nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A hybrid approach to secure and compress data streams in cloud computing environment
|
A.Abdo, |
|
|
36 |
3 |
p. |
artikel |
2 |
A novel tree structure-based multi-prototype clustering algorithm
|
Li, Tao |
|
|
36 |
3 |
p. |
artikel |
3 |
Artificial intelligence techniques in financial trading: A systematic literature review
|
Dakalbab, Fatima |
|
|
36 |
3 |
p. |
artikel |
4 |
Bengali handwritten equation solving system
|
Das, Utpol Kanti |
|
|
36 |
3 |
p. |
artikel |
5 |
Blockchain-based CP-ABE data sharing and privacy-preserving scheme using distributed KMS and zero-knowledge proof
|
Ren, Zhixin |
|
|
36 |
3 |
p. |
artikel |
6 |
Cloud center energy consumption control for predictability in neural fuzzy systems
|
Yan, Meng |
|
|
36 |
3 |
p. |
artikel |
7 |
EEG-based depression recognition using feature selection method with fuzzy label
|
Li, Yalin |
|
|
36 |
3 |
p. |
artikel |
8 |
Encoder–decoder graph neural network for credit card fraud detection
|
Cherif, Asma |
|
|
36 |
3 |
p. |
artikel |
9 |
Enhanced backoff mechanism for uplink OFDMA in Wireless Local Area Network
|
Khan, Muhammad Ishaque |
|
|
36 |
3 |
p. |
artikel |
10 |
EOSA-Net: A deep learning framework for enhanced multi-class skin cancer classification using optimized convolutional neural networks
|
Thanga Purni, J.S. |
|
|
36 |
3 |
p. |
artikel |
11 |
Harnessing the advances of MEDA to optimize multi-PUF for enhancing IP security of biochips
|
Dong, Chen |
|
|
36 |
3 |
p. |
artikel |
12 |
IDaPS — Improved data-locality aware data placement strategy based on Markov clustering to enhance MapReduce performance on Hadoop
|
Vengadeswaran, S. |
|
|
36 |
3 |
p. |
artikel |
13 |
Improving the efficiency of network controllability processes on temporal networks
|
Li, Fang |
|
|
36 |
3 |
p. |
artikel |
14 |
Punctuation and lexicon aid representation: A hybrid model for short text sentiment analysis on social media platform
|
Li, Zhenyu |
|
|
36 |
3 |
p. |
artikel |
15 |
Quantum-enhanced Chaotic Image Encryption: Strengthening Digital Data Security With 1-D Sine-based Chaotic Maps and Quantum Coding
|
Rehman, Mujeeb Ur |
|
|
36 |
3 |
p. |
artikel |
16 |
RDPGNet: A road extraction network with dual-view information perception based on GCN
|
Liu, Guanghui |
|
|
36 |
3 |
p. |
artikel |
17 |
Reliable paths prediction with intelligent data plane monitoring enabled reinforcement learning in SD-IoT
|
Jisi, Chandroth |
|
|
36 |
3 |
p. |
artikel |
18 |
Resource allocation strategy based on service function Chaining in Multi-Access edge computing network
|
Zhang, Xiaobo |
|
|
36 |
3 |
p. |
artikel |
19 |
RIS-NOMA-assisted short-packet communication with direct links
|
Tran, Huu Q. |
|
|
36 |
3 |
p. |
artikel |
20 |
RRFL: A rational and reliable federated learning incentive framework for mobile crowdsensing
|
He, Qingyi |
|
|
36 |
3 |
p. |
artikel |
21 |
SDE-based software reliability additive models with masked data using ELS algorithm
|
Yang, Jianfeng |
|
|
36 |
3 |
p. |
artikel |
22 |
Security issues in visual cryptography scheme with known random number sequence
|
Fu, Zhengxin |
|
|
36 |
3 |
p. |
artikel |
23 |
Semi-supervised community detection method based on generative adversarial networks
|
Liu, Xiaoyang |
|
|
36 |
3 |
p. |
artikel |
24 |
Sound to expression: Using emotional sound to guide facial expression editing
|
Liu, Wenjin |
|
|
36 |
3 |
p. |
artikel |
25 |
SRSegNet: Super-resolution-assisted small targets polyp segmentation network with combined high and low resolution
|
Fan, Puyin |
|
|
36 |
3 |
p. |
artikel |
26 |
Transfer learning model for cash-instrument prediction adopting a Transformer derivative
|
Feng, Ling |
|
|
36 |
3 |
p. |
artikel |
27 |
Vision-inertial collaborative localization of multi-agents with remote interaction
|
Liu, Chang |
|
|
36 |
3 |
p. |
artikel |