nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A chaos based image encryption algorithm using Rubik’s cube and prime factorization process (CIERPF)
|
Vidhya, R. |
|
|
34 |
5 |
p. 2000-2016 |
artikel |
2 |
African buffalo algorithm: Training the probabilistic neural network to solve classification problems
|
Alweshah, Mohammed |
|
|
34 |
5 |
p. 1808-1818 |
artikel |
3 |
A hybrid model of ghost-convolution enlightened transformer for effective diagnosis of grape leaf disease and pest
|
Lu, Xiangyu |
|
|
34 |
5 |
p. 1755-1767 |
artikel |
4 |
An adaptive cuckoo search based algorithm for placement of relay nodes in wireless body area networks
|
Samal, Tushar Kanta |
|
|
34 |
5 |
p. 1845-1856 |
artikel |
5 |
An algorithmic implementation of entropic ternary reduct soft sentiment set (ETRSSS) using soft computing technique on big data sentiment analysis (BDSA) for optimal selection of a decision based on real-time update in online reviews
|
Dwivedi, Akhilesh |
|
|
34 |
5 |
p. 2118-2130 |
artikel |
6 |
Android sensitive data leakage prevention with rooting detection using Java function hooking
|
Soewito, Benfano |
|
|
34 |
5 |
p. 1950-1957 |
artikel |
7 |
An effective component-based age-invariant face recognition using Discriminant Correlation Analysis
|
Boussaad, Leila |
|
|
34 |
5 |
p. 1739-1747 |
artikel |
8 |
A new attributed graph clustering by using label propagation in complex networks
|
Berahmand, Kamal |
|
|
34 |
5 |
p. 1869-1883 |
artikel |
9 |
A new design of a flying robot, with advanced computer vision techniques to perform self-maintenance of smart grids
|
Baba, Abdullatif |
|
|
34 |
5 |
p. 2252-2261 |
artikel |
10 |
A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function
|
Karthik, P. |
|
|
34 |
5 |
p. 1933-1949 |
artikel |
11 |
A new heuristic method of finding the initial basic feasible solution to solve the transportation problem
|
Amaliah, Bilqis |
|
|
34 |
5 |
p. 2298-2307 |
artikel |
12 |
A novel collaborative requirement prioritization approach to handle priority vagueness and inter-relationships
|
Gupta, Ankita |
|
|
34 |
5 |
p. 2288-2297 |
artikel |
13 |
A review on big data based parallel and distributed approaches of pattern mining
|
Kumar, Sunil |
|
|
34 |
5 |
p. 1639-1662 |
artikel |
14 |
A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using unicode
|
Ditta, Allah |
|
|
34 |
5 |
p. 2180-2191 |
artikel |
15 |
Aspect-based approach to measure performance of financial services using voice of customer
|
Vyas, Vishal |
|
|
34 |
5 |
p. 2262-2270 |
artikel |
16 |
A survey on fish classification techniques
|
Alsmadi, Mutasem K. |
|
|
34 |
5 |
p. 1625-1638 |
artikel |
17 |
A three-tier road condition classification system using a spiking neural network model
|
Agebure, Moses Apambila |
|
|
34 |
5 |
p. 1718-1729 |
artikel |
18 |
Bidirectional convolutional recurrent neural network architecture with group-wise enhancement mechanism for text sentiment classification
|
Onan, Aytuğ |
|
|
34 |
5 |
p. 2098-2117 |
artikel |
19 |
Characteristics of Malay translated hadith corpus
|
Sazali, Siti Syakirah |
|
|
34 |
5 |
p. 2151-2160 |
artikel |
20 |
Cluster analysis of urdu tweets
|
Nasim, Zarmeen |
|
|
34 |
5 |
p. 2170-2179 |
artikel |
21 |
Data privacy preservation in MAC aware Internet of things with optimized key generation
|
Kalyani, G. |
|
|
34 |
5 |
p. 2062-2071 |
artikel |
22 |
Deep signature-based isolated and large scale continuous gesture recognition approach
|
Mahmoud, Rihem |
|
|
34 |
5 |
p. 1793-1807 |
artikel |
23 |
Development of trust based access control models using fuzzy logic in cloud computing
|
Kesarwani, Abhishek |
|
|
34 |
5 |
p. 1958-1967 |
artikel |
24 |
DGA-based botnets detection using DNS traffic mining
|
Manasrah, Ahmed M. |
|
|
34 |
5 |
p. 2045-2061 |
artikel |
25 |
Dynamic detection of offshore wind turbines by spatial machine learning from spaceborne synthetic aperture radar imagery
|
Xu, Zhihuo |
|
|
34 |
5 |
p. 1674-1686 |
artikel |
26 |
Early detection of crypto-ransomware using pre-encryption detection algorithm
|
Kok, S.H. |
|
|
34 |
5 |
p. 1984-1999 |
artikel |
27 |
Effective deep learning approaches for summarization of legal texts
|
Anand, Deepa |
|
|
34 |
5 |
p. 2141-2150 |
artikel |
28 |
Ensemble Neighborhood Search (ENS) for biclustering of gene expression microarray data and single cell RNA sequencing data
|
Biswal, Bhawani Sankar |
|
|
34 |
5 |
p. 2244-2251 |
artikel |
29 |
Evolving Optimized Neutrosophic C means clustering using Behavioral Inspiration of Artificial Bacterial Foraging (ONCMC-ABF) in the Prediction of Dyslexia
|
Loveline Zeema, J. |
|
|
34 |
5 |
p. 1748-1754 |
artikel |
30 |
Forwarding strategies in vehicular named data networks: A survey
|
Ahed, Kaoutar |
|
|
34 |
5 |
p. 1819-1835 |
artikel |
31 |
Fuzzy modelling based energy aware clustering in wireless sensor networks using modified invasive weed optimization
|
Sharma, Richa |
|
|
34 |
5 |
p. 1884-1894 |
artikel |
32 |
GP-ELM-RNN: Garson-pruned extreme learning machine based replicator neural network for anomaly detection
|
Hashmi, Adeel Shiraz |
|
|
34 |
5 |
p. 1768-1774 |
artikel |
33 |
Hurst exponent based approach for influence maximization in social networks
|
Saxena, Bhawna |
|
|
34 |
5 |
p. 2218-2230 |
artikel |
34 |
Hybrid Artificial Bee Colony and Monarchy Butterfly Optimization Algorithm (HABC-MBOA)-based cluster head selection for WSNs
|
Rambabu, Bandi |
|
|
34 |
5 |
p. 1895-1905 |
artikel |
35 |
Image-based soft drink type classification and dietary assessment system using deep convolutional neural network with transfer learning
|
Hafiz, Rubaiya |
|
|
34 |
5 |
p. 1775-1784 |
artikel |
36 |
Image compression for quality 3D reconstruction
|
Salih, Omar M. |
|
|
34 |
5 |
p. 2271-2287 |
artikel |
37 |
Influence propagation in social networks: Interest-based community ranking model
|
Ayman R. Abd Al-Azim, Nouran |
|
|
34 |
5 |
p. 2231-2243 |
artikel |
38 |
Intelligent waste management system using deep learning with IoT
|
Rahman, Md. Wahidur |
|
|
34 |
5 |
p. 2072-2087 |
artikel |
39 |
Investigation of the optimal method for generating and verifying the Smartphone’s fingerprint: A review
|
Alsunaidi, Shikah J. |
|
|
34 |
5 |
p. 1919-1932 |
artikel |
40 |
Malaria detection using deep residual networks with mobile microscopy
|
Pattanaik, P.A. |
|
|
34 |
5 |
p. 1700-1705 |
artikel |
41 |
Mal-Detect: An intelligent visualization approach for malware detection
|
Falana, Olorunjube James |
|
|
34 |
5 |
p. 1968-1983 |
artikel |
42 |
Multi-Agents Indexing System (MAIS) for Plagiarism Detection
|
Zouaoui, Samia |
|
|
34 |
5 |
p. 2131-2140 |
artikel |
43 |
Multi-robot control for a static polygon formation using Neighbor-Leader algorithm
|
Issa, Bayadir A. |
|
|
34 |
5 |
p. 2207-2217 |
artikel |
44 |
Multi task learning with general vector space for cross-lingual semantic relation detection
|
Sholikah, Rizka W. |
|
|
34 |
5 |
p. 2161-2169 |
artikel |
45 |
Network Forensic Investigation Protocol to Identify True Origin of Cyber Crime
|
Patil, Rachana Y. |
|
|
34 |
5 |
p. 2031-2044 |
artikel |
46 |
Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme
|
Hassan, Fatuma Saeid |
|
|
34 |
5 |
p. 2017-2030 |
artikel |
47 |
NROI based feature learning for automated tumor stage classification of pulmonary lung nodules using deep convolutional neural networks
|
Suresh, Supriya |
|
|
34 |
5 |
p. 1706-1717 |
artikel |
48 |
Optimal container resource allocation in cloud architecture: A new hybrid model
|
N. Vhatkar, Kapil |
|
|
34 |
5 |
p. 1906-1918 |
artikel |
49 |
Rank Criteria Improved Confidence-based centroid scheme for Non Line of Sight node localizations in vehicular networks
|
Amuthan, A. |
|
|
34 |
5 |
p. 1836-1844 |
artikel |
50 |
RFM model for customer purchase behavior using K-Means algorithm
|
Anitha, P. |
|
|
34 |
5 |
p. 1785-1792 |
artikel |
51 |
RSA based encryption approach for preserving confidentiality of big data
|
Sharma, Kanika |
|
|
34 |
5 |
p. 2088-2097 |
artikel |
52 |
Saliency guided faster-RCNN (SGFr-RCNN) model for object detection and recognition
|
Sharma, Vipal Kumar |
|
|
34 |
5 |
p. 1687-1699 |
artikel |
53 |
Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm
|
Vinitha, A. |
|
|
34 |
5 |
p. 1857-1868 |
artikel |
54 |
S 2 RC : A multi-objective route planning and charging slot reservation approach for electric vehicles considering state of traffic and charging station
|
Kumar, Ashwani |
|
|
34 |
5 |
p. 2192-2206 |
artikel |
55 |
Stereo matching algorithm based on deep learning: A survey
|
Hamid, Mohd Saad |
|
|
34 |
5 |
p. 1663-1673 |
artikel |
56 |
Subject independent emotion recognition from EEG using VMD and deep learning
|
Pandey, Pallavi |
|
|
34 |
5 |
p. 1730-1738 |
artikel |