nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A centralized architecture for autonomic quality of experience oriented handover in dense networks
|
Aldhaibani, Omar A |
|
|
94 |
C |
p. |
artikel |
2 |
Adaptive negative impedance strategy for stability improvement in DC microgrid with constant power loads
|
Kumar, Ramesh |
|
|
94 |
C |
p. |
artikel |
3 |
A distinctive landmark-based face recognition system for identical twins by extracting novel weighted features
|
Mousavi, Shokoufeh |
|
|
94 |
C |
p. |
artikel |
4 |
A generalized model predictive control method for series elastic actuator driven exoskeleton robots
|
Li, Shenghui |
|
|
94 |
C |
p. |
artikel |
5 |
A hashtag-based sub-event detection framework for social media
|
Lu, Guoming |
|
|
94 |
C |
p. |
artikel |
6 |
An efficient Manta Ray Foraging Optimization algorithm for parameter extraction of three-diode photovoltaic model
|
Houssein, Essam H. |
|
|
94 |
C |
p. |
artikel |
7 |
A new multiscale tool for simulating smart-grid energy management based on a systemic approach
|
Randriantsoa, Ando Ny Aina |
|
|
94 |
C |
p. |
artikel |
8 |
A novel privacy-preserving deep learning scheme without a cryptography component
|
Sun, Chin-Yu |
|
|
94 |
C |
p. |
artikel |
9 |
A Prognostic Energy Optimization Technique with unified power quality conditioner for energy stabilization in grid system
|
Kavithaa, G. |
|
|
94 |
C |
p. |
artikel |
10 |
A protection scheme for distribution utility grid with wind energy penetration
|
Mahela, Om Prakash |
|
|
94 |
C |
p. |
artikel |
11 |
A smart content store with logical table for named data networking in industrial internet of things environment
|
Li, Zhuo |
|
|
94 |
C |
p. |
artikel |
12 |
A three-dimensional clustered peer-to-peer overlay protocol for mobile ad hoc networks
|
Tahir, Ali |
|
|
94 |
C |
p. |
artikel |
13 |
A vehicle detection and shadow elimination method based on greyscale information, edge information, and prior knowledge
|
Zhang, Jing |
|
|
94 |
C |
p. |
artikel |
14 |
Blockchain-enabled Peer-to-Peer energy trading
|
Wongthongtham, Pornpit |
|
|
94 |
C |
p. |
artikel |
15 |
CARE: A Collision-Aware Mobile Robot Navigation in Grid Environment using Improved Breadth First Search
|
Tripathy, Hrudaya Kumar |
|
|
94 |
C |
p. |
artikel |
16 |
Classification of respiratory sounds using improved convolutional recurrent neural network
|
Asatani, Naoki |
|
|
94 |
C |
p. |
artikel |
17 |
CLSA: A novel deep learning model for MOOC dropout prediction
|
Fu, Qian |
|
|
94 |
C |
p. |
artikel |
18 |
Data-centric routing and caching approach for mobile and social sensing applications
|
Shynu, P.G. |
|
|
94 |
C |
p. |
artikel |
19 |
Depth estimation from a single RGB image using target foreground and background scene variations
|
Alphonse, P.J.A. |
|
|
94 |
C |
p. |
artikel |
20 |
Design of a secure file storage and access protocol for cloud-enabled Internet of Things environment
|
Karati, Arijit |
|
|
94 |
C |
p. |
artikel |
21 |
Editorial Board
|
|
|
|
94 |
C |
p. |
artikel |
22 |
Efficient routing mechanism for neighbour selection using fuzzy logic in wireless sensor network
|
Ramkumar, K. |
|
|
94 |
C |
p. |
artikel |
23 |
Enhancing Whale Optimization Algorithm with Levy Flight for coverage optimization in wireless sensor networks
|
Deepa, R. |
|
|
94 |
C |
p. |
artikel |
24 |
Enterprise Credential Spear-phishing attack detection
|
Al-Hamar, Yuosuf |
|
|
94 |
C |
p. |
artikel |
25 |
Fog-enabled secure multiparty computation based aggregation scheme in smart grid
|
Khan, Hayat Mohammad |
|
|
94 |
C |
p. |
artikel |
26 |
Generative Robotic Grasping Using Depthwise Separable Convolution
|
Teng, Yadong |
|
|
94 |
C |
p. |
artikel |
27 |
Hierarchical K-means clustering for registration of multi-view point sets
|
Guo, Rui |
|
|
94 |
C |
p. |
artikel |
28 |
HMM-BiMM: Hidden Markov Model-based word segmentation via improved Bi-directional Maximal Matching algorithm
|
Yan, Xingyu |
|
|
94 |
C |
p. |
artikel |
29 |
Introduction To The Special Section On Autonomic Computing And Its Applications for self organizing networks (VSI-acson)
|
Paul, Anand |
|
|
94 |
C |
p. |
artikel |
30 |
Machine learning-based seawater concentration pathway prediction
|
Hu, Fang |
|
|
94 |
C |
p. |
artikel |
31 |
Machine learning classification algorithms and anomaly detection in conventional meters and Tunisian electricity consumption large datasets
|
Oprea, Simona-Vasilica |
|
|
94 |
C |
p. |
artikel |
32 |
Market power assessment in electricity markets based on social network analysis
|
Beni, Sadegh Amani |
|
|
94 |
C |
p. |
artikel |
33 |
Maximum weight multi-modal information fusion algorithm of electroencephalographs and face images for emotion recognition
|
Wang, Mei |
|
|
94 |
C |
p. |
artikel |
34 |
Multi-objective optimal RFID reader deployment using a Leaders and Followers algorithm
|
Mathaba, T.N.D. |
|
|
94 |
C |
p. |
artikel |
35 |
Multi-objective optimization of hybrid renewable energy system by using novel autonomic soft computing techniques
|
Das, Gourab |
|
|
94 |
C |
p. |
artikel |
36 |
Optimal sizing of off-line microgrid via hybrid multi-objective simulated annealing particle swarm optimizer
|
Hafez, Ahmed.A. |
|
|
94 |
C |
p. |
artikel |
37 |
Point cloud up-sampling network with multi-level spatial local feature aggregation
|
Zeng, Guang |
|
|
94 |
C |
p. |
artikel |
38 |
Prediction of Risk Percentage in Software Projects by Training Machine Learning Classifiers
|
P, Gouthaman |
|
|
94 |
C |
p. |
artikel |
39 |
QoS-aware routing and traffic management in multi-flow opportunistic routing
|
Parsa, Ali |
|
|
94 |
C |
p. |
artikel |
40 |
Quantum inspired meta-heuristic approach for optimization of genetic algorithm
|
Ganesan, Vithya |
|
|
94 |
C |
p. |
artikel |
41 |
Resolving cold start and sparse data challenge in recommender systems using multi-level singular value decomposition
|
Vahidy Rodpysh, Keyvan |
|
|
94 |
C |
p. |
artikel |
42 |
RETRACTED: A border surveillance system to sense terrorist outbreaks
|
Vadivelan, N. |
|
|
94 |
C |
p. |
artikel |
43 |
Servo motor sliding mode control based on fuzzy power index method
|
Li, Ye |
|
|
94 |
C |
p. |
artikel |
44 |
Teaching fuzzy controllers through a V-model based methodology
|
Ponce, Pedro |
|
|
94 |
C |
p. |
artikel |
45 |
Texture and quality analysis for face spoofing detection
|
Daniel, Neenu |
|
|
94 |
C |
p. |
artikel |
46 |
The role of reality enhancing technologies in teaching and learning of mathematics
|
Buentello-Montoya, D.A. |
|
|
94 |
C |
p. |
artikel |
47 |
The use of ellipse-based estimator as a sub-key distinguisher for Side-Channel Analysis
|
MartÃnez-Herrera, Alberto F. |
|
|
94 |
C |
p. |
artikel |
48 |
Training data selection for imbalanced cross-project defect prediction
|
Zheng, Shang |
|
|
94 |
C |
p. |
artikel |