nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accurate prediction of electric vehicles mileage for proactive battery management in varied conditions using multi-criteria approach
|
Jog, Vivek V. |
|
|
119 |
PA |
p. |
artikel |
2 |
A combined probabilistic-fuzzy approach for dynamic modeling of traffic in smart cities: Handling imprecise and uncertain traffic data
|
Jamshidnejad, Anahita |
|
|
119 |
PA |
p. |
artikel |
3 |
A comprehensive decision support system for optimizing solar power projects using Fermatean fuzzy soft Einstein aggregation operators
|
Zeb, Aurang |
|
|
119 |
PA |
p. |
artikel |
4 |
Adaptive similarity-guided self-merging network for few-shot semantic segmentation
|
Liu, Yu |
|
|
119 |
PA |
p. |
artikel |
5 |
A DCSLBP based intelligent machine malfunction detection model using sound signals for industrial automation systems
|
Boztas, G. |
|
|
119 |
PA |
p. |
artikel |
6 |
Advancing Vietnamese Visual Question Answering with Transformer and Convolutional Integration
|
Nguyen, Ngoc Son |
|
|
119 |
PA |
p. |
artikel |
7 |
A machine learning-based adaptive heuristic for vessel scheduling problem under uncertainty via chance-constrained programming
|
Li, Runfo |
|
|
119 |
PA |
p. |
artikel |
8 |
An efficient anonymous authentication scheme for blockchain assisted and fog-enabled smart grid
|
Subramani, Jegadeesan |
|
|
119 |
PA |
p. |
artikel |
9 |
An energy and area-efficient spike frequency adaptable LIF neuron for spiking neural networks
|
Mushtaq, Umayia |
|
|
119 |
PA |
p. |
artikel |
10 |
A new voltage sensitivity-based distributed feedback online optimization for voltage control in active distribution networks
|
Kinga, Sammy |
|
|
119 |
PA |
p. |
artikel |
11 |
An intelligent ransomware attack detection and classification using dual vision transformer with Mantis Search Split Attention Network
|
K., Ashwini |
|
|
119 |
PA |
p. |
artikel |
12 |
An optimized ensemble classifier for mammographic mass classification
|
Laishram, Romesh |
|
|
119 |
PA |
p. |
artikel |
13 |
A novel dynamic vulnerability assessment method for Industrial Control System based on vulnerability correlation attack graph
|
Zhou, Ying |
|
|
119 |
PA |
p. |
artikel |
14 |
A novel offloading strategy for multi-user optimization in blockchain-enabled Mobile Edge Computing networks for improved Internet of Things performance
|
Rahmani, Amir Masoud |
|
|
119 |
PA |
p. |
artikel |
15 |
A novel reconfigurable UAV design and control based on the parallel linkage
|
Xu, Xuesong |
|
|
119 |
PA |
p. |
artikel |
16 |
An SDN-based Hybrid-DL-driven cognitive intrusion detection system for IoT ecosystem
|
Wahab, Fazal |
|
|
119 |
PA |
p. |
artikel |
17 |
Application and practice of portable bi-directional DC-AC energy storage converter based on second order generalized integrator phase-locked loop and HERIC circuit
|
Zhang, Caiyi |
|
|
119 |
PA |
p. |
artikel |
18 |
Application layer security for Internet communications: A comprehensive review, challenges, and future trends
|
Cevallos-Salas, David |
|
|
119 |
PA |
p. |
artikel |
19 |
A review of integrated modeling and simulation of control and communication systems in Smart Grid
|
Aslam, Muhammad Mobeen |
|
|
119 |
PA |
p. |
artikel |
20 |
Artificial intelligence-based smart agricultural systems for saffron cultivation with integration of Unmanned Aerial Vehicle imagery and deep learning approaches
|
Nazeer, Ishrat |
|
|
119 |
PA |
p. |
artikel |
21 |
A shape-supervised feature fusion U-Net for tubular structure segmentation
|
Yue, Jinghua |
|
|
119 |
PA |
p. |
artikel |
22 |
Asymptotic multilayer pooled transformer based strategy for medical assistance in developing countries
|
He, Keke |
|
|
119 |
PA |
p. |
artikel |
23 |
BCDA: A blockchain-based dynamic auditing scheme for intelligent IoT
|
Liu, Yu |
|
|
119 |
PA |
p. |
artikel |
24 |
Benchmarking feed-forward randomized neural networks for vessel trajectory prediction
|
Cheng, Ruke |
|
|
119 |
PA |
p. |
artikel |
25 |
Bids and asks: Blockchain-based peer-to-peer trading platform
|
Divya, G. |
|
|
119 |
PA |
p. |
artikel |
26 |
Blockchain-based and multi-authority hierarchical access control data sharing scheme
|
Du, Jianming |
|
|
119 |
PA |
p. |
artikel |
27 |
BSPM: Blockchain-based Security Protection Model for power load management terminals
|
Cai, Hao |
|
|
119 |
PA |
p. |
artikel |
28 |
Capacitor voltage balancing, capacitance monitoring, and fast fault detection in a nested neutral point clamped (NNPC) converter with the reduced number of sensors
|
Barahouei, Vahid |
|
|
119 |
PA |
p. |
artikel |
29 |
CloudIntellMal: An advanced cloud based intelligent malware detection framework to analyze android applications
|
Mishra, Preeti |
|
|
119 |
PA |
p. |
artikel |
30 |
Complementary split ring resonator-inspired multi-HCN for implementation of an efficiency-enhanced inverse class-F2,3 PA
|
Boumalkha, Mohamed |
|
|
119 |
PA |
p. |
artikel |
31 |
Comprehensive survey: Biometric user authentication application, evaluation, and discussion
|
Alrawili, Reem |
|
|
119 |
PA |
p. |
artikel |
32 |
Construction of battery charge state prediction model for new energy electric vehicles
|
Luo, Daobao |
|
|
119 |
PA |
p. |
artikel |
33 |
Context-aware embeddings for robust multiclass fraudulent URL detection in online social platforms
|
Afzal, Sara |
|
|
119 |
PA |
p. |
artikel |
34 |
Depth based stable election routing protocol for heterogeneous internet of underwater things (IoUT) energy efficiency
|
Ali, Elmustafa Sayed |
|
|
119 |
PA |
p. |
artikel |
35 |
Design procedures for series–series wpt systems: A comparative analysis
|
Corti, Fabio |
|
|
119 |
PA |
p. |
artikel |
36 |
Detecting android malware using deep learning algorithms: A survey
|
Alzubaidi, Abdulaziz |
|
|
119 |
PA |
p. |
artikel |
37 |
Driver fatigue detection method based on temporal–spatial adaptive networks and adaptive temporal fusion module
|
Lv, Xiangshuai |
|
|
119 |
PA |
p. |
artikel |
38 |
dssCLATT: A tkinter based software tool to learn and analyze for advancement of dye-sensitized solar cell technology
|
Mandal, Biswajit |
|
|
119 |
PA |
p. |
artikel |
39 |
Editorial Board
|
|
|
|
119 |
PA |
p. |
artikel |
40 |
Efficient power factor correction in single phase AC–DC boost converter for retrofitted electric bicycle battery charging: A finite element analysis approach
|
S, Julius Fusic |
|
|
119 |
PA |
p. |
artikel |
41 |
Energy harvesting-assisted wireless transmission secured with jamming: Performance analysis
|
Ho-Van, Khuong |
|
|
119 |
PA |
p. |
artikel |
42 |
Energy management algorithm development for smart car parks including charging stations, storage, and renewable energy sources
|
Ayaz, Murat |
|
|
119 |
PA |
p. |
artikel |
43 |
Enhanced connectivity through double RIS uplink MIMO and advanced modulation
|
Salem, Mohammed A. |
|
|
119 |
PA |
p. |
artikel |
44 |
Enhanced QRS detection and ECG compression using adaptive thresholding: A real-time approach for improved monitoring and diagnosis
|
Habibi, Zhilvan |
|
|
119 |
PA |
p. |
artikel |
45 |
Enhanced virtual machine migration for energy sustainability optimization in cloud computing through knowledge acquisition
|
Seddiki, Doraid |
|
|
119 |
PA |
p. |
artikel |
46 |
Enhancing anomaly detection: A comprehensive approach with MTBO feature selection and TVETBOOptimized Quad-LSTM classification
|
Reddy N V, RajaSekhar |
|
|
119 |
PA |
p. |
artikel |
47 |
Enhancing sustainability in electric mobility: Exploring blockchain applications for secure EV charging and energy management
|
Rana, Muhammad Tayyab |
|
|
119 |
PA |
p. |
artikel |
48 |
Evaluating the impact of unmanned aerial vehicles (UAVs) on air quality management in smart cities: A comprehensive analysis of transportation-related pollution
|
Bakirci, Murat |
|
|
119 |
PA |
p. |
artikel |
49 |
Experimental investigation of predictive control for PMSM-based wind turbine generation system
|
Nouraldin, Noura A. |
|
|
119 |
PA |
p. |
artikel |
50 |
Fault diagnosis of planetary gearboxes under variable operating conditions based on AWM-TCN
|
Huang, Jinpeng |
|
|
119 |
PA |
p. |
artikel |
51 |
FPGA-based UAV and UGV for search and rescue applications: A case study
|
Huang, Chun-Hsian |
|
|
119 |
PA |
p. |
artikel |
52 |
High-order polynomial interpolation with CNN: A robust approach for missing data imputation
|
Khan, Hufsa |
|
|
119 |
PA |
p. |
artikel |
53 |
How rationals boost textual entailment modeling: Insights from large language models
|
Pham, Duc-Huy |
|
|
119 |
PA |
p. |
artikel |
54 |
Improved keypoint localization network for tea bud based on YOLO framework
|
Chen, Shunlong |
|
|
119 |
PA |
p. |
artikel |
55 |
Improving stability and performance in IoT-Driven networked control systems
|
Lu, Xutao |
|
|
119 |
PA |
p. |
artikel |
56 |
Informer model with season-aware block for efficient long-term power time series forecasting
|
Cui, Yunlong |
|
|
119 |
PA |
p. |
artikel |
57 |
Insider threat detection in cyber-physical systems: a systematic literature review
|
Al-Mhiqani, Mohammed Nasser |
|
|
119 |
PA |
p. |
artikel |
58 |
Interactive display method of electric power business hall based on 3D technology
|
Wang, Yijun |
|
|
119 |
PA |
p. |
artikel |
59 |
Interference management and power scheduling in femtocell networks with the optimized power scheduling BiLSTM
|
Mohite, Dr. Shailaja Sanjay |
|
|
119 |
PA |
p. |
artikel |
60 |
IoT-driven optimization of a NxN enhanced pipeline multiplier
|
Mohammad, Khader |
|
|
119 |
PA |
p. |
artikel |
61 |
Link attributes based multi-service routing for software-defined satellite networks
|
Lu, Xueyu |
|
|
119 |
PA |
p. |
artikel |
62 |
Local core expanding-based label diffusion and local deep embedding for fast community detection algorithm in social networks
|
Bouyer, Asgarali |
|
|
119 |
PA |
p. |
artikel |
63 |
LSGDDN-LCD: An appearance-based loop closure detection using local superpixel grid descriptors and incremental dynamic nodes
|
Zhang, Baosheng |
|
|
119 |
PA |
p. |
artikel |
64 |
MATNet: Semantic segmentation of 3D point clouds with multiscale adaptive transformer
|
Zheng, Yufei |
|
|
119 |
PA |
p. |
artikel |
65 |
Multi-objective discrete Cuckoo search algorithm for optimization of bag-of-tasks scheduling in fog computing environment
|
Hosseini, Seyed Mahyar |
|
|
119 |
PA |
p. |
artikel |
66 |
Multistep power load forecasting using iterative neural network-based prediction intervals
|
Guan, Shouping |
|
|
119 |
PA |
p. |
artikel |
67 |
Network anomaly detection and security defense technology based on machine learning: A review
|
Liu, Ruixiao |
|
|
119 |
PA |
p. |
artikel |
68 |
Online_XKD: An online knowledge distillation model for underwater object detection
|
Chen, Xiao |
|
|
119 |
PA |
p. |
artikel |
69 |
PA-Net: Trustworthy weakly supervised point cloud semantic segmentation with primary–auxiliary structure
|
Niu, Yingchun |
|
|
119 |
PA |
p. |
artikel |
70 |
Pattern reconfigurable UHF RFID universal reader antenna array
|
Abdallah, Rania M. |
|
|
119 |
PA |
p. |
artikel |
71 |
Power factor preregulation in power supplies using modified single stage non-isolated interleaved Sepic converter with minimal part count
|
Periyathiruvadi, Muthu Thiruvengadam |
|
|
119 |
PA |
p. |
artikel |
72 |
Prediction of rainy-day photovoltaic power generation based on Generative Adversarial Networks and enhanced Sparrow Search Algorithm
|
Wencheng, Liu |
|
|
119 |
PA |
p. |
artikel |
73 |
Privacy preserving decentralized swap derivative with deep learning based oracles leveraging blockchain technology and cryptographic primitives
|
Vijayakumar, Gayathri |
|
|
119 |
PA |
p. |
artikel |
74 |
Privacy-preserving protocol for high-frequency smart meters using reversible watermarking and Paillier encryption
|
Kabir, Farzana |
|
|
119 |
PA |
p. |
artikel |
75 |
Quantum-attack-resilience OTP-based multi-factor mutual authentication and session key agreement scheme for mobile users
|
Basu, Swagatam |
|
|
119 |
PA |
p. |
artikel |
76 |
Real-time Arabic avatar for deaf-mute communication enabled by deep learning sign language translation
|
Talaat, Fatma M. |
|
|
119 |
PA |
p. |
artikel |
77 |
Reconfigurable topology assessment for efficient allocation of photovoltaic generators in unbalanced power delivery networks
|
Maji, Sukalyan |
|
|
119 |
PA |
p. |
artikel |
78 |
Reversible Data Hiding based on optimized CNN predictor and Prediction Error Expansion with Lower Surround Background Complexity
|
Luo, Yuling |
|
|
119 |
PA |
p. |
artikel |
79 |
Secure ultra fast authentication protocol for electric vehicle charging
|
Mookherji, Srijanee |
|
|
119 |
PA |
p. |
artikel |
80 |
Side-channel attacks based on attention mechanism and multi-scale convolutional neural network
|
He, Pengfei |
|
|
119 |
PA |
p. |
artikel |
81 |
Smart3DMOT: Smart cascade 3D MOT tracking strategy with motion and appearance association
|
Hong, Ru |
|
|
119 |
PA |
p. |
artikel |
82 |
Unveiling the impact of heterogeneous driving behaviors on traffic flow: A mesoscale multi-agent modeling approach
|
Wu, Ling |
|
|
119 |
PA |
p. |
artikel |