nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A control-driven transition strategy for enhanced multi-level threshold image segmentation optimization
|
Abualigah, Laith |
|
|
30 |
C |
p. |
artikel |
2 |
ADAMAEX—Alzheimer’s disease classification via attention-enhanced autoencoders and XAI
|
Bootun, Doorgeshwaree |
|
|
30 |
C |
p. |
artikel |
3 |
A deep learning-orchestrated garlic routing architecture for secure telesurgery operations in healthcare 4.0
|
Shah, Kavit |
|
|
30 |
C |
p. |
artikel |
4 |
Advanced AI-driven intrusion detection for securing cloud-based industrial IoT
|
Qureshi, Saima Siraj |
|
|
30 |
C |
p. |
artikel |
5 |
Advanced skin lesion segmentation and classification using adaptive contextual GLCM and deep learning hybrid models
|
Kumar, Vinit |
|
|
30 |
C |
p. |
artikel |
6 |
A multi-module approach to evaluate online teaching quality in international Chinese education
|
Ping, Yang Ya |
|
|
30 |
C |
p. |
artikel |
7 |
Analysis of social networks content to identify fake news using stacked combination of deep neural networks
|
Li, Yujie |
|
|
30 |
C |
p. |
artikel |
8 |
An innovative approach to advanced voice classification of sacred Quranic recitations through multimodal fusion
|
Hassan, Esraa |
|
|
30 |
C |
p. |
artikel |
9 |
An optimized feature selection using triangle mutation rule and restart strategy in enhanced slime mould algorithm
|
Conteh, Ibrahim Musa |
|
|
30 |
C |
p. |
artikel |
10 |
A novel approach for efficient resource allocation in 6G V2V networks using neighbor-aware greedy algorithm and sweep line model
|
Mande, Spandana |
|
|
30 |
C |
p. |
artikel |
11 |
A novel hybrid fuzzy logic and federated learning framework for enhancing cybersecurity and fraud detection in IoT-enabled metaverse transactions
|
Rehman, Amjad |
|
|
30 |
C |
p. |
artikel |
12 |
A real-time system for monitoring and classification of human falls on stairs using 2.4 GHz XBee3 micro modules with a tri-axial accelerometer and KNN algorithms
|
Booranawong, Apidet |
|
|
30 |
C |
p. |
artikel |
13 |
A robust and efficient algorithm for graph coloring problem based on Malatya centrality and sequent independent sets
|
Yakut, Selman |
|
|
30 |
C |
p. |
artikel |
14 |
A robust tuned EfficientNet-B2 using dynamic learning for predicting different grades of brain cancer
|
El-Aziz, A. A. Abd |
|
|
30 |
C |
p. |
artikel |
15 |
A strong algorithm for randomly hiding a secret files inside true color image using large primary secret key
|
Suhail, Aamer Tahseen |
|
|
30 |
C |
p. |
artikel |
16 |
Automatic identification method of foreign body intrusion in railway transportation track based on improved LeaderRank identification of key points
|
Niu, Linjie |
|
|
30 |
C |
p. |
artikel |
17 |
Blockchain-enhanced optimization for a secure and transparent global energy supply chain with reduced environmental impact and cost
|
Ramalingam, Sivajothi |
|
|
30 |
C |
p. |
artikel |
18 |
Cancelable finger vein authentication using multidimensional scaling based on deep learning
|
Hammad, Mohamed |
|
|
30 |
C |
p. |
artikel |
19 |
Climate-resilient water management: Leveraging IoT and AI for sustainable agriculture
|
Zaigham Abbas Naqvi, Syed Muhammad |
|
|
30 |
C |
p. |
artikel |
20 |
Clipper: An efficient cluster-based data pruning technique for biomedical data to increase the accuracy of machine learning model prediction
|
Karadeniz, M.B. |
|
|
30 |
C |
p. |
artikel |
21 |
Cloud based collaborative data compression technology for power Internet of Things
|
Wang, Qiong |
|
|
30 |
C |
p. |
artikel |
22 |
Cryptocurrency-driven ransomware syndicates operating on the darknet: A focused examination of the Arab world
|
Kim, Kyounggon |
|
|
30 |
C |
p. |
artikel |
23 |
Design and hardware implementation of LED block cipher for vehicles keyless entry systems
|
Mhaouch, Ayoub |
|
|
30 |
C |
p. |
artikel |
24 |
Design and optimization of human-machine interaction interface for the intelligent Internet of Things based on deep learning and spatial computing
|
Wang, Wencong |
|
|
30 |
C |
p. |
artikel |
25 |
Dynamic secret sharing for enhanced cloud security: Tackling eavesdropping and threshold attacks
|
Ali, Sijjad |
|
|
30 |
C |
p. |
artikel |
26 |
Effectiveness of Teachable Machine, mobile net, and YOLO for object detection: A comparative study on practical applications
|
Saqib, Sheikh Muhammad |
|
|
30 |
C |
p. |
artikel |
27 |
Emotion recognition in panoramic audio and video virtual reality based on deep learning and feature fusion
|
Guo, Siqi |
|
|
30 |
C |
p. |
artikel |
28 |
Enhanced multiple sclerosis diagnosis by MRI image retrieval using convolutional autoencoders
|
Haggag, R.M. |
|
|
30 |
C |
p. |
artikel |
29 |
Enhancing IoT security and healthcare data protection in the metaverse: A Dynamic Adaptive Security Mechanism
|
Qureshi, Saima Siraj |
|
|
30 |
C |
p. |
artikel |
30 |
Enhancing security in social computing systems through knowledge learning techniques
|
Rajesh, Anitha |
|
|
30 |
C |
p. |
artikel |
31 |
Explainable AI supported hybrid deep learnig method for layer 2 intrusion detection
|
Kilincer, Ilhan Firat |
|
|
30 |
C |
p. |
artikel |
32 |
Expression of Concern: “BSDN-HMTD: A blockchain supported SDN framework for detecting DDoS attacks using deep learning method” [Egypt. Infor. J. 27 (2024) 100515]
|
Ramadass, Parthasarathy |
|
|
30 |
C |
p. |
artikel |
33 |
Federated learning-based semantic segmentation framework for sustainable development
|
Godavarthi, Deepthi |
|
|
30 |
C |
p. |
artikel |
34 |
Hybrid signal algorithm detection in NOMA 5G waveform: Transforming smart healthcare connectivity by reducing latency
|
Kumar, Arun |
|
|
30 |
C |
p. |
artikel |
35 |
IAPN: Framework to secure IoT-based infrastructures using Private APN
|
Alsharabi, Naif |
|
|
30 |
C |
p. |
artikel |
36 |
IFC: Editorial
|
|
|
|
30 |
C |
p. |
artikel |
37 |
Improved lightweight node storage solutions in blockchain
|
Cao, Hongping |
|
|
30 |
C |
p. |
artikel |
38 |
Improving data transmission through optimizing blockchain sharding in cloud IoT based healthcare applications
|
Mythili, J. |
|
|
30 |
C |
p. |
artikel |
39 |
Innovative quantum techniques for improving system performance in cloud computing
|
Alsafri, Naher M. |
|
|
30 |
C |
p. |
artikel |
40 |
Intelligent VANET-based traffic signal control system for emergency vehicle prioritization and improved traffic management
|
Bairi, Pijush |
|
|
30 |
C |
p. |
artikel |
41 |
Intrusion detection algorithm of wireless network based on network traffic anomaly analysis
|
Nie, Xiangqian |
|
|
30 |
C |
p. |
artikel |
42 |
Intrusion detection system framework for cyber-physical systems
|
Rehman, Shafiq ur |
|
|
30 |
C |
p. |
artikel |
43 |
LPBSA: Pre-clinical data analysis using advanced machine learning models for disease prediction
|
Hamad, Dana R. |
|
|
30 |
C |
p. |
artikel |
44 |
Machine learning models for enhanced stroke detection and prediction
|
Bajaj, Shilpa |
|
|
30 |
C |
p. |
artikel |
45 |
MANET highly efficient clustering technique based on coverage k-means algorithm
|
Hussein, Aya Ayad |
|
|
30 |
C |
p. |
artikel |
46 |
Metadata association feature ATC data security assessment
|
Jia, Ruchun |
|
|
30 |
C |
p. |
artikel |
47 |
Multi-task detection of harmful content in code-mixed meme captions using large language models with zero-shot, few-shot, and fine-tuning approaches
|
Indira Kumar, A.K. |
|
|
30 |
C |
p. |
artikel |
48 |
Network information security protection method based on additive Gaussian noise and mutual information neural network in cloud computing background
|
Zhong, Yu |
|
|
30 |
C |
p. |
artikel |
49 |
Novel framework on double event-triggered consensus of positive multi-agent systems
|
Zhang, Junfeng |
|
|
30 |
C |
p. |
artikel |
50 |
PRFE-driven gene selection with multi-classifier ensemble for cancer classification
|
Behuria, Smitirekha |
|
|
30 |
C |
p. |
artikel |
51 |
Ransomware detection and family classification using fine-tuned BERT and RoBERTa models
|
Hussain, Amjad |
|
|
30 |
C |
p. |
artikel |
52 |
Refining digital security with EfficientNetV2-B2 deepfake detection techniques
|
Vivekananda, G.N. |
|
|
30 |
C |
p. |
artikel |
53 |
Research on network information leakage prevention method based on k-symmetric anonymous algorithm
|
Zheng, Zaoxian |
|
|
30 |
C |
p. |
artikel |
54 |
Robust zero-watermarking based on dual branch neural network for ownership authentication, auxiliary information delivery and tamper detection
|
Arevalo-Ancona, Rodrigo Eduardo |
|
|
30 |
C |
p. |
artikel |
55 |
Simulink-Driven Digital Twin Implementation for Smart Greenhouse Environmental Control
|
Arshad, Jehangir |
|
|
30 |
C |
p. |
artikel |
56 |
Standardization of expected value in gap statistic using Gaussian distribution for optimal number of clusters selection in K-means
|
Khan, Iliyas Karim |
|
|
30 |
C |
p. |
artikel |
57 |
Temporal record linkage for heterogeneous big data records
|
Abdel Monem, Reham I. |
|
|
30 |
C |
p. |
artikel |
58 |
TFKAN: Transformer based on Kolmogorov–Arnold Networks for Intrusion Detection in IoT environment
|
Fares, Ibrahim A. |
|
|
30 |
C |
p. |
artikel |
59 |
The application and performance optimization of multi-controller-based load balancing algorithm in computer networks
|
Guo, Fengfeng |
|
|
30 |
C |
p. |
artikel |
60 |
Towards lightweight model using non-local-based graph convolution neural network for SQL injection detection
|
Nguyen, Duc-Chinh |
|
|
30 |
C |
p. |
artikel |
61 |
Zero trust anonymous access algorithm for multi cloud storage system based on CP-ABE
|
Tian, Jun |
|
|
30 |
C |
p. |
artikel |