nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A bio-inspired leader election protocol for cognitive radio networks
|
Murmu, Mahendra Kumar |
|
2018 |
22 |
supplement-1 |
p. 1665-1678 |
artikel |
2 |
Accurate detection of user interest data in cloud computing environment
|
Yu, Qiang |
|
2017 |
22 |
supplement-1 |
p. 1169-1178 |
artikel |
3 |
A cloud-based virtual caregiver for elderly people in a cyber physical IoT system
|
Rahman, Md. Abdur |
|
2018 |
22 |
supplement-1 |
p. 2317-2330 |
artikel |
4 |
A cloud system model employing random space vector pulse width modulation for noise reduction in VSI fed induction motor
|
Mohan Das, R. |
|
2018 |
22 |
supplement-1 |
p. 347-360 |
artikel |
5 |
A distributed IDS architecture model for Smart Home systems
|
Gajewski, Mariusz |
|
2017 |
22 |
supplement-1 |
p. 1739-1749 |
artikel |
6 |
A distributed incremental information acquisition model for large-scale text data
|
Sun, Shengtao |
|
2017 |
22 |
supplement-1 |
p. 2383-2394 |
artikel |
7 |
A FCM cluster: cloud networking model for intelligent transportation in the city of Macau
|
Cai, Zhiming |
|
2017 |
22 |
supplement-1 |
p. 1219-1228 |
artikel |
8 |
A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environment
|
Ren, Yongjun |
|
2018 |
22 |
supplement-1 |
p. 1805-1814 |
artikel |
9 |
A hybrid technique for gender classification with SLBP and HOG features
|
Annalakshmi, M. |
|
2018 |
22 |
supplement-1 |
p. 11-20 |
artikel |
10 |
A localization and tracking scheme for target gangs based on big data of Wi-Fi locations
|
Zhao, Fan |
|
2018 |
22 |
supplement-1 |
p. 1679-1690 |
artikel |
11 |
A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs
|
Wang, Jin |
|
2017 |
22 |
supplement-1 |
p. 1787-1795 |
artikel |
12 |
A mutual refinement technique for big data retrieval using hash tag graph
|
Prasanth, T. |
|
2017 |
22 |
supplement-1 |
p. 2027-2037 |
artikel |
13 |
Analysis on key dimension’s measurement error in high speed computing
|
Zhang, Jin |
|
2017 |
22 |
supplement-1 |
p. 769-779 |
artikel |
14 |
Analyzing and visualizing comprehensive and personalized online product reviews
|
Kim, Jooyoung |
|
2018 |
22 |
supplement-1 |
p. 2115-2128 |
artikel |
15 |
An augmented approach for pseudo-free groups in smart cyber-physical system
|
Kumar, M. V. Ranjith |
|
2018 |
22 |
supplement-1 |
p. 673-692 |
artikel |
16 |
An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology
|
Almogren, Ahmad |
|
2018 |
22 |
supplement-1 |
p. 2309-2316 |
artikel |
17 |
An effective pose invariant face recognition system with the aid of ABC optimized ANFIS
|
Anantha Padmanabhan, S. |
|
2018 |
22 |
supplement-1 |
p. 177-187 |
artikel |
18 |
An effective task scheduling algorithm based on dynamic energy management and efficient resource utilization in green cloud computing environment
|
Lu, Yong |
|
2017 |
22 |
supplement-1 |
p. 513-520 |
artikel |
19 |
An efficient categorization of liver cirrhosis using convolution neural networks for health informatics
|
Suganya, R. |
|
2017 |
22 |
supplement-1 |
p. 47-56 |
artikel |
20 |
An efficient DDoS detection based on SU-Genetic feature selection
|
Wang, Chundong |
|
2018 |
22 |
supplement-1 |
p. 2505-2515 |
artikel |
21 |
An efficient personalized trust based hybrid recommendation (TBHR) strategy for e-learning system in cloud computing
|
Bhaskaran, S. |
|
2017 |
22 |
supplement-1 |
p. 1137-1149 |
artikel |
22 |
An efficient scheduling multimedia transcoding method for DASH streaming in cloud environment
|
Ma, Linh Van |
|
2017 |
22 |
supplement-1 |
p. 1043-1053 |
artikel |
23 |
An empirical study on the influential factors affecting continuous usage of mobile cloud service
|
Park, Seong-Taek |
|
2017 |
22 |
supplement-1 |
p. 1873-1887 |
artikel |
24 |
A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services
|
Elmisery, Ahmed M. |
|
2017 |
22 |
supplement-1 |
p. 1611-1638 |
artikel |
25 |
A new DOA estimation algorithm based on compressed sensing
|
Yong, Zhang |
|
2018 |
22 |
supplement-1 |
p. 895-903 |
artikel |
26 |
A new GLoSM embedded virtual machine model for big data services in cloud storage systems
|
Kalai Arasan, K. |
|
2018 |
22 |
supplement-1 |
p. 399-405 |
artikel |
27 |
A new recommendation algorithm combined with spectral clustering and transfer learning
|
Li, Xiang |
|
2017 |
22 |
supplement-1 |
p. 1151-1167 |
artikel |
28 |
An improved anonymous authentication scheme for distributed mobile cloud computing services
|
Chaudhry, Shehzad Ashraf |
|
2017 |
22 |
supplement-1 |
p. 1595-1609 |
artikel |
29 |
An improved model based on genetic algorithm for detecting intrusion in mobile ad hoc network
|
Bharathisindhu, P. |
|
2018 |
22 |
supplement-1 |
p. 265-275 |
artikel |
30 |
An iterative sampling method for online aggregation
|
Zhang, Zhiqiang |
|
2017 |
22 |
supplement-1 |
p. 2471-2484 |
artikel |
31 |
Anomaly detection model based on data stream clustering
|
Yin, Chunyong |
|
2017 |
22 |
supplement-1 |
p. 1729-1738 |
artikel |
32 |
Anonymous and formally verified dual signature based online e-voting protocol
|
Saqib, Malik Najmus |
|
2018 |
22 |
supplement-1 |
p. 1703-1716 |
artikel |
33 |
An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment
|
Manasrah, Ahmad M. |
|
2017 |
22 |
supplement-1 |
p. 1639-1653 |
artikel |
34 |
A novel disk I/O scheduling framework of virtualized storage system
|
Li, Dingding |
|
2018 |
22 |
supplement-1 |
p. 2395-2405 |
artikel |
35 |
A novel improved deep convolutional neural network model for medical image fusion
|
Xia, Kai-jian |
|
2018 |
22 |
supplement-1 |
p. 1515-1527 |
artikel |
36 |
A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing
|
Thillaiarasu, N. |
|
2017 |
22 |
supplement-1 |
p. 1179-1188 |
artikel |
37 |
A novel SMLR-PSO model to estimate the chlorophyll content in the crops using hyperspectral satellite images
|
Nandibewoor, Archana |
|
2018 |
22 |
supplement-1 |
p. 443-450 |
artikel |
38 |
Anti load disturbance method for AC servo motor power system
|
Lv, Haoliang |
|
2018 |
22 |
supplement-1 |
p. 2273-2283 |
artikel |
39 |
A parameter based growing ensemble of self-organizing maps for outlier detection in healthcare
|
Elmougy, Samir |
|
2017 |
22 |
supplement-1 |
p. 2437-2460 |
artikel |
40 |
A performance comparison of linux containers and virtual machines using Docker and KVM
|
Chae, MinSu |
|
2017 |
22 |
supplement-1 |
p. 1765-1775 |
artikel |
41 |
Application of computerized numerical modeling in multi-state wet wheel hub heat simulations
|
Liu, Sheng |
|
2018 |
22 |
supplement-1 |
p. 1569-1580 |
artikel |
42 |
Application of low impact development technology in rainwater drainage system reconstruction project
|
Hu, Pengbo |
|
2017 |
22 |
supplement-1 |
p. 533-543 |
artikel |
43 |
Apriori semantic processing orienting at the business English parallel corpus characteristics in business contract
|
Xin, Lu |
|
2018 |
22 |
supplement-1 |
p. 2263-2271 |
artikel |
44 |
A rational data delivery framework for disaster-inspired internet of nano-things (IoNT) in practice
|
Al-Turjman, Fadi |
|
2017 |
22 |
supplement-1 |
p. 1751-1763 |
artikel |
45 |
A real-time operating system supporting distributed shared memory for embedded control systems
|
Tamura, Yuji |
|
2017 |
22 |
supplement-1 |
p. 989-998 |
artikel |
46 |
A silhouette based novel algorithm for object detection and tracking using information fusion of video frames
|
Jiang, Xiaoping |
|
2018 |
22 |
supplement-1 |
p. 391-398 |
artikel |
47 |
A simulation analysis method based on PSO-RBF model and its application
|
Fei, Xi |
|
2018 |
22 |
supplement-1 |
p. 2255-2261 |
artikel |
48 |
Assembly sequence planning method based on particle swarm algorithm
|
Wu, Yu-jia |
|
2017 |
22 |
supplement-1 |
p. 835-846 |
artikel |
49 |
Assessment of recommendation trust for access control in open networks
|
Zhao, Bin |
|
2018 |
22 |
supplement-1 |
p. 565-571 |
artikel |
50 |
Association rules and deep learning for cryptographic algorithm in privacy preserving data mining
|
Rajesh, N. |
|
2018 |
22 |
supplement-1 |
p. 119-131 |
artikel |
51 |
A study on secure user authentication and authorization in OAuth protocol
|
Chae, Cheol-Joo |
|
2017 |
22 |
supplement-1 |
p. 1991-1999 |
artikel |
52 |
A survey of deep learning-based network anomaly detection
|
Kwon, Donghwoon |
|
2017 |
22 |
supplement-1 |
p. 949-961 |
artikel |
53 |
A unified framework of trust prediction based on message passing
|
Oh, Hyun-Kyo |
|
2018 |
22 |
supplement-1 |
p. 2049-2061 |
artikel |
54 |
Automatic segmentation of coronary lumen based on minimum path and image fusion from cardiac computed tomography images
|
Liu, Liu |
|
2018 |
22 |
supplement-1 |
p. 1559-1568 |
artikel |
55 |
Big data and rule-based recommendation system in Internet of Things
|
Jeong, Hanjo |
|
2017 |
22 |
supplement-1 |
p. 1837-1846 |
artikel |
56 |
B+-tree construction on massive data with Hadoop
|
Ngu, Huynh Cong Viet |
|
2017 |
22 |
supplement-1 |
p. 1011-1021 |
artikel |
57 |
Bucket-size balancing locality sensitive hashing using the map reduce paradigm
|
Lee, Kyung Mi |
|
2017 |
22 |
supplement-1 |
p. 1959-1971 |
artikel |
58 |
Building the intelligent transportation systems based on the computation of driving velocity law of blasting fly-rock
|
Huang, Yong-hui |
|
2017 |
22 |
supplement-1 |
p. 759-768 |
artikel |
59 |
Cause-chain analysis of coal-mine gas explosion accident based on Bayesian network model
|
Li, Xiangong |
|
2018 |
22 |
supplement-1 |
p. 1549-1557 |
artikel |
60 |
Chaotic social spider algorithm for load balance aware task scheduling in cloud computing
|
Arul Xavier, V. M. |
|
2018 |
22 |
supplement-1 |
p. 287-297 |
artikel |
61 |
Chatbot-based heathcare service with a knowledge base for cloud computing
|
Chung, Kyungyong |
|
2018 |
22 |
supplement-1 |
p. 1925-1937 |
artikel |
62 |
Classification of sentence level sentiment analysis using cloud machine learning techniques
|
Arulmurugan, R. |
|
2017 |
22 |
supplement-1 |
p. 1199-1209 |
artikel |
63 |
Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
|
Gao, Chong-zhi |
|
2018 |
22 |
supplement-1 |
p. 1655-1663 |
artikel |
64 |
Cloud based u-healthcare network with QoS guarantee for mobile health service
|
Chung, Kyungyong |
|
2017 |
22 |
supplement-1 |
p. 2001-2015 |
artikel |
65 |
Cluster and cloud computing framework for scientific metrology in flow control
|
Wang, Yumin |
|
2017 |
22 |
supplement-1 |
p. 1189-1198 |
artikel |
66 |
Cluster-based distributed architecture for prediction of student’s performance in higher education
|
Ramanathan, L. |
|
2018 |
22 |
supplement-1 |
p. 1329-1344 |
artikel |
67 |
Cluster based effective prediction approach for improving the curable rate of lymphatic filariasis affected patients
|
Rajagopal, Renuka Devi |
|
2018 |
22 |
supplement-1 |
p. 197-205 |
artikel |
68 |
Cluster based-image descriptors and fractional hybrid optimization for medical image retrieval
|
Yadav, Poonam |
|
2018 |
22 |
supplement-1 |
p. 1345-1359 |
artikel |
69 |
Clustered entropy computing: a holoentropy based encoding scheme for high efficient computing systems
|
Munagala, Venkatesh |
|
2018 |
22 |
supplement-1 |
p. 1429-1441 |
artikel |
70 |
Collaborative data analytics for smart buildings: opportunities and models
|
Lazarova-Molnar, Sanja |
|
2017 |
22 |
supplement-1 |
p. 1065-1077 |
artikel |
71 |
Correction to: Runtime self-monitoring approach of business process compliance in cloud environments
|
Barnawi, Ahmed |
|
2018 |
22 |
supplement-1 |
p. 2541 |
artikel |
72 |
Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement
|
Jing, Zhengjun |
|
2018 |
22 |
supplement-1 |
p. 1717-1727 |
artikel |
73 |
Customized video service system design and implementation: from taste to image-based consuming method
|
Park, Hyojin |
|
2017 |
22 |
supplement-1 |
p. 999-1009 |
artikel |
74 |
Depth from defocus (DFD) based on VFISTA optimization algorithm in micro/nanometer vision
|
Liu, Yongjun |
|
2018 |
22 |
supplement-1 |
p. 1459-1467 |
artikel |
75 |
Design and development of exponential lion algorithm for optimal allocation of cluster resources in cloud
|
Devagnanam, J. |
|
2018 |
22 |
supplement-1 |
p. 1385-1400 |
artikel |
76 |
Design and implement a cross layer verification framework (CLVF) for detecting and preventing blackhole and wormhole attack in wireless ad-hoc networks for cloud environment
|
Jagadeesan, S. |
|
2018 |
22 |
supplement-1 |
p. 299-310 |
artikel |
77 |
Design and implementation of an analytical framework for interference aware job scheduling on Apache Spark platform
|
Wang, Kewen |
|
2017 |
22 |
supplement-1 |
p. 2223-2237 |
artikel |
78 |
Design and implementation of initial OpenSHMEM on PCIe NTB based cloud computing
|
Shim, Cheol |
|
2018 |
22 |
supplement-1 |
p. 1815-1826 |
artikel |
79 |
Design and implementation of OpenGL SC 2.0 rendering pipeline
|
Baek, Nakhoon |
|
2017 |
22 |
supplement-1 |
p. 931-936 |
artikel |
80 |
Design of intelligent carpooling program based on big data analysis and multi-information perception
|
Zhou, Guiliang |
|
2017 |
22 |
supplement-1 |
p. 521-532 |
artikel |
81 |
Design of network threat detection and classification based on machine learning on cloud computing
|
Kim, Hyunjoo |
|
2018 |
22 |
supplement-1 |
p. 2341-2350 |
artikel |
82 |
Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique
|
Cam, Nguyen Tan |
|
2017 |
22 |
supplement-1 |
p. 1055-1064 |
artikel |
83 |
Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust
|
Mehetre, Deepak C. |
|
2018 |
22 |
supplement-1 |
p. 1313-1328 |
artikel |
84 |
Detection of DoS attacks in cloud networks using intelligent rule based classification system
|
Rajendran, Rakesh |
|
2018 |
22 |
supplement-1 |
p. 423-434 |
artikel |
85 |
Development of a medical big-data mining process using topic modeling
|
Song, Chang-Woo |
|
2017 |
22 |
supplement-1 |
p. 1949-1958 |
artikel |
86 |
Development of healthcare service model using physical information data based on cluster sensing technology
|
Kim, Bong-Hyun |
|
2017 |
22 |
supplement-1 |
p. 1847-1859 |
artikel |
87 |
Diabetes prediction in healthcare systems using machine learning algorithms on Hadoop cluster
|
Yuvaraj, N. |
|
2017 |
22 |
supplement-1 |
p. 1-9 |
artikel |
88 |
Distortion less secret image sharing scheme for Internet of Things system
|
Li, Li |
|
2017 |
22 |
supplement-1 |
p. 2293-2307 |
artikel |
89 |
Distributed SVM face recognition based on Hadoop
|
Zhang, Boping |
|
2017 |
22 |
supplement-1 |
p. 827-834 |
artikel |
90 |
Dragonfly optimization and constraint measure-based load balancing in cloud computing
|
Polepally, Vijayakumar |
|
2017 |
22 |
supplement-1 |
p. 1099-1111 |
artikel |
91 |
DSM: a dynamic scheduling method for concurrent workflows in cloud environment
|
Xue, Shengjun |
|
2017 |
22 |
supplement-1 |
p. 693-706 |
artikel |
92 |
Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud
|
George, Ashok |
|
2018 |
22 |
supplement-1 |
p. 1277-1288 |
artikel |
93 |
Dynamic data driven big data cooperative control scheme with virtual visualization for mobile multimedia communication
|
Yin, Xiang-dong |
|
2018 |
22 |
supplement-1 |
p. 1541-1548 |
artikel |
94 |
Dynamic data-driven learning for self-healing avionics
|
Imai, Shigeru |
|
2017 |
22 |
supplement-1 |
p. 2187-2210 |
artikel |
95 |
Efficient parallel implementation of DDDAS inference using an ensemble Kalman filter with shrinkage covariance matrix estimation
|
Nino-Ruiz, Elias D. |
|
2017 |
22 |
supplement-1 |
p. 2211-2221 |
artikel |
96 |
Energy and cluster based efficient routing for broadcasting in mobile ad hoc networks
|
Venu, Sivakumar |
|
2018 |
22 |
supplement-1 |
p. 661-671 |
artikel |
97 |
Enhanced continuous and discrete multi objective particle swarm optimization for text summarization
|
Priya, V. |
|
2018 |
22 |
supplement-1 |
p. 229-240 |
artikel |
98 |
Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis
|
Tuan, Ly Hoang |
|
2017 |
22 |
supplement-1 |
p. 1079-1085 |
artikel |
99 |
Evaluation of software quality-in-use attributes based on analysis network process
|
Kim, Seung-Hee |
|
2018 |
22 |
supplement-1 |
p. 2101-2114 |
artikel |
100 |
Evolutionary energy balanced ant colony algorithm based on WSNs
|
Chen, Yegang |
|
2017 |
22 |
supplement-1 |
p. 609-621 |
artikel |
101 |
Expected value model of bus gas station site layout problem with fuzzy demand in supplementary fuel using genetic algorithm
|
Wei, Ming |
|
2017 |
22 |
supplement-1 |
p. 809-818 |
artikel |
102 |
Exposed body component-based harmful image detection in ubiquitous sensor data
|
Jang, Seok-Woo |
|
2018 |
22 |
supplement-1 |
p. 1899-1910 |
artikel |
103 |
Face recognition algorithm based on wavelet transform and local linear embedding
|
Zhou, Yan |
|
2018 |
22 |
supplement-1 |
p. 1529-1540 |
artikel |
104 |
Fast attack detection system using log analysis and attack tree generation
|
Kim, Duhoe |
|
2018 |
22 |
supplement-1 |
p. 1827-1835 |
artikel |
105 |
FDLA: Fractional Dragonfly based Load balancing Algorithm in cluster cloud model
|
Ashok Kumar, C. |
|
2018 |
22 |
supplement-1 |
p. 1401-1414 |
artikel |
106 |
FFBF: cluster-based Fuzzy Firefly Bayes Filter for noise identification and removal from grayscale images
|
Kumar, S. Vijaya |
|
2018 |
22 |
supplement-1 |
p. 1289-1311 |
artikel |
107 |
Fitting a cluster of line images under central catadioptric camera
|
Duan, Huixian |
|
2017 |
22 |
supplement-1 |
p. 781-793 |
artikel |
108 |
Gesture recognition based on modified adaptive orthogonal matching pursuit algorithm
|
Li, Bei |
|
2017 |
22 |
supplement-1 |
p. 503-512 |
artikel |
109 |
Handling high web access utility mining using intelligent hybrid hill climbing algorithm based tree construction
|
Tamilselvi, T. |
|
2018 |
22 |
supplement-1 |
p. 145-155 |
artikel |
110 |
High performance feature selection algorithms using filter method for cloud-based recommendation system
|
Muthusankar, D. |
|
2018 |
22 |
supplement-1 |
p. 311-322 |
artikel |
111 |
High-speed vision extraction based on the CamShift algorithm
|
Zhang, ChunYu |
|
2017 |
22 |
supplement-1 |
p. 555-564 |
artikel |
112 |
Histogram difference with Fuzzy rule base modeling for gradual shot boundary detection in video cloud applications
|
Kethsy Prabavathy, A. |
|
2017 |
22 |
supplement-1 |
p. 1211-1218 |
artikel |
113 |
Hybrid evolutionary computing algorithms and statistical methods based optimal fragmentation in smart cloud networks
|
Rani, K. Sasi Kala |
|
2017 |
22 |
supplement-1 |
p. 241-254 |
artikel |
114 |
Hybrid metaheuristic algorithm for improving the efficiency of data clustering
|
Mageshkumar, C. |
|
2018 |
22 |
supplement-1 |
p. 435-442 |
artikel |
115 |
Hybrid routing algorithm for improving path selection in sustainable network
|
Jayanthi, N. |
|
2018 |
22 |
supplement-1 |
p. 323-334 |
artikel |
116 |
Identification of PIWI-interacting RNA modules by weighted correlation network analysis
|
Liu, Yajun |
|
2017 |
22 |
supplement-1 |
p. 707-717 |
artikel |
117 |
Implementation of flexible denim nickel copper rip stop textile antenna for medical application
|
Thangaselvi, E. |
|
2018 |
22 |
supplement-1 |
p. 635-645 |
artikel |
118 |
Implementing self adaptiveness in whale optimization for cluster head section in Internet of Things
|
Reddy, M. Praveen Kumar |
|
2018 |
22 |
supplement-1 |
p. 1361-1372 |
artikel |
119 |
Improved continuous query plan with cluster weighted dominant querying in synthetic datasets
|
Madhankumar, M. |
|
2017 |
22 |
supplement-1 |
p. 1239-1246 |
artikel |
120 |
Improved security and routing path learning in MANETs using Beer–Quiche game theoritical model in cloud computing
|
Sathiya, D. |
|
2018 |
22 |
supplement-1 |
p. 21-31 |
artikel |
121 |
Improvement of malware detection and classification using API call sequence alignment and visualization
|
Kim, Hyunjoo |
|
2017 |
22 |
supplement-1 |
p. 921-929 |
artikel |
122 |
Information security model of block chain based on intrusion sensing in the IoT environment
|
Li, Daming |
|
2018 |
22 |
supplement-1 |
p. 451-468 |
artikel |
123 |
Instance selection and feature extraction using cuttlefish optimization algorithm and principal component analysis using decision tree
|
Suganthi, M. |
|
2018 |
22 |
supplement-1 |
p. 89-101 |
artikel |
124 |
Intelligent computation techniques for optimization of the shortest path in an asynchronous network-on-chip
|
Ilamathi, K. |
|
2018 |
22 |
supplement-1 |
p. 335-346 |
artikel |
125 |
Intelligent distribution characteristic analysis of heavy metals in reservoir sediments
|
Min, Wang |
|
2018 |
22 |
supplement-1 |
p. 2285-2292 |
artikel |
126 |
Intelligent early warning model of early-stage overflow based on dynamic clustering
|
Liang, Haibo |
|
2017 |
22 |
supplement-1 |
p. 481-492 |
artikel |
127 |
IoT based fall detection and ambient assisted system for the elderly
|
Chandra, I. |
|
2018 |
22 |
supplement-1 |
p. 2517-2525 |
artikel |
128 |
Iot based real time trafic control using cloud computing
|
Vardhana, M. |
|
2018 |
22 |
supplement-1 |
p. 2495-2504 |
artikel |
129 |
Layered constraint united scheduling model of multi-line lock
|
Pan, Xiang |
|
2017 |
22 |
supplement-1 |
p. 859-870 |
artikel |
130 |
LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
|
Daniel, Esther |
|
2017 |
22 |
supplement-1 |
p. 1247-1258 |
artikel |
131 |
Linear and non-linear proximal support vector machine classifiers for wind speed prediction
|
Ranganayaki, V. |
|
2018 |
22 |
supplement-1 |
p. 379-390 |
artikel |
132 |
Locating the critical slip surface in a slope stability analysis by enhanced fireworks algorithm
|
Xiao, Zeyun |
|
2017 |
22 |
supplement-1 |
p. 719-729 |
artikel |
133 |
Lossless and robust privacy preservation of association rules in data sanitization
|
Navale, Geeta S. |
|
2018 |
22 |
supplement-1 |
p. 1415-1428 |
artikel |
134 |
Low-quality multivariate spatio-temporal serial data preprocessing
|
Yu, Tao |
|
2017 |
22 |
supplement-1 |
p. 2357-2370 |
artikel |
135 |
Map-Reduce framework based cluster architecture for academic student’s performance prediction using cumulative dragonfly based neural network
|
VeeraManickam, M. R. M. |
|
2018 |
22 |
supplement-1 |
p. 1259-1275 |
artikel |
136 |
Maximum data collection rate routing for data gather trees with data aggregation in rechargeable wireless sensor networks
|
Lin, Haifeng |
|
2017 |
22 |
supplement-1 |
p. 597-607 |
artikel |
137 |
MCCFG: an MOF-based multiple condition control flow graph for automatic test case generation
|
Son, Hyun Seung |
|
2016 |
22 |
supplement-1 |
p. 2461-2470 |
artikel |
138 |
Memory-aware TLP throttling and cache bypassing for GPUs
|
Zhang, Jun |
|
2017 |
22 |
supplement-1 |
p. 871-883 |
artikel |
139 |
Minimizing movement for network connectivity in mobile sensor networks: an adaptive approach
|
Jagtap, Arvind Madhukar |
|
2018 |
22 |
supplement-1 |
p. 1373-1383 |
artikel |
140 |
Mirrored and hybrid disk arrays and their reliability
|
Thomasian, Alexander |
|
2018 |
22 |
supplement-1 |
p. 2485-2494 |
artikel |
141 |
Mitigating combinatorial attacks in node to node communication using high level security measures based on analysis of efficiency factor through regression and deviation
|
Gayathri, V. M. |
|
2018 |
22 |
supplement-1 |
p. 165-176 |
artikel |
142 |
Modeling and analysis for stock return movements along with exchange rates and interest rates in Markov regime-switching models
|
Kim, Suyi |
|
2017 |
22 |
supplement-1 |
p. 2039-2048 |
artikel |
143 |
More efficient and effective tricks for deep action recognition
|
Liu, Zheyuan |
|
2017 |
22 |
supplement-1 |
p. 819-826 |
artikel |
144 |
Moving average multi directional local features for speaker recognition
|
Mahmood, Awais |
|
2018 |
22 |
supplement-1 |
p. 2145-2157 |
artikel |
145 |
Multi-biometric authentication system using finger vein and iris in cloud computing
|
Ilankumaran, S. |
|
2018 |
22 |
supplement-1 |
p. 103-117 |
artikel |
146 |
Novel routing protocol scheme for real-time applications in mobile Ad Hoc networks
|
Lee, Dong Chun |
|
2017 |
22 |
supplement-1 |
p. 977-988 |
artikel |
147 |
Online energy-efficient deployment based on equivalent continuous DFS for large-scale web cluster
|
Xiong, Zhi |
|
2018 |
22 |
supplement-1 |
p. 583-596 |
artikel |
148 |
Online handwritten signature verification based on the most stable feature and partition
|
Yang, Li |
|
2018 |
22 |
supplement-1 |
p. 1691-1701 |
artikel |
149 |
On the role of message broker middleware for many-task computing on a big-data platform
|
Nguyen, Cao Ngoc |
|
2018 |
22 |
supplement-1 |
p. 2527-2540 |
artikel |
150 |
On the use of chaotic iterations to design keyed hash function
|
Lin, Zhuosheng |
|
2017 |
22 |
supplement-1 |
p. 905-919 |
artikel |
151 |
Optimized energy efficient route assigning method using related node discovery algorithm in MANET
|
Aruna, R. |
|
2018 |
22 |
supplement-1 |
p. 469-479 |
artikel |
152 |
Optimized neural network for spectrum prediction using genetic algorithm in cognitive radio networks
|
Supraja, P. |
|
2018 |
22 |
supplement-1 |
p. 157-163 |
artikel |
153 |
Optimized state update for mobile games in cloud networks
|
Kim, Hye-Young |
|
2017 |
22 |
supplement-1 |
p. 1035-1041 |
artikel |
154 |
Optimized traffic control and data processing using IoT
|
Kuppusamy, P. |
|
2018 |
22 |
supplement-1 |
p. 2169-2178 |
artikel |
155 |
Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties
|
Li, Ye |
|
2017 |
22 |
supplement-1 |
p. 1581-1593 |
artikel |
156 |
Parallel image search application based on online hashing hierarchical ranking
|
Li, Xiaofei |
|
2018 |
22 |
supplement-1 |
p. 1469-1478 |
artikel |
157 |
Parameter estimation of P-III distribution based on GA using rejection and interpolation mechanism
|
She, Wei |
|
2018 |
22 |
supplement-1 |
p. 2159-2167 |
artikel |
158 |
Performance evaluation of revised virtual resources allocation scheme in network function virtualization (NFV) networks
|
Kim, Hyuncheol |
|
2018 |
22 |
supplement-1 |
p. 2331-2339 |
artikel |
159 |
Performance evaluation of support vector machine classification approaches in data mining
|
Chidambaram, S. |
|
2018 |
22 |
supplement-1 |
p. 189-196 |
artikel |
160 |
Performance optimization and evaluation for parallel processing of big data in earth system models
|
Wang, Yuzhu |
|
2017 |
22 |
supplement-1 |
p. 2371-2381 |
artikel |
161 |
Prediction of software fault-prone classes using an unsupervised hybrid SOM algorithm
|
Viji, C. |
|
2018 |
22 |
supplement-1 |
p. 133-143 |
artikel |
162 |
Priority-based scheduling using best channel in 6TiSCH networks
|
Lee, Tsung-Han |
|
2017 |
22 |
supplement-1 |
p. 1023-1033 |
artikel |
163 |
Probabilistic classification techniques to perform geographical labeling of web objects
|
AnjanKumar, K. N. |
|
2018 |
22 |
supplement-1 |
p. 277-285 |
artikel |
164 |
PRODA: improving parallel programs on GPUs through dependency analysis
|
Wei, Xiong |
|
2017 |
22 |
supplement-1 |
p. 2129-2144 |
artikel |
165 |
Prognostic evaluation of multimodal biometric traits recognition based human face, finger print and iris images using ensembled SVM classifier
|
Raja, J. |
|
2018 |
22 |
supplement-1 |
p. 215-228 |
artikel |
166 |
Prototype implementation of the OpenGL ES 2.0 shading language offline compiler
|
Baek, Nakhoon |
|
2017 |
22 |
supplement-1 |
p. 943-948 |
artikel |
167 |
Providing profiling information for OpenGL ES application programs
|
Kim, Kuinam J. |
|
2017 |
22 |
supplement-1 |
p. 937-941 |
artikel |
168 |
Quantum-inspired immune clonal algorithm for railway empty cars optimization based on revenue management and time efficiency
|
Jing, Yun |
|
2017 |
22 |
supplement-1 |
p. 545-554 |
artikel |
169 |
Research on abnormal data detection method of web browser in cloud computing environment
|
Duan, Xindong |
|
2017 |
22 |
supplement-1 |
p. 1229-1238 |
artikel |
170 |
Research on concurrency comparison modeling based on $$\uppi $$π calculus in future computer technology
|
Bu, Hao |
|
2018 |
22 |
supplement-1 |
p. 623-634 |
artikel |
171 |
Research on coordinated scheduling of multiple systems and single jobs based on improved particle swarm optimization
|
Lei, Dingyou |
|
2018 |
22 |
supplement-1 |
p. 1443-1458 |
artikel |
172 |
Research on the single image super-resolution method based on sparse Bayesian estimation
|
Yang, Yong-qiang |
|
2018 |
22 |
supplement-1 |
p. 1505-1513 |
artikel |
173 |
Research on the thermal network optimization of wet axle based on high performance computing and wireless data transmission
|
Liu, Sheng |
|
2018 |
22 |
supplement-1 |
p. 1479-1493 |
artikel |
174 |
Research trend analysis on convergence and joint research of Korea using scientific papers
|
Yoo, Suhyeon |
|
2017 |
22 |
supplement-1 |
p. 1939-1948 |
artikel |
175 |
Residual Sarsa algorithm with function approximation
|
Qiming, Fu |
|
2017 |
22 |
supplement-1 |
p. 795-807 |
artikel |
176 |
Resource recommendation via user tagging behavior analysis
|
Liu, Haibo |
|
2017 |
22 |
supplement-1 |
p. 885-894 |
artikel |
177 |
Revamping data access privacy preservation method against inside attacks in wireless sensor networks
|
Babu, S. Sathees |
|
2018 |
22 |
supplement-1 |
p. 65-75 |
artikel |
178 |
Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authentication
|
Kang, Hyeok |
|
2017 |
22 |
supplement-1 |
p. 2017-2026 |
artikel |
179 |
Safety analysis of traffic flow characteristics of highway tunnel based on artificial intelligence flow net algorithm
|
Tian, Lingling |
|
2018 |
22 |
supplement-1 |
p. 573-582 |
artikel |
180 |
Scalable distributed data cube computation for large-scale multidimensional data analysis on a Spark cluster
|
Lee, Suan |
|
2018 |
22 |
supplement-1 |
p. 2063-2087 |
artikel |
181 |
Scalable top-k keyword search in relational databases
|
Xu, Yanwei |
|
2017 |
22 |
supplement-1 |
p. 731-747 |
artikel |
182 |
Score level multibiometrics fusion approach for healthcare
|
El-Latif, Ahmed A. Abd |
|
2017 |
22 |
supplement-1 |
p. 2425-2436 |
artikel |
183 |
Secure provable data possession scheme with replication support in the cloud using Tweaks
|
Ali, S. Ahamed |
|
2017 |
22 |
supplement-1 |
p. 1113-1123 |
artikel |
184 |
Semantic feature hierarchical clustering algorithm based on improved regional merging strategy
|
yu-feng, Yao |
|
2018 |
22 |
supplement-1 |
p. 1495-1503 |
artikel |
185 |
Semantic query graph based SPARQL generation from natural language questions
|
Song, Shengli |
|
2017 |
22 |
supplement-1 |
p. 847-858 |
artikel |
186 |
Semantics-based sensitive topic diffusion detection framework towards privacy aware online social networks
|
Valliyammai, Chinnaiah |
|
2018 |
22 |
supplement-1 |
p. 407-422 |
artikel |
187 |
Smart hardware hybrid secure searchable encryption in cloud with IoT privacy management for smart home system
|
Liu, Hua |
|
2017 |
22 |
supplement-1 |
p. 1125-1135 |
artikel |
188 |
Software defect prediction techniques using metrics based on neural network classifier
|
Jayanthi, R. |
|
2018 |
22 |
supplement-1 |
p. 77-88 |
artikel |
189 |
Spatial task management method for location privacy aware crowdsourcing
|
Li, Yan |
|
2017 |
22 |
supplement-1 |
p. 1797-1803 |
artikel |
190 |
Splicing image forgery identification based on artificial neural network approach and texture features
|
Abrahim, Araz Rajab |
|
2018 |
22 |
supplement-1 |
p. 647-660 |
artikel |
191 |
Study of spectral reflectance reconstruction based on regularization matrix R method
|
Wang, Ke |
|
2017 |
22 |
supplement-1 |
p. 493-502 |
artikel |
192 |
Task scheduling in a cloud computing environment using HGPSO algorithm
|
Senthil Kumar, A. M. |
|
2018 |
22 |
supplement-1 |
p. 2179-2185 |
artikel |
193 |
Testing the consistency of business data objects using extended static testing of CRUD matrices
|
Bures, Miroslav |
|
2017 |
22 |
supplement-1 |
p. 963-976 |
artikel |
194 |
The dynamic model of pulverized coal and waste plastic bonded together in flight combustion process
|
Liu, Jihui |
|
2017 |
22 |
supplement-1 |
p. 749-757 |
artikel |
195 |
The resource running time manager for integrated environment
|
Jung, Daeyong |
|
2017 |
22 |
supplement-1 |
p. 1777-1786 |
artikel |
196 |
The study on how to remove the shadow area for WSN based indoor disaster monitoring system
|
Jung, Gang Hee |
|
2017 |
22 |
supplement-1 |
p. 1973-1984 |
artikel |
197 |
The study on the application of virtual reality in adapted physical education
|
Kang, Sunyoung |
|
2018 |
22 |
supplement-1 |
p. 2351-2355 |
artikel |
198 |
The supporting system for disabled person with the artificial hand controlled by muscle sensor
|
Jeong, Seungdo |
|
2018 |
22 |
supplement-1 |
p. 1889-1898 |
artikel |
199 |
Transit-hub: a smart public transportation decision support system with multi-timescale analytical services
|
Sun, Fangzhou |
|
2018 |
22 |
supplement-1 |
p. 2239-2254 |
artikel |
200 |
Triple referee incentive mechanism for secure mobile adhoc networks
|
Vedhavathy, T. R. |
|
2018 |
22 |
supplement-1 |
p. 255-264 |
artikel |
201 |
Trust based resource selection with optimization technique
|
Saravana Kumar, E. |
|
2018 |
22 |
supplement-1 |
p. 207-213 |
artikel |
202 |
Turtle edge encoding and flood fill based image compression scheme
|
Arockia Raj, Y. |
|
2018 |
22 |
supplement-1 |
p. 361-377 |
artikel |
203 |
Upkeeping secrecy in information extraction using ‘k’ division graph based postulates
|
Kumar, B. Santhosh |
|
2018 |
22 |
supplement-1 |
p. 57-63 |
artikel |
204 |
Verifying a secure authentication protocol for IoT medical devices
|
Bae, Woo-Sik |
|
2017 |
22 |
supplement-1 |
p. 1985-1990 |
artikel |
205 |
Visual and textual features based email spam classification using S-Cuckoo search and hybrid kernel support vector machine
|
Kumaresan, T. |
|
2017 |
22 |
supplement-1 |
p. 33-46 |
artikel |
206 |
Visualization of security event logs across multiple networks and its application to a CSOC
|
Song, Boyeon |
|
2017 |
22 |
supplement-1 |
p. 1861-1872 |
artikel |
207 |
Who is answering whom? Finding “Reply-To” relations in group chats with deep bidirectional LSTM networks
|
Guo, Gaoyang |
|
2018 |
22 |
supplement-1 |
p. 2089-2100 |
artikel |
208 |
Whole procedure heterogeneous multiprocessors low-power optimization at algorithm-level
|
Wang, Zhuowei |
|
2018 |
22 |
supplement-1 |
p. 2407-2423 |
artikel |
209 |
Word recommendation for English composition using big corpus data processing
|
Lee, Keon Myung |
|
2018 |
22 |
supplement-1 |
p. 1911-1924 |
artikel |
210 |
W-Scheduler: whale optimization for task scheduling in cloud computing
|
Sreenu, Karnam |
|
2017 |
22 |
supplement-1 |
p. 1087-1098 |
artikel |