Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             101 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Comparative Analysis of Machine Learning Algorithms for Classification Purpose Sheth, Vraj

215 C p. 422-431
artikel
2 A Comparative Study of Machine Learning Regression Approach on Dental Caries Detection Kumar, Chandan

215 C p. 519-528
artikel
3 A Customer Churn Prediction Model using XGBoost for the Telecommunication Industry in Nepal Shrestha, Sagar Maan

215 C p. 652-661
artikel
4 A Dynamic Fuzzy Engine for Adaptive Control towards improvement of Network Performance in Big Data Environment Saravanan, S.

215 C p. 24-32
artikel
5 AI Powered IoT based Home Energy Management System towards DG Integration Raju, M. Pratapa

215 C p. 846-855
artikel
6 A Lightweight Cryptographic Algorithm for Underwater Acoustic Networks Goyal, S.B.

215 C p. 266-273
artikel
7 American Sign Language Recognition for Alphabets Using MediaPipe and LSTM Sundar, B

215 C p. 642-651
artikel
8 A model to detect domain names generated by DGA malware Divya, T

215 C p. 403-412
artikel
9 A Modified PRBS: Vertical Stacked LFSR Primitive Polynomial for Secure Data Communication Ramasamy, Jagadeshwaran

215 C p. 947-954
artikel
10 Analysing RSA and PAILLIER homomorphic Property for security in Cloud Munjal, Kundan

215 C p. 240-246
artikel
11 ANALYSIS OF IN-PLACE MATRIX ROTATION OF SQUARE MATRIX FOR INFORMATION SECURITY APPLICATIONS Kiran, S.

215 C p. 131-139
artikel
12 An assessment of water pollutions area in Terengganu River, Malaysia using unsupervised machine learning Zamri, Nurnadiah

215 C p. 920-928
artikel
13 An efficient and enhancement of recent approaches to build an automated essay scoring system Goura, V.M.K. Prasad

215 C p. 442-451
artikel
14 An embedded LSTM based scheme for depression detection and analysis Singh, Jaskaran

215 C p. 166-175
artikel
15 An Hourly Electricity Demand Forecaster for the Mexican National Interconnected System based on Regional Statistical Features Coria, Jehosafat

215 C p. 677-686
artikel
16 An Improved Approach for Load Balancing among Virtual Machines in Cloud Environment Sansanwal, Suman

215 C p. 556-566
artikel
17 An Intelligent RPL attack detection using Machine Learning-Based Intrusion Detection System for Internet of Things Raghavendra, T

215 C p. 61-70
artikel
18 An Intensified System for Identifying Distinct Clusters over the Video Using Improved Semi-Supervised Clustering Technique Kumar, S Sreedhar.

215 C p. 771-780
artikel
19 A novel approach for context-aware sensor optimization in a smart home Shrinidhi, L

215 C p. 350-360
artikel
20 A Novel Approach towards Windows Malware Detection System Using Deep Neural Networks Divakarla, Usha

215 C p. 148-157
artikel
21 A Performance Comparative on Most Popular Internet Web Browsers Mohamed, Azza

215 C p. 589-597
artikel
22 Application of a Genetic Algorithm for the Selection of the Optimal Composition of Protection Tools of the Information and Educational System of the University Akhmetov, B.S.

215 C p. 598-607
artikel
23 Application of classification algorithms of Machine learning in cybersecurity Abdiyeva-Aliyeva, Gunay

215 C p. 909-919
artikel
24 A Resource-optimized and Accelerated Sentiment Analysis Method using Serverless Computing Jefferson, Steve

215 C p. 33-43
artikel
25 A Review of the Present Cryptographic Arsenal to Deal with Post-Quantum Threats Yalamuri, Gagan

215 C p. 834-845
artikel
26 A Review on Vulnerabilities to Modern Processors and its Mitigation for Various Variants Praveen Kumar, E

215 C p. 91-97
artikel
27 A Scalable framework for data lakes ingestion CHERRADI, Mohamed

215 C p. 809-814
artikel
28 A Subset Scaling Recursive Feature Collection Based DDoS Detection Using Behavioural Based Ideal Neural Network For Security In A Cloud Environment Karthick, Mr. K

215 C p. 509-518
artikel
29 Authentication and Authorization in Modern Web Apps for Data Security Using Nodejs and Role of Dark Web Pant, Piyush

215 C p. 781-790
artikel
30 Automated Pipeline for the Deployment using OpenShift Chowdary, Mandepudi Nobel

215 C p. 220-229
artikel
31 Big Data as a Service and Application for Indian Banking Sector Singh, Jaspreet

215 C p. 878-887
artikel
32 Blockchain Base Community Cluster-Federated Learning for Secure Aggregation of Healthcare Data Jatain, Divya

215 C p. 752-762
artikel
33 Blockchain Based Data Integrity Security Management Salagrama, Shailaja

215 C p. 331-339
artikel
34 Blockchain-based Decentralized KYC Verification Framework for Banks Patil, Pradnya

215 C p. 529-536
artikel
35 Blockchain in Food Supply Chain Patel, Daksh

215 C p. 321-330
artikel
36 Business Model on M-Business: A Systematic Review Purnomo, Agung

215 C p. 955-962
artikel
37 Clustering-based Factorization Machines for Advertisement Click prediction Raphael, Joel

215 C p. 546-555
artikel
38 Comparison of Artificial Intelligence Algorithms for IoT Botnet Detection on Apache Spark Platform Anwar, Faaiz

215 C p. 499-508
artikel
39 Contents
215 C p. iii-viii
artikel
40 Context Aware Data Synchronization in Ubiquitous Networks: Cognitive Agent Approach Bhajantri, Lokesh B.

215 C p. 176-181
artikel
41 Cooperative Control of Fixed-wing Drones Using Relative Jacobian with Obstacle Avoidance Elijah, Thato

215 C p. 731-741
artikel
42 Cybersecurity vs. Information Security Taherdoost, Hamed

215 C p. 483-487
artikel
43 Data division using Fuzzy Logic and Blockchain for data security in cyber space Seenivasan, Manjula

215 C p. 452-460
artikel
44 Deep Contextualized Embeddings for Sentiment Analysis of Arabic Book's Reviews ELFAIK, Hanane

215 C p. 973-982
artikel
45 Deep Flamingo Search and Reinforcement Learning Based Recommendation System for E-Learning Platform using Social Media Vedavathi, N

215 C p. 192-201
artikel
46 Deep learning based Self-Sustained Personal Network Muthulakshmi, Dr. K

215 C p. 856-868
artikel
47 Deep Learning Models for Multiple Face Mask Detection under a Complex Big Data Environment Rekha, V.

215 C p. 706-712
artikel
48 Digital Evidence Management System for Cybercrime Investigation using Proxy Re-Encryption and Blockchain Chougule, Harshwardhan

215 C p. 71-77
artikel
49 Digital File Rights Management System Using Blockchain Siddique, S. Shireen

215 C p. 309-320
artikel
50 Document Management System Empowered by Effective Amalgam of Blockchain and IPFS Sarang, Shikhar

215 C p. 340-349
artikel
51 Dynamic Fusion of Text, Video and Audio models for Sentiment Analysis Vasanth, K.

215 C p. 211-219
artikel
52 Efficient parallel viterbi algorithm for big data in a spark cloud computing environment Sassi, Imad

215 C p. 937-946
artikel
53 Employment of Technological-Based Approaches for Creative E-Learning; Teaching Management Information Systems Taherdoost, Hamed

215 C p. 802-808
artikel
54 Enabling Remote School Education using Knowledge Graphs and Deep Learning Techniques Nair, Lekshmi S

215 C p. 618-625
artikel
55 ENERGY EFFICIENT ROBUST BACTERIAL FORAGING ROUTING PROTOCOL (EE-RBFRP) FOR BIG DATA NETWORK Gunasekaran, S.A.

215 C p. 763-770
artikel
56 Enhancing Data Security in Mobile Cloud using Novel key Generation Virushabadoss, S.

215 C p. 567-576
artikel
57 Enhancing the Security of WPA2/PSK Authentication Protocol in Wi-Fi Networks Arikumar, K s

215 C p. 413-421
artikel
58 Ensemble Deep Learning Models for Lung Cancer Diagnosis in Histopathological Images Bokefode, Jayant

215 C p. 471-482
artikel
59 Function Management in Future Railway Mobile Communication Systems Atanasov, Ivaylo

215 C p. 158-165
artikel
60 Hybrid Neural Network Architecture for Multi-Label Object Recognition using Feature Fusion Meena, S Divya

215 C p. 78-90
artikel
61 Improving IoT Security Using Elliptic Curve Integrated Encryption Scheme with Primary Structure-Based Block Chain Technology Chauhan, Chetan

215 C p. 488-498
artikel
62 Influence of the Fourth Industrial Revolution on the Ethics of the Colombian Accounting Professional Gaviria, Daniel Alberto Grajales

215 C p. 626-641
artikel
63 Insights into NoSQL databases using financial data: A comparative analysis Rao, Ashish

215 C p. 8-23
artikel
64 Internet of Things: Protocols, Applications and Security Issues Choudhary, Dr. Sarika

215 C p. 274-288
artikel
65 IRING TemaniKu: A Grab-Style Integrated Application of e-Healthcare Chaperone Services for the Elderly Living at Home in Malaysia Ahmad, Muhamad Fazil

215 C p. 112-120
artikel
66 Load balancing strategy for workflow tasks using stochastic fractal search (SFS) in Cloud Computing Hasan, Faraz

215 C p. 815-823
artikel
67 Machine Learning for IoT based networks intrusion detection: a comparative study Baich, Marwa

215 C p. 742-751
artikel
68 Machine Learning for Prediction of Wait Times in Outpatient Clinic Joseph, Jeffin

215 C p. 230-239
artikel
69 Map-Reduce based Ensemble Intrusion Detection System with Security in Big Data Rao, Mr. S.Uma Maheswara

215 C p. 888-896
artikel
70 Metaheuristics approach to improve data analysis process for the healthcare sector Rahul, Kumar

215 C p. 98-103
artikel
71 mURLi: A Tool for Detection of Malicious URLs and Injection Attacks Devalla, Vihar

215 C p. 662-676
artikel
72 Non-stationarity Removal Techniques in MEG Data: A Review Philip, Beril Susan

215 C p. 824-833
artikel
73 On-device Resilient Android Malware Detection using Incremental Learning Renjith, G

215 C p. 929-936
artikel
74 Physical Layer Security Using Cross Layer Authentication for AES-ECDSA Algorithm Nagamani, K

215 C p. 380-392
artikel
75 Pipeline Parallelism in Distributed Deep Learning for Diabetic Retinopathy Classification Patil, Shashank Anand

215 C p. 393-402
artikel
76 Pragmatic evaluation of data mining models based on quality assessment & metric analysis Ghongade, Trupti G.

215 C p. 121-130
artikel
77 Predem: A computational framework for prediction of early dementia using deep neural networks Sharma, Deep

215 C p. 697-705
artikel
78 preTrained Convolutional Neural Networks Performance Assessment under Different Color Variability Indexes Magaña, Alejandro Garcia

215 C p. 869-877
artikel
79 Real-time Influencer Detection In Twitter Using A Hybrid Approach. Siji Rani, S

215 C p. 461-470
artikel
80 Real-Time Obstacle Detection Over Railway Track using Deep Neural Networks Rahman, Fahim Ur

215 C p. 289-298
artikel
81 Risk Level Prediction of Diabetic Retinopathy based on Retinal Images using Deep Learning Algorithm Meruva, Sai Kiran Reddy

215 C p. 722-730
artikel
82 Scalable Blockchain Architecture using off-chain IPFS for Marks Card Validation Praveen, M. Dhulavvagol

215 C p. 370-379
artikel
83 Secure Architecture to Support IoT based on Fog Computing Khan, Gulista

215 C p. 608-617
artikel
84 Secured information sharing in SCM: Parametric Analysis on Improved Beetle Swarm Optimization Kalyani, Dasari.

215 C p. 897-908
artikel
85 Secure Image Transmission Using 2D ECT and Latin Square Algorithm for IoUT Systems Ravi, Renjith V.

215 C p. 299-308
artikel
86 Security Analyses of Random Number Generation with Image Encryption Using Improved Chaotic Map Sathya, K

215 C p. 432-441
artikel
87 Security and Privacy Preservation for Data Communication Network Kumar, Kamal

215 C p. 1-7
artikel
88 Self-Enhancing Multi-filter Sequence-to-Sequence Model Yang, Yunhao

215 C p. 537-545
artikel
89 Smart wallet for creating sub tokens Gokul, G

215 C p. 791-801
artikel
90 Stock Market Prediction with High Accuracy using Machine Learning Techniques Bansal, Malti

215 C p. 247-265
artikel
91 STREAM ENCRYPTION METHOD BASED ON THE CHAOTIC BROWNIAN MOTION MODEL OF MOLECULES Gasimov, Vagif A.

215 C p. 577-588
artikel
92 Suicide Ideation Detection on Social Networks: Short Literature Review Lasri, Sara

215 C p. 713-721
artikel
93 Swarm Intelligence in Data Science: Challenges, Opportunities and Applications Chopra, Deepti

215 C p. 104-111
artikel
94 Text Summarization Using Document and Sentence Clustering Pawar, Sumathi

215 C p. 361-369
artikel
95 The Role of Smart Contract Blockchain in 6G Wireless Communication System Taherdoost, Hamed

215 C p. 44-50
artikel
96 Time Complexity in Deep Learning Models Shah, Bhoomi

215 C p. 202-210
artikel
97 Time Series Data Error Optimization through Three Stacked Long Short-Term Memory Devi, M. Shyamala

215 C p. 140-147
artikel
98 Towards air quality particulate-matter monitoring using low-cost sensor data and visual exploration techniques: case study of Kisumu, Kenya Tékouabou, Stéphane C.K.

215 C p. 963-972
artikel
99 Tuning Multi-Layer Perceptron by Hybridized Arithmetic Optimization Algorithm for Healthcare 4.0 Stankovic, Marko

215 C p. 51-60
artikel
100 Using Deep Packet Inspection Data to Examine Subscribers on the Network Nkongolo, Mike

215 C p. 182-191
artikel
101 Web attacks detection using stacked generalization ensemble for LSTMs and word embedding Alaoui, Rokia Lamrani

215 C p. 687-696
artikel
                             101 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland