nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A hybrid data collection scheme to achieve load balancing for underwater sensor networks
|
Ayaz, Muhammad |
|
|
35 |
3 |
p. 74-86 |
artikel |
2 |
A lightweight secure retrieval model applied to intranet
|
Zhi, Qiang |
|
|
35 |
3 |
p. 274-282 |
artikel |
3 |
An efficient and autonomous scheme for solving IoT service placement problem using the improved Archimedes optimization algorithm
|
Zhang, Zhijun |
|
|
35 |
3 |
p. 157-175 |
artikel |
4 |
An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0
|
Chakir, Oumaima |
|
|
35 |
3 |
p. 103-119 |
artikel |
5 |
An image encryption scheme based on a seven-dimensional hyperchaotic system and Pascal's matrix
|
Neamah, Ammar Ali |
|
|
35 |
3 |
p. 238-248 |
artikel |
6 |
An improved multi-copy cloud data auditing scheme and its application
|
Tu, Zheng |
|
|
35 |
3 |
p. 120-130 |
artikel |
7 |
An incremental approach to the n-queen problem with polynomial time
|
El Abidine, Bouneb Zine |
|
|
35 |
3 |
p. 1-7 |
artikel |
8 |
A novel method for designing indexes to support efficient substring queries on encrypted databases
|
Ngoc Hoang, Canh |
|
|
35 |
3 |
p. 20-36 |
artikel |
9 |
A self-learning mean optimization filter to improve bluetooth 5.1 AoA indoor positioning accuracy for ship environments
|
Lin, Qianfeng |
|
|
35 |
3 |
p. 59-73 |
artikel |
10 |
Attention-based latent features for jointly trained end-to-end automatic speech recognition with modified speech enhancement
|
Yang, Da-Hee |
|
|
35 |
3 |
p. 202-210 |
artikel |
11 |
Computer-aided fish assessment in an underwater marine environment using parallel and progressive spatial information fusion
|
Haider, Adnan |
|
|
35 |
3 |
p. 211-226 |
artikel |
12 |
Data plane failure and its recovery techniques in SDN: A systematic literature review
|
Khan, Nauman |
|
|
35 |
3 |
p. 176-201 |
artikel |
13 |
Evaluation of the iterative method of task distribution in a swarm of unmanned aerial vehicles in a clustered field of targets
|
Petrenko, Vyacheslav |
|
|
35 |
3 |
p. 283-291 |
artikel |
14 |
Evolutionary game decision-making method for network attack and defense based on regret minimization algorithm
|
Jin, Hui |
|
|
35 |
3 |
p. 292-302 |
artikel |
15 |
Exploiting 3D fractal cube and chaos for effective multi-image compression and encryption
|
Lu, Yang |
|
|
35 |
3 |
p. 37-58 |
artikel |
16 |
Feature selection method based on quantum inspired genetic algorithm for Arabic signature verification
|
Abdulhussien, Ansam A. |
|
|
35 |
3 |
p. 141-156 |
artikel |
17 |
Framework for automatic detection of anomalies in DevOps
|
Hany Fawzy, Ahmed |
|
|
35 |
3 |
p. 8-19 |
artikel |
18 |
IB-TransUNet: Combining Information Bottleneck and Transformer for Medical Image Segmentation
|
Li, Guangju |
|
|
35 |
3 |
p. 249-258 |
artikel |
19 |
Prediction of the customers' interests using sentiment analysis in e-commerce data for comparison of Arabic, English, and Turkish languages
|
Savci, Pinar |
|
|
35 |
3 |
p. 227-237 |
artikel |
20 |
Sequential and parallel sliding window algorithms for multiplying large integers
|
Bahig, Hazem M. |
|
|
35 |
3 |
p. 131-140 |
artikel |
21 |
Spatiotemporal fusion for spectral remote sensing: A statistical analysis and review
|
Chen, Guangsheng |
|
|
35 |
3 |
p. 259-273 |
artikel |
22 |
Twofold dynamic attention guided deep network and noise-aware mechanism for image denoising
|
Chen, Zihao |
|
|
35 |
3 |
p. 87-102 |
artikel |