nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Comparative Analysis of Machine Learning Algorithms for Classification Purpose
|
Sheth, Vraj |
|
|
215 |
C |
p. 422-431 |
artikel |
2 |
A Comparative Study of Machine Learning Regression Approach on Dental Caries Detection
|
Kumar, Chandan |
|
|
215 |
C |
p. 519-528 |
artikel |
3 |
A Customer Churn Prediction Model using XGBoost for the Telecommunication Industry in Nepal
|
Shrestha, Sagar Maan |
|
|
215 |
C |
p. 652-661 |
artikel |
4 |
A Dynamic Fuzzy Engine for Adaptive Control towards improvement of Network Performance in Big Data Environment
|
Saravanan, S. |
|
|
215 |
C |
p. 24-32 |
artikel |
5 |
AI Powered IoT based Home Energy Management System towards DG Integration
|
Raju, M. Pratapa |
|
|
215 |
C |
p. 846-855 |
artikel |
6 |
A Lightweight Cryptographic Algorithm for Underwater Acoustic Networks
|
Goyal, S.B. |
|
|
215 |
C |
p. 266-273 |
artikel |
7 |
American Sign Language Recognition for Alphabets Using MediaPipe and LSTM
|
Sundar, B |
|
|
215 |
C |
p. 642-651 |
artikel |
8 |
A model to detect domain names generated by DGA malware
|
Divya, T |
|
|
215 |
C |
p. 403-412 |
artikel |
9 |
A Modified PRBS: Vertical Stacked LFSR Primitive Polynomial for Secure Data Communication
|
Ramasamy, Jagadeshwaran |
|
|
215 |
C |
p. 947-954 |
artikel |
10 |
Analysing RSA and PAILLIER homomorphic Property for security in Cloud
|
Munjal, Kundan |
|
|
215 |
C |
p. 240-246 |
artikel |
11 |
ANALYSIS OF IN-PLACE MATRIX ROTATION OF SQUARE MATRIX FOR INFORMATION SECURITY APPLICATIONS
|
Kiran, S. |
|
|
215 |
C |
p. 131-139 |
artikel |
12 |
An assessment of water pollutions area in Terengganu River, Malaysia using unsupervised machine learning
|
Zamri, Nurnadiah |
|
|
215 |
C |
p. 920-928 |
artikel |
13 |
An efficient and enhancement of recent approaches to build an automated essay scoring system
|
Goura, V.M.K. Prasad |
|
|
215 |
C |
p. 442-451 |
artikel |
14 |
An embedded LSTM based scheme for depression detection and analysis
|
Singh, Jaskaran |
|
|
215 |
C |
p. 166-175 |
artikel |
15 |
An Hourly Electricity Demand Forecaster for the Mexican National Interconnected System based on Regional Statistical Features
|
Coria, Jehosafat |
|
|
215 |
C |
p. 677-686 |
artikel |
16 |
An Improved Approach for Load Balancing among Virtual Machines in Cloud Environment
|
Sansanwal, Suman |
|
|
215 |
C |
p. 556-566 |
artikel |
17 |
An Intelligent RPL attack detection using Machine Learning-Based Intrusion Detection System for Internet of Things
|
Raghavendra, T |
|
|
215 |
C |
p. 61-70 |
artikel |
18 |
An Intensified System for Identifying Distinct Clusters over the Video Using Improved Semi-Supervised Clustering Technique
|
Kumar, S Sreedhar. |
|
|
215 |
C |
p. 771-780 |
artikel |
19 |
A novel approach for context-aware sensor optimization in a smart home
|
Shrinidhi, L |
|
|
215 |
C |
p. 350-360 |
artikel |
20 |
A Novel Approach towards Windows Malware Detection System Using Deep Neural Networks
|
Divakarla, Usha |
|
|
215 |
C |
p. 148-157 |
artikel |
21 |
A Performance Comparative on Most Popular Internet Web Browsers
|
Mohamed, Azza |
|
|
215 |
C |
p. 589-597 |
artikel |
22 |
Application of a Genetic Algorithm for the Selection of the Optimal Composition of Protection Tools of the Information and Educational System of the University
|
Akhmetov, B.S. |
|
|
215 |
C |
p. 598-607 |
artikel |
23 |
Application of classification algorithms of Machine learning in cybersecurity
|
Abdiyeva-Aliyeva, Gunay |
|
|
215 |
C |
p. 909-919 |
artikel |
24 |
A Resource-optimized and Accelerated Sentiment Analysis Method using Serverless Computing
|
Jefferson, Steve |
|
|
215 |
C |
p. 33-43 |
artikel |
25 |
A Review of the Present Cryptographic Arsenal to Deal with Post-Quantum Threats
|
Yalamuri, Gagan |
|
|
215 |
C |
p. 834-845 |
artikel |
26 |
A Review on Vulnerabilities to Modern Processors and its Mitigation for Various Variants
|
Praveen Kumar, E |
|
|
215 |
C |
p. 91-97 |
artikel |
27 |
A Scalable framework for data lakes ingestion
|
CHERRADI, Mohamed |
|
|
215 |
C |
p. 809-814 |
artikel |
28 |
A Subset Scaling Recursive Feature Collection Based DDoS Detection Using Behavioural Based Ideal Neural Network For Security In A Cloud Environment
|
Karthick, Mr. K |
|
|
215 |
C |
p. 509-518 |
artikel |
29 |
Authentication and Authorization in Modern Web Apps for Data Security Using Nodejs and Role of Dark Web
|
Pant, Piyush |
|
|
215 |
C |
p. 781-790 |
artikel |
30 |
Automated Pipeline for the Deployment using OpenShift
|
Chowdary, Mandepudi Nobel |
|
|
215 |
C |
p. 220-229 |
artikel |
31 |
Big Data as a Service and Application for Indian Banking Sector
|
Singh, Jaspreet |
|
|
215 |
C |
p. 878-887 |
artikel |
32 |
Blockchain Base Community Cluster-Federated Learning for Secure Aggregation of Healthcare Data
|
Jatain, Divya |
|
|
215 |
C |
p. 752-762 |
artikel |
33 |
Blockchain Based Data Integrity Security Management
|
Salagrama, Shailaja |
|
|
215 |
C |
p. 331-339 |
artikel |
34 |
Blockchain-based Decentralized KYC Verification Framework for Banks
|
Patil, Pradnya |
|
|
215 |
C |
p. 529-536 |
artikel |
35 |
Blockchain in Food Supply Chain
|
Patel, Daksh |
|
|
215 |
C |
p. 321-330 |
artikel |
36 |
Business Model on M-Business: A Systematic Review
|
Purnomo, Agung |
|
|
215 |
C |
p. 955-962 |
artikel |
37 |
Clustering-based Factorization Machines for Advertisement Click prediction
|
Raphael, Joel |
|
|
215 |
C |
p. 546-555 |
artikel |
38 |
Comparison of Artificial Intelligence Algorithms for IoT Botnet Detection on Apache Spark Platform
|
Anwar, Faaiz |
|
|
215 |
C |
p. 499-508 |
artikel |
39 |
Contents
|
|
|
|
215 |
C |
p. iii-viii |
artikel |
40 |
Context Aware Data Synchronization in Ubiquitous Networks: Cognitive Agent Approach
|
Bhajantri, Lokesh B. |
|
|
215 |
C |
p. 176-181 |
artikel |
41 |
Cooperative Control of Fixed-wing Drones Using Relative Jacobian with Obstacle Avoidance
|
Elijah, Thato |
|
|
215 |
C |
p. 731-741 |
artikel |
42 |
Cybersecurity vs. Information Security
|
Taherdoost, Hamed |
|
|
215 |
C |
p. 483-487 |
artikel |
43 |
Data division using Fuzzy Logic and Blockchain for data security in cyber space
|
Seenivasan, Manjula |
|
|
215 |
C |
p. 452-460 |
artikel |
44 |
Deep Contextualized Embeddings for Sentiment Analysis of Arabic Book's Reviews
|
ELFAIK, Hanane |
|
|
215 |
C |
p. 973-982 |
artikel |
45 |
Deep Flamingo Search and Reinforcement Learning Based Recommendation System for E-Learning Platform using Social Media
|
Vedavathi, N |
|
|
215 |
C |
p. 192-201 |
artikel |
46 |
Deep learning based Self-Sustained Personal Network
|
Muthulakshmi, Dr. K |
|
|
215 |
C |
p. 856-868 |
artikel |
47 |
Deep Learning Models for Multiple Face Mask Detection under a Complex Big Data Environment
|
Rekha, V. |
|
|
215 |
C |
p. 706-712 |
artikel |
48 |
Digital Evidence Management System for Cybercrime Investigation using Proxy Re-Encryption and Blockchain
|
Chougule, Harshwardhan |
|
|
215 |
C |
p. 71-77 |
artikel |
49 |
Digital File Rights Management System Using Blockchain
|
Siddique, S. Shireen |
|
|
215 |
C |
p. 309-320 |
artikel |
50 |
Document Management System Empowered by Effective Amalgam of Blockchain and IPFS
|
Sarang, Shikhar |
|
|
215 |
C |
p. 340-349 |
artikel |
51 |
Dynamic Fusion of Text, Video and Audio models for Sentiment Analysis
|
Vasanth, K. |
|
|
215 |
C |
p. 211-219 |
artikel |
52 |
Efficient parallel viterbi algorithm for big data in a spark cloud computing environment
|
Sassi, Imad |
|
|
215 |
C |
p. 937-946 |
artikel |
53 |
Employment of Technological-Based Approaches for Creative E-Learning; Teaching Management Information Systems
|
Taherdoost, Hamed |
|
|
215 |
C |
p. 802-808 |
artikel |
54 |
Enabling Remote School Education using Knowledge Graphs and Deep Learning Techniques
|
Nair, Lekshmi S |
|
|
215 |
C |
p. 618-625 |
artikel |
55 |
ENERGY EFFICIENT ROBUST BACTERIAL FORAGING ROUTING PROTOCOL (EE-RBFRP) FOR BIG DATA NETWORK
|
Gunasekaran, S.A. |
|
|
215 |
C |
p. 763-770 |
artikel |
56 |
Enhancing Data Security in Mobile Cloud using Novel key Generation
|
Virushabadoss, S. |
|
|
215 |
C |
p. 567-576 |
artikel |
57 |
Enhancing the Security of WPA2/PSK Authentication Protocol in Wi-Fi Networks
|
Arikumar, K s |
|
|
215 |
C |
p. 413-421 |
artikel |
58 |
Ensemble Deep Learning Models for Lung Cancer Diagnosis in Histopathological Images
|
Bokefode, Jayant |
|
|
215 |
C |
p. 471-482 |
artikel |
59 |
Function Management in Future Railway Mobile Communication Systems
|
Atanasov, Ivaylo |
|
|
215 |
C |
p. 158-165 |
artikel |
60 |
Hybrid Neural Network Architecture for Multi-Label Object Recognition using Feature Fusion
|
Meena, S Divya |
|
|
215 |
C |
p. 78-90 |
artikel |
61 |
Improving IoT Security Using Elliptic Curve Integrated Encryption Scheme with Primary Structure-Based Block Chain Technology
|
Chauhan, Chetan |
|
|
215 |
C |
p. 488-498 |
artikel |
62 |
Influence of the Fourth Industrial Revolution on the Ethics of the Colombian Accounting Professional
|
Gaviria, Daniel Alberto Grajales |
|
|
215 |
C |
p. 626-641 |
artikel |
63 |
Insights into NoSQL databases using financial data: A comparative analysis
|
Rao, Ashish |
|
|
215 |
C |
p. 8-23 |
artikel |
64 |
Internet of Things: Protocols, Applications and Security Issues
|
Choudhary, Dr. Sarika |
|
|
215 |
C |
p. 274-288 |
artikel |
65 |
IRING TemaniKu: A Grab-Style Integrated Application of e-Healthcare Chaperone Services for the Elderly Living at Home in Malaysia
|
Ahmad, Muhamad Fazil |
|
|
215 |
C |
p. 112-120 |
artikel |
66 |
Load balancing strategy for workflow tasks using stochastic fractal search (SFS) in Cloud Computing
|
Hasan, Faraz |
|
|
215 |
C |
p. 815-823 |
artikel |
67 |
Machine Learning for IoT based networks intrusion detection: a comparative study
|
Baich, Marwa |
|
|
215 |
C |
p. 742-751 |
artikel |
68 |
Machine Learning for Prediction of Wait Times in Outpatient Clinic
|
Joseph, Jeffin |
|
|
215 |
C |
p. 230-239 |
artikel |
69 |
Map-Reduce based Ensemble Intrusion Detection System with Security in Big Data
|
Rao, Mr. S.Uma Maheswara |
|
|
215 |
C |
p. 888-896 |
artikel |
70 |
Metaheuristics approach to improve data analysis process for the healthcare sector
|
Rahul, Kumar |
|
|
215 |
C |
p. 98-103 |
artikel |
71 |
mURLi: A Tool for Detection of Malicious URLs and Injection Attacks
|
Devalla, Vihar |
|
|
215 |
C |
p. 662-676 |
artikel |
72 |
Non-stationarity Removal Techniques in MEG Data: A Review
|
Philip, Beril Susan |
|
|
215 |
C |
p. 824-833 |
artikel |
73 |
On-device Resilient Android Malware Detection using Incremental Learning
|
Renjith, G |
|
|
215 |
C |
p. 929-936 |
artikel |
74 |
Physical Layer Security Using Cross Layer Authentication for AES-ECDSA Algorithm
|
Nagamani, K |
|
|
215 |
C |
p. 380-392 |
artikel |
75 |
Pipeline Parallelism in Distributed Deep Learning for Diabetic Retinopathy Classification
|
Patil, Shashank Anand |
|
|
215 |
C |
p. 393-402 |
artikel |
76 |
Pragmatic evaluation of data mining models based on quality assessment & metric analysis
|
Ghongade, Trupti G. |
|
|
215 |
C |
p. 121-130 |
artikel |
77 |
Predem: A computational framework for prediction of early dementia using deep neural networks
|
Sharma, Deep |
|
|
215 |
C |
p. 697-705 |
artikel |
78 |
preTrained Convolutional Neural Networks Performance Assessment under Different Color Variability Indexes
|
Magaña, Alejandro Garcia |
|
|
215 |
C |
p. 869-877 |
artikel |
79 |
Real-time Influencer Detection In Twitter Using A Hybrid Approach.
|
Siji Rani, S |
|
|
215 |
C |
p. 461-470 |
artikel |
80 |
Real-Time Obstacle Detection Over Railway Track using Deep Neural Networks
|
Rahman, Fahim Ur |
|
|
215 |
C |
p. 289-298 |
artikel |
81 |
Risk Level Prediction of Diabetic Retinopathy based on Retinal Images using Deep Learning Algorithm
|
Meruva, Sai Kiran Reddy |
|
|
215 |
C |
p. 722-730 |
artikel |
82 |
Scalable Blockchain Architecture using off-chain IPFS for Marks Card Validation
|
Praveen, M. Dhulavvagol |
|
|
215 |
C |
p. 370-379 |
artikel |
83 |
Secure Architecture to Support IoT based on Fog Computing
|
Khan, Gulista |
|
|
215 |
C |
p. 608-617 |
artikel |
84 |
Secured information sharing in SCM: Parametric Analysis on Improved Beetle Swarm Optimization
|
Kalyani, Dasari. |
|
|
215 |
C |
p. 897-908 |
artikel |
85 |
Secure Image Transmission Using 2D ECT and Latin Square Algorithm for IoUT Systems
|
Ravi, Renjith V. |
|
|
215 |
C |
p. 299-308 |
artikel |
86 |
Security Analyses of Random Number Generation with Image Encryption Using Improved Chaotic Map
|
Sathya, K |
|
|
215 |
C |
p. 432-441 |
artikel |
87 |
Security and Privacy Preservation for Data Communication Network
|
Kumar, Kamal |
|
|
215 |
C |
p. 1-7 |
artikel |
88 |
Self-Enhancing Multi-filter Sequence-to-Sequence Model
|
Yang, Yunhao |
|
|
215 |
C |
p. 537-545 |
artikel |
89 |
Smart wallet for creating sub tokens
|
Gokul, G |
|
|
215 |
C |
p. 791-801 |
artikel |
90 |
Stock Market Prediction with High Accuracy using Machine Learning Techniques
|
Bansal, Malti |
|
|
215 |
C |
p. 247-265 |
artikel |
91 |
STREAM ENCRYPTION METHOD BASED ON THE CHAOTIC BROWNIAN MOTION MODEL OF MOLECULES
|
Gasimov, Vagif A. |
|
|
215 |
C |
p. 577-588 |
artikel |
92 |
Suicide Ideation Detection on Social Networks: Short Literature Review
|
Lasri, Sara |
|
|
215 |
C |
p. 713-721 |
artikel |
93 |
Swarm Intelligence in Data Science: Challenges, Opportunities and Applications
|
Chopra, Deepti |
|
|
215 |
C |
p. 104-111 |
artikel |
94 |
Text Summarization Using Document and Sentence Clustering
|
Pawar, Sumathi |
|
|
215 |
C |
p. 361-369 |
artikel |
95 |
The Role of Smart Contract Blockchain in 6G Wireless Communication System
|
Taherdoost, Hamed |
|
|
215 |
C |
p. 44-50 |
artikel |
96 |
Time Complexity in Deep Learning Models
|
Shah, Bhoomi |
|
|
215 |
C |
p. 202-210 |
artikel |
97 |
Time Series Data Error Optimization through Three Stacked Long Short-Term Memory
|
Devi, M. Shyamala |
|
|
215 |
C |
p. 140-147 |
artikel |
98 |
Towards air quality particulate-matter monitoring using low-cost sensor data and visual exploration techniques: case study of Kisumu, Kenya
|
Tékouabou, Stéphane C.K. |
|
|
215 |
C |
p. 963-972 |
artikel |
99 |
Tuning Multi-Layer Perceptron by Hybridized Arithmetic Optimization Algorithm for Healthcare 4.0
|
Stankovic, Marko |
|
|
215 |
C |
p. 51-60 |
artikel |
100 |
Using Deep Packet Inspection Data to Examine Subscribers on the Network
|
Nkongolo, Mike |
|
|
215 |
C |
p. 182-191 |
artikel |
101 |
Web attacks detection using stacked generalization ensemble for LSTMs and word embedding
|
Alaoui, Rokia Lamrani |
|
|
215 |
C |
p. 687-696 |
artikel |