nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive framework for hand gesture recognition using hybrid-metaheuristic algorithms and deep learning models
|
Mohyuddin, Hassan |
|
|
19 |
C |
p. |
artikel |
2 |
A data security and privacy scheme for user quality of experience in a Mobile Edge Computing-based network
|
Foko Sindjoung, Miguel Landry |
|
|
19 |
C |
p. |
artikel |
3 |
Affective state prediction of E-learner using SS-ROA based deep LSTM
|
Rathi, Snehal |
|
|
19 |
C |
p. |
artikel |
4 |
A hybrid recommendation scheme for delay-tolerant networks: The case of digital marketplaces
|
Romero II, Victor M. |
|
|
19 |
C |
p. |
artikel |
5 |
An effective stacked autoencoder based depth separable convolutional neural network model for face mask detection
|
Balasubaramanian, Sundaravadivazhagan |
|
|
19 |
C |
p. |
artikel |
6 |
An optimized hybrid methodology for non-invasive fetal electrocardiogram signal extraction and monitoring
|
Lampros, Theodoros |
|
|
19 |
C |
p. |
artikel |
7 |
A novel lossy image compression algorithm using multi-models stacked AutoEncoders
|
Fraihat, Salam |
|
|
19 |
C |
p. |
artikel |
8 |
A real-time application-based convolutional neural network approach for tomato leaf disease classification
|
Paul, Showmick Guha |
|
|
19 |
C |
p. |
artikel |
9 |
Bleeding alert map (BAM): The identification method of the bleeding source in real organs using datasets made on mimicking organs
|
Sogabe, Maina |
|
|
19 |
C |
p. |
artikel |
10 |
Capturing low-rate DDoS attack based on MQTT protocol in software Defined-IoT environment
|
Al-Fayoumi, Mustafa |
|
|
19 |
C |
p. |
artikel |
11 |
2D and 3D object detection algorithms from images: A Survey
|
Chen, Wei |
|
|
19 |
C |
p. |
artikel |
12 |
Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directions
|
Yao, Aiting |
|
|
19 |
C |
p. |
artikel |
13 |
Ensuring network security with a robust intrusion detection system using ensemble-based machine learning
|
Hossain, Md. Alamgir |
|
|
19 |
C |
p. |
artikel |
14 |
Fault detection and state estimation in robotic automatic control using machine learning
|
Natarajan, Rajesh |
|
|
19 |
C |
p. |
artikel |
15 |
Forecasting students' adaptability in online entrepreneurship education using modified ensemble machine learning model
|
Malik, Amit |
|
|
19 |
C |
p. |
artikel |
16 |
Hybrid weakly supervised learning with deep learning technique for detection of fake news from cyber propaganda
|
Syed, Liyakathunisa |
|
|
19 |
C |
p. |
artikel |
17 |
Kororā: A secure live virtual machine job migration framework for cloud systems integrity
|
Deylami, Hanif |
|
|
19 |
C |
p. |
artikel |
18 |
Multiple robust approaches for EEG-based driving fatigue detection and classification
|
Prabhakar, Sunil Kumar |
|
|
19 |
C |
p. |
artikel |
19 |
Occlusion and multi-scale pedestrian detection A review
|
Chen, Wei |
|
|
19 |
C |
p. |
artikel |
20 |
Optimal inventory system for deteriorated goods with time-varying demand rate function and advertisement cost
|
Saranya, Palanivelu |
|
|
19 |
C |
p. |
artikel |
21 |
Optimizing student engagement in edge-based online learning with advanced analytics
|
Abdulkader, Rasheed |
|
|
19 |
C |
p. |
artikel |
22 |
Performance evaluation on work-stealing featured parallel programs on asymmetric performance multicore processors
|
Adnan, |
|
|
19 |
C |
p. |
artikel |
23 |
ResneSt-Transformer: Joint attention segmentation-free for end-to-end handwriting paragraph recognition model
|
Hamdan, Mohammed |
|
|
19 |
C |
p. |
artikel |
24 |
SSFuzzyART: A Semi-Supervised Fuzzy ART through seeding initialization and a clustered data generation algorithm to deeply study clustering solutions
|
Jendoubi, Siwar |
|
|
19 |
C |
p. |
artikel |
25 |
The study of the hyper-parameter modelling the decision rule of the cautious classifiers based on the F β measure
|
Imoussaten, Abdelhak |
|
|
19 |
C |
p. |
artikel |