nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An inception V3 approach for malware classification using machine learning and transfer learning
|
Ahmed, Mumtaz |
|
|
4 |
C |
p. 11-18 |
artikel |
2 |
An optimized framework for VANET routing: A multi-objective hybrid model for data synchronization with digital twin
|
Badole, Madhuri Husan |
|
|
4 |
C |
p. 272-282 |
artikel |
3 |
A novel deep neural network heartbeats classifier for heart health monitoring
|
Sindhu, Velagapudi Swapna |
|
|
4 |
C |
p. 1-10 |
artikel |
4 |
A novel heterogenous ensemble theory for symmetric 5G cells segmentation: Intelligent RAN analytics
|
Dahj, Jean Nestor M. |
|
|
4 |
C |
p. 310-324 |
artikel |
5 |
Application of spatial data and 3S robotic technology in digital city planning
|
Chang, Yunyan |
|
|
4 |
C |
p. 211-217 |
artikel |
6 |
ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach
|
Krishna Kishore, P. |
|
|
4 |
C |
p. 38-45 |
artikel |
7 |
A systematic review of decentralized finance protocols
|
Shah, Kaushal |
|
|
4 |
C |
p. 171-181 |
artikel |
8 |
A systematic review on early prediction of Mild cognitive impairment to alzheimers using machine learning algorithms
|
Muhammed Niyas, K.P. |
|
|
4 |
C |
p. 74-88 |
artikel |
9 |
Cache controlled cluster networking protocol
|
Sunhare, Priyank |
|
|
4 |
C |
p. 182-192 |
artikel |
10 |
Classification of network slicing threats based on slicing enablers: A survey
|
Abood, Mohammad J.K. |
|
|
4 |
C |
p. 103-112 |
artikel |
11 |
Conversational chat system using attention mechanism for COVID-19 inquiries
|
Xin Hui, Wang |
|
|
4 |
C |
p. 140-144 |
artikel |
12 |
Covertvasion: Depicting threats through covert channels based novel evasive attacks in android
|
Gautam, Sunil |
|
|
4 |
C |
p. 337-348 |
artikel |
13 |
Customer churning analysis using machine learning algorithms
|
Prabadevi, B. |
|
|
4 |
C |
p. 145-154 |
artikel |
14 |
Efficient breast cancer detection via cascade deep learning network
|
Asadi, Bita |
|
|
4 |
C |
p. 46-52 |
artikel |
15 |
Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique
|
Kousalya, A. |
|
|
4 |
C |
p. 62-67 |
artikel |
16 |
Enhancing vulnerability scoring for information security in intelligent computers
|
Zhu, Qingkun |
|
|
4 |
C |
p. 253-260 |
artikel |
17 |
Erratum regarding previously published articles
|
|
|
|
4 |
C |
p. 89 |
artikel |
18 |
Face expression image detection and recognition based on big data technology
|
Deng, Shuji |
|
|
4 |
C |
p. 218-223 |
artikel |
19 |
Fairness-driven link scheduling approach for heterogeneous gateways for digital twin enabled industry 4.0
|
Patil, Suvarna |
|
|
4 |
C |
p. 162-170 |
artikel |
20 |
Genetic algorithm with self adaptive immigrants for effective virtual machine placement in cloud environment
|
Karthikeyan, P. |
|
|
4 |
C |
p. 155-161 |
artikel |
21 |
Hierarchical energy efficient secure routing protocol for optimal route selection in wireless body area networks
|
Roshini, A. |
|
|
4 |
C |
p. 19-28 |
artikel |
22 |
HNTSumm: Hybrid text summarization of transliterated news articles
|
Muniraj, Padhma |
|
|
4 |
C |
p. 53-61 |
artikel |
23 |
Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud
|
Mageshkumar, Nagappan |
|
|
4 |
C |
p. 301-309 |
artikel |
24 |
Intelligent personalized content recommendations based on neural networks
|
Zhou, HeQiang |
|
|
4 |
C |
p. 231-239 |
artikel |
25 |
Intelligent prediction method for power generation based on deep learning and cloud computing in big data networks
|
Zhou, Zhaolong |
|
|
4 |
C |
p. 224-230 |
artikel |
26 |
Localization for V2X communication with noisy distance measurement
|
Javed, Iram |
|
|
4 |
C |
p. 355-360 |
artikel |
27 |
Marketing data security and privacy protection based on federated gamma in cloud computing environment
|
Zhang, Caixia |
|
|
4 |
C |
p. 261-271 |
artikel |
28 |
Multi-sensor based strategy learning with deep reinforcement learning for unmanned ground vehicle
|
Luo, Mingyu |
|
|
4 |
C |
p. 325-336 |
artikel |
29 |
PARouting: Prediction-supported adaptive routing protocol for FANETs with deep reinforcement learning
|
Liu, Cunzhuang |
|
|
4 |
C |
p. 113-121 |
artikel |
30 |
Prediction of floods using improved PCA with one-dimensional convolutional neural network
|
John, Tegil J. |
|
|
4 |
C |
p. 122-129 |
artikel |
31 |
Priority based k -coverage hole restoration and m -connectivity using whale optimization scheme for underwater wireless sensor networks
|
Kumari, Sangeeta |
|
|
4 |
C |
p. 240-252 |
artikel |
32 |
Proposed artificial intelligence algorithm and deep learning techniques for development of higher education
|
Al Ka'bi, Amin |
|
|
4 |
C |
p. 68-73 |
artikel |
33 |
Quadratic ensemble weighted emphasis boosting based energy and bandwidth efficient routing in Underwater Sensor Network
|
Vidhya, O. |
|
|
4 |
C |
p. 130-139 |
artikel |
34 |
Research on the impact of artificial intelligence-based e-commerce personalization on traditional accounting methods
|
Cao, Pan |
|
|
4 |
C |
p. 193-201 |
artikel |
35 |
Roadside sensor network deployment based on vehicle-infrastructure cooperative intelligent driving
|
An, Xin |
|
|
4 |
C |
p. 283-300 |
artikel |
36 |
Secure short-packet communications using a full-duplex receiver
|
Chen, Dechuan |
|
|
4 |
C |
p. 349-354 |
artikel |
37 |
Solar irradiance forecasting models using machine learning techniques and digital twin: A case study with comparison
|
Sehrawat, Neha |
|
|
4 |
C |
p. 90-102 |
artikel |
38 |
Three-stage data generation algorithm for multiclass network intrusion detection with highly imbalanced dataset
|
Chui, Kwok Tai |
|
|
4 |
C |
p. 202-210 |
artikel |
39 |
Unsupervised machine learning technique for classifying production zones in unconventional reservoirs
|
Abbas, Karrar A. |
|
|
4 |
C |
p. 29-37 |
artikel |