Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             109 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Achieving stepwise construction of cyber physical systems in EX-MAN component model Rana, Tauseef

34 10PB p. 10319-10338
artikel
2 A comprehensive meta-analysis of emerging swarm intelligent computing techniques and their research trend Monga, Preeti

34 10PB p. 9622-9643
artikel
3 A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model Şahin, Meryem Soysaldı

34 10PB p. 9852-9866
artikel
4 A good neighbor is a great blessing: Nearest neighbor filtering method to remove impulse noise Lone, Mohd Rafi

34 10PB p. 9942-9952
artikel
5 A hybrid XSS attack (H Y XSS A ) based on fusion approach: Challenges, threats and implications in cybersecurity Korać, Dragan

34 10PB p. 9284-9300
artikel
6 A marker collaborating model for entity and relation extraction Wu, Yizhao

34 10PB p. 9163-9172
artikel
7 A method of value model convergence and profit optimization for crossover services Liu, Zhengli

34 10PB p. 10459-10473
artikel
8 A model for generating a user dynamic profile on social media Azzam, Fatima

34 10PB p. 9132-9145
artikel
9 A multi-tiered feature selection model for android malware detection based on Feature discrimination and Information Gain Bhat, Parnika

34 10PB p. 9464-9477
artikel
10 An enhanced routing algorithm based on a re-position particle swarm optimization (RA-RPSO) for wireless sensor network Elshrkawey, Mohamed

34 10PB p. 10304-10318
artikel
11 An ensemble deep learning technique for detecting suicidal ideation from posts in social media platforms Renjith, Shini

34 10PB p. 9564-9575
artikel
12 An improved image encryption algorithm based on Bézier coefficients matrix Ismail, Nur Hidayah Mohammad

34 10PB p. 10056-10067
artikel
13 An improvement of both security and reliability for AES implementations Bedoui, Mouna

34 10PB p. 9844-9851
artikel
14 An objective measure for assessing the quality of contrast enhancement on magnetic resonance images Renuka, Simi Venuji

34 10PB p. 9732-9744
artikel
15 A novel DeepMaskNet model for face mask detection and masked facial recognition Ullah, Naeem

34 10PB p. 9905-9914
artikel
16 A novel method for adaptive terrain rendering using memory-efficient tessellation codes for virtual globes Masood, Zafar

34 10PB p. 9393-9408
artikel
17 A Novel Metric based Detection of Temporary Field Code Smell and its Empirical Analysis Gupta, Ruchin

34 10PB p. 9478-9500
artikel
18 A novel multi-level population hybrid search evolution algorithm for constrained multi-objective optimization problems Li, Chaoqun

34 10PB p. 9071-9087
artikel
19 A novel wheeled mobile robots control based on robust hybrid controller: Mixed H2/H∞ and predictive algorithm approach Liu, Sibang

34 10PB p. 9662-9676
artikel
20 A relation-centric algorithm for solving text-diagram function problems Yu, Xinguo

34 10PB p. 8972-8984
artikel
21 A semi-supervised label distribution learning model with label correlations and data manifold exploration Guo, Ruiqi

34 10PB p. 10094-10108
artikel
22 A spatiotemporal Order-Revealing query processing approach for Industrial Internet of Things Sharma, Ravi

34 10PB p. 8985-8995
artikel
23 A survey of DeFi security: Challenges and opportunities Li, Wenkai

34 10PB p. 10378-10404
artikel
24 A survey on textual entailment based question answering Paramasivam, Aarthi

34 10PB p. 9644-9653
artikel
25 “A systematic literature review on IoT gateways” Beniwal, Gunjan

34 10PB p. 9541-9563
artikel
26 Automatic mapping of configuration options in software using static analysis Wang, Junyong

34 10PB p. 10044-10055
artikel
27 Blockchain-based donations traceability framework Almaghrabi, Abeer

34 10PB p. 9442-9454
artikel
28 Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV Zhang, Ye

34 10PB p. 9216-9227
artikel
29 BMCR: A collaborator recommendation model based on Scholars’ academic level Qin, Hongwu

34 10PB p. 9409-9418
artikel
30 BOOMPizer: Minimization and prioritization of CONCOLIC based boosted MC/DC test cases Barisal, Swadhin Kumar

34 10PB p. 9757-9776
artikel
31 Certificateless multi-source signcryption with lattice Yu, Huifang

34 10PB p. 10157-10166
artikel
32 Classification from Sky: A Robust Remote Sensing Time Series Image Classification Using Spatial Encoder and Multi-Fast Channel Attention Sarpong, Kwabena

34 10PB p. 10405-10422
artikel
33 Coherent convolution neural network based retinal disease detection using optical coherence tomographic images Upadhyay, Pawan Kumar

34 10PB p. 9688-9695
artikel
34 Color stereo image encryption and local zero-watermarking schemes using octonion Hahn moments and modified Henon map Daoui, Achraf

34 10PB p. 8927-8954
artikel
35 Combined economic emission dispatch in hybrid power systems using competitive swarm optimization Mohapatra, Prabhujit

34 10PB p. 8955-8971
artikel
36 Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends Belal, Mohamad Mulham

34 10PB p. 9102-9131
artikel
37 Computer-assisted i‘raab of Arabic sentences for teaching grammar to students Mannaa, Zarah M.

34 10PB p. 8909-8926
artikel
38 Concept Drift Detection in Data Stream Mining : A literature review Agrahari, Supriya

34 10PB p. 9523-9540
artikel
39 Concurrent kernel execution and interference analysis on GPUs using deep learning approaches Ayub, Mohammed

34 10PB p. 10193-10204
artikel
40 Construction of vector space and its application to facilitate bitwise XOR – Free operation to minimize the time complexity Dodmane, Radhakrishna

34 10PB p. 9836-9843
artikel
41 Coverage hole detection using social spider optimized Gaussian Mixture Model Gupta, Abhishek

34 10PB p. 9814-9821
artikel
42 Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey Isaac Abiodun, Oludare

34 10PB p. 10217-10245
artikel
43 DeepFocus: A visual focus of attention detection framework using deep learning in multi-object scenarios Afroze, Sadia

34 10PB p. 10109-10124
artikel
44 Deep Learning-based Multi-stage segmentation method using ultrasound images for breast cancer diagnosis Cho, Se Woon

34 10PB p. 10273-10292
artikel
45 Deep learning-based plant classification and crop disease classification by thermal camera Batchuluun, Ganbayar

34 10PB p. 10474-10486
artikel
46 Dense attentive GAN-based one-class model for detection of autism and ADHD Kuttala, Devika

34 10PB p. 10444-10458
artikel
47 DeSa COVID-19: Deep salient COVID-19 image-based quality assessment Risnandar,

34 10PB p. 9501-9512
artikel
48 Directional user similarity model for personalized recommendation in online social networks Bin Suhaim, Areej

34 10PB p. 10205-10216
artikel
49 Distributed output tracking via event-triggered control for nonlinear multi-agent systems Xu, Xiaoyu

34 10PB p. 9173-9183
artikel
50 Driver profiling: The pathway to deeper personalization Zahraoui, Yassine

34 10PB p. 9088-9101
artikel
51 Dynamic parking space allocation at urban scale: Problem formulation and resolution Errousso, Hanae

34 10PB p. 9576-9590
artikel
52 Effective and scalable black-box fuzzing approach for modern web applications Alsaedi, Aseel

34 10PB p. 10068-10078
artikel
53 Effect of Hilbert-Huang transform on classification of PCG signals using machine learning Arslan, Özkan

34 10PB p. 9915-9925
artikel
54 Effects of official information and rumor on resource-epidemic coevolution dynamics Huo, Liang'an

34 10PB p. 9207-9215
artikel
55 Efficient data replay mechanism of sensor stream data based on concurrent buffer pool Ye, Feng

34 10PB p. 10293-10303
artikel
56 Experimental verification and validation of the SICN-oriented process mining algorithm and system Kim, Kyoung-Sook

34 10PB p. 9793-9813
artikel
57 Explainable machine learning multi-label classification of Spanish legal judgements de Arriba-Pérez, Francisco

34 10PB p. 10180-10192
artikel
58 Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication Gan, Zhihua

34 10PB p. 9252-9272
artikel
59 FPGA implementation of a chaos-based image encryption algorithm Maazouz, Mohamed

34 10PB p. 9926-9941
artikel
60 Friendship links-based privacy-preserving algorithm against inference attacks Shen, Jiawei

34 10PB p. 9363-9375
artikel
61 Generating BPMN diagram from textual requirements Sholiq, Sholiq

34 10PB p. 10079-10093
artikel
62 Gradient boosting machines fusion for automatic epilepsy detection from EEG signals based on wavelet features Sunaryono, Dwi

34 10PB p. 9591-9607
artikel
63 Handling data sparsity via item metadata embedding into deep collaborative recommender system Behera, Gopal

34 10PB p. 9953-9963
artikel
64 High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem Jayabalasamy, Guruprakash

34 10PB p. 9677-9687
artikel
65 Hybrid time synchronization protocol for large-scale wireless sensor networks Phan, Linh-An

34 10PB p. 10423-10433
artikel
66 Identifying the influential nodes in complex social networks using centrality-based approach Ishfaq, Umar

34 10PB p. 9376-9392
artikel
67 Image identification of cashmere and wool fibers based on the improved Xception network Zhu, Yaolin

34 10PB p. 9301-9310
artikel
68 Impact of Insertion Sequences and RNAs on Genomic Inversions in Pseudomonas aeruginosa AlKindy, Bassam

34 10PB p. 9513-9522
artikel
69 Improved exploiting modification direction steganography for hexagonal image processing Cevik, Nazife

34 10PB p. 9273-9283
artikel
70 Intelligent fuzzy system for automatic artifact detection and removal from EEG signals Agounad, Said

34 10PB p. 9428-9441
artikel
71 Internet of medical things and trending converged technologies: A comprehensive review on real-time applications Wagan, Shiraz Ali

34 10PB p. 9228-9251
artikel
72 IoT-edge anomaly detection for covariate shifted and point time series health data Ray, Partha Pratim

34 10PB p. 9608-9621
artikel
73 Keypoints class distribution based entropy for weighting scheme on image classification Andono, Pulung Nurtantio

34 10PB p. 9028-9038
artikel
74 Leader election of dynamic wireless intelligent control machine in sensor network distributed processing Sediyono, Eko

34 10PB p. 9146-9162
artikel
75 Leveraging Arabic sentiment classification using an enhanced CNN-LSTM approach and effective Arabic text preparation Alayba, Abdulaziz M.

34 10PB p. 9710-9722
artikel
76 Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic Jana, Manasi

34 10PB p. 9822-9835
artikel
77 Machine learning model design for high performance cloud computing & load balancing resiliency: An innovative approach Kamila, Nilayam Kumar

34 10PB p. 9991-10009
artikel
78 Mantaray modified multi-objective Harris hawk optimization algorithm expedites optimal load balancing in cloud computing Haris, Mohammad

34 10PB p. 9696-9709
artikel
79 MapReduce based intelligent model for intrusion detection using machine learning technique Asif, Muhammad

34 10PB p. 9723-9731
artikel
80 MetaViz – A graphical meta-model instantiator for generating information dashboards and visualizations Vázquez-Ingelmo, Andrea

34 10PB p. 9977-9990
artikel
81 Modelling and optimization for cognitive radio networks with preemption backoff mechanism Zhao, Yuan

34 10PB p. 9039-9051
artikel
82 Multi-scale YOLACT for instance segmentation Zeng, Jiexian

34 10PB p. 9419-9427
artikel
83 Natural language processing applied to tourism research: A systematic review and future research directions Álvarez-Carmona, Miguel Á.

34 10PB p. 10125-10144
artikel
84 NLPC: A nimble low-priority congestion control algorithm for high-speed and lossy networks Xie, Yi

34 10PB p. 9052-9059
artikel
85 Novel logic mining incorporating log linear approach Jamaludin, Siti Zulaikha Mohd

34 10PB p. 9011-9027
artikel
86 Offline Arabic handwritten word recognition: A transfer learning approach Awni, Mohamed

34 10PB p. 9654-9661
artikel
87 On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems Han, Mengdie

34 10PB p. 9455-9463
artikel
88 Optimal deploying IoT services on the fog computing: A metaheuristic-based multi-objective approach Wu, Banghua

34 10PB p. 10010-10027
artikel
89 Pairing-free certificateless blind signature scheme for smart grid Liu, ShuangGen

34 10PB p. 10145-10156
artikel
90 Predicting input validation vulnerabilities based on minimal SSA features and machine learning Marashdih, Abdalla Wasef

34 10PB p. 9311-9331
artikel
91 Prioritization of god class design smell: A multi-criteria based approach Alkharabsheh, Khalid

34 10PB p. 9332-9342
artikel
92 QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets Guo, Wanying

34 10PB p. 10487-10495
artikel
93 Research on identity authentication system of Internet of Things based on blockchain technology Yanhui, Liu

34 10PB p. 10365-10377
artikel
94 Robust and Swift Iris Recognition at distance based on novel pupil segmentation Nsaif, Ahmed Khudhur

34 10PB p. 9184-9206
artikel
95 Robust mobile robot navigation in cluttered environments based on hybrid adaptive neuro-fuzzy inference and sensor fusion Haider, Muhammad Husnain

34 10PB p. 9060-9070
artikel
96 Skin cancer image segmentation utilizing a novel EN-GWO based hyper-parameter optimized FCEDN Mohakud, Rasmiranjan

34 10PB p. 9889-9904
artikel
97 Smart big data framework for insight discovery Yousfi, Siham

34 10PB p. 9777-9792
artikel
98 Software design patterns for data management features in web-based information systems Al-Hawari, Feras

34 10PB p. 10028-10043
artikel
99 Spatial-temporal upsampling graph convolutional network for daily long-term traffic speed prediction Zhang, Song

34 10PB p. 8996-9010
artikel
100 SPIDER: A shallow PCA based network intrusion detection system with enhanced recurrent neural networks Udas, Pritom Biswas

34 10PB p. 10246-10272
artikel
101 Spoof detection based on score fusion using ensemble networks robust against adversarial attacks of fake finger-vein images Kim, Seung Gu

34 10PB p. 9343-9362
artikel
102 Task offloading using GPU-based particle swarm optimization for high-performance vehicular edge computing Alqarni, Mohamed A.

34 10PB p. 10356-10364
artikel
103 The hybrid feature extraction method for classification of adolescence idiopathic scoliosis using Evolving Spiking Neural Network Sabri, Nurbaity

34 10PB p. 8899-8908
artikel
104 Thumbnail-preserving encryption based on improved logistic system Zhu, Ziwen

34 10PB p. 10167-10179
artikel
105 Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review Madan, Sanjay

34 10PB p. 9867-9888
artikel
106 Towards solving NLP tasks with optimal transport loss Bhardwaj, Rishabh

34 10PB p. 10434-10443
artikel
107 Two-phase fuzzy feature-filter based hybrid model for spam classification Gazal,

34 10PB p. 10339-10355
artikel
108 Unified approach for detecting traffic signs and potholes on Indian roads Satti, Satish Kumar

34 10PB p. 9745-9756
artikel
109 Very high-resolution satellite image segmentation using variable-length multi-objective genetic clustering for multi-class change detection Pal, Ramen

34 10PB p. 9964-9976
artikel
                             109 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland