nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Achieving stepwise construction of cyber physical systems in EX-MAN component model
|
Rana, Tauseef |
|
|
34 |
10PB |
p. 10319-10338 |
artikel |
2 |
A comprehensive meta-analysis of emerging swarm intelligent computing techniques and their research trend
|
Monga, Preeti |
|
|
34 |
10PB |
p. 9622-9643 |
artikel |
3 |
A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model
|
Şahin, Meryem Soysaldı |
|
|
34 |
10PB |
p. 9852-9866 |
artikel |
4 |
A good neighbor is a great blessing: Nearest neighbor filtering method to remove impulse noise
|
Lone, Mohd Rafi |
|
|
34 |
10PB |
p. 9942-9952 |
artikel |
5 |
A hybrid XSS attack (H Y XSS A ) based on fusion approach: Challenges, threats and implications in cybersecurity
|
Korać, Dragan |
|
|
34 |
10PB |
p. 9284-9300 |
artikel |
6 |
A marker collaborating model for entity and relation extraction
|
Wu, Yizhao |
|
|
34 |
10PB |
p. 9163-9172 |
artikel |
7 |
A method of value model convergence and profit optimization for crossover services
|
Liu, Zhengli |
|
|
34 |
10PB |
p. 10459-10473 |
artikel |
8 |
A model for generating a user dynamic profile on social media
|
Azzam, Fatima |
|
|
34 |
10PB |
p. 9132-9145 |
artikel |
9 |
A multi-tiered feature selection model for android malware detection based on Feature discrimination and Information Gain
|
Bhat, Parnika |
|
|
34 |
10PB |
p. 9464-9477 |
artikel |
10 |
An enhanced routing algorithm based on a re-position particle swarm optimization (RA-RPSO) for wireless sensor network
|
Elshrkawey, Mohamed |
|
|
34 |
10PB |
p. 10304-10318 |
artikel |
11 |
An ensemble deep learning technique for detecting suicidal ideation from posts in social media platforms
|
Renjith, Shini |
|
|
34 |
10PB |
p. 9564-9575 |
artikel |
12 |
An improved image encryption algorithm based on Bézier coefficients matrix
|
Ismail, Nur Hidayah Mohammad |
|
|
34 |
10PB |
p. 10056-10067 |
artikel |
13 |
An improvement of both security and reliability for AES implementations
|
Bedoui, Mouna |
|
|
34 |
10PB |
p. 9844-9851 |
artikel |
14 |
An objective measure for assessing the quality of contrast enhancement on magnetic resonance images
|
Renuka, Simi Venuji |
|
|
34 |
10PB |
p. 9732-9744 |
artikel |
15 |
A novel DeepMaskNet model for face mask detection and masked facial recognition
|
Ullah, Naeem |
|
|
34 |
10PB |
p. 9905-9914 |
artikel |
16 |
A novel method for adaptive terrain rendering using memory-efficient tessellation codes for virtual globes
|
Masood, Zafar |
|
|
34 |
10PB |
p. 9393-9408 |
artikel |
17 |
A Novel Metric based Detection of Temporary Field Code Smell and its Empirical Analysis
|
Gupta, Ruchin |
|
|
34 |
10PB |
p. 9478-9500 |
artikel |
18 |
A novel multi-level population hybrid search evolution algorithm for constrained multi-objective optimization problems
|
Li, Chaoqun |
|
|
34 |
10PB |
p. 9071-9087 |
artikel |
19 |
A novel wheeled mobile robots control based on robust hybrid controller: Mixed H2/H∞ and predictive algorithm approach
|
Liu, Sibang |
|
|
34 |
10PB |
p. 9662-9676 |
artikel |
20 |
A relation-centric algorithm for solving text-diagram function problems
|
Yu, Xinguo |
|
|
34 |
10PB |
p. 8972-8984 |
artikel |
21 |
A semi-supervised label distribution learning model with label correlations and data manifold exploration
|
Guo, Ruiqi |
|
|
34 |
10PB |
p. 10094-10108 |
artikel |
22 |
A spatiotemporal Order-Revealing query processing approach for Industrial Internet of Things
|
Sharma, Ravi |
|
|
34 |
10PB |
p. 8985-8995 |
artikel |
23 |
A survey of DeFi security: Challenges and opportunities
|
Li, Wenkai |
|
|
34 |
10PB |
p. 10378-10404 |
artikel |
24 |
A survey on textual entailment based question answering
|
Paramasivam, Aarthi |
|
|
34 |
10PB |
p. 9644-9653 |
artikel |
25 |
“A systematic literature review on IoT gateways”
|
Beniwal, Gunjan |
|
|
34 |
10PB |
p. 9541-9563 |
artikel |
26 |
Automatic mapping of configuration options in software using static analysis
|
Wang, Junyong |
|
|
34 |
10PB |
p. 10044-10055 |
artikel |
27 |
Blockchain-based donations traceability framework
|
Almaghrabi, Abeer |
|
|
34 |
10PB |
p. 9442-9454 |
artikel |
28 |
Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV
|
Zhang, Ye |
|
|
34 |
10PB |
p. 9216-9227 |
artikel |
29 |
BMCR: A collaborator recommendation model based on Scholars’ academic level
|
Qin, Hongwu |
|
|
34 |
10PB |
p. 9409-9418 |
artikel |
30 |
BOOMPizer: Minimization and prioritization of CONCOLIC based boosted MC/DC test cases
|
Barisal, Swadhin Kumar |
|
|
34 |
10PB |
p. 9757-9776 |
artikel |
31 |
Certificateless multi-source signcryption with lattice
|
Yu, Huifang |
|
|
34 |
10PB |
p. 10157-10166 |
artikel |
32 |
Classification from Sky: A Robust Remote Sensing Time Series Image Classification Using Spatial Encoder and Multi-Fast Channel Attention
|
Sarpong, Kwabena |
|
|
34 |
10PB |
p. 10405-10422 |
artikel |
33 |
Coherent convolution neural network based retinal disease detection using optical coherence tomographic images
|
Upadhyay, Pawan Kumar |
|
|
34 |
10PB |
p. 9688-9695 |
artikel |
34 |
Color stereo image encryption and local zero-watermarking schemes using octonion Hahn moments and modified Henon map
|
Daoui, Achraf |
|
|
34 |
10PB |
p. 8927-8954 |
artikel |
35 |
Combined economic emission dispatch in hybrid power systems using competitive swarm optimization
|
Mohapatra, Prabhujit |
|
|
34 |
10PB |
p. 8955-8971 |
artikel |
36 |
Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends
|
Belal, Mohamad Mulham |
|
|
34 |
10PB |
p. 9102-9131 |
artikel |
37 |
Computer-assisted i‘raab of Arabic sentences for teaching grammar to students
|
Mannaa, Zarah M. |
|
|
34 |
10PB |
p. 8909-8926 |
artikel |
38 |
Concept Drift Detection in Data Stream Mining : A literature review
|
Agrahari, Supriya |
|
|
34 |
10PB |
p. 9523-9540 |
artikel |
39 |
Concurrent kernel execution and interference analysis on GPUs using deep learning approaches
|
Ayub, Mohammed |
|
|
34 |
10PB |
p. 10193-10204 |
artikel |
40 |
Construction of vector space and its application to facilitate bitwise XOR – Free operation to minimize the time complexity
|
Dodmane, Radhakrishna |
|
|
34 |
10PB |
p. 9836-9843 |
artikel |
41 |
Coverage hole detection using social spider optimized Gaussian Mixture Model
|
Gupta, Abhishek |
|
|
34 |
10PB |
p. 9814-9821 |
artikel |
42 |
Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
|
Isaac Abiodun, Oludare |
|
|
34 |
10PB |
p. 10217-10245 |
artikel |
43 |
DeepFocus: A visual focus of attention detection framework using deep learning in multi-object scenarios
|
Afroze, Sadia |
|
|
34 |
10PB |
p. 10109-10124 |
artikel |
44 |
Deep Learning-based Multi-stage segmentation method using ultrasound images for breast cancer diagnosis
|
Cho, Se Woon |
|
|
34 |
10PB |
p. 10273-10292 |
artikel |
45 |
Deep learning-based plant classification and crop disease classification by thermal camera
|
Batchuluun, Ganbayar |
|
|
34 |
10PB |
p. 10474-10486 |
artikel |
46 |
Dense attentive GAN-based one-class model for detection of autism and ADHD
|
Kuttala, Devika |
|
|
34 |
10PB |
p. 10444-10458 |
artikel |
47 |
DeSa COVID-19: Deep salient COVID-19 image-based quality assessment
|
Risnandar, |
|
|
34 |
10PB |
p. 9501-9512 |
artikel |
48 |
Directional user similarity model for personalized recommendation in online social networks
|
Bin Suhaim, Areej |
|
|
34 |
10PB |
p. 10205-10216 |
artikel |
49 |
Distributed output tracking via event-triggered control for nonlinear multi-agent systems
|
Xu, Xiaoyu |
|
|
34 |
10PB |
p. 9173-9183 |
artikel |
50 |
Driver profiling: The pathway to deeper personalization
|
Zahraoui, Yassine |
|
|
34 |
10PB |
p. 9088-9101 |
artikel |
51 |
Dynamic parking space allocation at urban scale: Problem formulation and resolution
|
Errousso, Hanae |
|
|
34 |
10PB |
p. 9576-9590 |
artikel |
52 |
Effective and scalable black-box fuzzing approach for modern web applications
|
Alsaedi, Aseel |
|
|
34 |
10PB |
p. 10068-10078 |
artikel |
53 |
Effect of Hilbert-Huang transform on classification of PCG signals using machine learning
|
Arslan, Özkan |
|
|
34 |
10PB |
p. 9915-9925 |
artikel |
54 |
Effects of official information and rumor on resource-epidemic coevolution dynamics
|
Huo, Liang'an |
|
|
34 |
10PB |
p. 9207-9215 |
artikel |
55 |
Efficient data replay mechanism of sensor stream data based on concurrent buffer pool
|
Ye, Feng |
|
|
34 |
10PB |
p. 10293-10303 |
artikel |
56 |
Experimental verification and validation of the SICN-oriented process mining algorithm and system
|
Kim, Kyoung-Sook |
|
|
34 |
10PB |
p. 9793-9813 |
artikel |
57 |
Explainable machine learning multi-label classification of Spanish legal judgements
|
de Arriba-Pérez, Francisco |
|
|
34 |
10PB |
p. 10180-10192 |
artikel |
58 |
Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication
|
Gan, Zhihua |
|
|
34 |
10PB |
p. 9252-9272 |
artikel |
59 |
FPGA implementation of a chaos-based image encryption algorithm
|
Maazouz, Mohamed |
|
|
34 |
10PB |
p. 9926-9941 |
artikel |
60 |
Friendship links-based privacy-preserving algorithm against inference attacks
|
Shen, Jiawei |
|
|
34 |
10PB |
p. 9363-9375 |
artikel |
61 |
Generating BPMN diagram from textual requirements
|
Sholiq, Sholiq |
|
|
34 |
10PB |
p. 10079-10093 |
artikel |
62 |
Gradient boosting machines fusion for automatic epilepsy detection from EEG signals based on wavelet features
|
Sunaryono, Dwi |
|
|
34 |
10PB |
p. 9591-9607 |
artikel |
63 |
Handling data sparsity via item metadata embedding into deep collaborative recommender system
|
Behera, Gopal |
|
|
34 |
10PB |
p. 9953-9963 |
artikel |
64 |
High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem
|
Jayabalasamy, Guruprakash |
|
|
34 |
10PB |
p. 9677-9687 |
artikel |
65 |
Hybrid time synchronization protocol for large-scale wireless sensor networks
|
Phan, Linh-An |
|
|
34 |
10PB |
p. 10423-10433 |
artikel |
66 |
Identifying the influential nodes in complex social networks using centrality-based approach
|
Ishfaq, Umar |
|
|
34 |
10PB |
p. 9376-9392 |
artikel |
67 |
Image identification of cashmere and wool fibers based on the improved Xception network
|
Zhu, Yaolin |
|
|
34 |
10PB |
p. 9301-9310 |
artikel |
68 |
Impact of Insertion Sequences and RNAs on Genomic Inversions in Pseudomonas aeruginosa
|
AlKindy, Bassam |
|
|
34 |
10PB |
p. 9513-9522 |
artikel |
69 |
Improved exploiting modification direction steganography for hexagonal image processing
|
Cevik, Nazife |
|
|
34 |
10PB |
p. 9273-9283 |
artikel |
70 |
Intelligent fuzzy system for automatic artifact detection and removal from EEG signals
|
Agounad, Said |
|
|
34 |
10PB |
p. 9428-9441 |
artikel |
71 |
Internet of medical things and trending converged technologies: A comprehensive review on real-time applications
|
Wagan, Shiraz Ali |
|
|
34 |
10PB |
p. 9228-9251 |
artikel |
72 |
IoT-edge anomaly detection for covariate shifted and point time series health data
|
Ray, Partha Pratim |
|
|
34 |
10PB |
p. 9608-9621 |
artikel |
73 |
Keypoints class distribution based entropy for weighting scheme on image classification
|
Andono, Pulung Nurtantio |
|
|
34 |
10PB |
p. 9028-9038 |
artikel |
74 |
Leader election of dynamic wireless intelligent control machine in sensor network distributed processing
|
Sediyono, Eko |
|
|
34 |
10PB |
p. 9146-9162 |
artikel |
75 |
Leveraging Arabic sentiment classification using an enhanced CNN-LSTM approach and effective Arabic text preparation
|
Alayba, Abdulaziz M. |
|
|
34 |
10PB |
p. 9710-9722 |
artikel |
76 |
Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic
|
Jana, Manasi |
|
|
34 |
10PB |
p. 9822-9835 |
artikel |
77 |
Machine learning model design for high performance cloud computing & load balancing resiliency: An innovative approach
|
Kamila, Nilayam Kumar |
|
|
34 |
10PB |
p. 9991-10009 |
artikel |
78 |
Mantaray modified multi-objective Harris hawk optimization algorithm expedites optimal load balancing in cloud computing
|
Haris, Mohammad |
|
|
34 |
10PB |
p. 9696-9709 |
artikel |
79 |
MapReduce based intelligent model for intrusion detection using machine learning technique
|
Asif, Muhammad |
|
|
34 |
10PB |
p. 9723-9731 |
artikel |
80 |
MetaViz – A graphical meta-model instantiator for generating information dashboards and visualizations
|
Vázquez-Ingelmo, Andrea |
|
|
34 |
10PB |
p. 9977-9990 |
artikel |
81 |
Modelling and optimization for cognitive radio networks with preemption backoff mechanism
|
Zhao, Yuan |
|
|
34 |
10PB |
p. 9039-9051 |
artikel |
82 |
Multi-scale YOLACT for instance segmentation
|
Zeng, Jiexian |
|
|
34 |
10PB |
p. 9419-9427 |
artikel |
83 |
Natural language processing applied to tourism research: A systematic review and future research directions
|
Álvarez-Carmona, Miguel Á. |
|
|
34 |
10PB |
p. 10125-10144 |
artikel |
84 |
NLPC: A nimble low-priority congestion control algorithm for high-speed and lossy networks
|
Xie, Yi |
|
|
34 |
10PB |
p. 9052-9059 |
artikel |
85 |
Novel logic mining incorporating log linear approach
|
Jamaludin, Siti Zulaikha Mohd |
|
|
34 |
10PB |
p. 9011-9027 |
artikel |
86 |
Offline Arabic handwritten word recognition: A transfer learning approach
|
Awni, Mohamed |
|
|
34 |
10PB |
p. 9654-9661 |
artikel |
87 |
On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems
|
Han, Mengdie |
|
|
34 |
10PB |
p. 9455-9463 |
artikel |
88 |
Optimal deploying IoT services on the fog computing: A metaheuristic-based multi-objective approach
|
Wu, Banghua |
|
|
34 |
10PB |
p. 10010-10027 |
artikel |
89 |
Pairing-free certificateless blind signature scheme for smart grid
|
Liu, ShuangGen |
|
|
34 |
10PB |
p. 10145-10156 |
artikel |
90 |
Predicting input validation vulnerabilities based on minimal SSA features and machine learning
|
Marashdih, Abdalla Wasef |
|
|
34 |
10PB |
p. 9311-9331 |
artikel |
91 |
Prioritization of god class design smell: A multi-criteria based approach
|
Alkharabsheh, Khalid |
|
|
34 |
10PB |
p. 9332-9342 |
artikel |
92 |
QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets
|
Guo, Wanying |
|
|
34 |
10PB |
p. 10487-10495 |
artikel |
93 |
Research on identity authentication system of Internet of Things based on blockchain technology
|
Yanhui, Liu |
|
|
34 |
10PB |
p. 10365-10377 |
artikel |
94 |
Robust and Swift Iris Recognition at distance based on novel pupil segmentation
|
Nsaif, Ahmed Khudhur |
|
|
34 |
10PB |
p. 9184-9206 |
artikel |
95 |
Robust mobile robot navigation in cluttered environments based on hybrid adaptive neuro-fuzzy inference and sensor fusion
|
Haider, Muhammad Husnain |
|
|
34 |
10PB |
p. 9060-9070 |
artikel |
96 |
Skin cancer image segmentation utilizing a novel EN-GWO based hyper-parameter optimized FCEDN
|
Mohakud, Rasmiranjan |
|
|
34 |
10PB |
p. 9889-9904 |
artikel |
97 |
Smart big data framework for insight discovery
|
Yousfi, Siham |
|
|
34 |
10PB |
p. 9777-9792 |
artikel |
98 |
Software design patterns for data management features in web-based information systems
|
Al-Hawari, Feras |
|
|
34 |
10PB |
p. 10028-10043 |
artikel |
99 |
Spatial-temporal upsampling graph convolutional network for daily long-term traffic speed prediction
|
Zhang, Song |
|
|
34 |
10PB |
p. 8996-9010 |
artikel |
100 |
SPIDER: A shallow PCA based network intrusion detection system with enhanced recurrent neural networks
|
Udas, Pritom Biswas |
|
|
34 |
10PB |
p. 10246-10272 |
artikel |
101 |
Spoof detection based on score fusion using ensemble networks robust against adversarial attacks of fake finger-vein images
|
Kim, Seung Gu |
|
|
34 |
10PB |
p. 9343-9362 |
artikel |
102 |
Task offloading using GPU-based particle swarm optimization for high-performance vehicular edge computing
|
Alqarni, Mohamed A. |
|
|
34 |
10PB |
p. 10356-10364 |
artikel |
103 |
The hybrid feature extraction method for classification of adolescence idiopathic scoliosis using Evolving Spiking Neural Network
|
Sabri, Nurbaity |
|
|
34 |
10PB |
p. 8899-8908 |
artikel |
104 |
Thumbnail-preserving encryption based on improved logistic system
|
Zhu, Ziwen |
|
|
34 |
10PB |
p. 10167-10179 |
artikel |
105 |
Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review
|
Madan, Sanjay |
|
|
34 |
10PB |
p. 9867-9888 |
artikel |
106 |
Towards solving NLP tasks with optimal transport loss
|
Bhardwaj, Rishabh |
|
|
34 |
10PB |
p. 10434-10443 |
artikel |
107 |
Two-phase fuzzy feature-filter based hybrid model for spam classification
|
Gazal, |
|
|
34 |
10PB |
p. 10339-10355 |
artikel |
108 |
Unified approach for detecting traffic signs and potholes on Indian roads
|
Satti, Satish Kumar |
|
|
34 |
10PB |
p. 9745-9756 |
artikel |
109 |
Very high-resolution satellite image segmentation using variable-length multi-objective genetic clustering for multi-class change detection
|
Pal, Ramen |
|
|
34 |
10PB |
p. 9964-9976 |
artikel |