Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             61 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A control-driven transition strategy for enhanced multi-level threshold image segmentation optimization Abualigah, Laith

30 C p.
artikel
2 ADAMAEX—Alzheimer’s disease classification via attention-enhanced autoencoders and XAI Bootun, Doorgeshwaree

30 C p.
artikel
3 A deep learning-orchestrated garlic routing architecture for secure telesurgery operations in healthcare 4.0 Shah, Kavit

30 C p.
artikel
4 Advanced AI-driven intrusion detection for securing cloud-based industrial IoT Qureshi, Saima Siraj

30 C p.
artikel
5 Advanced skin lesion segmentation and classification using adaptive contextual GLCM and deep learning hybrid models Kumar, Vinit

30 C p.
artikel
6 A multi-module approach to evaluate online teaching quality in international Chinese education Ping, Yang Ya

30 C p.
artikel
7 Analysis of social networks content to identify fake news using stacked combination of deep neural networks Li, Yujie

30 C p.
artikel
8 An innovative approach to advanced voice classification of sacred Quranic recitations through multimodal fusion Hassan, Esraa

30 C p.
artikel
9 An optimized feature selection using triangle mutation rule and restart strategy in enhanced slime mould algorithm Conteh, Ibrahim Musa

30 C p.
artikel
10 A novel approach for efficient resource allocation in 6G V2V networks using neighbor-aware greedy algorithm and sweep line model Mande, Spandana

30 C p.
artikel
11 A novel hybrid fuzzy logic and federated learning framework for enhancing cybersecurity and fraud detection in IoT-enabled metaverse transactions Rehman, Amjad

30 C p.
artikel
12 A real-time system for monitoring and classification of human falls on stairs using 2.4 GHz XBee3 micro modules with a tri-axial accelerometer and KNN algorithms Booranawong, Apidet

30 C p.
artikel
13 A robust and efficient algorithm for graph coloring problem based on Malatya centrality and sequent independent sets Yakut, Selman

30 C p.
artikel
14 A robust tuned EfficientNet-B2 using dynamic learning for predicting different grades of brain cancer El-Aziz, A. A. Abd

30 C p.
artikel
15 A strong algorithm for randomly hiding a secret files inside true color image using large primary secret key Suhail, Aamer Tahseen

30 C p.
artikel
16 Automatic identification method of foreign body intrusion in railway transportation track based on improved LeaderRank identification of key points Niu, Linjie

30 C p.
artikel
17 Blockchain-enhanced optimization for a secure and transparent global energy supply chain with reduced environmental impact and cost Ramalingam, Sivajothi

30 C p.
artikel
18 Cancelable finger vein authentication using multidimensional scaling based on deep learning Hammad, Mohamed

30 C p.
artikel
19 Climate-resilient water management: Leveraging IoT and AI for sustainable agriculture Zaigham Abbas Naqvi, Syed Muhammad

30 C p.
artikel
20 Clipper: An efficient cluster-based data pruning technique for biomedical data to increase the accuracy of machine learning model prediction Karadeniz, M.B.

30 C p.
artikel
21 Cloud based collaborative data compression technology for power Internet of Things Wang, Qiong

30 C p.
artikel
22 Cryptocurrency-driven ransomware syndicates operating on the darknet: A focused examination of the Arab world Kim, Kyounggon

30 C p.
artikel
23 Design and hardware implementation of LED block cipher for vehicles keyless entry systems Mhaouch, Ayoub

30 C p.
artikel
24 Design and optimization of human-machine interaction interface for the intelligent Internet of Things based on deep learning and spatial computing Wang, Wencong

30 C p.
artikel
25 Dynamic secret sharing for enhanced cloud security: Tackling eavesdropping and threshold attacks Ali, Sijjad

30 C p.
artikel
26 Effectiveness of Teachable Machine, mobile net, and YOLO for object detection: A comparative study on practical applications Saqib, Sheikh Muhammad

30 C p.
artikel
27 Emotion recognition in panoramic audio and video virtual reality based on deep learning and feature fusion Guo, Siqi

30 C p.
artikel
28 Enhanced multiple sclerosis diagnosis by MRI image retrieval using convolutional autoencoders Haggag, R.M.

30 C p.
artikel
29 Enhancing IoT security and healthcare data protection in the metaverse: A Dynamic Adaptive Security Mechanism Qureshi, Saima Siraj

30 C p.
artikel
30 Enhancing security in social computing systems through knowledge learning techniques Rajesh, Anitha

30 C p.
artikel
31 Explainable AI supported hybrid deep learnig method for layer 2 intrusion detection Kilincer, Ilhan Firat

30 C p.
artikel
32 Expression of Concern: “BSDN-HMTD: A blockchain supported SDN framework for detecting DDoS attacks using deep learning method” [Egypt. Infor. J. 27 (2024) 100515] Ramadass, Parthasarathy

30 C p.
artikel
33 Federated learning-based semantic segmentation framework for sustainable development Godavarthi, Deepthi

30 C p.
artikel
34 Hybrid signal algorithm detection in NOMA 5G waveform: Transforming smart healthcare connectivity by reducing latency Kumar, Arun

30 C p.
artikel
35 IAPN: Framework to secure IoT-based infrastructures using Private APN Alsharabi, Naif

30 C p.
artikel
36 IFC: Editorial
30 C p.
artikel
37 Improved lightweight node storage solutions in blockchain Cao, Hongping

30 C p.
artikel
38 Improving data transmission through optimizing blockchain sharding in cloud IoT based healthcare applications Mythili, J.

30 C p.
artikel
39 Innovative quantum techniques for improving system performance in cloud computing Alsafri, Naher M.

30 C p.
artikel
40 Intelligent VANET-based traffic signal control system for emergency vehicle prioritization and improved traffic management Bairi, Pijush

30 C p.
artikel
41 Intrusion detection algorithm of wireless network based on network traffic anomaly analysis Nie, Xiangqian

30 C p.
artikel
42 Intrusion detection system framework for cyber-physical systems Rehman, Shafiq ur

30 C p.
artikel
43 LPBSA: Pre-clinical data analysis using advanced machine learning models for disease prediction Hamad, Dana R.

30 C p.
artikel
44 Machine learning models for enhanced stroke detection and prediction Bajaj, Shilpa

30 C p.
artikel
45 MANET highly efficient clustering technique based on coverage k-means algorithm Hussein, Aya Ayad

30 C p.
artikel
46 Metadata association feature ATC data security assessment Jia, Ruchun

30 C p.
artikel
47 Multi-task detection of harmful content in code-mixed meme captions using large language models with zero-shot, few-shot, and fine-tuning approaches Indira Kumar, A.K.

30 C p.
artikel
48 Network information security protection method based on additive Gaussian noise and mutual information neural network in cloud computing background Zhong, Yu

30 C p.
artikel
49 Novel framework on double event-triggered consensus of positive multi-agent systems Zhang, Junfeng

30 C p.
artikel
50 PRFE-driven gene selection with multi-classifier ensemble for cancer classification Behuria, Smitirekha

30 C p.
artikel
51 Ransomware detection and family classification using fine-tuned BERT and RoBERTa models Hussain, Amjad

30 C p.
artikel
52 Refining digital security with EfficientNetV2-B2 deepfake detection techniques Vivekananda, G.N.

30 C p.
artikel
53 Research on network information leakage prevention method based on k-symmetric anonymous algorithm Zheng, Zaoxian

30 C p.
artikel
54 Robust zero-watermarking based on dual branch neural network for ownership authentication, auxiliary information delivery and tamper detection Arevalo-Ancona, Rodrigo Eduardo

30 C p.
artikel
55 Simulink-Driven Digital Twin Implementation for Smart Greenhouse Environmental Control Arshad, Jehangir

30 C p.
artikel
56 Standardization of expected value in gap statistic using Gaussian distribution for optimal number of clusters selection in K-means Khan, Iliyas Karim

30 C p.
artikel
57 Temporal record linkage for heterogeneous big data records Abdel Monem, Reham I.

30 C p.
artikel
58 TFKAN: Transformer based on Kolmogorov–Arnold Networks for Intrusion Detection in IoT environment Fares, Ibrahim A.

30 C p.
artikel
59 The application and performance optimization of multi-controller-based load balancing algorithm in computer networks Guo, Fengfeng

30 C p.
artikel
60 Towards lightweight model using non-local-based graph convolution neural network for SQL injection detection Nguyen, Duc-Chinh

30 C p.
artikel
61 Zero trust anonymous access algorithm for multi cloud storage system based on CP-ABE Tian, Jun

30 C p.
artikel
                             61 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland