nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A fast algorithm for constructing suffix arrays for DNA alphabets
|
Rabea, Zeinab |
|
|
34 |
7 |
p. 4659-4668 |
artikel |
2 |
A machine learning based attack detection and mitigation using a secure SaaS framework
|
Reddy, SaiSindhuTheja |
|
|
34 |
7 |
p. 4047-4061 |
artikel |
3 |
A new standard error based artificial bee colony algorithm and its applications in feature selection
|
Hanbay, Kazım |
|
|
34 |
7 |
p. 4554-4567 |
artikel |
4 |
A new temporal locality-based workload prediction approach for SaaS services in a cloud environment
|
Matoussi, Wiem |
|
|
34 |
7 |
p. 3973-3987 |
artikel |
5 |
An extended intelligent water drop approach for efficient VM allocation in secure cloud computing framework
|
Dubey, Kalka |
|
|
34 |
7 |
p. 3948-3958 |
artikel |
6 |
An optimized XGBoost based diagnostic system for effective prediction of heart disease
|
Budholiya, Kartik |
|
|
34 |
7 |
p. 4514-4523 |
artikel |
7 |
A novel load balancing technique for cloud computing platform based on PSO
|
Pradhan, Arabinda |
|
|
34 |
7 |
p. 3988-3995 |
artikel |
8 |
A novel wavelet thresholding rule for speckle reduction from ultrasound images
|
Jain, Leena |
|
|
34 |
7 |
p. 4461-4471 |
artikel |
9 |
A review of IoT network management: Current status and perspectives
|
Aboubakar, Moussa |
|
|
34 |
7 |
p. 4163-4176 |
artikel |
10 |
A Review on Secure Data Deduplication: Cloud Storage Security Issue
|
Prajapati, Priteshkumar |
|
|
34 |
7 |
p. 3996-4007 |
artikel |
11 |
A secure and efficient public auditing system of cloud storage based on BLS signature and automatic blocker protocol
|
Jalil, Baidaa Abdulrahman |
|
|
34 |
7 |
p. 4008-4021 |
artikel |
12 |
A survey on vehicular task offloading: Classification, issues, and challenges
|
Ahmed, Manzoor |
|
|
34 |
7 |
p. 4135-4162 |
artikel |
13 |
A technical review of wireless security for the internet of things: Software defined radio perspective
|
Rugeles Uribe, José de Jesús |
|
|
34 |
7 |
p. 4122-4134 |
artikel |
14 |
BiCHAT: BiLSTM with deep CNN and hierarchical attention for hate speech detection
|
Khan, Shakir |
|
|
34 |
7 |
p. 4335-4344 |
artikel |
15 |
Capsule network based analysis of histopathological images of oral squamous cell carcinoma
|
Panigrahi, Santisudha |
|
|
34 |
7 |
p. 4546-4553 |
artikel |
16 |
Classification of bird sounds as an early warning method of forest fires using Convolutional Neural Network (CNN) algorithm
|
Permana, Silvester Dian Handy |
|
|
34 |
7 |
p. 4345-4357 |
artikel |
17 |
Container scheduling techniques: A Survey and assessment
|
Ahmad, Imtiaz |
|
|
34 |
7 |
p. 3934-3947 |
artikel |
18 |
Co-occurrence patterns based fruit quality detection for hierarchical fruit image annotation
|
Nemade, Sangita B. |
|
|
34 |
7 |
p. 4592-4606 |
artikel |
19 |
CyberAid: Are your children safe from cyberbullying?
|
Thun, Lee Jia |
|
|
34 |
7 |
p. 4099-4108 |
artikel |
20 |
Dedicated hardware architecture for localizing iris in VW images
|
Kumar, Vineet |
|
|
34 |
7 |
p. 4568-4578 |
artikel |
21 |
Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover
|
Durafe, Asha |
|
|
34 |
7 |
p. 4483-4498 |
artikel |
22 |
Disintegrate hypergraph networks by attacking hyperedge
|
Peng, Hao |
|
|
34 |
7 |
p. 4679-4685 |
artikel |
23 |
Distributed application execution in fog computing: A taxonomy, challenges and future directions
|
Ashraf, Maria |
|
|
34 |
7 |
p. 3887-3909 |
artikel |
24 |
Domain knowledge based genetic algorithms for mobile robot path planning having single and multiple targets
|
Sarkar, Ritam |
|
|
34 |
7 |
p. 4269-4283 |
artikel |
25 |
EEG-based emotion recognition: Review of commercial EEG devices and machine learning techniques
|
Dadebayev, Didar |
|
|
34 |
7 |
p. 4385-4401 |
artikel |
26 |
Energy-aware service composition in multi-Cloud
|
Li, Jianmin |
|
|
34 |
7 |
p. 3959-3967 |
artikel |
27 |
Enhanced Indonesian Ethnic Speaker Recognition using Data Augmentation Deep Neural Network
|
Nugroho, Kristiawan |
|
|
34 |
7 |
p. 4375-4384 |
artikel |
28 |
Facial image recognition for biometric authentication systems using a combination of geometrical feature points and low-level visual features
|
Vasanthi, M. |
|
|
34 |
7 |
p. 4109-4121 |
artikel |
29 |
Fingerprint liveness detection through fusion of pores perspiration and texture features
|
Agarwal, Diwakar |
|
|
34 |
7 |
p. 4089-4098 |
artikel |
30 |
GHFormer-Net: Towards more accurate small green apple/begonia fruit detection in the nighttime
|
Sun, Meili |
|
|
34 |
7 |
p. 4421-4432 |
artikel |
31 |
Green software: Refactoring approach
|
Sehgal, Rajni |
|
|
34 |
7 |
p. 4635-4643 |
artikel |
32 |
HLifeRL: A hierarchical lifelong reinforcement learning framework
|
Ding, Fan |
|
|
34 |
7 |
p. 4312-4321 |
artikel |
33 |
Hybrid model for bot group activity detection using similarity and correlation approaches based on network traffic flows analysis
|
Hostiadi, Dandy Pramana |
|
|
34 |
7 |
p. 4219-4232 |
artikel |
34 |
IDEA: Intellect database for emotion analysis using EEG signal
|
Joshi, Vaishali M. |
|
|
34 |
7 |
p. 4433-4447 |
artikel |
35 |
ILA4: Overcoming missing values in machine learning datasets – An inductive learning approach
|
Elhassan, Ammar |
|
|
34 |
7 |
p. 4284-4295 |
artikel |
36 |
Improved colorization and classification of intracranial tumor expanse in MRI images via hybrid scheme of Pix2Pix-cGANs and NASNet-large
|
Mehmood, Mavra |
|
|
34 |
7 |
p. 4358-4374 |
artikel |
37 |
KAB: A new k-anonymity approach based on black hole algorithm
|
Kacha, Lynda |
|
|
34 |
7 |
p. 4075-4088 |
artikel |
38 |
Knowledge graph and deep learning combined with a stock price prediction network focusing on related stocks and mutation points
|
Tao, Meiyao |
|
|
34 |
7 |
p. 4322-4334 |
artikel |
39 |
Lightweight hash-based de-duplication system using the self detection of most repeated patterns as chunks divisors
|
Ahmed, Saja Taha |
|
|
34 |
7 |
p. 4669-4678 |
artikel |
40 |
Load balancing techniques in cloud computing environment: A review
|
Shafiq, Dalia Abdulkareem |
|
|
34 |
7 |
p. 3910-3933 |
artikel |
41 |
LUET: A novel lines-of-uniformity based clustering protocol for heterogeneous-WSN for multiple-applications
|
Sood, Tanvi |
|
|
34 |
7 |
p. 4177-4190 |
artikel |
42 |
Measuring the effect of monitoring on a cloud computing system by estimating the delay time of requests
|
Khalil, M.M. |
|
|
34 |
7 |
p. 3968-3972 |
artikel |
43 |
Method for building an information model specification based on a sensemaking approach to user involvement in the development process
|
Lapshin, Vyacheslav S. |
|
|
34 |
7 |
p. 4644-4658 |
artikel |
44 |
Normalized square difference based multilevel thresholding technique for multispectral images using leader slime mould algorithm
|
Naik, Manoj Kumar |
|
|
34 |
7 |
p. 4524-4536 |
artikel |
45 |
Optimization and acceleration of convolutional neural networks: A survey
|
Habib, Gousia |
|
|
34 |
7 |
p. 4244-4268 |
artikel |
46 |
Phase-based thresholding schemes for segmentation of fetal thigh cross-sectional region in ultrasound images
|
Hermawati, Fajar Astuti |
|
|
34 |
7 |
p. 4448-4460 |
artikel |
47 |
Privacy protection scheme for mobile social network
|
Mohammad Safi, Seyyed |
|
|
34 |
7 |
p. 4062-4074 |
artikel |
48 |
Race estimation with deep networks
|
Ahmed, Mazida A. |
|
|
34 |
7 |
p. 4579-4591 |
artikel |
49 |
Resource identifier interoperability among heterogeneous IoT platforms
|
Koo, Jahoon |
|
|
34 |
7 |
p. 4191-4208 |
artikel |
50 |
Robust coverless steganography using limited mapping images
|
Liu, Xiyao |
|
|
34 |
7 |
p. 4472-4482 |
artikel |
51 |
Seam Carving based visible watermarking robust to removal attacks
|
Fragoso-Navarro, Eduardo |
|
|
34 |
7 |
p. 4499-4513 |
artikel |
52 |
Secure and efficient two-party collaborative SM9 signature scheme suitable for smart home
|
Liu, Shuang Gen |
|
|
34 |
7 |
p. 4022-4030 |
artikel |
53 |
Secure and load balanced routing model for wireless sensor networks
|
Thahniyath, Gousia |
|
|
34 |
7 |
p. 4209-4218 |
artikel |
54 |
Shot based keyframe extraction using edge-LBP approach
|
Nandini, H.M. |
|
|
34 |
7 |
p. 4537-4545 |
artikel |
55 |
Smart contract based digital evidence management framework over blockchain for vehicle accident investigation in IoV era
|
Philip, Abin Oommen |
|
|
34 |
7 |
p. 4031-4046 |
artikel |
56 |
Software quality: Application of a process model for quality-in-use assessment
|
Souza-Pereira, Leonice |
|
|
34 |
7 |
p. 4626-4634 |
artikel |
57 |
STLF-Net: Two-stream deep network for short-term load forecasting in residential buildings
|
Abdel-Basset, Mohamed |
|
|
34 |
7 |
p. 4296-4311 |
artikel |
58 |
Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA
|
Singh, Prabhash Kumar |
|
|
34 |
7 |
p. 4402-4420 |
artikel |
59 |
Throughput optimization of interference limited cognitive radio-based Internet of Things (CR-IoT) network
|
Bala, Indu |
|
|
34 |
7 |
p. 4233-4243 |
artikel |
60 |
Understanding community participation and engagement in open source software Projects: A systematic mapping study
|
Kaur, Rajdeep |
|
|
34 |
7 |
p. 4607-4625 |
artikel |