nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparative evaluation of intrusion detection systems on the edge-IIoT-2022 dataset
|
Al Nuaimi, Taraf |
|
|
20 |
C |
p. |
artikel |
2 |
A deep learning model for cotton disease prediction using fine-tuning with smart web application in agriculture
|
Islam, Md. Manowarul |
|
|
20 |
C |
p. |
artikel |
3 |
Advancements in end-to-end isolated Kannada ASR system by combining robust noise elimination technique and TDNN
|
Thimmaraja, Yadava G. |
|
|
20 |
C |
p. |
artikel |
4 |
Analysis of the application of path finding system based on efficiency improvement in smart tourism
|
Liu, Shuping |
|
|
20 |
C |
p. |
artikel |
5 |
An innovative model fusion algorithm to improve the recall rate of peer-to-peer lending default customers
|
Liu, Zhida |
|
|
20 |
C |
p. |
artikel |
6 |
Anti-drone systems: An attention based improved YOLOv7 model for a real-time detection and identification of multi-airborne target
|
Yasmine, Ghazlane |
|
|
20 |
C |
p. |
artikel |
7 |
Apache Flink and clustering-based framework for fast anonymization of IoT stream data
|
Sadeghi-Nasab, Alireza |
|
|
20 |
C |
p. |
artikel |
8 |
Application of deep reinforcement learning in asset liability management
|
Wekwete, Takura Asael |
|
|
20 |
C |
p. |
artikel |
9 |
A survey on traffic flow prediction and classification
|
Gomes, Bernardo |
|
|
20 |
C |
p. |
artikel |
10 |
Automated invoice processing: Machine learning-based information extraction for long tail suppliers
|
Krieger, Felix |
|
|
20 |
C |
p. |
artikel |
11 |
Chinese corporate fraud risk assessment with machine learning
|
Lu, Qingyang |
|
|
20 |
C |
p. |
artikel |
12 |
Combining low-code development with ChatGPT to novel no-code approaches: A focus-group study
|
Martins, José |
|
|
20 |
C |
p. |
artikel |
13 |
Development of a novel robot-assisted vocabulary learning system using pure synthetic data
|
Aung, Zaw Htet |
|
|
20 |
C |
p. |
artikel |
14 |
DSG-GAN: Multi-turn text-to-image synthesis via dual semantic-stream guidance with global and local linguistics
|
Sun, Heyu |
|
|
20 |
C |
p. |
artikel |
15 |
Efficient deep learning models based on tension techniques for sign language recognition
|
Attia, Nehal F. |
|
|
20 |
C |
p. |
artikel |
16 |
Enhancements in encoded noisy speech data by background noise reduction
|
Thimmaraja, Yadava G. |
|
|
20 |
C |
p. |
artikel |
17 |
Evaluation model and algorithm optimization of intelligent manufacturing system on the basis of BP neural network
|
Tian, Wei |
|
|
20 |
C |
p. |
artikel |
18 |
Exploring the application of teaching evaluation models incorporating association rules and weighted naive Bayesian algorithms
|
Gu, Yurong |
|
|
20 |
C |
p. |
artikel |
19 |
Exploring topic models to discern cyber threats on Twitter: A case study on Log4Shell
|
Wang, Yue |
|
|
20 |
C |
p. |
artikel |
20 |
Improving the quality of service indices of task allocation in mobile crowd sensing with fuzzy-based inverse stackelberg game theory
|
Vahedi, Zohreh |
|
|
20 |
C |
p. |
artikel |
21 |
Investigation of deep learning for whitefly identification in coconut tree leaves
|
Kavithamani, V. |
|
|
20 |
C |
p. |
artikel |
22 |
Liquefaction susceptibility using machine learning based on SPT data
|
Kumar, Divesh Ranjan |
|
|
20 |
C |
p. |
artikel |
23 |
MalHyStack: A hybrid stacked ensemble learning framework with feature engineering schemes for obfuscated malware analysis
|
Roy, Kowshik Sankar |
|
|
20 |
C |
p. |
artikel |
24 |
MultiResEdge: A deep learning-based edge detection approach
|
Muntarina, Kanija |
|
|
20 |
C |
p. |
artikel |
25 |
Optimization of perishable agricultural products logistics distribution path based on IACO-time window constraint
|
Miao, Xiaohong |
|
|
20 |
C |
p. |
artikel |
26 |
Overhead object projector: OverProjNet
|
Hatipoglu, Poyraz Umut |
|
|
20 |
C |
p. |
artikel |
27 |
Pixel-level image analysis to derive the broncho-artery (BA) ratio employing HRCT scans: A computer-aided approach
|
Azam, Sami |
|
|
20 |
C |
p. |
artikel |
28 |
Robustness-Eva-MRC: Assessing and analyzing the robustness of neural models in extractive machine reading comprehension
|
Fang, Jingliang |
|
|
20 |
C |
p. |
artikel |
29 |
Similarity index of the STFT-based health diagnosis of variable speed rotating machines
|
Ahsan, Muhammad |
|
|
20 |
C |
p. |
artikel |
30 |
Skin cancer classification using explainable artificial intelligence on pre-extracted image features
|
Khater, Tarek |
|
|
20 |
C |
p. |
artikel |
31 |
Soft prompt enhanced joint learning for cross-domain aspect-based sentiment analysis
|
Shi, Jingli |
|
|
20 |
C |
p. |
artikel |
32 |
Special issue on technology assisted review systems
|
Nunzio, Giorgio Maria Di |
|
|
20 |
C |
p. |
artikel |
33 |
Speech emotion recognition using machine learning — A systematic review
|
Madanian, Samaneh |
|
|
20 |
C |
p. |
artikel |
34 |
The application of HMM algorithm based music note feature recognition teaching in universities
|
Chen, Yunli |
|
|
20 |
C |
p. |
artikel |
35 |
The assessment model of online vocal music teaching quality under the optimized DL model
|
Guo, Yuwei |
|
|
20 |
C |
p. |
artikel |