nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A formal framework for verifying IKA property of protocols
|
Joy, Shyam P. |
|
2019 |
31 |
3 |
p. 318-326 |
artikel |
2 |
A fuzzy image clustering method based on an improved backtracking search optimization algorithm with an inertia weight parameter
|
Toz, Güliz |
|
2019 |
31 |
3 |
p. 295-303 |
artikel |
3 |
An adaptive framework for real-time data reduction in AMI
|
Mohamed, Marwa F. |
|
2019 |
31 |
3 |
p. 392-402 |
artikel |
4 |
A novel path planning algorithm for visually impaired people
|
Nandini, Durgesh |
|
2019 |
31 |
3 |
p. 385-391 |
artikel |
5 |
A novel steganography method using transliteration of Bengali text
|
Khairullah, Md |
|
2019 |
31 |
3 |
p. 348-366 |
artikel |
6 |
A survey on unequal clustering protocols in Wireless Sensor Networks
|
Arjunan, Sariga |
|
2019 |
31 |
3 |
p. 304-317 |
artikel |
7 |
CS-IBC: Cuckoo search based incremental binary classifier for data streams
|
Abdualrhman, Mohammed Ahmed Ali |
|
2019 |
31 |
3 |
p. 367-377 |
artikel |
8 |
Data aggregation in underwater wireless sensor network: Recent approaches and issues
|
Goyal, Nitin |
|
2019 |
31 |
3 |
p. 275-286 |
artikel |
9 |
Hybrid Elitist-Ant System for Nurse-Rostering Problem
|
Jaradat, Ghaith M. |
|
2019 |
31 |
3 |
p. 378-384 |
artikel |
10 |
Information hiding scheme for digital images using difference expansion and modulus function
|
Maniriho, Pascal |
|
2019 |
31 |
3 |
p. 335-347 |
artikel |
11 |
IR-based technique for linearizing abstract method invocation in plagiarism-suspected source code pair
|
Karnalim, Oscar |
|
2019 |
31 |
3 |
p. 327-334 |
artikel |
12 |
Missing value imputation for breast cancer diagnosis data using tensor factorization improved by enhanced reduced adaptive particle swarm optimization
|
Nekouie, Atefeh |
|
2019 |
31 |
3 |
p. 287-294 |
artikel |
13 |
The effect of 3D visualization on mainframe application maintenance: A controlled experiment
|
Satish, C.J. |
|
2019 |
31 |
3 |
p. 403-414 |
artikel |