nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparative survey on LEACH successors clustering algorithms for energy-efficient longevity WSNs
|
Hussain, Mai Hussain Ahmed |
|
|
26 |
C |
p. |
artikel |
2 |
Addressing label noise in leukemia image classification using small loss approach and pLOF with weighted-average ensemble
|
Aziz, Md. Tarek |
|
|
26 |
C |
p. |
artikel |
3 |
AI-driven Q-learning for personalized acne genetics: Innovative approaches and potential genetic markers
|
Chua, Yong Chi |
|
|
26 |
C |
p. |
artikel |
4 |
An automated quantitative investment model of stock selection and market timing based on industry information
|
Liu, Minshi |
|
|
26 |
C |
p. |
artikel |
5 |
An immune plasma algorithm with Q-learning based pandemic management for path planning of unmanned aerial vehicles
|
Aslan, Selcuk |
|
|
26 |
C |
p. |
artikel |
6 |
A shallow 3D convolutional neural network for violence detection in videos
|
Dündar, Naz |
|
|
26 |
C |
p. |
artikel |
7 |
Blockchain and big data integration design for traceability and carbon footprint management in the fishery supply chain
|
Alwi, Aslan |
|
|
26 |
C |
p. |
artikel |
8 |
Boosted Nutcracker optimizer and Chaos Game Optimization with Cross Vision Transformer for medical image classification
|
Mohamed, Ahmed F. |
|
|
26 |
C |
p. |
artikel |
9 |
Cerebral palsy-affected individuals' brain-computer interface for wheelchair movement in an indoor environment using mental tasks
|
Ramakrishnan, Jayabrabu |
|
|
26 |
C |
p. |
artikel |
10 |
Classification feature selection and dimensionality reduction based on logical binary sine-cosine function arithmetic optimization algorithm
|
Li, Xu-Dong |
|
|
26 |
C |
p. |
artikel |
11 |
Configuring the RegTech business model to explore implications of FinTech
|
Wang, Jen-Sheng |
|
|
26 |
C |
p. |
artikel |
12 |
CoTNeT: Contextual transformer network for encrypted traffic classification
|
Huang, Hong |
|
|
26 |
C |
p. |
artikel |
13 |
Egocentric intention object prediction based on a human-like manner
|
Ma, Zongnan |
|
|
26 |
C |
p. |
artikel |
14 |
Email spam detection by deep learning models using novel feature selection technique and BERT
|
Nasreen, Ghazala |
|
|
26 |
C |
p. |
artikel |
15 |
IFC: Editorial
|
|
|
|
26 |
C |
p. |
artikel |
16 |
Intelligent vineyard blade density measurement method incorporating a lightweight vision transformer
|
Ke, Shan |
|
|
26 |
C |
p. |
artikel |
17 |
Internet of Things intrusion detection: Research and practice of NSENet and LSTM fusion models
|
Li, Shaoqin |
|
|
26 |
C |
p. |
artikel |
18 |
Lightweight authentication protocol for connected medical IoT through privacy-preserving access
|
Tanveer, Muhammad |
|
|
26 |
C |
p. |
artikel |
19 |
MalRed: An innovative approach for detecting malware using the red channel analysis of color images
|
Shakir Hameed Shah, Syed |
|
|
26 |
C |
p. |
artikel |
20 |
Molding robust S-box design based on linear fractional transformation and multilayer Perceptron: Applications to multimedia security
|
Waheed, Adil |
|
|
26 |
C |
p. |
artikel |
21 |
Predict student learning styles and suitable assessment methods using click stream
|
Rashad Sayed, Ahmed |
|
|
26 |
C |
p. |
artikel |
22 |
RETRACTED: ODRNN: Optimized Deep Recurrent Neural Networks for Automatic Detection of Leukaemia
|
Shree,a, K. Dhana |
|
|
26 |
C |
p. |
artikel |