nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A collaborative approach to early detection of IoT Botnet
|
Nguyen, Giang L. |
|
|
97 |
C |
p. |
artikel |
2 |
Adaptive backstepping control design for MEMS gyroscope based on function approximation techniques with input saturation and output constraints
|
Zirkohi, Majid Moradi |
|
|
97 |
C |
p. |
artikel |
3 |
A hybrid multi-population metaheuristic applied to load-sharing optimization of gas compressor stations
|
Rodrigues, Leonardo R. |
|
|
97 |
C |
p. |
artikel |
4 |
An efficient node placement scheme to mitigate routing attacks in Internet of Battlefield Things
|
Mohd, Noor |
|
|
97 |
C |
p. |
artikel |
5 |
An efficient P300 detection algorithm based on Kernel Principal Component Analysis-Support Vector Machine
|
Hashmi, Mohammad Farukh |
|
|
97 |
C |
p. |
artikel |
6 |
A new intelligent multilayer framework for insider threat detection
|
Al-Mhiqani, Mohammed Nasser |
|
|
97 |
C |
p. |
artikel |
7 |
An improved smart key frame extraction algorithm for vehicle target recognition
|
Wang, Jianguo |
|
|
97 |
C |
p. |
artikel |
8 |
An optimization model based on the frequency dependent power flow for the secondary control in islanded microgrids
|
Rios, Miguel Angel |
|
|
97 |
C |
p. |
artikel |
9 |
A novel approach for spam detection based on association rule mining and genetic algorithm
|
Sokhangoee, Zeynab Fallah |
|
|
97 |
C |
p. |
artikel |
10 |
A phase-locked loop with an improved dynamic response under abnormal grid conditions
|
Smadi, Issam A. |
|
|
97 |
C |
p. |
artikel |
11 |
Application dependable interaction module for computer vision-based human-computer interactions
|
Al-Ma'aitah, Mohammed |
|
|
97 |
C |
p. |
artikel |
12 |
Application of optimisation technique in PV integrated multilevel inverter for power quality improvement
|
Das, Soumya Ranjan |
|
|
97 |
C |
p. |
artikel |
13 |
A quad-form clustered mapping approach for large-scale applications of reconfigurable computing systems
|
Mohtavipour, Seyed Mehdi |
|
|
97 |
C |
p. |
artikel |
14 |
A Secure Mobile Wireless Sensor Networks based Protocol for Smart Data Gathering with Cloud
|
Haseeb, Khalid |
|
|
97 |
C |
p. |
artikel |
15 |
Building a dataset through attack pattern modeling and analysis system
|
Higuera, Juan Ramón Bermejo |
|
|
97 |
C |
p. |
artikel |
16 |
Cascaded continuous sliding mode control for tracked mobile robot via nonlinear disturbance observer
|
Wang, Huiming |
|
|
97 |
C |
p. |
artikel |
17 |
Chinese keyword extraction model with distributed computing
|
Ding, Tiantian |
|
|
97 |
C |
p. |
artikel |
18 |
Context-aware security for the Intra-Electric Vehicle Network under energy constraints
|
Fraiji, Yosra |
|
|
97 |
C |
p. |
artikel |
19 |
De-CAPTCHA: A novel DFS based approach to solve CAPTCHA schemes
|
Atri, Aditya |
|
|
97 |
C |
p. |
artikel |
20 |
Decomposition-based scheduling for parallel real-time tasks on multiprocessors
|
Zhao, Liang |
|
|
97 |
C |
p. |
artikel |
21 |
Deep hierarchical LSTM networks with attention for video summarization
|
Lin, Jingxu |
|
|
97 |
C |
p. |
artikel |
22 |
Deep learning-based malicious smart contract detection scheme for internet of things environment
|
Gupta, Rajesh |
|
|
97 |
C |
p. |
artikel |
23 |
Editorial Board
|
|
|
|
97 |
C |
p. |
artikel |
24 |
Efficient implementation of Montgomery modular multiplier on FPGA
|
Abd-Elkader, Ahmed A.H. |
|
|
97 |
C |
p. |
artikel |
25 |
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection
|
Canavese, Daniele |
|
|
97 |
C |
p. |
artikel |
26 |
Energy-aware task scheduling in data centers using an application signature
|
Salinas-Hilburg, Juan Carlos |
|
|
97 |
C |
p. |
artikel |
27 |
Enhanced dynamic performance of steam turbine driving synchronous generator emulator via adaptive fuzzy control
|
Zoghby, Helmy M. El |
|
|
97 |
C |
p. |
artikel |
28 |
Event-triggered neuro sliding mode control for an uncertain Euler–Lagrange system: An impulsive dynamical system approach
|
Nath, Krishanu |
|
|
97 |
C |
p. |
artikel |
29 |
Extend auction description language to represent and reason knowledge in auctions
|
Xu, Zhenlei |
|
|
97 |
C |
p. |
artikel |
30 |
Fast algorithms for restoring survivable spanning connection
|
Huang, Jiale |
|
|
97 |
C |
p. |
artikel |
31 |
Improved fractional PI λ D μ controller for AVR system using Chaotic Black Widow algorithm
|
Munagala, Vijaya Kumar |
|
|
97 |
C |
p. |
artikel |
32 |
Improving energy efficiency and economics of motor-pump-system using electric variable-speed drives for automatic transition of working points
|
Ahmed, Abdelsalam A. |
|
|
97 |
C |
p. |
artikel |
33 |
Introduction to the special section on Artificial Intelligence and Robotics (VSI-air3)
|
Lu, Huimin |
|
|
97 |
C |
p. |
artikel |
34 |
Introduction to the special section on Smart Green Applications: QoS and Security-aware solutions in collaborative wireless networks (VSI-cwn)
|
Collotta, Mario |
|
|
97 |
C |
p. |
artikel |
35 |
Load - aware intelligent multiprocessor scheduler for time-critical cyber-physical system applications
|
Padmajothi, V. |
|
|
97 |
C |
p. |
artikel |
36 |
Low power design methodology in quantum-dot cellular automata
|
Sadhu, Arindam |
|
|
97 |
C |
p. |
artikel |
37 |
Machine and deep learning amalgamation for feature extraction in Industrial Internet-of-Things
|
Jayalaxmi, P.L.S. |
|
|
97 |
C |
p. |
artikel |
38 |
Machine learning-based multimedia services for business model evaluation
|
Zhong, Xiaoying |
|
|
97 |
C |
p. |
artikel |
39 |
MIMO auto-regressive modeling-based generalized predictive control for grid-connected hybrid systems
|
Franco, Ricardo A.P. |
|
|
97 |
C |
p. |
artikel |
40 |
Noncontact button operation system using hand gestures
|
Li, Yujie |
|
|
97 |
C |
p. |
artikel |
41 |
Optimal design of passive power filter for enhancing the harmonic-constrained hosting capacity of renewable DG systems
|
Bajaj, Mohit |
|
|
97 |
C |
p. |
artikel |
42 |
Optimal integration of photovoltaic and shunt compensator considering irradiance and load changes
|
Abdelsattar, Montaser |
|
|
97 |
C |
p. |
artikel |
43 |
Optimization of sensor selection problem in IoT systems using opposition-based learning in many-objective evolutionary algorithms
|
Younas, Irfan |
|
|
97 |
C |
p. |
artikel |
44 |
Passive Fractional-order Proportional-Integral-Derivative control design of a Grid-connected Photovoltaic inverter for Maximum Power Point Tracking
|
Thangam, Thomas |
|
|
97 |
C |
p. |
artikel |
45 |
Performance analysis of multi-hop routing protocols in SDN-based wireless networks
|
Ashtari, Sepehr |
|
|
97 |
C |
p. |
artikel |
46 |
Power control techniques for fuel cell hybrid electric vehicles: A comparative study
|
Sid, Mohamed Nacereddine |
|
|
97 |
C |
p. |
artikel |
47 |
Privacy-preserving task allocation for edge computing-based mobile crowdsensing
|
Ding, Xuyang |
|
|
97 |
C |
p. |
artikel |
48 |
Quality-aware energy efficient scheduling model for fog computing comprised IoT network
|
POTU, NARAYANA |
|
|
97 |
C |
p. |
artikel |
49 |
Remodeled chaotic compressive sensing scheme for secure and energy-efficient data forwarding in body-to-body network
|
Nidhya, R |
|
|
97 |
C |
p. |
artikel |
50 |
Route recommendation based on temporal–spatial metric
|
Liang, Feng |
|
|
97 |
C |
p. |
artikel |
51 |
Segmentation of liver tumors in multiphase computed tomography images using hybrid method
|
Wu, Jiaqi |
|
|
97 |
C |
p. |
artikel |
52 |
Smart energy storage dispatching of peak-valley load characteristics based-convolutional neural network
|
Lu, Huayong |
|
|
97 |
C |
p. |
artikel |
53 |
Spontaneous facial expression database of learners’ academic emotions in online learning with hand occlusion
|
Lyu, Li |
|
|
97 |
C |
p. |
artikel |
54 |
Suspicious transaction detection in banking cyber–physical systems
|
Shabbir, Aysha |
|
|
97 |
C |
p. |
artikel |
55 |
Systematic realization of a fully connected deep and convolutional neural network architecture on a field programmable gate array
|
Mukhopadhyay, Anand Kumar |
|
|
97 |
C |
p. |
artikel |
56 |
Tensor completion algorithms for estimating missing values in multi-channel audio signals
|
Ding, Wenjian |
|
|
97 |
C |
p. |
artikel |
57 |
Towards Energy Efficient Approx Cache-coherence Protocol Verified using Model Checker
|
Saraswat, Anant |
|
|
97 |
C |
p. |
artikel |
58 |
Towards the realization of regular clocking-based QCA circuits using genetic algorithm
|
Pramanik, Amit Kumar |
|
|
97 |
C |
p. |
artikel |
59 |
Traffic station classification based on deep spatio-temporal network
|
Hu, Zhiqiu |
|
|
97 |
C |
p. |
artikel |
60 |
Trust aware energy management system for smart homes appliances
|
Qureshi, Kashif Naseer |
|
|
97 |
C |
p. |
artikel |
61 |
Two-stage computing offloading algorithm in cloud-edge collaborative scenarios based on game theory
|
Xu, Fei |
|
|
97 |
C |
p. |
artikel |
62 |
Vision-based vehicle tracking on highway traffic using bounding-box features to extract statistical information
|
Azimjonov, Jahongir |
|
|
97 |
C |
p. |
artikel |