nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accountable multi-authority attribute-based data access control in smart grids
|
Zhang, Leyou |
|
|
35 |
7 |
p. |
artikel |
2 |
A hierarchical approach based CBIR scheme using shape, texture, and color for accelerating retrieval process
|
Kumar, Sumit |
|
|
35 |
7 |
p. |
artikel |
3 |
A new local structural similarity fusion-based thresholding method for homomorphic ultrasound image despeckling in NSCT domain
|
Singh, Prabhishek |
|
|
35 |
7 |
p. |
artikel |
4 |
An optimized hybrid deep learning model based on word embeddings and statistical features for extractive summarization
|
Wazery, Yaser M. |
|
|
35 |
7 |
p. |
artikel |
5 |
A novel image recommendation model based on user preferences and social relationships
|
Wei, Weiyi |
|
|
35 |
7 |
p. |
artikel |
6 |
A novel secure authentication protocol for eHealth records in cloud with a new key generation method and minimized key exchange
|
Mohinder Singh, B |
|
|
35 |
7 |
p. |
artikel |
7 |
Authentication and encryption protocol with revocation and reputation management for enhancing 5G-V2X security
|
Abdel Hakeem, Shimaa A. |
|
|
35 |
7 |
p. |
artikel |
8 |
Automatic explanation of the classification of Spanish legal judgments in jurisdiction-dependent law categories with tree estimators
|
González-González, Jaime |
|
|
35 |
7 |
p. |
artikel |
9 |
Backtracking search optimization algorithm with dual scatter search strategy for automated test case generation
|
Ren, Jingru |
|
|
35 |
7 |
p. |
artikel |
10 |
Bandwidth and power efficient lightweight authentication scheme for healthcare system☆☆☆☆☆☆
|
Jan, Saeed Ullah |
|
|
35 |
7 |
p. |
artikel |
11 |
Building a decentralized industrial alliance with the information system empowered by blockchain
|
Han, Gaoyong |
|
|
35 |
7 |
p. |
artikel |
12 |
Causality extraction: A comprehensive survey and new perspective
|
Ali, Wajid |
|
|
35 |
7 |
p. |
artikel |
13 |
Compressing medical deep neural network models for edge devices using knowledge distillation
|
MohiEldeen Alabbasy, F. |
|
|
35 |
7 |
p. |
artikel |
14 |
Contextual Embeddings based on Fine-tuned Urdu-BERT for Urdu threatening content and target identification
|
Malik, Muhammad Shahid Iqbal |
|
|
35 |
7 |
p. |
artikel |
15 |
Cryptanalyzing an image cipher using multiple chaos and DNA operations
|
Wen, Heping |
|
|
35 |
7 |
p. |
artikel |
16 |
CsAGP: Detecting Alzheimer's disease from multimodal images via dual-transformer with cross-attention and graph pooling
|
Tang, Chaosheng |
|
|
35 |
7 |
p. |
artikel |
17 |
Deep learning framework for rapid and accurate respiratory COVID-19 prediction using chest X-ray images
|
Ukwuoma, Chiagoziem C. |
|
|
35 |
7 |
p. |
artikel |
18 |
Efficient and secure image encryption using key substitution process with discrete wavelet transform
|
Rehman, Mujeeb Ur |
|
|
35 |
7 |
p. |
artikel |
19 |
Enhancing accessibility for the blind and visually impaired: Presenting semantic information in PDF tables
|
Fayyaz, Nosheen |
|
|
35 |
7 |
p. |
artikel |
20 |
Exploring a radically new exponential Retinex model for multi-task environments
|
Rahman, Ziaur |
|
|
35 |
7 |
p. |
artikel |
21 |
GaitGCN++: Improving GCN-based gait recognition with part-wise attention and DropGraph
|
Hasan, Md. Bakhtiar |
|
|
35 |
7 |
p. |
artikel |
22 |
GCANet: Geometry cues-aware facial expression recognition based on graph convolutional networks
|
Wang, Shutong |
|
|
35 |
7 |
p. |
artikel |
23 |
Graph learning considering dynamic structure and random structure
|
Dong, Haiyao |
|
|
35 |
7 |
p. |
artikel |
24 |
Hierarchical graph-based text classification framework with contextual node embedding and BERT-based dynamic fusion
|
Onan, Aytuğ |
|
|
35 |
7 |
p. |
artikel |
25 |
Hybrid precoding design for secure smart-grid enabled MIMO wireless communications in Industry 5.0
|
Ullah, Kalim |
|
|
35 |
7 |
p. |
artikel |
26 |
Implementation of a steganography system based on hybrid square quaternion moment compression in IoMT
|
Tahiri, Mohamed Amine |
|
|
35 |
7 |
p. |
artikel |
27 |
Integrated deep learning paradigm for document-based sentiment analysis
|
Atandoh, Peter |
|
|
35 |
7 |
p. |
artikel |
28 |
Key nodes identification in complex networks based on subnetwork feature extraction
|
Gao, Luyuan |
|
|
35 |
7 |
p. |
artikel |
29 |
Lattice-based ring signcryption for consortium blockchain
|
Yu, Huifang |
|
|
35 |
7 |
p. |
artikel |
30 |
Machine and Deep Learning-based XSS Detection Approaches: A Systematic Literature Review
|
Thajeel, Isam Kareem |
|
|
35 |
7 |
p. |
artikel |
31 |
Mask Positioner: An effective segmentation algorithm for green fruit in complex environment
|
Lu, Yuqi |
|
|
35 |
7 |
p. |
artikel |
32 |
Mining heuristic evidence sentences for more interpretable document-level relation extraction
|
Zhu, Taojie |
|
|
35 |
7 |
p. |
artikel |
33 |
Monte Carlo-based improved ant colony optimization for path planning of welding robot
|
Wang, Tiancheng |
|
|
35 |
7 |
p. |
artikel |
34 |
Performance analysis in overlay-based cognitive D2D communications in 5G networks
|
Alotaibi, Abdullilah A. |
|
|
35 |
7 |
p. |
artikel |
35 |
PLPose: An efficient framework for detecting power lines via key points-based pose estimation
|
Jaffari, Rabeea |
|
|
35 |
7 |
p. |
artikel |
36 |
S-KMN: Integrating semantic features learning and knowledge mapping network for automatic quiz question annotation
|
Wang, Jing |
|
|
35 |
7 |
p. |
artikel |
37 |
SRL-ACO: A text augmentation framework based on semantic role labeling and ant colony optimization
|
Onan, Aytuğ |
|
|
35 |
7 |
p. |
artikel |
38 |
Study on an autonomous distribution system for smart parks based on parallel system theory against the background of Industry 5.0
|
Ma, Shizi |
|
|
35 |
7 |
p. |
artikel |
39 |
Towards deploying SFC with parallelized VNFs under resource demand uncertainty in mobile edge computing
|
Zhang, Kun |
|
|
35 |
7 |
p. |
artikel |