient-noise Free Generation of Clean Underwater Ship Engine Audios from Hydrophones using Generative Adversarial Networks
|
Ashraf, Hina |
|
|
100 |
C |
p. |
artikel |
16 |
A moving target defence approach for detecting deception attacks on cyber-physical systems
|
Babadi, Narges |
|
|
100 |
C |
p. |
artikel |
17 |
An automatic classification and early disease detection technique for herbs plant
|
Sathiya, V. |
|
|
100 |
C |
p. |
artikel |
18 |
An efficient framework for semantically-correlated term detection and sanitization in clinical documents
|
Moqurrab, Syed Atif |
|
|
100 |
C |
p. |
artikel |
19 |
An efficient, robust optimization model for the unit commitment considering renewable uncertainty and pumped-storage hydropower
|
Nasab, Morteza Azimi |
|
|
100 |
C |
p. |
artikel |
20 |
An intelligent music genre analysis using feature extraction and classification using deep learning techniques
|
Hongdan, Wang |
|
|
100 |
C |
p. |
artikel |
21 |
An intelligent WSN-UAV-based IoT framework for precision agriculture application
|
Singh, Pradeep Kumar |
|
|
100 |
C |
p. |
artikel |
22 |
An LSTM-based model for the compression of acoustic inventories for corpus-based text-to-speech synthesis systems
|
Rojc, Matej |
|
|
100 |
C |
p. |
artikel |
23 |
An optimum end-to-end text-independent speaker identification system using convolutional neural network
|
Farsiani, Shabnam |
|
|
100 |
C |
p. |
artikel |
24 |
A novel method for lung nodule detection in computed tomography scans based on Boolean equations and vector of filters techniques
|
de Mesquita, Vítor A. |
|
|
100 |
C |
p. |
artikel |
25 |
A novel nomad migration-inspired algorithm for global optimization
|
Lin, Na |
|
|
100 |
C |
p. |
artikel |
26 |
A privacy enhancing model for Internet of Things using three-way decisions and differential privacy
|
Ali, Waqas |
|
|
100 |
C |
p. |
artikel |
27 |
A probable cheating-free (t, n) threshold secret sharing scheme with enhanced blockchain
|
Biswas, Anindya Kumar |
|
|
100 |
C |
p. |
artikel |
28 |
A recommender system fused with implicit social information through network representation learning
|
Chen, Yida |
|
|
100 |
C |
p. |
artikel |
29 |
A Robust DNS Flood Attack Detection with a Hybrid Deeper Learning Model
|
KASIM, Ömer |
|
|
100 |
C |
p. |
artikel |
30 |
Artificial intelligence-based creative thinking skill analysis model using human–computer interaction in art design teaching
|
Fan, Xiaoying |
|
|
100 |
C |
p. |
artikel |
31 |
A sophisticated offline network developed for recognizing handwritten Chinese character efficiently
|
Xu, Xingmiao |
|
|
100 |
C |
p. |
artikel |
32 |
Autonomous Application Controls on Smart Irrigation
|
Veerachamy, Ramachandran |
|
|
100 |
C |
p. |
artikel |
33 |
Autonomous detection of malevolent nodes using secure heterogeneous cluster protocol
|
Kotteeswaran, C. |
|
|
100 |
C |
p. |
artikel |
34 |
Character-level word encoding deep learning model for combating cyber threats in phishing URL detection
|
Alshehri, Mohammed |
|
|
100 |
C |
p. |
artikel |
35 |
College music education and teaching based on AI techniques
|
Wei, Jing |
|
|
100 |
C |
p. |
artikel |
36 |
Compatibility of a Truncated Fin-FinFET as a k-modulated Biosensor with Optimum parameters for Pre-emptive Diagnosis of Diseases
|
Kashyap, Mridul Prakash |
|
|
100 |
C |
p. |
artikel |
37 |
Competitive trading scheduling in smart microgrid market with uncertainty
|
Liu, Zhi |
|
|
100 |
C |
p. |
artikel |
38 |
Context-aware session recommendation based on recurrent neural networks
|
Wu, Tianhui |
|
|
100 |
C |
p. |
artikel |
39 |
Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges
|
Nath N, Renya |
|
|
100 |
C |
p. |
artikel |
40 |
Customized deep neural network model for autonomous and efficient surveillance of wildlife in national parks
|
Maheswari, M. |
|
|
100 |
C |
p. |
artikel |
41 |
Deep Learning Models for Arrhythmia Detection in IoT Healthcare Applications
|
Hammad, Mohamed |
|
|
100 |
C |
p. |
artikel |
42 |
Deep retinex decomposition network for underwater image enhancement
|
Xu, Shuai |
|
|
100 |
C |
p. |
artikel |
43 |
Design of autonomous online social community architecture for older adults
|
Embarak, Farhat |
|
|
100 |
C |
p. |
artikel |
44 |
Detection of remote sensing targets with angles via modified CenterNet
|
Wang, Xin |
|
|
100 |
C |
p. |
artikel |
45 |
Digital payment fraud detection methods in digital ages and Industry 4.0
|
Chang, Victor |
|
|
100 |
C |
p. |
artikel |
46 |
Digital teaching in the context of Chinese universities and their impact on students for Ubiquitous Applications
|
Wu, Kexu |
|
|
100 |
C |
p. |
artikel |
47 |
Economic Operation and Management of Microgrid System Using Deep Reinforcement Learning
|
Wu, Ling |
|
|
100 |
C |
p. |
artikel |
48 |
Edge optimized and personalized lifelogging framework using ensembled metaheuristic algorithms
|
Agarwal, Preeti |
|
|
100 |
C |
p. |
artikel |
49 |
Editorial Board
|
|
|
|
100 |
C |
p. |
artikel |
50 |
Efficient deniable authentication and its application in location-based services
|
Ahene, Emmanuel |
|
|
100 |
C |
p. |
artikel |
51 |
Evolutionary Approach for Optimal Bidding Strategies in Electricity Markets
|
Wang, Zirun |
|
|
100 |
C |
p. |
artikel |
52 |
Fairness-aware scheduling of dynamic cross-job coflows in shared datacenters based on meta learning
|
Huang, Hongbin |
|
|
100 |
C |
p. |
artikel |
53 |
Feature-guided Multimodal Sentiment Analysis towards Industry 4.0
|
Yu, Bihui |
|
|
100 |
C |
p. |
artikel |
54 |
Federated Learning-Aware Multi-Objective Modeling and blockchain-enable system for IIoT applications
|
Lakhan, Abdullah |
|
|
100 |
C |
p. |
artikel |
55 |
Fibonacci tree structure based privacy preserving public auditing for IoT enabled data in cloud environment
|
Mishra, Rahul |
|
|
100 |
C |
p. |
artikel |
56 |
Guest editorial: Introduction to the special section: Advanced Software and Data Analytics for Secure UAV Networks (VSI-suav)
|
Sharma, Bhisham |
|
|
100 |
C |
p. |
artikel |
57 |
Hand gesture recognition based on a Harris Hawks optimized Convolution Neural Network
|
Gadekallu, Thippa Reddy |
|
|
100 |
C |
p. |
artikel |
58 |
High dimensional autonomous computing on Arabic language classification
|
Rady, George Samy |
|
|
100 |
C |
p. |
artikel |
59 |
Human-computer interaction for augmentative communication using a visual feedback system
|
Zhao, Jian |
|
|
100 |
C |
p. |
artikel |
60 |
Hybrid beamforming with relay and dual-base stations blockage mitigation in millimetre-wave 5G communication applied in (VIOT)
|
Alsunbuli, Bushra N. |
|
|
100 |
C |
p. |
artikel |
61 |
Hybrid optimization and deep learning based intrusion detection system
|
Gupta, Subham Kumar |
|
|
100 |
C |
p. |
artikel |
62 |
Image encryption using modified perfect shuffle-based bit level permutation and learning with errors based diffusion for IoT devices
|
M., Devipriya |
|
|
100 |
C |
p. |
artikel |
63 |
Impact of Interface Trap Charges on the Performances of Junctionless MOSFET in Sub-Threshold Regime
|
Ganguli, Tanushree |
|
|
100 |
C |
p. |
artikel |
64 |
Implementation analysis of reliable unmanned aerial vehicles models for security against cyber-crimes: Attacks, tracebacks, forensics and solutions
|
Alsulami, Hemaid |
|
|
100 |
C |
p. |
artikel |
65 |
Innovation of engineering teaching methods based on multimedia assisted technology
|
Fu, Jianping |
|
|
100 |
C |
p. |
artikel |
66 |
Intelligent deep learning-enabled autonomous small ship detection and classification model
|
Escorcia-Gutierrez, José |
|
|
100 |
C |
p. |
artikel |
67 |
Interactive teaching using human-machine interaction for higher education systems
|
Shang, Huipeng |
|
|
100 |
C |
p. |
artikel |
68 |
Interference management in backhaul constrained 5G HetNets through coordinated multipoint
|
Gulia, Sandeep |
|
|
100 |
C |
p. |
artikel |
69 |
Internet-of-thing based real-time electrical market monitoring system design
|
Zhao, Yiqing |
|
|
100 |
C |
p. |
artikel |
70 |
Introduction to the special section on advances of machine learning in cybersecurity (VSI-mlsec)
|
Namasudra, Suyel |
|
|
100 |
C |
p. |
artikel |
71 |
Introduction to the special section on Artificial Intelligence-driven Mobile Edge Computing (VSI-aime)
|
Pasumpon Pandian, A. |
|
|
100 |
C |
p. |
artikel |
72 |
Introduction to the special section on developments in renewable energy generation and automation
|
Ramadan, Haitham Saad Mohamed |
|
|
100 |
C |
p. |
artikel |
73 |
Introduction to the special section on field programmable gate arrays applications (VSI-fpga3)
|
CABAL-YEPEZ, Eduardo |
|
|
100 |
C |
p. |
artikel |
74 |
Introduction to the special section on Human-computer Interaction enabled Augmentative communication (VSI-hcac)
|
García-Díaz, Vicente |
|
|
100 |
C |
p. |
artikel |
75 |
Introduction to the special section on parallel and distributed computing, algorithms, programming, applications and technologies (VSI-pdcat4)
|
Xu, Yicheng |
|
|
100 |
C |
p. |
artikel |
76 |
Introduction to the special section on security and privacy in IoT and cloud (VSI-spiot)
|
Mondal, Bhaskar |
|
|
100 |
C |
p. |
artikel |
77 |
Introduction to the special section on State-of-the-art Micro-Nano devices and systems
|
Sarkar, Angsuman |
|
|
100 |
C |
p. |
artikel |
78 |
IoE based private multi-data center cloud architecture framework
|
Dhaya, R |
|
|
100 |
C |
p. |
artikel |
79 |
Lightweight intrusion detection for edge computing networks using deep forest and bio-inspired algorithms
|
Bangui, Hind |
|
|
100 |
C |
p. |
artikel |
80 |
Machine Learning Approach For System Reconfiguration Considering Profit-Driven Security Market
|
Li, Xiaolei |
|
|
100 |
C |
p. |
artikel |
81 |
Machine learning-based algorithmically generated domain detection
|
Wang, Zheng |
|
|
100 |
C |
p. |
artikel |
82 |
Market-Based Versus Price-Based Optimal Trading Mechanism Design in Microgrid
|
Zhu, Lianyi |
|
|
100 |
C |
p. |
artikel |
83 |
Mitigating adversarial evasion attacks of ransomware using ensemble learning
|
Ahmed, Usman |
|
|
100 |
C |
p. |
artikel |
84 |
Model-free predictive control of nonlinear systems under False Data Injection attacks
|
Zhang, Zeyu |
|
|
100 |
C |
p. |
artikel |
85 |
Multi-gen genetic programming based improved innovative model for extrapolation of wind data at high altitudes, case study: Turkey
|
Emeksiz, Cem |
|
|
100 |
C |
p. |
artikel |
86 |
Multi-view Subspace Clustering with View Correlations via low-rank tensor learning
|
Zheng, Qinghai |
|
|
100 |
C |
p. |
artikel |
87 |
Newly developed narrow-band filters for stabilizing load voltage and compensating for voltage unbalance with harmonics in islanded Microgrid
|
Elnady, A. |
|
|
100 |
C |
p. |
artikel |
88 |
Novel market decision approach using data management technique with short supply
|
Huang, Yan |
|
|
100 |
C |
p. |
artikel |
89 |
Optimal vehicle-to-grid and grid-to-vehicle scheduling strategy with uncertainty management using improved marine predator algorithm
|
R, Sowmya |
|
|
100 |
C |
p. |
artikel |
90 |
Optimizing the LoRa network performance for industrial scenario using a machine learning approach
|
Kaur, Gagandeep |
|
|
100 |
C |
p. |
artikel |
91 |
Parametric investigation and trap sensitivity of n-p-n double gate TFETs
|
Deb, Deepjyoti |
|
|
100 |
C |
p. |
artikel |
92 |
Peer To Peer Market Management And Policy Modeling Of The Electricity Market
|
Liu, Ying |
|
|
100 |
C |
p. |
artikel |
93 |
Performance analysis of cognitive hybrid radio frequency and free space optical cooperative networks
|
Qin, Dong |
|
|
100 |
C |
p. |
artikel |
94 |
Personality prediction model for social media using machine learning Technique
|
Kamalesh, Murari Devakannan |
|
|
100 |
C |
p. |
artikel |
95 |
Power quality events recognition using enhanced empirical mode decomposition and optimized extreme learning machine
|
Samanta, Indu Sekhar |
|
|
100 |
C |
p. |
artikel |
96 |
Practical attacks on a class of secret image sharing schemes based on Chinese Remainder Theorem
|
Sahoo, Suraj Kumar |
|
|
100 |
C |
p. |
artikel |
97 |
Real-time data of COVID-19 detection with IoT sensor tracking using artificial neural network
|
Mohammedqasem, Roa'a |
|
|
100 |
C |
p. |
artikel |
98 |
Real-time deep learning-based market demand forecasting and monitoring
|
Guo, Yuan |
|
|
100 |
C |
p. |
artikel |
99 |
Real-Time intelligent Elevator Monitoring and Diagnosis: Case Studies and Solutions with applications using Artificial Intelligence
|
Jiang, Xi-Yang |
|
|
100 |
C |
p. |
artikel |
100 |
Regularized sparse features for noisy speech enhancement using deep neural networks
|
Khattak, Muhammad Irfan |
|
|
100 |
C |
p. |
artikel |
101 |
Remote reconfiguration of FPGA-based wireless sensor nodes for flexible Internet of Things☆
|
Aziz, Syed Mahfuzul |
|
|
100 |
C |
p. |
artikel |
102 |
Risk monitoring strategy for confidentiality of healthcare information
|
Rizwan, Muhammad |
|
|
100 |
C |
p. |
artikel |
103 |
Secure and pervasive communication framework using Named Data Networking for connected healthcare
|
Dudeja, Rajan Kumar |
|
|
100 |
C |
p. |
artikel |
104 |
Securing e-Health application of cloud computing using hyperchaotic image encryption framework
|
R, Anandkumar |
|
|
100 |
C |
p. |
artikel |
105 |
Semantic Constraints Matrix Factorization Hashing for cross-modal retrieval
|
Li, Weian |
|
|
100 |
C |
p. |
artikel |
106 |
ShareTrust: Centralized trust management mechanism for trustworthy resource sharing in industrial Internet of Things
|
Din, Ikram Ud |
|
|
100 |
C |
p. |
artikel |
107 |
Software fault prediction using data mining, machine learning and deep learning techniques: A systematic literature review
|
Batool, Iqra |
|
|
100 |
C |
p. |
artikel |
108 |
Spilled load detection based on lightweight YOLOv4 trained with easily accessible synthetic dataset
|
Li, Feng |
|
|
100 |
C |
p. |
artikel |
109 |
Stacking approach for accurate Invasive Ductal Carcinoma classification
|
Haq, Amin Ul |
|
|
100 |
C |
p. |
artikel |
110 |
Structural–Temporal embedding of large-scale dynamic networks with parallel implementation
|
Xie, Luodie |
|
|
100 |
C |
p. |
artikel |
111 |
Traffic scheduling, network slicing and virtualization based on deep reinforcement learning
|
Kumar, Priyan Malarvizhi |
|
|
100 |
C |
p. |
artikel |
112 |
Transfer learning based on lexical constraint mechanism in low-resource machine translation
|
Jiang, Hao |
|
|
100 |
C |
p. |
artikel |
113 |
Underwater image enhancement by color correction and color constancy via Retinex for detail preserving
|
Muniraj, Manigandan |
|
|
100 |
C |
p. |
artikel |
114 |
Underwater image enhancement method with light scattering characteristics
|
Zhou, Jingchun |
|
|
100 |
C |
p. |
artikel |
115 |
Underwater Image Restoration via Information Distribution and Light Scattering Prior
|
Zhou, Jingchun |
|
|
100 |
C |
p. |
artikel |
116 |
Underwater sonar image segmentation combining pixel-level and region-level information
|
Chen, Zhe |
|
|
100 |
C |
p. |
artikel |
117 |
Unsupervised domain adaptation based on adaptive local manifold learning
|
Shi, Kaiming |
|
|
100 |
C |
p. |
artikel |
118 |
Use of supervised machine learning to detect abuse of COVID-19 related domain names
|
Wang, Zheng |
|
|
100 |
C |
p. |
artikel |
119 |
Wind potential investigation with turbine siting control for improved energy yield at El-Tor Region, Egypt
|
Ramadan, Haitham S. |
|
|
100 |
C |
p. |
artikel |