nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analyzing the public sentiment on COVID-19 vaccination in social media: Bangladesh context
|
Zulfiker, Md. Sabab |
|
|
15 |
C |
p. |
artikel |
2 |
An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks
|
Sallal, Muntadher |
|
|
15 |
C |
p. |
artikel |
3 |
An improved probability propagation algorithm for density peak clustering based on natural nearest neighborhood
|
Zuo, Wendi |
|
|
15 |
C |
p. |
artikel |
4 |
A parameter-free graph reduction for spectral clustering and SpectralNet
|
Alshammari, Mashaan |
|
|
15 |
C |
p. |
artikel |
5 |
Application of Artificial Immune Systems in Advanced Manufacturing
|
Pinto, Rui |
|
|
15 |
C |
p. |
artikel |
6 |
A robust and secure watermarking algorithm based on DWT and SVD in the fractional order fourier transform domain
|
Tang, Ming |
|
|
15 |
C |
p. |
artikel |
7 |
Bayesian optimization of distributed neurodynamical controller models for spatial navigation
|
Hadzic, Armin |
|
|
15 |
C |
p. |
artikel |
8 |
BLPnet: A new DNN model and Bengali OCR engine for Automatic Licence Plate Recognition
|
Onim, Md. Saif Hassan |
|
|
15 |
C |
p. |
artikel |
9 |
CE-Fed: Communication efficient multi-party computation enabled federated learning
|
Kanagavelu, Renuga |
|
|
15 |
C |
p. |
artikel |
10 |
Classifying jobs towards power-aware HPC system operation through long-term log analysis
|
Tsujita, Yuichi |
|
|
15 |
C |
p. |
artikel |
11 |
Decision trees for regular factorial languages
|
Moshkov, Mikhail |
|
|
15 |
C |
p. |
artikel |
12 |
Deep reinforcement learning for gearshift controllers in automatic transmissions
|
Gaiselmann, Gerd |
|
|
15 |
C |
p. |
artikel |
13 |
Distributed denial of service attack detection in E-government cloud via data clustering
|
Abdullayeva, Fargana J. |
|
|
15 |
C |
p. |
artikel |
14 |
Efficient alignment-based average delay time estimation in fluctuating delayed propagation
|
Nakamura, Atsuyoshi |
|
|
15 |
C |
p. |
artikel |
15 |
Eye tracking technologies to visualize secure coding behavior
|
Davis, Daniel Kyle |
|
|
15 |
C |
p. |
artikel |
16 |
How statistical modeling and machine learning could help in the calibration of numerical simulation and fluid mechanics models? Application to the calibration of models reproducing the vibratory behavior of an overhead line conductor
|
Amroun, Hamdi |
|
|
15 |
C |
p. |
artikel |
17 |
Improved Deep Multi-Patch Hierarchical Network For Handling Saturation In Image Deblurring
|
B.M., Mahendra |
|
|
15 |
C |
p. |
artikel |
18 |
Learning to rank method combining multi-head self-attention with conditional generative adversarial nets
|
Li, Jinzhong |
|
|
15 |
C |
p. |
artikel |
19 |
Maximization influence in dynamic social networks and graphs
|
Smani, Gkolfo I. |
|
|
15 |
C |
p. |
artikel |
20 |
Mechanisms and techniques to enhance the security of big data analytic framework with MongoDB and Linux Containers
|
Mailewa, Akalanka |
|
|
15 |
C |
p. |
artikel |
21 |
Natural language model for automatic identification of Intimate Partner Violence reports from Twitter
|
Al-Garadi, Mohammed Ali |
|
|
15 |
C |
p. |
artikel |
22 |
Node co-activations as a means of error detection—Towards fault-tolerant neural networks
|
Myllyaho, Lalli |
|
|
15 |
C |
p. |
artikel |
23 |
Novel group handover mechanism for Cooperative and Coordinated Mobile Femtocells technology in railway environment
|
Raheem, Rand |
|
|
15 |
C |
p. |
artikel |
24 |
Performance evaluation of a portable single-board computer as a 3-tiered LAMP stack under 32-bit and 64-bit Operating Systems
|
Dhuny, Riyad |
|
|
15 |
C |
p. |
artikel |
25 |
Post-quantum cryptography Algorithm's standardization and performance analysis
|
Kumar, Manish |
|
|
15 |
C |
p. |
artikel |
26 |
Quantum advantage on proof of work
|
Bard, Dan A. |
|
|
15 |
C |
p. |
artikel |
27 |
Recognition of road cracks based on multi-scale Retinex fused with wavelet transform
|
Liu, Shenao |
|
|
15 |
C |
p. |
artikel |
28 |
Remodelling correlation: A fault resilient technique of correlation sensitive stochastic designs
|
Mitra, Shyamali |
|
|
15 |
C |
p. |
artikel |
29 |
Research on multi-factory combination optimization based on DOSTAR
|
Chen, Sen |
|
|
15 |
C |
p. |
artikel |
30 |
Road scene classification based on street-level images and spatial data
|
Prykhodchenko, Roman |
|
|
15 |
C |
p. |
artikel |
31 |
Selection of unlabeled source domains for domain adaptation in remote sensing
|
Geiß, Christian |
|
|
15 |
C |
p. |
artikel |
32 |
Spatio-temporal aggregation of skeletal motion features for human motion prediction
|
Ueda, Itsuki |
|
|
15 |
C |
p. |
artikel |
33 |
Stochastic recognition of human daily activities via hybrid descriptors and random forest using wearable sensors
|
Halim, Nurkholish |
|
|
15 |
C |
p. |
artikel |
34 |
Tablext: A combined neural network and heuristic based table extractor
|
Colter, Zach |
|
|
15 |
C |
p. |
artikel |
35 |
Terminal independent security token derivation scheme for ultra-dense IoT networks
|
Nyangaresi, Vincent Omollo |
|
|
15 |
C |
p. |
artikel |
36 |
Towards automatic discovery and assessment of vulnerability severity in cyber–physical systems
|
Jiang, Yuning |
|
|
15 |
C |
p. |
artikel |
37 |
Using textual bug reports to predict the fault category of software bugs
|
Hirsch, Thomas |
|
|
15 |
C |
p. |
artikel |
38 |
Visual SLAM algorithms and their application for AR, mapping, localization and wayfinding
|
Theodorou, Charalambos |
|
|
15 |
C |
p. |
artikel |