nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A new method for hiding a secret file in several WAV files depends on circular secret key
|
Tahseen Suhail, Aamer |
|
|
23 |
4 |
p. 33-43 |
artikel |
2 |
A novel approach for detecting advanced persistent threats
|
Al-Saraireh, Jaafer |
|
|
23 |
4 |
p. 45-55 |
artikel |
3 |
A speech separation system in video sequence using dilated inception network and U-Net
|
Dahy, Ghada |
|
|
23 |
4 |
p. 121-131 |
artikel |
4 |
Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms
|
Almomani, Ammar |
|
|
23 |
4 |
p. 57-68 |
artikel |
5 |
Energy efficiency in cognitive radio network using cooperative spectrum sensing based on hybrid spectrum handoff
|
Arshid, Kaleem |
|
|
23 |
4 |
p. 77-88 |
artikel |
6 |
IFC: Editorial
|
|
|
|
23 |
4 |
p. IFC |
artikel |
7 |
Large-capacity information hiding scheme based on minimum pixel modification
|
Yu, Zhang |
|
|
23 |
4 |
p. 97-108 |
artikel |
8 |
Model of functioning of the centralized wireless information ecosystem focused on multimedia streaming
|
Kovtun, Viacheslav |
|
|
23 |
4 |
p. 89-96 |
artikel |
9 |
Novel linear programming models based on distance measure of IFSs and modified TOPSIS method for portfolio selection
|
Deng, Xue |
|
|
23 |
4 |
p. 13-31 |
artikel |
10 |
Predicting the prevalence of lung cancer using feature transformation techniques
|
Munawar, Zunaira |
|
|
23 |
4 |
p. 109-120 |
artikel |
11 |
Private blockchain-based encryption framework using computational intelligence approach
|
Ghazal, Taher M. |
|
|
23 |
4 |
p. 69-75 |
artikel |
12 |
Provably throttling SQLI using an enciphering query and secure matching
|
Abdulridha Hussain, Mohammed |
|
|
23 |
4 |
p. 145-162 |
artikel |
13 |
Read my lips: Artificial intelligence word-level arabic lipreading system
|
Dweik, Waleed |
|
|
23 |
4 |
p. 1-12 |
artikel |
14 |
Smart Traffic Scheduling for Crowded Cities Road Networks
|
Alkhatib, Ahmad A.A. |
|
|
23 |
4 |
p. 163-176 |
artikel |
15 |
Systematic literature review and analysis for Arabic text steganography method practically
|
Alifah Roslan, Nuur |
|
|
23 |
4 |
p. 177-191 |
artikel |
16 |
WeDIV – An improved k-means clustering algorithm with a weighted distance and a novel internal validation index
|
Ning, Zilan |
|
|
23 |
4 |
p. 133-144 |
artikel |