Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             37 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A formal verification approach for composite smart contracts security using FSM Almakhour, Mouhamad

35 1 p. 70-86
artikel
2 A Fuzzy-Based Duo-Secure Multi-Modal Framework for IoMT Anomaly Detection Wagan, Shiraz Ali

35 1 p. 131-144
artikel
3 An attention-based hybrid deep learning approach for bengali video captioning Zaoad, Md. Shahir

35 1 p. 257-269
artikel
4 An end-to-end real-time pollutants spilling recognition in wastewater based on the IoT-ready SENSIPLUS platform Gerevini, Luca

35 1 p. 499-513
artikel
5 An energy fault and consumption optimization strategy in wireless sensor networks with edge computing Li, Guozhi

35 1 p. 357-367
artikel
6 An immune plasma algorithm based approach for UCAV path planning Aslan, Selcuk

35 1 p. 56-69
artikel
7 A novel deterministic substitution box generator over elliptic curves for real-time applications Khan, Mohammad Abdul Mujeeb

35 1 p. 219-236
artikel
8 A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses Karthik, P.

35 1 p. 310-323
artikel
9 A privacy scoring framework: Automation of privacy compliance and risk evaluation with standard indicators Kim, Nakyoung

35 1 p. 514-525
artikel
10 A robust detection and localization technique for copy-move forgery in digital images Alhaidery, Manaf Mohammed Ali

35 1 p. 449-461
artikel
11 Arrhythmia classification using multirate processing metaheuristic optimization and variational mode decomposition Mian Qaisar, Saeed

35 1 p. 26-37
artikel
12 Big data analysis using a parallel ensemble clustering architecture and an unsupervised feature selection approach Wang, Yubo

35 1 p. 270-282
artikel
13 Bio-inspired robotics enabled schemes in blockchain-fog-cloud assisted IoMT environment lakhan, Abdullah

35 1 p. 1-12
artikel
14 BPPIR: Blockchain-assisted privacy-preserving similarity image retrieval over multiple clouds Tian, Miao

35 1 p. 324-334
artikel
15 Credit card fraud detection in the era of disruptive technologies: A systematic review Cherif, Asma

35 1 p. 145-174
artikel
16 Deep learning framework for congestion detection at public places via learning from synthetic data Basalamah, Saleh

35 1 p. 102-114
artikel
17 3D face reconstruction from single image with generative adversarial networks Malah, Mehdi

35 1 p. 250-256
artikel
18 Differentially private block coordinate descent Riaz, Shazia

35 1 p. 283-295
artikel
19 FinTech enablers, use cases, and role of future internet of things Bhat, Jagadeesha R.

35 1 p. 87-101
artikel
20 FPGA-based point processing for denoising of the show-through effect in scanned document images Nazeer, Habibunnisha

35 1 p. 296-309
artikel
21 Intention-guided deep semi-supervised document clustering via metric learning Jingnan, Li

35 1 p. 416-425
artikel
22 Leveraging feature-level fusion representations and attentional bidirectional RNN-CNN deep models for Arabic affect analysis on Twitter Elfaik, Hanane

35 1 p. 462-482
artikel
23 Local generalization and bucketization technique for personalized privacy preservation Li, Boyu

35 1 p. 393-404
artikel
24 Missing values imputation using Fuzzy K-Top Matching Value Ali, Azza

35 1 p. 426-437
artikel
25 Model-agnostic meta-learning-based region-adaptive parameter adjustment scheme for influenza forecasting Moon, Jaeuk

35 1 p. 175-184
artikel
26 MSSRGO: A multimeta-model-based global optimization method using a selection-rank-based infill sampling strategy Li, Mingyang

35 1 p. 382-392
artikel
27 Multiple-level thresholding for breast mass detection Yu, Xiang

35 1 p. 115-130
artikel
28 Neural POS tagging of shahmukhi by using contextualized word representations Tehseen, Amina

35 1 p. 335-356
artikel
29 Opt-CoInfer: Optimal collaborative inference across IoT and cloud for fast and accurate CNN inference Zhang, Zhanhua

35 1 p. 438-448
artikel
30 ProRE: An ACO- based programmer recommendation model to precisely manage software bugs Kukkar, Ashima

35 1 p. 483-498
artikel
31 SCIPOG: Seeding and constraint support in IPOG strategy for combinatorial t-way testing to generate optimum test cases Aminu Muazu, Aminu

35 1 p. 185-201
artikel
32 Texture and material classification with multi-scale ternary and septenary patterns Rachdi, E.

35 1 p. 405-415
artikel
33 Theft detection dataset for benchmarking and machine learning based classification in a smart grid environment Zidi, Salah

35 1 p. 13-25
artikel
34 Towards distributed and autonomous IoT service placement in fog computing using asynchronous advantage actor-critic algorithm Zare, Mansoureh

35 1 p. 368-381
artikel
35 UsAge guidelines: Toward usable Saudi M-Government applications for elderly users Alkhomsan, Mashail N.

35 1 p. 202-218
artikel
36 VF-CART: A communication-efficient vertical federated framework for the CART algorithm Xu, Yang

35 1 p. 237-249
artikel
37 VODRAC: Efficient and robust correspondence-based point cloud registration with extreme outlier ratios Hu, Enwen

35 1 p. 38-55
artikel
                             37 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland