nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Algorithmic implementation of deep learning layer assignment in edge computing based smart city environment
|
Lee, Kyuchang |
|
|
89 |
C |
p. |
artikel |
2 |
A Low-Waste Reliable Adiabatic Platform
|
Narimani, Reza |
|
|
89 |
C |
p. |
artikel |
3 |
A secure framework for remote diagnosis in health care: A high capacity reversible data hiding technique for medical images
|
Govind, P.V. Sabeen |
|
|
89 |
C |
p. |
artikel |
4 |
A trust-based fuzzy neural network for smart data fusion in internet of things
|
Malchi, Sunil Kumar |
|
|
89 |
C |
p. |
artikel |
5 |
A vehicle safety monitoring system based on the Internet of things and the identification of physiological characteristics
|
Wang, Zhi-Hao |
|
|
89 |
C |
p. |
artikel |
6 |
Computers and Electrical Engineering: Publisher Note
|
|
|
|
89 |
C |
p. |
artikel |
7 |
Deep learning-based urban big data fusion in smart cities: Towards traffic monitoring and flow-preserving fusion
|
Khan, Sulaiman |
|
|
89 |
C |
p. |
artikel |
8 |
Design and robustness analysis of an Automatic Voltage Regulator system controller by using Equilibrium Optimizer algorithm
|
Micev, Mihailo |
|
|
89 |
C |
p. |
artikel |
9 |
Design of a new BUS for low power reversible computation
|
Krishnaveni, D. |
|
|
89 |
C |
p. |
artikel |
10 |
Design, Simulation and Implementation of a DC Microgrid based on Quadrupler DC Converter
|
Awaad, Mohamed I. |
|
|
89 |
C |
p. |
artikel |
11 |
Detection and localization of inter-frame forgeries in videos based on macroblock variation and motion vector analysis
|
Bakas, Jamimamul |
|
|
89 |
C |
p. |
artikel |
12 |
Detection of highway lane lines and drivable regions based on dynamic image enhancement algorithm under unfavorable vision
|
LIU, Mingzhou |
|
|
89 |
C |
p. |
artikel |
13 |
Development of optimum watermarking algorithm for radiography images
|
El_Tokhy, Mohamed S. |
|
|
89 |
C |
p. |
artikel |
14 |
Editorial Board
|
|
|
|
89 |
C |
p. |
artikel |
15 |
Enhanced QoS routing protocol using maximum flow technique
|
Alghamdi, Turki Ali |
|
|
89 |
C |
p. |
artikel |
16 |
Enhancing prediction of student success: Automated machine learning approach
|
Zeineddine, Hassan |
|
|
89 |
C |
p. |
artikel |
17 |
Exploiting Laguerre transform in image steganography
|
Ghosal, Sudipta Kr |
|
|
89 |
C |
p. |
artikel |
18 |
Illumination normalization techniques for makeup-invariant face recognition
|
Saeed, Usman |
|
|
89 |
C |
p. |
artikel |
19 |
Insights into demand-side management with big data analytics in electricity consumers’ behaviour
|
Oprea, Simona-Vasilica |
|
|
89 |
C |
p. |
artikel |
20 |
Introduction to the special section on image processing in security applications (VSI-ipsa)
|
Cabal-Yepez, Eduardo |
|
|
89 |
C |
p. |
artikel |
21 |
Introduction to the special section on recent advancements in big data fusion
|
Aljawarneh, Shadi A. |
|
|
89 |
C |
p. |
artikel |
22 |
IoT Based monitoring and control of fluid transportation using machine learning
|
Bhaskaran, Priyanka E. |
|
|
89 |
C |
p. |
artikel |
23 |
Mitigating personalization challenges in mobile commerce: An empirical study
|
Qusef, Abdallah |
|
|
89 |
C |
p. |
artikel |
24 |
Morphology-based spatial filtering for efficiency enhancement of remote sensing image fusion
|
Pandit, Vaibhav R. |
|
|
89 |
C |
p. |
artikel |
25 |
Multi-source and multimodal data fusion for predicting academic performance in blended learning university courses
|
Chango, Wilson |
|
|
89 |
C |
p. |
artikel |
26 |
Neural network predictive control of vibrations in tall structure: An experimental controlled vision
|
Jamil, Mohsin |
|
|
89 |
C |
p. |
artikel |
27 |
Pixel co-ordinate-based secret image sharing scheme with constant size shadow images
|
Patil, Shravani Mahesh |
|
|
89 |
C |
p. |
artikel |
28 |
Predicting market movement direction for bitcoin: A comparison of time series modeling methods
|
Ibrahim, Ahmed |
|
|
89 |
C |
p. |
artikel |
29 |
Pseudo magic cubes: A multidimensional data hiding scheme exploiting modification directions for large payloads
|
Ranjani, J. Jennifer |
|
|
89 |
C |
p. |
artikel |
30 |
Retraction Notice
|
|
|
|
89 |
C |
p. |
artikel |
31 |
Secure and verifiable iris authentication system using fully homomorphic encryption
|
Morampudi, Mahesh Kumar |
|
|
89 |
C |
p. |
artikel |
32 |
Simulation and experimental design of adaptive-based maximum power point tracking methods for photovoltaic systems
|
Srinivasarao, P. |
|
|
89 |
C |
p. |
artikel |
33 |
Tamper detection technique for document images using zero watermarking in wavelet domain
|
Singh, Balkar |
|
|
89 |
C |
p. |
artikel |
34 |
Towards the definition of an information quality metric for information fusion models
|
Paggi, Horacio |
|
|
89 |
C |
p. |
artikel |