nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Academic Payment Tokenization: An Online Payment System for Academia Utilizing Non-Fungible Tokens and Permissionless Blockchain
|
Rani, Prity |
|
|
230 |
C |
p. 347-356 |
artikel |
2 |
A Comparative Analysis of Dynamic Scheduling Algorithms for Enhanced Resource Management in Homogeneous and Heterogeneous Fog Computing Environments
|
Sehgal, Nikita |
|
|
230 |
C |
p. 542-553 |
artikel |
3 |
Advanced EGAN-IDS Framework for Resilience against Adversarial Attacks using Multi-headed Attention Module
|
Saravanan, T. |
|
|
230 |
C |
p. 203-213 |
artikel |
4 |
Advanced Ensemble Machine Learning Models to Predict SDN Traffic
|
Nyaramneni, Sarika |
|
|
230 |
C |
p. 417-426 |
artikel |
5 |
Advancements in Real-Time Face Recognition Algorithms for Enhanced Smart Video Surveillance
|
S, Kanagamalliga |
|
|
230 |
C |
p. 486-492 |
artikel |
6 |
Agent-based Fuzzy Hamiltonian Graph Systems with Artificial Intelligence in the Private Region
|
Greeda, J |
|
|
230 |
C |
p. 608-619 |
artikel |
7 |
A HDCP-Fuzzy Model for Securing Data Integrity of Medical Records against Attacks
|
M, Saravanan |
|
|
230 |
C |
p. 233-240 |
artikel |
8 |
AI-based Detection of Stress using Heart Rate Data obtained from Wearable Devices
|
Mandal, Anurag |
|
|
230 |
C |
p. 749-759 |
artikel |
9 |
AI-based Integrated Approach for the Development of Intelligent Document Management System (IDMS)
|
Pandey, Mrinal |
|
|
230 |
C |
p. 725-736 |
artikel |
10 |
AI-Enhanced Defect Identification in Construction Quality Prediction: Hybrid Model of Unsupervised and Supervised Machine Learning
|
Fan, Ching-Lung |
|
|
230 |
C |
p. 112-119 |
artikel |
11 |
An Enhanced Research Productivity Monitoring System for Higher Education Institutions (HEI's) with Natural Language Processing (NLP)
|
Regla, Alfio I. |
|
|
230 |
C |
p. 316-325 |
artikel |
12 |
An Evolutionary Fuzzy System for Multiclustering in Data Streaming
|
Martos, Luis Alfonso Pérez |
|
|
230 |
C |
p. 33-43 |
artikel |
13 |
A Novel Edge-Aware Image Fusion Approach for Thermal and Visible Images
|
K, Palani Thanaraj |
|
|
230 |
C |
p. 55-60 |
artikel |
14 |
A Predictive Model for Abnormal Conditions in Smart Farming using IoT Sensors
|
Bouarourou, Soukaina |
|
|
230 |
C |
p. 248-256 |
artikel |
15 |
A Proportional Work Analysis to Significant Approaches in Blockchain for Supply-Chain Technology
|
Saraswat, Himani |
|
|
230 |
C |
p. 819-829 |
artikel |
16 |
Automated Decision Support System for Cyberbullying Detection
|
Kannammal, A. |
|
|
230 |
C |
p. 760-768 |
artikel |
17 |
Automatic Creation of Quality Images from Text using Multiple Generative Adversial Network
|
Devasana, M.S. Geetha |
|
|
230 |
C |
p. 955-963 |
artikel |
18 |
Classification of Stakeholders of an Information System using Fuzzy based Adjusted Cosine Similarity Measure during Requirements Elicitation Process
|
Akram, Faiz |
|
|
230 |
C |
p. 620-628 |
artikel |
19 |
Collaborative Learning based Recommendation System for Content Streaming Platform using Non-Negative Matrix Factorization Clustering
|
Nahar, Nikita Jain |
|
|
230 |
C |
p. 427-435 |
artikel |
20 |
Comparative Analysis of Low and High Scalable VANET in terms of Receive Rate, Packets Received, MAC/PHY Overhead and Average Goodput
|
Kour, Satveer |
|
|
230 |
C |
p. 214-222 |
artikel |
21 |
Compressed Deepfake Detection using Spatio-Temporal Approach with Model Pruning
|
K, Vidya |
|
|
230 |
C |
p. 436-444 |
artikel |
22 |
Computational Overhead Analysis for Mitigation of Content Poisoning Attack in NDN-based IoT Body Area Networks
|
Priya, M |
|
|
230 |
C |
p. 257-263 |
artikel |
23 |
Contents
|
|
|
|
230 |
C |
p. iii-viii |
artikel |
24 |
Convolutional Fuzzy Machine Learning based Algorithms for Mapping Chickpea Agricultural Crop Fields using Temporal Satellite Data
|
Suman, Shilpa |
|
|
230 |
C |
p. 532-541 |
artikel |
25 |
Corrigendum to Name2Vec: Name Matching using Character-based with Deep Learning Procedia Computer Science Volume 230, 2023, pp-305-315
|
Dinh, Xuan Truong |
|
|
230 |
C |
p. 964-965 |
artikel |
26 |
Data Analytics for Pandemic Management using MapReduce and Apriori Algorithm
|
Kumar, Shashwat |
|
|
230 |
C |
p. 455-466 |
artikel |
27 |
Decentralized and Multi-Authority based Public Key Infrastructure for Sharing Electronic Health Records
|
Kumari, Anamika |
|
|
230 |
C |
p. 44-54 |
artikel |
28 |
Design and Optimization of an Eco-Efficient Vehicle Routing Model for Heterogeneous Fleets and Multi Depot Systems
|
Vyakarnam, Shreeyash |
|
|
230 |
C |
p. 629-640 |
artikel |
29 |
Design of Hexagonal Ring Wearable Textile Antenna using Polyester for Early Bone Health Detection
|
Rathod, Dr. Kiran |
|
|
230 |
C |
p. 946-954 |
artikel |
30 |
Development of a Method for Software Reliability Assessment using Neural Networks
|
Bayramova, Tamilla A. |
|
|
230 |
C |
p. 445-454 |
artikel |
31 |
Development of Renewable Energy System for Enhancing Reliability of Power
|
Mallala, Balasubbareddy |
|
|
230 |
C |
p. 1-10 |
artikel |
32 |
Dynamic Ensemble Learning with Evolutionary Programming and Swarm Intelligence for Image Classification
|
Kiran, G Uday |
|
|
230 |
C |
p. 669-678 |
artikel |
33 |
Dynamic Simulation of a 12 DoF Biped Robot with Newton-Euler Method using Unit Vector Approach
|
Thakkar, Ashish M. |
|
|
230 |
C |
p. 935-945 |
artikel |
34 |
Dynamic Virtual Machine Consolidation in the Cloud: A Cuckoo Search Approach
|
Thakur, Puja |
|
|
230 |
C |
p. 769-779 |
artikel |
35 |
Efficient Single Secret Image Sharing in Resource-Constrained Environment using Counting-Based Secret Sharing over Cloud
|
Parihar, Bhawana |
|
|
230 |
C |
p. 158-167 |
artikel |
36 |
Empirical Evaluation of Deep Learning based Models for Time Series Datasets
|
Champaneria, Malav |
|
|
230 |
C |
p. 864-873 |
artikel |
37 |
Enabling an On-demand Access to Community Sentiments using LSTM RNNs Web Service Architecture
|
Prabakaran, N |
|
|
230 |
C |
p. 584-597 |
artikel |
38 |
Enhanced Generic Framework for Privacy Preservation in Internet of Things Networks
|
Kumar, Vikash |
|
|
230 |
C |
p. 475-485 |
artikel |
39 |
Enhanced Traffic Management for Emergency Vehicle Information Transmission using Wireless Sensor Networks
|
Kumar, P Phani |
|
|
230 |
C |
p. 798-807 |
artikel |
40 |
Enhancing Network Lifetime of WSNs through the Implementation of a Modified Ant Colony Optimization Algorithm
|
Murugesan, Malathi |
|
|
230 |
C |
p. 368-376 |
artikel |
41 |
Enhancing Thyroid Patient Dietary Management with an Optimized Recommender System based on PSO and K-means
|
Hosen, Md Apu |
|
|
230 |
C |
p. 688-697 |
artikel |
42 |
Enhancing Tuberculosis Detection: Leveraging RF-HOG Model for Automated Diagnosis from Chest X-ray Images
|
Geethamani, R. |
|
|
230 |
C |
p. 21-32 |
artikel |
43 |
Evolutionary Computing Coupled Machine Learning Algorithms to Predict the Temperature Distribution of Additive Friction Stir Deposited Aluminum Alloy
|
Mishra, Akshansh |
|
|
230 |
C |
p. 651-657 |
artikel |
44 |
Evolving Convolutional Neural Networks with Meta-Heuristics for Transfer Learning in Computer Vision
|
Srilakshmi, V |
|
|
230 |
C |
p. 658-668 |
artikel |
45 |
FFO-ABC DepressioGuard: A Hybrid Classification Framework for Social Media Depression Detection
|
Ananthanagu, U |
|
|
230 |
C |
p. 138-149 |
artikel |
46 |
FSON Topology for Mass Development and Management of Future Generation Space Technologies
|
Hasanov, Mehman H. |
|
|
230 |
C |
p. 82-89 |
artikel |
47 |
Genetic Algorithm Optimized Topic-aware Transformer-Based Framework for Conversational Question Generation
|
Mulla, Nikahat |
|
|
230 |
C |
p. 914-922 |
artikel |
48 |
Global Optimization using Random Adaptive Backtracking Particle Swarm Optimization (RAB-PSO)
|
Barrios II, Dennis M. |
|
|
230 |
C |
p. 223-232 |
artikel |
49 |
Healthcare 4.0: A Review of Phishing Attacks in Cyber Security
|
Sushma, K S N |
|
|
230 |
C |
p. 874-878 |
artikel |
50 |
Hub based LAN simulation using QualNet
|
Kothari, Abhishek |
|
|
230 |
C |
p. 890-902 |
artikel |
51 |
Hybrid Algorithm for Large Scale in Electric Vehicle Routing and Scheduling Optimization
|
Rele, Mayur |
|
|
230 |
C |
p. 503-514 |
artikel |
52 |
Improved Adaptive PSO-based Gain Tuning for PID Controllers in Utility Boilers
|
Kruthika, U. |
|
|
230 |
C |
p. 183-192 |
artikel |
53 |
Improving Twitter Sentiment Analysis Efficiency with SVM-PSO Classification and EFWS Heuristic
|
Gupta, Vijay |
|
|
230 |
C |
p. 698-715 |
artikel |
54 |
Innovating Healthcare IoT with a Secure Blockchain Consensus Algorithm based on Verifiable Random Ranking
|
Pundlik, Manish |
|
|
230 |
C |
p. 264-274 |
artikel |
55 |
Intrusion Detection in Novel WSN-Leach Dos Attack Dataset using Machine Learning based Boosting Algorithms
|
N, Dharini |
|
|
230 |
C |
p. 90-99 |
artikel |
56 |
Investigation of Digital Twin Technology for Secure and Privacy Preserving Networking
|
Hassan, Fauzia |
|
|
230 |
C |
p. 398-406 |
artikel |
57 |
Investigation of Task Scheduling in Cloud Computing by using Imperialist Competitive and Crow Search Algorithms
|
Ravi, Jayavadivel |
|
|
230 |
C |
p. 879-889 |
artikel |
58 |
I-Randomly Exploring Algorithm for Wheeled Mobile Robot Path Planning
|
Ravishankar, Kavya |
|
|
230 |
C |
p. 357-367 |
artikel |
59 |
Lane Detection using Kalman Filtering
|
Subramani, R |
|
|
230 |
C |
p. 598-607 |
artikel |
60 |
Leveraging Machine Learning for Customer Intelligence: An Experimental Analysis Learning Classifiers
|
K, Dr. Sudha |
|
|
230 |
C |
p. 128-137 |
artikel |
61 |
Leveraging the Power of Blockchain Technology for Building a Resilient Crowdfunding Solution
|
Naik, Dr. Poornima G. |
|
|
230 |
C |
p. 11-20 |
artikel |
62 |
LSTM-based Approach for Android Malware Detection
|
Kumar, Manoj |
|
|
230 |
C |
p. 679-687 |
artikel |
63 |
Lung Cancer Detection from X-Ray Images using Hybrid Deep Learning Technique
|
Sreeprada, V. |
|
|
230 |
C |
p. 467-474 |
artikel |
64 |
MedUAV: Drone-based Emergency Medical Supply System using Decentralized Autonomous Organization (DAO)
|
E, Sarvesh |
|
|
230 |
C |
p. 737-748 |
artikel |
65 |
Miner Selection in Blockchain using Proof of Artificial Intelligence
|
Pawar, Manjula K. |
|
|
230 |
C |
p. 838-845 |
artikel |
66 |
Multi-Method Stacked Feature Selection Approach based IDS for IoT Networks
|
Kushwaha, Jai Prakash |
|
|
230 |
C |
p. 564-573 |
artikel |
67 |
Name2Vec: Name Matching using Character-based with Deep Learning
|
Dinh, Xuan Truong |
|
|
230 |
C |
p. 305-315 |
artikel |
68 |
Online Adaptable Trajectory using artificial Neural Networks for Unknown Environment
|
Duhan, Seema |
|
|
230 |
C |
p. 377-387 |
artikel |
69 |
Optimizing Broadband Access and Network Design in Wireless Mesh Networks using Multi-Objective Particle Swarm Optimization
|
Neema, M. |
|
|
230 |
C |
p. 275-286 |
artikel |
70 |
Optimizing Chronic Kidney Disease Diagnosis in Uddanam: A Smart Fusion of GA-MLP Hybrid and PCA Dimensionality Reduction
|
Terlapu, Pandu Ranga Vital |
|
|
230 |
C |
p. 522-531 |
artikel |
71 |
Optimizing Wireless Sensor Network Routing Through Memetic Algorithms: Enhancing Energy Efficiency and Data Reliability
|
D, Aishwarya |
|
|
230 |
C |
p. 150-157 |
artikel |
72 |
Ordering of Solar Photovoltaic Panels using the MEREC-SPOTIS Hybrid Analytical Model
|
Junior, Célio Manso de Azevêdo |
|
|
230 |
C |
p. 808-818 |
artikel |
73 |
Performance Analysis of Machine Learning Techniques for Anomaly Detection in Indian Electricity Consumption Data
|
M, Ravinder |
|
|
230 |
C |
p. 287-296 |
artikel |
74 |
Performance Analysis of Wireless Adhoc Networks in Flat Fading and Frequency Selective Fading channels
|
Premkumar, M |
|
|
230 |
C |
p. 846-852 |
artikel |
75 |
Phishing Detection using Gradient Boosting Classifier
|
Omari, Kamal |
|
|
230 |
C |
p. 120-127 |
artikel |
76 |
Proactive Headcount and Suspicious Activity Detection using YOLOv8
|
D, Sudharson |
|
|
230 |
C |
p. 61-69 |
artikel |
77 |
QUESC: Environmental Sound classification Using Quantum Quantized Networks
|
Dutta, Siddhant |
|
|
230 |
C |
p. 554-563 |
artikel |
78 |
Real Time Implementation of Biometric-based EVM System for Distinct Verification
|
Keerthi, T. |
|
|
230 |
C |
p. 407-416 |
artikel |
79 |
REC CONNECT: A Comprehensive Android File Transfer Application
|
L, Priya |
|
|
230 |
C |
p. 903-913 |
artikel |
80 |
Resource Scheduling and Load Balancing Algorithms in Cloud Computing
|
Vijay, Rahul |
|
|
230 |
C |
p. 326-336 |
artikel |
81 |
Revolutionizing COVID-19 Management: Block chain-Enabled Prediction and Secure Storage using Deep Learning Techniques
|
Arulmozhi, B. |
|
|
230 |
C |
p. 853-863 |
artikel |
82 |
Robust Framework for Malevolent URL Detection using Hybrid Supervised Learning
|
R, Roopalakshmi |
|
|
230 |
C |
p. 241-247 |
artikel |
83 |
Routing Protocol using Ant Colony Optimization- Traveling Salesman Problem
|
R, Latha |
|
|
230 |
C |
p. 515-521 |
artikel |
84 |
Secured Health Data Sharing System using IPFS and Blockchain with Beacon Proxy
|
Jayanthy, Dr. S. |
|
|
230 |
C |
p. 788-797 |
artikel |
85 |
Security and Energy Management in Cooperative Spectrum Sensing
|
Antoinette, A |
|
|
230 |
C |
p. 716-724 |
artikel |
86 |
Security Implementation on IoT using CoAP and Elliptical Curve Cryptography
|
Achary, Rathnakar |
|
|
230 |
C |
p. 493-502 |
artikel |
87 |
Selection of Water Flow Sensors: An Approach using the PrOPPAGA Method
|
Diniz, Bruno Pereira |
|
|
230 |
C |
p. 641-650 |
artikel |
88 |
SMS Spam Detection using Relevance Vector Machine
|
Pudasaini, Shushanta |
|
|
230 |
C |
p. 337-346 |
artikel |
89 |
Supply Chain Management of Dual-Use Drugs using Blockchain
|
Samundeswari, S |
|
|
230 |
C |
p. 388-397 |
artikel |
90 |
Suspension Control Sensors Embedded with Smart Grid- Smart Car System
|
Sasirekha, R |
|
|
230 |
C |
p. 297-304 |
artikel |
91 |
Sustainable and Optimized Harmonic Filter Design for Industrial Loads
|
Mahesh, G. Sreeramulu |
|
|
230 |
C |
p. 780-787 |
artikel |
92 |
The Decentralized Smart Contract Certificate System Utilizing Ethereum Blockchain Technology
|
Wankhede, Disha |
|
|
230 |
C |
p. 923-934 |
artikel |
93 |
UGVs for Agri Spray with AI assisted Paddy Crop disease Identification
|
Sujatha, K. |
|
|
230 |
C |
p. 70-81 |
artikel |
94 |
Unlocking Energy Efficiency: Harnessing Fuzzy Logic Control for Lighting Systems
|
Imamguluyev, Rahib |
|
|
230 |
C |
p. 574-583 |
artikel |
95 |
Updated Particle Swarm Optimization for Mechanical Engineering Design Optimization
|
Parouha, Raghav Prasad |
|
|
230 |
C |
p. 830-837 |
artikel |
96 |
Web Application Security through Comprehensive Vulnerability Assessment
|
Gandikota, Prasanth Satya Sai Kiran |
|
|
230 |
C |
p. 168-182 |
artikel |
97 |
Web Scraping using Natural Language Processing: Exploiting Unstructured Text for Data Extraction and Analysis
|
Pichiyan, Vijayaragavan |
|
|
230 |
C |
p. 193-202 |
artikel |
98 |
Wild Animal Detection using YOLOv8
|
Dave, Brahm |
|
|
230 |
C |
p. 100-111 |
artikel |