nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A classification framework for straggler mitigation and management in a heterogeneous Hadoop cluster: A state-of-art survey
|
Bawankule, Kamalakant Laxman |
|
|
34 |
9 |
p. 7621-7644 |
artikel |
2 |
A Comprehensive Survey on the Application of Deep and Reinforcement Learning Approaches in Autonomous Driving
|
Elallid, Badr Ben |
|
|
34 |
9 |
p. 7366-7390 |
artikel |
3 |
A contemplative perspective on federated machine learning: Taxonomy, threats & vulnerability assessment and challenges
|
Jatain, Divya |
|
|
34 |
9 |
p. 6681-6698 |
artikel |
4 |
A Fuzzy Logic based feature engineering approach for Botnet detection using ANN
|
Joshi, Chirag |
|
|
34 |
9 |
p. 6872-6882 |
artikel |
5 |
AGRO: A smart sensing and decision-making mechanism for real-time agriculture monitoring
|
Koteish, Kamila |
|
|
34 |
9 |
p. 7059-7069 |
artikel |
6 |
A hybrid genetic algorithm and tabu search for minimizing makespan in flow shop scheduling problem
|
Umam, Moch Saiful |
|
|
34 |
9 |
p. 7459-7467 |
artikel |
7 |
A hybrid two-stage robustness approach to portfolio construction under uncertainty
|
Atta Mills, Ebenezer Fiifi Emire |
|
|
34 |
9 |
p. 7735-7750 |
artikel |
8 |
AlexNet architecture based convolutional neural network for toxic comments classification
|
Singh, Inderpreet |
|
|
34 |
9 |
p. 7547-7558 |
artikel |
9 |
A lightweight three factor authentication framework for IoT based critical applications
|
Saqib, Manasha |
|
|
34 |
9 |
p. 6925-6937 |
artikel |
10 |
An in-depth automated approach for fish disease recognition
|
Mia, Md. Jueal |
|
|
34 |
9 |
p. 7174-7183 |
artikel |
11 |
An integrated approach for eye centre localization using deep networks and rectangular-intensity-gradient technique
|
Ahmad, Naseem |
|
|
34 |
9 |
p. 7153-7167 |
artikel |
12 |
An IoMT enabled deep learning framework for automatic detection of fetal QRS: A solution to remote prenatal care
|
Jaba Deva Krupa, Abel |
|
|
34 |
9 |
p. 7200-7211 |
artikel |
13 |
A novel method for detecting psychological stress at tweet level using neighborhood tweets
|
KVTKN, Prashanth |
|
|
34 |
9 |
p. 6663-6680 |
artikel |
14 |
An unsupervised method for word sense disambiguation
|
Rahman, Nazreena |
|
|
34 |
9 |
p. 6643-6651 |
artikel |
15 |
Arabic aspect based sentiment analysis using bidirectional GRU based models
|
M.Abdelgwad, Mohammed |
|
|
34 |
9 |
p. 6652-6662 |
artikel |
16 |
Arabic Knowledge Graph Construction: A close look in the present and into the future
|
Ahmed, Ibrahim A. |
|
|
34 |
9 |
p. 6505-6523 |
artikel |
17 |
Arabic light-based stemmer using new rules
|
Alshalabi, Hamood |
|
|
34 |
9 |
p. 6635-6642 |
artikel |
18 |
A review of diabetic retinopathy: Datasets, approaches, evaluation metrics and future trends
|
Nagpal, Dimple |
|
|
34 |
9 |
p. 7138-7152 |
artikel |
19 |
A review on 6G for space-air-ground integrated network: Key enablers, open challenges, and future direction
|
Ray, Partha Pratim |
|
|
34 |
9 |
p. 6949-6976 |
artikel |
20 |
A robust voice spoofing detection system using novel CLS-LBP features and LSTM
|
Dawood, Hussain |
|
|
34 |
9 |
p. 7300-7312 |
artikel |
21 |
Artificial intelligence-based fault prediction framework for WBAN
|
Awad, Mamoun |
|
|
34 |
9 |
p. 7126-7137 |
artikel |
22 |
Association features of smote and rose for drug addiction relapse risk
|
Selamat, Nor Ashidah |
|
|
34 |
9 |
p. 7710-7719 |
artikel |
23 |
A study on generic object detection with emphasis on future research directions
|
Arulprakash, Enoch |
|
|
34 |
9 |
p. 7347-7365 |
artikel |
24 |
A systematic literature review of attribute based encryption in health services
|
Imam, Raza |
|
|
34 |
9 |
p. 6743-6774 |
artikel |
25 |
A third generation genetic algorithm NSGAIII for task scheduling in cloud computing
|
Imene, Latreche |
|
|
34 |
9 |
p. 7515-7529 |
artikel |
26 |
A two-layer decentralized charging approach for residential electric vehicles based on fuzzy data fusion
|
Hussain, Shahid |
|
|
34 |
9 |
p. 7391-7405 |
artikel |
27 |
Bayesian Nash Equilibrium based Gaming Model for Eco-safe Driving
|
Jain, Neetika |
|
|
34 |
9 |
p. 7482-7493 |
artikel |
28 |
Blockchain state-of-the-art: architecture, use cases, consensus, challenges and opportunities
|
Shrimali, Bela |
|
|
34 |
9 |
p. 6793-6807 |
artikel |
29 |
Characterization of task response time in a fog-enabled IoT network using queueing models with general service times
|
Ibrahim, Amira S. |
|
|
34 |
9 |
p. 7089-7100 |
artikel |
30 |
Cloud and distributed architectures for data management in agriculture 4.0 : Review and future trends
|
Debauche, Olivier |
|
|
34 |
9 |
p. 7494-7514 |
artikel |
31 |
CNN based efficient approach for emotion recognition
|
Aslan, Muzaffer |
|
|
34 |
9 |
p. 7335-7346 |
artikel |
32 |
Compact modular multiplier design for strong security capabilities in resource-limited Telehealth IoT devices
|
Ibrahim, Atef |
|
|
34 |
9 |
p. 6847-6854 |
artikel |
33 |
Completely fair energy scheduling mechanism in a smart distributed multi-microgrid system
|
Jain, Khushboo |
|
|
34 |
9 |
p. 7819-7829 |
artikel |
34 |
Contrast and brightness balance in image enhancement using Cuckoo Search-optimized image fusion
|
Maurya, Lalit |
|
|
34 |
9 |
p. 7247-7258 |
artikel |
35 |
Digital intervention to reduce counterfeit and falsified medicines: A systematic review and future research agenda
|
Islam, Iyolita |
|
|
34 |
9 |
p. 6699-6718 |
artikel |
36 |
Disease detection of apple leaf with combination of color segmentation and modified DWT
|
Hasan, Sharad |
|
|
34 |
9 |
p. 7212-7224 |
artikel |
37 |
DLNet: Accurate segmentation of green fruit in obscured environments
|
Liu, Jie |
|
|
34 |
9 |
p. 7259-7270 |
artikel |
38 |
DQRE-SCnet: A novel hybrid approach for selecting users in Federated Learning with Deep-Q-Reinforcement Learning based on Spectral Clustering
|
Ahmadi, Mohsen |
|
|
34 |
9 |
p. 7445-7458 |
artikel |
39 |
DVTChain: A blockchain-based decentralized mechanism to ensure the security of digital voting system voting system
|
Alvi, Syada Tasmia |
|
|
34 |
9 |
p. 6855-6871 |
artikel |
40 |
Dynamic indoor path planning for the visually impaired
|
Benabid Najjar, Abir |
|
|
34 |
9 |
p. 7014-7024 |
artikel |
41 |
Dynamic MTU: A smaller path MTU size technique to reduce packet drops in IPv6
|
Hussain, Ishfaq |
|
|
34 |
9 |
p. 7070-7088 |
artikel |
42 |
Efficient sequential covering strategy for classification rules mining using a discrete equilibrium optimization algorithm
|
MALIK, Mohamed Mahdi |
|
|
34 |
9 |
p. 7559-7569 |
artikel |
43 |
Embedding and generalization of formula with context in the retrieval of mathematical information
|
Dadure, Pankaj |
|
|
34 |
9 |
p. 6624-6634 |
artikel |
44 |
Embedding arabic questions by feature-level fusion of word representations for questions classification: It is worth doing?
|
Hamza, Alami |
|
|
34 |
9 |
p. 6583-6594 |
artikel |
45 |
Emerging Trends in Blockchain Technology and Applications: A Review and Outlook
|
Gad, Ahmed G. |
|
|
34 |
9 |
p. 6719-6742 |
artikel |
46 |
Emotion recognition from facial images with simultaneous occlusion, pose and illumination variations using meta-learning
|
Kuruvayil, Soumya |
|
|
34 |
9 |
p. 7271-7282 |
artikel |
47 |
Encryfuscation: A model for preserving data and location privacy in fog based IoT scenario
|
Kaur, Jasleen |
|
|
34 |
9 |
p. 6808-6817 |
artikel |
48 |
Energy Aware Q-learning AODV (EAQ-AODV) routing for cognitive radio sensor networks
|
Joon, Ranjita |
|
|
34 |
9 |
p. 6989-7000 |
artikel |
49 |
Enhanced DSSM (deep semantic structure modelling) technique for job recommendation
|
Mishra, Ravita |
|
|
34 |
9 |
p. 7790-7802 |
artikel |
50 |
Enhanced IPCGAN-Alexnet model for new face image generating on age target
|
Pranoto, Hady |
|
|
34 |
9 |
p. 7236-7246 |
artikel |
51 |
Fuzzy rule-based acceptance criterion in metaheuristic algorithms
|
Arık, Oğuzhan Ahmet |
|
|
34 |
9 |
p. 7775-7789 |
artikel |
52 |
Handfan: A flexible peer-to-peer service discovery system for internet of things applications
|
Djellabi, Brahim |
|
|
34 |
9 |
p. 7686-7698 |
artikel |
53 |
Handwritten numeral recognition through superimposition onto printed form
|
Shuvo, M.I.R. |
|
|
34 |
9 |
p. 7751-7764 |
artikel |
54 |
Identification of Multilingual Offense and Troll from Social Media Memes Using Weighted Ensemble of Multimodal Features
|
Hossain, Eftekhar |
|
|
34 |
9 |
p. 6605-6623 |
artikel |
55 |
Indoor positioning system using hybrid method of fingerprinting and pedestrian dead reckoning
|
Riady, Alvin |
|
|
34 |
9 |
p. 7101-7110 |
artikel |
56 |
Influence maximization frameworks, performance, challenges and directions on social network: A theoretical study
|
Singh, Shashank Sheshar |
|
|
34 |
9 |
p. 7570-7603 |
artikel |
57 |
Integration of morphological features and contextual weightage using monotonic chunk attention for part of speech tagging
|
Mundotiya, Rajesh Kumar |
|
|
34 |
9 |
p. 7324-7334 |
artikel |
58 |
iVaccine-Deep: Prediction of COVID-19 mRNA vaccine degradation using deep learning
|
Muneer, Amgad |
|
|
34 |
9 |
p. 7419-7432 |
artikel |
59 |
Learning-free, divide and conquer text-line extraction algorithm for printed Arabic text with diacritics
|
Qaroush, Aziz |
|
|
34 |
9 |
p. 7699-7709 |
artikel |
60 |
Lightweight deep learning model to secure authentication in Mobile Cloud Computing
|
Zeroual, Abdelhakim |
|
|
34 |
9 |
p. 6938-6948 |
artikel |
61 |
Load balancing between fog and cloud in fog of things based platforms through software-defined networking
|
Batista, Ernando |
|
|
34 |
9 |
p. 7111-7125 |
artikel |
62 |
MDA-Net: Multiscale dual attention-based network for breast lesion segmentation using ultrasound images
|
Iqbal, Ahmed |
|
|
34 |
9 |
p. 7283-7299 |
artikel |
63 |
Medical Image Cryptosystem using Dynamic Josephus Sequence and Chaotic-hash Scrambling
|
Setiadi, De Rosal Ignatius Moses |
|
|
34 |
9 |
p. 6818-6828 |
artikel |
64 |
Multilingual broad phoneme recognition and language-independent spoken term detection for low-resourced languages
|
G, Deekshitha |
|
|
34 |
9 |
p. 7313-7323 |
artikel |
65 |
Multi-Model Generative Adversarial Network Hybrid Prediction Algorithm (MMGAN-HPA) for stock market prices prediction
|
Polamuri, Subba Rao |
|
|
34 |
9 |
p. 7433-7444 |
artikel |
66 |
Multi-user routing algorithm for indoor spaces – Adapted for social distancing
|
Alamri, Abdullah |
|
|
34 |
9 |
p. 7045-7058 |
artikel |
67 |
NI-Louvain: A novel algorithm to detect overlapping communities with influence analysis
|
Singh, Dipika |
|
|
34 |
9 |
p. 7765-7774 |
artikel |
68 |
NLQ into SQL translation using computational linguistics
|
Kedwan, Ftoon |
|
|
34 |
9 |
p. 6564-6582 |
artikel |
69 |
On the vulnerability of the mobile ad hoc network to transmission power controlled Sybil attack: Adopting the mobility-based clustering
|
Vasudeva, Amol |
|
|
34 |
9 |
p. 7025-7044 |
artikel |
70 |
Optimised calibration of machine vision system for close range photogrammetry based on machine learning
|
El Ghazouali, Safouane |
|
|
34 |
9 |
p. 7406-7418 |
artikel |
71 |
Probing AndroVul dataset for studies on Android malware classification
|
Zakeya, Namrud |
|
|
34 |
9 |
p. 6883-6894 |
artikel |
72 |
Pruning-based oversampling technique with smoothed bootstrap resampling for imbalanced clinical dataset of Covid-19
|
Wibowo, Prasetyo |
|
|
34 |
9 |
p. 7830-7839 |
artikel |
73 |
Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature
|
Majhi, Mukul |
|
|
34 |
9 |
p. 6829-6846 |
artikel |
74 |
RDF/OWL storage and management in relational database management systems: A comparative study
|
El Idrissi, Bouchra |
|
|
34 |
9 |
p. 7604-7620 |
artikel |
75 |
Reducing the number of migrated instances during business process change: A graph rewriting approach
|
Bouhamed, Mohammed Mounir |
|
|
34 |
9 |
p. 7720-7734 |
artikel |
76 |
Research on false review detection Methods: A state-of-the-art review
|
Mewada, Arvind |
|
|
34 |
9 |
p. 7530-7546 |
artikel |
77 |
Review and classification of content recommenders in E-learning environment
|
Joy, Jeevamol |
|
|
34 |
9 |
p. 7670-7685 |
artikel |
78 |
Robust regularization for single image dehazing
|
Ali, Usman |
|
|
34 |
9 |
p. 7168-7173 |
artikel |
79 |
Secure and lightweight privacy preserving Internet of things integration for remote patient monitoring
|
Imtyaz Ahmed, Mohammed |
|
|
34 |
9 |
p. 6895-6908 |
artikel |
80 |
Securing matrix counting-based secret-sharing involving crypto steganography
|
Al-Shaarani, Faiza |
|
|
34 |
9 |
p. 6909-6924 |
artikel |
81 |
Security testing of web applications: A systematic mapping of the literature
|
Aydos, Murat |
|
|
34 |
9 |
p. 6775-6792 |
artikel |
82 |
Short text classification for Arabic social media tweets
|
Alzanin, Samah M. |
|
|
34 |
9 |
p. 6595-6604 |
artikel |
83 |
Similarity measures for Collaborative Filtering-based Recommender Systems: Review and experimental comparison
|
Fkih, Fethi |
|
|
34 |
9 |
p. 7645-7669 |
artikel |
84 |
Systematic literature review of arabic aspect-based sentiment analysis
|
Alyami, Salha |
|
|
34 |
9 |
p. 6524-6551 |
artikel |
85 |
The effect of loss function on conditional generative adversarial networks
|
Abu-Srhan, Alaa |
|
|
34 |
9 |
p. 6977-6988 |
artikel |
86 |
TLSPG: Transfer learning-based semi-supervised pseudo-corpus generation approach for zero-shot translation
|
Kumar, Amit |
|
|
34 |
9 |
p. 6552-6563 |
artikel |
87 |
Towards an efficient big data management schema for IoT
|
Sawalha, Samer |
|
|
34 |
9 |
p. 7803-7818 |
artikel |
88 |
Towards a 3-tiered space-air-ground network with reinforcement learning
|
Ndong, Massa |
|
|
34 |
9 |
p. 7001-7013 |
artikel |
89 |
Unified robot task and motion planning with extended planner using ROS simulator
|
Rajendran, Gayathri |
|
|
34 |
9 |
p. 7468-7481 |
artikel |
90 |
Using convolutional neural networks for corneal arcus detection towards familial hypercholesterolemia screening
|
Kocejko, Tomasz |
|
|
34 |
9 |
p. 7225-7235 |
artikel |
91 |
Weakly supervised road network extraction for remote sensing image based scribble annotation and adversarial learning
|
Yuan, Genji |
|
|
34 |
9 |
p. 7184-7199 |
artikel |