nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive user-oriented fuzzy-based service broker for cloud services
|
Al-Tarawneh, Mutaz |
|
|
34 |
2 |
p. 354-364 |
artikel |
2 |
A framework of monitoring water pipeline techniques based on sensors technologies
|
Ayadi, Aya |
|
|
34 |
2 |
p. 47-57 |
artikel |
3 |
A Genetic Algorithm based approach for designing multi-state computational grid with cost and bandwidth constraints
|
Das, Debashreet |
|
|
34 |
2 |
p. 443-456 |
artikel |
4 |
A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice
|
Keshta, Ismail |
|
|
34 |
2 |
p. 398-407 |
artikel |
5 |
An enhanced deadline constraint based task scheduling mechanism for cloud environment
|
Nayak, Suvendu Chandan |
|
|
34 |
2 |
p. 282-294 |
artikel |
6 |
An Enhanced Multiclass Support Vector Machine Model and its Application to Classifying File Systems Affected by a Digital Crime
|
Mohammad, Rami Mustafa A. |
|
|
34 |
2 |
p. 179-190 |
artikel |
7 |
An escalated convergent firefly algorithm
|
Arora, Sankalap |
|
|
34 |
2 |
p. 308-315 |
artikel |
8 |
A new binary grasshopper optimization algorithm for feature selection problem
|
Hichem, Haouassi |
|
|
34 |
2 |
p. 316-328 |
artikel |
9 |
A new way of crosscutting roles in set oriented programming
|
Masoumi, Saeid |
|
|
34 |
2 |
p. 433-442 |
artikel |
10 |
A predictive model for phishing detection
|
Orunsolu, A.A. |
|
|
34 |
2 |
p. 232-247 |
artikel |
11 |
Architecture and optimization of data mining modeling for visualization of knowledge extraction: Patient safety care
|
Belay Gebremeskel, Gebeyehu |
|
|
34 |
2 |
p. 468-479 |
artikel |
12 |
CDBR: A semi-automated collaborative execute-before-after dependency-based requirement prioritization approach
|
Gupta, Ankita |
|
|
34 |
2 |
p. 421-432 |
artikel |
13 |
Cellular automata-based approach for salt-and-pepper noise filtration
|
Jeelani, Zubair |
|
|
34 |
2 |
p. 365-374 |
artikel |
14 |
Computability evaluation of RESTful API using Primitive Recursive Function
|
Padmanaban, R. |
|
|
34 |
2 |
p. 457-467 |
artikel |
15 |
Content-based medical image retrieval by spatial matching of visual words
|
Shamna, P. |
|
|
34 |
2 |
p. 58-71 |
artikel |
16 |
Control points deployment in an Intelligent Transportation System for monitoring inter-urban network roadway
|
Mfenjou, Martin Luther |
|
|
34 |
2 |
p. 16-26 |
artikel |
17 |
Copy-move forgery detection using binary discriminant features
|
Raju, Priya Mariam |
|
|
34 |
2 |
p. 165-178 |
artikel |
18 |
Curvelet transform based feature extraction and selection for multimedia event classification
|
Kanagaraj, Kaavya |
|
|
34 |
2 |
p. 375-383 |
artikel |
19 |
Data encoding techniques to improve the performance of System on Chip
|
Chennakesavulu, M. |
|
|
34 |
2 |
p. 492-503 |
artikel |
20 |
Dependency-based fault diagnosis approach for SOA-based systems using Colored Petri Nets
|
Bhandari, Guru Prasad |
|
|
34 |
2 |
p. 480-491 |
artikel |
21 |
3D sign language recognition using spatio temporal graph kernels
|
Kumar, D. Anil |
|
|
34 |
2 |
p. 143-152 |
artikel |
22 |
Emotion recognition in speech signals using optimization based multi-SVNN classifier
|
Mannepalli, Kasiprasad |
|
|
34 |
2 |
p. 384-397 |
artikel |
23 |
Enhanced Zone-Based Energy Aware Data Collection Protocol for WSNs (E-ZEAL)
|
Allam, Aya H. |
|
|
34 |
2 |
p. 36-46 |
artikel |
24 |
Improved Cosine Similarity-based Artificial Bee Colony Optimization scheme for reactive and dynamic service composition
|
Arunachalam, N. |
|
|
34 |
2 |
p. 270-281 |
artikel |
25 |
Improved payload capacity in LSB image steganography uses dilated hybrid edge detection
|
Setiadi, De Rosal Ignatius Moses |
|
|
34 |
2 |
p. 104-114 |
artikel |
26 |
IMSS-P: An intelligent approach to design & development of personalized meta search & page ranking system
|
Malhotra, Dheeraj |
|
|
34 |
2 |
p. 248-263 |
artikel |
27 |
Locality preserving partial least squares discriminant analysis for face recognition
|
Aminu, Muhammad |
|
|
34 |
2 |
p. 153-164 |
artikel |
28 |
Machine vision gait-based biometric cryptosystem using a fuzzy commitment scheme
|
Elrefaei, Lamiaa A. |
|
|
34 |
2 |
p. 204-217 |
artikel |
29 |
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images
|
Hossain, Md Shamim |
|
|
34 |
2 |
p. 86-94 |
artikel |
30 |
Modernizing the multi-temporal multispectral remotely sensed image change detection for global maxima through binary particle swarm optimization
|
Lal, Anisha M. |
|
|
34 |
2 |
p. 95-103 |
artikel |
31 |
MRI Brain Tumor Segmentation and Analysis using Rough-Fuzzy C-Means and Shape Based Properties
|
Bal, Abhishek |
|
|
34 |
2 |
p. 115-133 |
artikel |
32 |
Mutual clustering coefficient-based suspicious-link detection approach for online social networks
|
Wani, Mudasir Ahmad |
|
|
34 |
2 |
p. 218-231 |
artikel |
33 |
On evaluating the collaborative research areas: A case study
|
Moradi, Mona |
|
|
34 |
2 |
p. 408-420 |
artikel |
34 |
On QoS evaluation for ZigBee incorporated Wireless Sensor Network (IEEE 802.15.4) using mobile sensor nodes
|
Arora, Vishal Kumar |
|
|
34 |
2 |
p. 27-35 |
artikel |
35 |
Optimal feature selection using binary teaching learning based optimization algorithm
|
Allam, Mohan |
|
|
34 |
2 |
p. 329-341 |
artikel |
36 |
Profiling analysis of DISC personality traits based on Twitter posts in Bahasa Indonesia
|
Utami, Ema |
|
|
34 |
2 |
p. 264-269 |
artikel |
37 |
RTSLPS: Real time server load prediction system for the ever-changing cloud computing environment
|
Toumi, Hajer |
|
|
34 |
2 |
p. 342-353 |
artikel |
38 |
Runtime performance evaluation and optimization of type-2 hypervisor for MIPS64 architecture
|
Ain, Qurrat |
|
|
34 |
2 |
p. 295-307 |
artikel |
39 |
STORE: Security Threat Oriented Requirements Engineering Methodology
|
Ansari, Md Tarique Jamal |
|
|
34 |
2 |
p. 191-203 |
artikel |
40 |
Systematic literature review of mobile application development and testing effort estimation
|
Kaur, Anureet |
|
|
34 |
2 |
p. 1-15 |
artikel |
41 |
Time series classification through visual pattern recognition
|
Jastrzebska, Agnieszka |
|
|
34 |
2 |
p. 134-142 |
artikel |
42 |
Zoom based image super-resolution using DCT with LBP as characteristic model
|
Doshi, Meera |
|
|
34 |
2 |
p. 72-85 |
artikel |