nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria decision-making methods
|
Al-Hchaimi, Ahmed Abbas Jasim |
|
|
24 |
2 |
p. 351-364 |
artikel |
2 |
A fully automatic fine tuned deep learning model for knee osteoarthritis detection and progression analysis
|
El-Ghany, Sameh Abd |
|
|
24 |
2 |
p. 229-240 |
artikel |
3 |
A genomic rule-based KNN model for fast flux botnet detection
|
Ayo, Femi Emmanuel |
|
|
24 |
2 |
p. 313-325 |
artikel |
4 |
An analysis of 5G-MIMO communication system based SS for centralized cooperative and non-cooperative users
|
Algriree, Waleed |
|
|
24 |
2 |
p. 161-172 |
artikel |
5 |
An improvised nature-inspired algorithm enfolded broad learning system for disease classification
|
Parhi, Pournamasi |
|
|
24 |
2 |
p. 241-255 |
artikel |
6 |
Click fraud detection for online advertising using machine learning
|
Aljabri, Malak |
|
|
24 |
2 |
p. 341-350 |
artikel |
7 |
Corrigendum to “A hybrid deep learning-based framework for future terrorist activities modeling and prediction” [Egypt. Inform. J. 23(3) 2022, 437–446]
|
Saidi, Firas |
|
|
24 |
2 |
p. 215-216 |
artikel |
8 |
Deployment of an intelligent and secure cattle health monitoring system
|
Arshad, Jehangir |
|
|
24 |
2 |
p. 265-275 |
artikel |
9 |
Design of security management model for communication networks in digital cultural consumption under Metaverse – The case of mobile game
|
Gao, Wei |
|
|
24 |
2 |
p. 303-311 |
artikel |
10 |
Detecting Arabic sexual harassment using bidirectional long-short-term memory and a temporal convolutional network
|
Amer Hamzah, Noor |
|
|
24 |
2 |
p. 365-373 |
artikel |
11 |
Detecting suicidality on social media: Machine learning at rescue
|
Rabani, Syed Tanzeel |
|
|
24 |
2 |
p. 291-302 |
artikel |
12 |
Energy-aware intelligent scheduling for deadline-constrained workflows in sustainable cloud computing
|
Cao, Min |
|
|
24 |
2 |
p. 277-290 |
artikel |
13 |
IFC: Editorial
|
|
|
|
24 |
2 |
p. IFC |
artikel |
14 |
iFogRep: An intelligent consistent approach for replication and placement of IoT based on fog computing
|
Saleh, Safa'a S. |
|
|
24 |
2 |
p. 327-339 |
artikel |
15 |
Intelligent deep analysis of DNA sequences based on FFGM to enhancement the performance and reduce the computation
|
Kadhuim, Zena A. |
|
|
24 |
2 |
p. 173-190 |
artikel |
16 |
Prediction of complex public opinion evolution based on improved multi-objective grey wolf optimizer
|
Su, Yilin |
|
|
24 |
2 |
p. 149-160 |
artikel |
17 |
Research on smart city data encryption and communication efficiency improvement under federated learning framework
|
Kuang, Zhen |
|
|
24 |
2 |
p. 217-227 |
artikel |
18 |
Study on trust evaluation and service selection for Service-Oriented E-Commerce systems in IoT environments
|
Wu, Xu |
|
|
24 |
2 |
p. 257-263 |
artikel |
19 |
Synthesis of nested loop exercises for practice in introductory programming
|
Okonkwo, Chinedu Wilfred |
|
|
24 |
2 |
p. 191-203 |
artikel |
20 |
TBMOR: A lightweight trust-based model for secure routing of opportunistic networks
|
Su, Bing |
|
|
24 |
2 |
p. 205-214 |
artikel |