nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A dual channel and node mobility based cognitive approach to optimize wireless networks in coal mines
|
Javaid, Fawad |
|
|
34 |
4 |
p. 1486-1497 |
artikel |
2 |
A modified Boneh-Lynn-Shacham signing dynamic auditing in cloud computing
|
Alrabea, Adnan |
|
|
34 |
4 |
p. 1388-1394 |
artikel |
3 |
An analysis of two-way equi-join algorithms under MapReduce
|
Al-Badarneh, Amer F. |
|
|
34 |
4 |
p. 1074-1085 |
artikel |
4 |
An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map
|
Gao, Xinyu |
|
|
34 |
4 |
p. 1535-1551 |
artikel |
5 |
An efficient technique for image compression and quality retrieval using matrix completion
|
Kumar, Ranjeet |
|
|
34 |
4 |
p. 1231-1239 |
artikel |
6 |
A new efficient TKHC-based image sharing scheme over unsecured channel
|
Hodeish, Mahmoud E. |
|
|
34 |
4 |
p. 1246-1262 |
artikel |
7 |
An in-depth exploration of automated jackfruit disease recognition
|
Habib, Md. Tarek |
|
|
34 |
4 |
p. 1200-1209 |
artikel |
8 |
A novel algorithm for a continuous and fast 3D projection of points on triangulated surfaces for CAM/CAD/CAE applications
|
Orazi, L. |
|
|
34 |
4 |
p. 1240-1245 |
artikel |
9 |
A novel joint histogram equalization based image contrast enhancement
|
Agrawal, Sanjay |
|
|
34 |
4 |
p. 1172-1182 |
artikel |
10 |
A novel need based free channel selection scheme for cooperative CRN using EFAHP-TOPSIS
|
Jayakumar, L. |
|
|
34 |
4 |
p. 1326-1342 |
artikel |
11 |
A novel robust approach for image copyright protection based on concentric rectangles
|
Shahadi, Haider Ismael |
|
|
34 |
4 |
p. 1263-1274 |
artikel |
12 |
A review on TinyML: State-of-the-art and prospects
|
Ray, Partha Pratim |
|
|
34 |
4 |
p. 1595-1623 |
artikel |
13 |
Automatic summarization of scientific articles: A survey
|
Ibrahim Altmami, Nouf |
|
|
34 |
4 |
p. 1011-1028 |
artikel |
14 |
Benchmarking on offline Handwritten Tamil Character Recognition using convolutional neural networks
|
Kavitha, B.R. |
|
|
34 |
4 |
p. 1183-1190 |
artikel |
15 |
Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing
|
Athanere, Smita |
|
|
34 |
4 |
p. 1523-1534 |
artikel |
16 |
Cognitively managed multi-level authentication for security using Fuzzy Logic based Quantum Key Distribution
|
Shabbir, Maryam |
|
|
34 |
4 |
p. 1468-1485 |
artikel |
17 |
Deep neural network based two-stage Indian language identification system using glottal closure instants as anchor points
|
China Bhanja, Chuya |
|
|
34 |
4 |
p. 1439-1454 |
artikel |
18 |
Design of pedestrian detectors using combinations of scale spaces and classifiers
|
Das, Amlan Jyoti |
|
|
34 |
4 |
p. 1210-1218 |
artikel |
19 |
Dr. Flynxz – A First Aid Mamdani-Sugeno-type fuzzy expert system for differential symptoms-based diagnosis
|
Fale, Mantim Innocent |
|
|
34 |
4 |
p. 1138-1149 |
artikel |
20 |
Efficient colour filter array demosaicking with prior error reduction
|
Safna Asiq, M.S. |
|
|
34 |
4 |
p. 1191-1199 |
artikel |
21 |
E-Had: A distributed and collaborative detection framework for early detection of DDoS attacks
|
Patil, Nilesh Vishwasrao |
|
|
34 |
4 |
p. 1373-1387 |
artikel |
22 |
Evolution of recommender paradigm optimization over time
|
Sinha, Bam Bahadur |
|
|
34 |
4 |
p. 1047-1059 |
artikel |
23 |
Expert systems in oil palm precision agriculture: A decade systematic review
|
Tan, Xiao Jian |
|
|
34 |
4 |
p. 1569-1594 |
artikel |
24 |
Face presentation attack detection based on optical flow and texture analysis
|
Li, Lei |
|
|
34 |
4 |
p. 1455-1467 |
artikel |
25 |
Frequent itemset-based feature selection and Rider Moth Search Algorithm for document clustering
|
Yarlagadda, Madhulika |
|
|
34 |
4 |
p. 1098-1109 |
artikel |
26 |
HE3: A hierarchical attribute based secure and efficient things-to-fog content sharing protocol
|
Porwal, Shardha |
|
|
34 |
4 |
p. 1312-1325 |
artikel |
27 |
High fidelity based reversible data hiding using modified LSB matching and pixel difference
|
Sahu, Aditya Kumar |
|
|
34 |
4 |
p. 1395-1409 |
artikel |
28 |
Hub-OS: An interoperable IoT computing platform for resources utilization with real-time support
|
Abdelqawy, Desoky |
|
|
34 |
4 |
p. 1498-1510 |
artikel |
29 |
Identification of the effects of the existing network properties on the performance of current community detection methods
|
Khouzani, Marziyeh Karimiyan |
|
|
34 |
4 |
p. 1296-1304 |
artikel |
30 |
Identifying cross-lingual plagiarism using rich semantic features and deep neural networks: A study on Arabic-English plagiarism cases
|
Alzahrani, Salha |
|
|
34 |
4 |
p. 1110-1123 |
artikel |
31 |
Implementation of modified OLSR protocol in AANETs for UDP and TCP environment
|
Kumar, Pardeep |
|
|
34 |
4 |
p. 1305-1311 |
artikel |
32 |
Improved l-diversity: Scalable anonymization approach for Privacy Preserving Big Data Publishing
|
Mehta, Brijesh B. |
|
|
34 |
4 |
p. 1423-1430 |
artikel |
33 |
Improving the performance of histogram-based data hiding method in the video environment
|
Ahmad, Tohari |
|
|
34 |
4 |
p. 1362-1372 |
artikel |
34 |
Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses
|
Alanazi, Norah |
|
|
34 |
4 |
p. 1343-1356 |
artikel |
35 |
ITNO-K2PC: An improved K2 algorithm with information-theory-centered node ordering for structure learning
|
Benmohamed, Emna |
|
|
34 |
4 |
p. 1410-1422 |
artikel |
36 |
Moving objects multi-classification based on information fusion
|
Honnit, Bouchra |
|
|
34 |
4 |
p. 1219-1230 |
artikel |
37 |
New contextual collaborative filtering system with application to personalized healthy nutrition education
|
Zitouni, Hanane |
|
|
34 |
4 |
p. 1124-1137 |
artikel |
38 |
Palm tree structure based data aggregation and routing in underwater wireless acoustic sensor networks: Agent oriented approach
|
Krishnaswamy, Vani |
|
|
34 |
4 |
p. 1275-1284 |
artikel |
39 |
Periocular biometrics: A survey
|
Kumari, Punam |
|
|
34 |
4 |
p. 1086-1097 |
artikel |
40 |
Querying of several DL-Lite knowledge bases from various information sources-based polynomial response unification approach
|
Hamdi, Ghassen |
|
|
34 |
4 |
p. 1161-1171 |
artikel |
41 |
Review of automatic text summarization techniques & methods
|
Widyassari, Adhika Pramita |
|
|
34 |
4 |
p. 1029-1046 |
artikel |
42 |
Rule extraction from scientific texts: Evaluation in the specialty of gynecology
|
Boufrida, Amina |
|
|
34 |
4 |
p. 1150-1160 |
artikel |
43 |
Sector influence aware stock trend prediction using 3D convolutional neural network
|
Sinha, Siddhant |
|
|
34 |
4 |
p. 1511-1522 |
artikel |
44 |
Securing password using dynamic password policy generator algorithm
|
Singh, Anuraj |
|
|
34 |
4 |
p. 1357-1361 |
artikel |
45 |
Stability of feature selection algorithm: A review
|
Khaire, Utkarsh Mahadeo |
|
|
34 |
4 |
p. 1060-1073 |
artikel |
46 |
Surface approximation using GPU-based localized fourier transform
|
MOUSA, Mohamed H. |
|
|
34 |
4 |
p. 1431-1438 |
artikel |
47 |
Sustainable task offloading decision using genetic algorithm in sensor mobile edge computing
|
Chakraborty, Sheuli |
|
|
34 |
4 |
p. 1552-1568 |
artikel |
48 |
Weighted Salp Swarm Algorithm and its applications towards optimal sensor deployment
|
Syed, Mudassar Ali |
|
|
34 |
4 |
p. 1285-1295 |
artikel |