Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             142 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Achieving energy efficient wireless sensor network by choosing effective cluster head Shalini, V. Baby

22 Suppl 5 p. 7761-7768
artikel
2 A coverage hole detection and repair algorithm in wireless sensor networks Feng, Xin

22 Suppl 5 p. 12473-12480
artikel
3 Adaptive PID controller for cloud smart city system stability control based on chaotic neural network Zhu, Xuebiao

22 Suppl 5 p. 13067-13075
artikel
4 A dynamic clustering based method in community detection Zhang, Rui
2017
22 Suppl 5 p. 5703-5717
artikel
5 Agricultural product monitoring system supported by cloud computing Jinbo, Chen

22 Suppl 5 p. 8929-8938
artikel
6 A hybrid multi-layer intrusion detection system in cloud Manickam, M.
2018
22 Suppl 5 p. 3961-3969
artikel
7 An adaptive fuzzy filter for image denoising Zhang, Weiping

22 Suppl 5 p. 14107-14124
artikel
8 Analysis of Blockchain technology: pros, cons and SWOT Niranjanamurthy, M.

22 Suppl 5 p. 14743-14757
artikel
9 Analysis of intelligent evaluation algorithm based on english diagnostic system Huo, Yanyan

22 Suppl 5 p. 13821-13826
artikel
10 Analysis on key dimension’s measurement error in high speed computing Zhang, Jin
2017
22 Suppl 5 p. 769-779
artikel
11 An early intelligent diagnosis model for drilling overflow based on GA–BP algorithm Liang, Haibo

22 Suppl 5 p. 10649-10668
artikel
12 An efficient personalized trust based hybrid recommendation (TBHR) strategy for e-learning system in cloud computing Bhaskaran, S.
2017
22 Suppl 5 p. 1137-1149
artikel
13 An effiecient human tracking system using Haar-like and hog feature extraction Prasanna, Dinesh
2018
22 Suppl 5 p. 2993-3000
artikel
14 An energy aware competition based clustering for cluster head selection in wireless sensor network with mobility Narendran, M.

22 Suppl 5 p. 11019-11028
artikel
15 A new concept of Cosine similarity measures based on dual hesitant fuzzy sets and its possible applications Zhang, Yutao

22 Suppl 5 p. 15483-15492
artikel
16 An exponent based error detection mechanism against DXDOS attack for improving the security in cloud Vijayalakshmi, J.
2018
22 Suppl 5 p. 3749-3758
artikel
17 Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment Yang, Chen

22 Suppl 5 p. 8309-8317
artikel
18 A novel algorithm for real time task scheduling in multiprocessor environment Josephson, Joel

22 Suppl 5 p. 13761-13771
artikel
19 A novel flip-flop based error free, area efficient and low power pipeline architecture for finite impulse recursive system Krishnamoorthy, Raja

22 Suppl 5 p. 15137-15147
artikel
20 A novel fuzzy scheduler for cell-edge users in LTE-advanced networks using Voronoi algorithm Radhakrishnan, S.

22 Suppl 5 p. 9625-9635
artikel
21 A novel WSNs routing algorithm based on game theory and energy consumption balance Lei, Shi
2018
22 Suppl 5 p. 4271-4276
artikel
22 Application of an intelligent early-warning method based on DBSCAN clustering for drilling overflow accident Haibo, Liang

22 Suppl 5 p. 12599-12608
artikel
23 Application of ARIMA and SVM mixed model in agricultural management under the background of intellectual agriculture Wen, Qing

22 Suppl 5 p. 14349-14358
artikel
24 Application of computerized numerical modeling in multi-state wet wheel hub heat simulations Liu, Sheng
2018
22 Suppl 5 p. 1569-1580
artikel
25 A rough set calibration scheme for energy effective routing protocol in mobile ad hoc networks Sathish Kumar, S.

22 Suppl 5 p. 13957-13963
artikel
26 A smart power saving protocol for IoT with wireless energy harvesting technique Madhurikkha, S.
2018
22 Suppl 5 p. 3313-3324
artikel
27 Async-LCAM: a lock contention aware messenger for Ceph distributed storage system Jeong, Bodon
2018
22 Suppl 5 p. 373-384
artikel
28 Attribute weights-based clustering centres algorithm for initialising K-modes clustering Peng, Liwen
2018
22 Suppl 5 p. 6171-6179
artikel
29 Black hole detection using evolutionary algorithm for IDS/IPS in MANETs Thanuja, R.
2018
22 Suppl 5 p. 3131-3143
artikel
30 Brain image feature recognition method for Alzheimer’s disease He, Xiaoying

22 Suppl 5 p. 8109-8117
artikel
31 Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing Thanga Revathi, S.
2018
22 Suppl 5 p. 3521-3530
artikel
32 Brain tumor detection using optimisation classification based on rough set theory Rajesh, T.

22 Suppl 5 p. 13853-13859
artikel
33 Cause-chain analysis of coal-mine gas explosion accident based on Bayesian network model Li, Xiangong
2018
22 Suppl 5 p. 1549-1557
artikel
34 Cellular planning for next generation wireless mobile network using novel energy efficient CoMP Dastoor, Sarosh K.
2018
22 Suppl 5 p. 4611-4623
artikel
35 Chatbot-based heathcare service with a knowledge base for cloud computing Chung, Kyungyong
2018
22 Suppl 5 p. 1925-1937
artikel
36 Clock node capacity minimization using lookup table based controller for ultrasound and medical imaging processor Titus, T. Joby
2018
22 Suppl 5 p. 4129-4134
artikel
37 Competition and the stepping-stone theory in the broadband access market Jiang, Yanyan
2018
22 Suppl 5 p. 5071-5087
artikel
38 Consensus disturbance rejection with channel uncertainties in directed leader-following network system Cao, Haozhe

22 Suppl 5 p. 14487-14493
artikel
39 Cost-sensitive large margin distribution machine for fault detection of wind turbines Tang, Mingzhu
2018
22 Suppl 5 p. 7525-7537
artikel
40 Design and development of high performance MOS current mode logic (MCML) processor for fast and power efficient computing Pradeep, K. P. Sai

22 Suppl 5 p. 13387-13395
artikel
41 Design of high performance filter bank multi-carrier transmitter Radhika, P.

22 Suppl 5 p. 12521-12527
artikel
42 Detection of denial of service attacks by domination graph application in wireless sensor networks Balaji, S.

22 Suppl 5 p. 15121-15126
artikel
43 Distinguishing investment changes in metro construction project based on a factor space algorithm Wang, Dong

22 Suppl 5 p. 9357-9370
artikel
44 Distributed SVM face recognition based on Hadoop Zhang, Boping
2017
22 Suppl 5 p. 827-834
artikel
45 Driving style estimation by fusing multiple driving behaviors: a case study of freeway in China Ma, Yulin

22 Suppl 5 p. 8259-8269
artikel
46 DSM: a dynamic scheduling method for concurrent workflows in cloud environment Xue, Shengjun
2017
22 Suppl 5 p. 693-706
artikel
47 Efficient computation of the transitive closure size Tang, Xian
2018
22 Suppl 5 p. 6517-6527
artikel
48 Enhanced sentiment labeling and implicit aspect identification by integration of deep convolution neural network and sequential algorithm Feng, Jinzhan
2018
22 Suppl 5 p. 5839-5857
artikel
49 Enhancing 4G Co-existence with Wi-Fi/IoT using cognitive radio Sumathi, A. C.

22 Suppl 5 p. 11295-11305
artikel
50 Evolving neural networks using bird swarm algorithm for data classification and regression applications Aljarah, Ibrahim
2019
22 Suppl 5 p. 1317-1345
artikel
51 Feature selection for software effort estimation with localized neighborhood mutual information Liu, Qin
2018
22 Suppl 5 p. 6953-6961
artikel
52 Forward looking infrared target matching algorithm based on depth learning and matrix double transformation Zeng, Rui
2018
22 Suppl 5 p. 7055-7062
artikel
53 FPGA implementation of modified error normalized LMS adaptive filter for ECG noise removal Venkatesan, C.

22 Suppl 5 p. 12233-12241
artikel
54 Fuzzy based edge enhanced text detection algorithm using MSER Thilagavathy, A.

22 Suppl 5 p. 11681-11687
artikel
55 Fuzzy TOPSIS analytic hierarchy process based cooperative development of cultural soft power YanHong, Wang
2018
22 Suppl 5 p. 4719-4727
artikel
56 Gesture recognition based on binocular vision Jiang, Du

22 Suppl 5 p. 13261-13271
artikel
57 Grey three index prediction method based on data assimilation preprocessing Tian, Zhouyu
2018
22 Suppl 5 p. 4859-4867
artikel
58 Hearing aid speech signal enhancement via N-parallel FIR-multiplying polynomials for Tamil language dialect syllable ripple and transition variation Shanmugaraj, G.
2018
22 Suppl 5 p. 3863-3874
artikel
59 Hierarchical cluster based evaluation system for computer courses Bai, Wei
2018
22 Suppl 5 p. 4135-4140
artikel
60 High performance decoding aware FPGA bit-stream compression using RG codes Satheesh Kumar, J.

22 Suppl 5 p. 15007-15013
artikel
61 High-performance internet file system based on multi-download for convergence computing in mobile communication systems Moon, Youngjun
2018
22 Suppl 5 p. 1057-1071
artikel
62 Identifying key influential parameters of high profile criminals through statistical correlation Wadood, Danish
2017
22 Suppl 5 p. 7135-7148
artikel
63 Improved continuous query plan with cluster weighted dominant querying in synthetic datasets Madhankumar, M.
2017
22 Suppl 5 p. 1239-1246
artikel
64 Improved eigensystem realization algorithm and its application on ocean platforms Xin, Junfeng
2018
22 Suppl 5 p. 3643-3650
artikel
65 Improving image steganalyser performance through curvelet transform denoising Hemalatha, J.

22 Suppl 5 p. 11821-11839
artikel
66 Improving medical diagnosis performance using hybrid feature selection via relieff and entropy based genetic search (RF-EGA) approach: application to breast cancer prediction Sangaiah, Ilangovan
2018
22 Suppl 5 p. 6899-6906
artikel
67 Investigation on application of association rule algorithm in English teaching logistics information Li, Min

22 Suppl 5 p. 13703-13709
artikel
68 Items assignment optimization for complex automated picking Systems Liu, Debao
2017
22 Suppl 5 p. 5787-5797
artikel
69 Lightweight and universal intelligent service platform in indoor environment Wan, Zheng

22 Suppl 5 p. 9187-9198
artikel
70 Load-deflection model for T-section rail press straightening process under lateral loads Song, Y.
2018
22 Suppl 5 p. 2955-2961
artikel
71 Low-level control technology of micro autonomous underwater vehicle based on intelligent computing Zhang, Lanyong

22 Suppl 5 p. 8569-8580
artikel
72 Map-Reduce framework based cluster architecture for academic student’s performance prediction using cumulative dragonfly based neural network VeeraManickam, M. R. M.
2018
22 Suppl 5 p. 1259-1275
artikel
73 Matrix decomposition model for robust based on M estimate and its application Zhang, Zhengyang
2018
22 Suppl 5 p. 4315-4322
artikel
74 Model transformation using logical prediction from sequence diagram: an experimental approach Mythily, M.

22 Suppl 5 p. 12351-12362
artikel
75 M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks Zhang, Zhaohui
2018
22 Suppl 5 p. 7677-7685
artikel
76 Moving average multi directional local features for speaker recognition Mahmood, Awais
2018
22 Suppl 5 p. 2145-2157
artikel
77 Multi-biometric authentication system using finger vein and iris in cloud computing Ilankumaran, S.
2018
22 Suppl 5 p. 103-117
artikel
78 Network-aware energy saving multi-objective optimization in virtualized data centers Al-Tarazi, Motassem
2018
22 Suppl 5 p. 635-647
artikel
79 Novel algorithm for generating basis convex hexagonal polygons and polyhedrons Khan, Mohd. Sherfuddin

22 Suppl 5 p. 14253-14267
artikel
80 Obstacles detection and depth estimation from monocular vision for inspection robot of high voltage transmission line Cheng, Li
2017
22 Suppl 5 p. 2611-2627
artikel
81 On efficient virtual network function chaining in NFV-based telecommunications networks Galdamez, Carlos
2018
22 Suppl 5 p. 693-703
artikel
82 Online customer service quality of online shopping: evidence from Dangdang.com Huang, Zhengwei

22 Suppl 5 p. 15285-15293
artikel
83 Optimized cognitive radio network (CRN) using genetic algorithm and artificial bee colony algorithm Arun, J.
2018
22 Suppl 5 p. 3801-3810
artikel
84 Optimized energy efficient route assigning method using related node discovery algorithm in MANET Aruna, R.
2018
22 Suppl 5 p. 469-479
artikel
85 Optimized neural network for spectrum prediction using genetic algorithm in cognitive radio networks Supraja, P.
2018
22 Suppl 5 p. 157-163
artikel
86 Optimized traffic control and data processing using IoT Kuppusamy, P.
2018
22 Suppl 5 p. 2169-2178
artikel
87 Optimized virtual space vector modulation for three-phase three-level T-type converter Xia, Yan

22 Suppl 5 p. 14679-14687
artikel
88 Pairwise relative ranking technique for efficient opinion mining using sentiment analysis Manivannan, P.

22 Suppl 5 p. 13487-13497
artikel
89 Partial least squares regression analysis to factor of influence for ecological footprint Huang, Zhiqi
2018
22 Suppl 5 p. 6425-6433
artikel
90 Pattern synthesis of a practical conformal hydrophone array via second-order cone programming Liu, Dali

22 Suppl 5 p. 8379-8386
artikel
91 Performance analysis of sub-interleaver based turbo codes Devi, M. Rajani

22 Suppl 5 p. 14091-14097
artikel
92 Performance of adaptive MIMO switching for cognitive MC-CDMA system Leela, S.

22 Suppl 5 p. 7723-7731
artikel
93 Performance of image transmission over MC-CDMA based on super resolution technique Raj, P. T. Vasanth

22 Suppl 5 p. 7943-7951
artikel
94 Personalized information recommendation based on synonymy tag optimization Wei, Jianliang
2017
22 Suppl 5 p. 5467-5478
artikel
95 Physical-traffic attentive vigorous routing (P-TAVR) and hot-spot detection to reduce the bottleneck in WSN Praghash, K.
2018
22 Suppl 5 p. 4201-4212
artikel
96 Product pricing considering the consumer preference based on Internet of Things Pan, Xin-yu

22 Suppl 5 p. 15379-15385
artikel
97 Reconfigurable unique key generation using variable duty cycle PUF Narasimhan, Sivasankari

22 Suppl 5 p. 11339-11349
artikel
98 Reliability improved, high performance FIR filter design using new computation sharing multiplier: suitable for signal processing applications Umadevi, S.

22 Suppl 5 p. 13669-13681
artikel
99 Repeated game analysis of power suppliers based on dynamic coopetition process and slightly altruistic factor Lanxiang, Jiang
2017
22 Suppl 5 p. 4075-4084
artikel
100 Research on data mining of permissions mode for Android malware detection Wang, Chao

22 Suppl 5 p. 13337-13350
artikel
101 Research on discontinuous guidance and hardware-in-the-loop simulation for unmanned underwater vehicle Shao, Zhiyu

22 Suppl 5 p. 7975-7982
artikel
102 Research on subgraph distribution algorithm based on label null model Wang, Zhisong
2017
22 Suppl 5 p. 5521-5533
artikel
103 Research on the thermal network optimization of wet axle based on high performance computing and wireless data transmission Liu, Sheng
2018
22 Suppl 5 p. 1479-1493
artikel
104 RETRACTED ARTICLE: A dynamic clustering based method in community detection Zhang, Rui

22 Suppl 5 p. 5703-5717
artikel
105 RETRACTED ARTICLE: Agricultural product monitoring system supported by cloud computing Jinbo, Chen

22 Suppl 5 p. 8929-8938
artikel
106 RETRACTED ARTICLE: A hybrid multi-layer intrusion detection system in cloud Manickam, M.

22 Suppl 5 p. 3961-3969
artikel
107 RETRACTED ARTICLE: Analysis of intelligent evaluation algorithm based on english diagnostic system Huo, Yanyan

22 Suppl 5 p. 13821-13826
artikel
108 RETRACTED ARTICLE: An effiecient human tracking system using Haar-like and hog feature extraction Prasanna, Dinesh

22 Suppl 5 p. 2993-3000
artikel
109 RETRACTED ARTICLE: Application of ARIMA and SVM mixed model in agricultural management under the background of intellectual agriculture Wen, Qing

22 Suppl 5 p. 14349-14358
artikel
110 RETRACTED ARTICLE: Computer electromagnetic radiation carcinogenic doses based on Monte Carlo algorithm Hou, Haoli

22 Suppl 5 p. 9047
artikel
111 RETRACTED ARTICLE: Investigation on application of association rule algorithm in English teaching logistics information Li, Min

22 Suppl 5 p. 13703-13709
artikel
112 RETRACTED ARTICLE: IoT based industrial safety measures monitoring and reporting system using accident reduction model (ARM) control algorithm Rajmohan, Palanivelu

22 Suppl 5 p. 11259-11269
artikel
113 RETRACTED ARTICLE: The application researches of visualized data mining technique in urban underground space based on GIS Zhang, Fayong

22 Suppl 5 p. 14827-14833
artikel
114 RFTL: improving performance of selective caching-based page-level FTL through replication Mativenga, Ronnie
2018
22 Suppl 5 p. 25-41
artikel
115 Secure and efficient data forwarding in untrusted cloud environment Ramachandran, Balamanigandan
2018
22 Suppl 5 p. 3727-3735
artikel
116 Secure and optimal authentication framework for cloud management using HGAPSO algorithm Selvarani, P.
2018
22 Suppl 5 p. 4007-4016
artikel
117 Secure error-correcting (SEC) schemes for network coding through McEliece cryptosystem Zhang, Guangzhi

22 Suppl 5 p. 11047-11055
artikel
118 Self-healing reconfiguration scheme for distribution network with distributed generations based on multi-agent systems Hongbin, Sun
2017
22 Suppl 5 p. 5293-5303
artikel
119 Semantic feature hierarchical clustering algorithm based on improved regional merging strategy yu-feng, Yao
2018
22 Suppl 5 p. 1495-1503
artikel
120 Sensor fault localization with accumulated residual contribution rate for bridge SHM Li, Lili

22 Suppl 5 p. 7821-7829
artikel
121 Soft computing approaches based bookmark selection and clustering techniques for social tagging systems Tolba, Amr
2018
22 Suppl 5 p. 3183-3189
artikel
122 SORD: a new strategy of online replica deduplication in Cloud-P2P Sun, ShengYao
2018
22 Suppl 5 p. 1-23
artikel
123 Spatial task management method for location privacy aware crowdsourcing Li, Yan
2017
22 Suppl 5 p. 1797-1803
artikel
124 Structure Characteristics Analysis of Diesel Sales in Complex Network Method Zhou, Datong
2017
22 Suppl 5 p. 5635-5645
artikel
125 Study of spectral reflectance reconstruction based on regularization matrix R method Wang, Ke
2017
22 Suppl 5 p. 493-502
artikel
126 Study on safety early warning system of miner’s physiological indexes Jing, Guoxun

22 Suppl 5 p. 9151-9157
artikel
127 Study on the construction and application of discrete space fault tree modified by fuzzy structured element Cui, Tie-Jun
2018
22 Suppl 5 p. 6563-6577
artikel
128 Study on the relationship between system reliability and influencing factors under big data and multi-factors Cui, Tie-Jun

22 Suppl 5 p. 10275-10297
artikel
129 The application researches of visualized data mining technique in urban underground space based on GIS Zhang, Fayong

22 Suppl 5 p. 14827-14833
artikel
130 The first-principle calculation method for thermal structure stability analysis based on the simulation and sensing on cohesive energy Li, Jiahui
2018
22 Suppl 5 p. 6197-6208
artikel
131 The linear regression method of the influencing factors of cultural industry based on the classification of structural data sources Honggang, Cao
2018
22 Suppl 5 p. 6123-6132
artikel
132 The longitudinal analysis of the genetic effects on craniofacial morphology in posterior–anterior and lateral cephalograms of female twins aged from 6 to 12 years Jing, Lv
2018
22 Suppl 5 p. 4957-4969
artikel
133 The research on compensation algorithm of infrared temperature measurement based on intelligent sensors Wei, Shaoliang
2018
22 Suppl 5 p. 6091-6100
artikel
134 Towards data storage in cryptographic systems: an efficient hardware architecture based on multivariate scheme for secure storage applications Yi, Haibo

22 Suppl 5 p. 8639-8646
artikel
135 Towards mobile cloud authentication and gait based security using time warping technique Merlin, S. Sengole

22 Suppl 5 p. 10595-10604
artikel
136 Towards optimal resource provisioning for Hadoop-MapReduce jobs using scale-out strategy and its performance analysis in private cloud environment Ramanathan, Ramakrishnan

22 Suppl 5 p. 14061-14071
artikel
137 Tsallis entropy: as a new single feature with the least computation time for classification of epileptic seizures Thilagaraj, M.

22 Suppl 5 p. 15213-15221
artikel
138 Turtle edge encoding and flood fill based image compression scheme Arockia Raj, Y.
2018
22 Suppl 5 p. 361-377
artikel
139 Validation of multicast routing in cyber physical systems monitoring air quality Amuthadevi, C.
2018
22 Suppl 5 p. 3917-3923
artikel
140 Virtual reality technology applied in digitalization of cultural heritage Donghui, Cao

22 Suppl 5 p. 10063-10074
artikel
141 Word recommendation for English composition using big corpus data processing Lee, Keon Myung
2018
22 Suppl 5 p. 1911-1924
artikel
142 W-Scheduler: whale optimization for task scheduling in cloud computing Sreenu, Karnam
2017
22 Suppl 5 p. 1087-1098
artikel
                             142 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland