nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A dependable and secure consensus algorithm for blockchain assisted microservice architecture
|
Ahmed, Mohiuddin |
|
|
109 |
PB |
p. |
artikel |
2 |
An efficient fragile watermarking scheme for tamper localization in satellite images
|
Sharma, Suchita |
|
|
109 |
PB |
p. |
artikel |
3 |
A network slicing algorithm for cloud-edge collaboration hybrid computing in 5G and beyond networks
|
Jin, Jianzhi |
|
|
109 |
PB |
p. |
artikel |
4 |
A novel framework for crowd counting using video and audio
|
Zou, Yi |
|
|
109 |
PB |
p. |
artikel |
5 |
A novel variant of deep convolutional neural network for classification of ovarian tumors using CT images
|
Kodipalli, Ashwini |
|
|
109 |
PB |
p. |
artikel |
6 |
A path planning algorithm for mobile robot based on water flow potential field method and beetle antennae search algorithm
|
Yu, Zhiheng |
|
|
109 |
PB |
p. |
artikel |
7 |
A two-stage approach based on Bayesian deep learning for predicting remaining useful life of rolling element bearings
|
Chen, Kaijian |
|
|
109 |
PB |
p. |
artikel |
8 |
BBBC-DDRL: A hybrid big-bang big-crunch optimization and deliberated deep reinforced learning mechanisms for cyber-attack detection
|
Abirami, A. |
|
|
109 |
PB |
p. |
artikel |
9 |
Computing in-memory with cascaded spintronic devices for AI edge
|
Bian, Zhongjian |
|
|
109 |
PB |
p. |
artikel |
10 |
Detection of High Impedance Faults in Power Lines using Empirical Mode Decomposition with Intelligent Classification Techniques
|
KV, Shihabudheen |
|
|
109 |
PB |
p. |
artikel |
11 |
Dynamic feature weakening for cross-modality person re-identification
|
Lu, Jian |
|
|
109 |
PB |
p. |
artikel |
12 |
Editorial Board
|
|
|
|
109 |
PB |
p. |
artikel |
13 |
Evaluating the inertia of the Jordanian power grid
|
Alnawafah, Hamza |
|
|
109 |
PB |
p. |
artikel |
14 |
GDPR compliance verification through a user-centric blockchain approach in multi-cloud environment
|
Ahmad, Haris |
|
|
109 |
PB |
p. |
artikel |
15 |
Gray wolf optimization-based wind power load mid-long term forecasting algorithm
|
Cai, Zhi |
|
|
109 |
PB |
p. |
artikel |
16 |
Information diffusion prediction based on cascade sequences and social topology
|
Jinghua, Zhao |
|
|
109 |
PB |
p. |
artikel |
17 |
Online emergency demand response mechanism for new power system
|
Liu, Weifeng |
|
|
109 |
PB |
p. |
artikel |
18 |
Optimization method of power grid material warehousing and allocation based on multi-level storage system and reinforcement learning
|
Dai, Zhou |
|
|
109 |
PB |
p. |
artikel |
19 |
ScPUAK: Smart card-based secure Protocol for remote User Authentication and Key agreement
|
Cherbal, Sarra |
|
|
109 |
PB |
p. |
artikel |
20 |
Smart contract vulnerability detection based on a semantic code structure and a self-designed neural network
|
Ren, Xiaojun |
|
|
109 |
PB |
p. |
artikel |
21 |
Task prediction on tablet based deep learning method
|
Dua, Bharat Bhushan |
|
|
109 |
PB |
p. |
artikel |
22 |
TextCNN-based ensemble learning model for Japanese Text Multi-classification
|
Chen, Hua |
|
|
109 |
PB |
p. |
artikel |
23 |
TinyLedger: A Lightweight Blockchain Ledger Protocol for the MEC Network
|
TANG, Yu |
|
|
109 |
PB |
p. |
artikel |
24 |
TruCert: Blockchain-based trustworthy product certification within autonomous automotive supply chains
|
Alsadi, Mohammed |
|
|
109 |
PB |
p. |
artikel |
25 |
WiFi-based indoor passive fall detection for medical Internet of Things
|
Xia, Zhengxin |
|
|
109 |
PB |
p. |
artikel |