Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             78 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A big data-centric architecture metamodel for Industry 4.0 López Martínez, Patricia

125 C p. 263-284
artikel
2 A computational drug repositioning model based on hybrid similarity side information powered graph neural network Li, Sumin

125 C p. 24-31
artikel
3 ACSIMCD: A 2-phase framework for detecting meaningful communities in dynamic social networks Akachar, Elyazid

125 C p. 399-420
artikel
4 Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments Novaes, Matheus P.

125 C p. 156-167
artikel
5 A fuzzy based Co-Operative Blackmailing Attack detection scheme for Edge Computing nodes in MANET-IOT environment Simpson, Serin V.

125 C p. 544-563
artikel
6 Analysis and experimental research on stability characteristics of squatting posture of wearable lower limb exoskeleton robot Zheng, Yi

125 C p. 352-363
artikel
7 A novel frog chorusing recognition method with acoustic indices and machine learning Gan, Hongxiao

125 C p. 485-495
artikel
8 A novel study on deep learning framework to predict and analyze the financial time series information Yang, Shuigen

125 C p. 812-819
artikel
9 A novel sub-Kmeans based on co-training approach by transforming single-view into multi-view Nan, Fengtao

125 C p. 831-843
artikel
10 A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption Unal, Devrim

125 C p. 433-445
artikel
11 A secure localization scheme based on trust assessment for WSNs using blockchain technology Goyat, Rekha

125 C p. 221-231
artikel
12 A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks Violettas, George

125 C p. 698-714
artikel
13 Assessing vulnerability to psychological distress during the COVID-19 pandemic through the analysis of microblogging content Viviani, Marco

125 C p. 446-459
artikel
14 A study on the AI-based online triage model for hospitals in sustainable smart city Kong, Lingqiang

125 C p. 59-70
artikel
15 Attention monitoring for synchronous distance learning Abate, Andrea F.

125 C p. 774-784
artikel
16 Basketball shooting angle calculation and analysis by deeply-learned vision model Wang, Yongqiang

125 C p. 949-953
artikel
17 Cloud-based privacy- and integrity-protecting density peaks clustering Yang, Haomiao

125 C p. 758-769
artikel
18 Collaborative algorithms that combine AI with IoT towards monitoring and control system Zhang, Tao

125 C p. 677-686
artikel
19 Collaborative APIs recommendation for Artificial Intelligence of Things with information fusion Xu, Yueshen

125 C p. 471-479
artikel
20 Complex event detection for commodity distribution Internet of Things model incorporating radio frequency identification and Wireless Sensor Network Zhu, Xu

125 C p. 100-111
artikel
21 Computational resource and cost prediction service for scientific workflows in federated clouds Rosa, Michel J.F.

125 C p. 844-858
artikel
22 Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge Sotelo Monge, Marco Antonio

125 C p. 869-890
artikel
23 CShield: Enabling code privacy for Cyber–Physical systems Yang, Kai

125 C p. 564-574
artikel
24 Data-driven detection and characterization of communities of accounts collaborating in MOOCs Ruipérez-Valiente, José A.

125 C p. 590-603
artikel
25 Data-flow driven optimal tasks distribution for global heterogeneous systems Garcia, Jordi

125 C p. 792-805
artikel
26 Deep Spatial/temporal-level feature engineering for Tennis-based action recognition Ning, Bai

125 C p. 188-193
artikel
27 Deep transfer learning framework for the identification of malicious activities to combat cyberattack Singh, Deepak

125 C p. 687-697
artikel
28 Defending CNN against privacy leakage in edge computing via binary neural networks Qiang, Weizhong

125 C p. 460-470
artikel
29 Detecting fake images by identifying potential texture difference Yang, Jiachen

125 C p. 127-135
artikel
30 Detecting malicious behavior in social platforms via hybrid knowledge- and data-driven systems Paredes, Jose N.

125 C p. 232-246
artikel
31 Down for failure: Active power status monitoring Bayat, Niloofar

125 C p. 629-640
artikel
32 DroneCOCoNet: Learning-based edge computation offloading and control networking for drone video analytics Qu, Chengyi

125 C p. 247-262
artikel
33 E-commerce products recognition based on a deep learning architecture: Theory and implementation Zhang, Peng

125 C p. 672-676
artikel
34 Editorial Board
125 C p. ii
artikel
35 Editorial for FGCS special issue: Intelligent IoT systems for healthcare and rehabilitation Ai, Qingsong

125 C p. 770-773
artikel
36 Efficient dynamic multi-replica auditing for the cloud with geographic location Yu, Haiyang

125 C p. 285-298
artikel
37 Efficient heterogeneous matrix profile on a CPU + High Performance FPGA with integrated HBM Romero, Jose Carlos

125 C p. 10-23
artikel
38 Energy-conscious optimization of Edge Computing through Deep Reinforcement Learning and two-phase immersion cooling Pérez, Sergio

125 C p. 891-907
artikel
39 Energy-efficient VM scheduling based on deep reinforcement learning Wang, Bin

125 C p. 616-628
artikel
40 ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs Khan, Tayyab

125 C p. 921-943
artikel
41 FedRD: Privacy-preserving adaptive Federated learning framework for intelligent hazardous Road Damage detection and warning Yuan, Yachao

125 C p. 385-398
artikel
42 Fingerprint pre-processing and feature engineering to enhance agricultural products categorization Zhao, Shajunyi

125 C p. 944-948
artikel
43 Hidden space deep sequential risk prediction on student trajectories Prenkaj, Bardh

125 C p. 532-543
artikel
44 Higher-Order Multiple-Feature-based Community Evolution Model with Potential Applications in Criminal Network Investigation Li, Xiaoming

125 C p. 364-375
artikel
45 High performance ant colony system based on GPU warp specialization with a static–dynamic balanced candidate set strategy Huang, Zhi-bin

125 C p. 136-150
artikel
46 Human action recognition using attention based LSTM network with dilated CNN features Muhammad, Khan

125 C p. 820-830
artikel
47 Incentive mechanism for collaborative distributed learning in Artificial Intelligence of Things Wang, Guan

125 C p. 376-384
artikel
48 ISAG: IoT-enabled and Secrecy Aware Group-based handover scheme for e-health services in M2M communication network Gupta, Shubham

125 C p. 168-187
artikel
49 Making data platforms smarter with MOSES Francia, Matteo

125 C p. 299-313
artikel
50 Massive-scale complicated human action recognition: Theory and applications Liu, Yishu

125 C p. 806-811
artikel
51 Massive-scale graph mining for e-commerce cold chain analysis and optimization Ren, Jiajia

125 C p. 526-531
artikel
52 MCFT-CNN: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in Internet of Things Sudhakar,

125 C p. 334-351
artikel
53 MPdist-based missing data imputation for supporting big data analyses in IoT-based applications Lee, Gyeong Ho

125 C p. 421-432
artikel
54 New approach to global data access in computational infrastructures Wrzeszcz, Michał

125 C p. 575-589
artikel
55 Optimizing makespan and resource utilization for multi-DNN training in GPU cluster Li, Zhongjin

125 C p. 206-220
artikel
56 Parallel optimization of QoS-aware big service processes with discovery of skyline services Liang, Helan

125 C p. 496-514
artikel
57 PBC4occ: A novel contrast pattern-based classifier for one-class classification Aguilar, Diana Laura

125 C p. 71-90
artikel
58 Predicting user emotional tone in mental disorder online communities Silveira, Bárbara

125 C p. 641-651
artikel
59 PROTECTOR: An optimized deep learning-based framework for image spam detection and prevention Makkar, Aaisha

125 C p. 41-58
artikel
60 Redesigning compound TCP with cognitive edge intelligence for WiFi-based IoT Sah Tyagi, Sumarga Kumar

125 C p. 859-868
artikel
61 Representing emotions with knowledge graphs for movie recommendations Breitfuss, Arno

125 C p. 715-725
artikel
62 Research on hierarchical clustering method based on partially-ordered Hasse graph Wu, Cong

125 C p. 785-791
artikel
63 Research on pedestrian detection technology based on the SVM classifier trained by HOG and LTP features Zhou, Hongzhi

125 C p. 604-615
artikel
64 Research on the optimum synchronous network search data extraction based on swarm intelligence algorithm Hu, Su

125 C p. 151-155
artikel
65 SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment Xu, Peng

125 C p. 32-40
artikel
66 Self-aware distributed deep learning framework for heterogeneous IoT edge devices Jin, Yi

125 C p. 908-920
artikel
67 Semi-supervised classification-aware cross-modal deep adversarial data augmentation Wang, Shaoqiang

125 C p. 194-205
artikel
68 Spectrum utilization efficiency in CRNs with hybrid spectrum access and channel reservation: A comprehensive analysis under prioritized traffic Khan, Abd Ullah

125 C p. 726-742
artikel
69 Student success prediction using student exam behaviour Kuzilek, Jakub

125 C p. 661-671
artikel
70 Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection Zhang, Yifei

125 C p. 112-126
artikel
71 Technical research on realizing remote intelligent diagnosis of petroleum drilling loss circulation under smart city strategy Liang, Haibo

125 C p. 91-99
artikel
72 Temporal sensitive heterogeneous graph neural network for news recommendation Ji, Zhenyan

125 C p. 324-333
artikel
73 Textual analysis of traitor-based dataset through semi supervised machine learning Janjua, Faisal

125 C p. 652-660
artikel
74 The NAS Parallel Benchmarks for evaluating C++ parallel programming frameworks on shared-memory architectures Löff, Júnior

125 C p. 743-757
artikel
75 TireNet: A high recall rate method for practical application of tire defect type classification Li, Ying

125 C p. 1-9
artikel
76 Towards parallelism detection of sequential programs with graph neural network Shen, Yuanyuan

125 C p. 515-525
artikel
77 Unbalanced data processing using deep sparse learning technique Li, Xing

125 C p. 480-484
artikel
78 Visualization and deep-learning-based malware variant detection using OpCode-level features Darem, Abdulbasit

125 C p. 314-323
artikel
                             78 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland