Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             49 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain scheme for authentication, data sharing and nonrepudiation to secure internet of wireless sensor things Khan, Asad Ullah

26 2 p. 945-960
artikel
2 Abstracting IoT protocols using timed process algebra and SPIN model checker Suresh Kumar, N.

26 2 p. 1611-1629
artikel
3 AI-based Bayesian inference scheme to recognize electroencephalogram signals for smart healthcare Hong, Puah Jia

26 2 p. 1221-1230
artikel
4 A multichannel EfficientNet deep learning-based stacking ensemble approach for lung disease detection using chest X-ray images Ravi, Vinayakumar

26 2 p. 1181-1203
artikel
5 An adaptive and secure routes migration model for the sustainable cloud of things Islam, Naveed

26 2 p. 1631-1642
artikel
6 An adaptive read/write optimized algorithm for Ceph heterogeneous systems via performance prediction and multi-attribute decision making Li, Zhike

26 2 p. 1125-1146
artikel
7 An AI-empowered affect recognition model for healthcare and emotional well-being using physiological signals Zhou, Zijian

26 2 p. 1253-1266
artikel
8 An attentive hierarchy ConvNet for crowd counting in smart city Zhai, Wenzhe

26 2 p. 1099-1111
artikel
9 A near-optimal & load balanced resilient system design for high-performance computing platform Kamila, Nilayam Kumar

26 2 p. 1535-1550
artikel
10 An ECC processor for IoT using Edwards curves and DFT modular multiplication Al-Khaleel, Osama

26 2 p. 1063-1075
artikel
11 An evaluation of deep learning models for chargeback Fraud detection in online games Wei, Yu-Chih

26 2 p. 927-943
artikel
12 An improved hash algorithm for monitoring network traffic in the internet of things Zhan, Teng

26 2 p. 961-976
artikel
13 A novel design of a dependable and fault-tolerant multi-layer banyan network based on a crossbar switch for nano communication Li, Shaoxi

26 2 p. 1601-1609
artikel
14 A novel multi agent recommender system for user interests extraction Mansour, Ayman M.

26 2 p. 1353-1362
artikel
15 A pre-trained convolutional neural network with optimized capsule networks for chest X-rays COVID-19 diagnosis AbouEl-Magd, Lobna M.

26 2 p. 1389-1403
artikel
16 A survey on deep learning-based identification of plant and crop diseases from UAV-based aerial images Bouguettaya, Abdelmalek

26 2 p. 1297-1317
artikel
17 A two-dimensional OMA-NOMA user-pairing and power-minimization approach for opportunistic B5G-enabled IoT networks Bany Salameh, Haythem

26 2 p. 1113-1124
artikel
18 Business intelligence using deep learning techniques for social media contents Kanan, Tarek

26 2 p. 1285-1296
artikel
19 DCOPA: a distributed clustering based on objects performances aggregation for hierarchical communications in IoT applications Mir, Foudil

26 2 p. 1077-1098
artikel
20 Deep learning application detecting SARS-CoV-2 key enzymes inhibitors Benarous, Leila

26 2 p. 1169-1180
artikel
21 Deep reinforcement learning-based microservice selection in mobile edge computing Guo, Feiyan

26 2 p. 1319-1335
artikel
22 Edge computing based secure health monitoring framework for electronic healthcare system Singh, Ashish

26 2 p. 1205-1220
artikel
23 Edge resource slicing approaches for latency optimization in AI-edge orchestration Chandrika, P. Keerthi

26 2 p. 1659-1683
artikel
24 EHHR: an efficient evolutionary hyper-heuristic based recommender framework for short-text classifier selection Almas, Bushra

26 2 p. 1425-1446
artikel
25 Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine Pavithran, Pramod

26 2 p. 1035-1051
artikel
26 Federated learning for energy constrained devices: a systematic mapping study El Mokadem, Rachid

26 2 p. 1685-1708
artikel
27 Fusion of deep learning based cyberattack detection and classification model for intelligent systems Alzubi, Omar A.

26 2 p. 1363-1374
artikel
28 Group intrusion detection in the Internet of Things using a hybrid recurrent neural network Belhadi, Asma

26 2 p. 1147-1158
artikel
29 HeuCrip: a malware detection approach for internet of battlefield things shah, Imtiaz Ali

26 2 p. 977-992
artikel
30 Improving virtualization and migration in combinatorial dynamic mapping for cloud services Gorjian Mehlabani, Ehsan

26 2 p. 1511-1533
artikel
31 K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing Ling, Chen

26 2 p. 1495-1510
artikel
32 Lightweight Gramian Angular Field classification for edge internet of energy applications Alsalemi, Abdullah

26 2 p. 1375-1387
artikel
33 Mitigating voltage fingerprint spoofing attacks on the controller area network bus Lalouani, Wassila

26 2 p. 1447-1460
artikel
34 MO-FreeVM: multi-objective server release algorithm for cluster resource management Zhang, Shiyan

26 2 p. 1011-1034
artikel
35 Multi-factor nature inspired SLA-aware energy efficient resource management for cloud environments Bashir, Sonia

26 2 p. 1643-1658
artikel
36 MultiHop optimal time complexity clustering for emerging IoT applications Mtopi, Yann Brice Chebu

26 2 p. 993-1009
artikel
37 On detecting distributed denial of service attacks using fuzzy inference system Almseidin, Mohammad

26 2 p. 1337-1351
artikel
38 Popular deep learning algorithms for disease prediction: a review Yu, Zengchen

26 2 p. 1231-1251
artikel
39 Reinforcement learning for intelligent online computation offloading in wireless powered edge networks Mustafa, Ehzaz

26 2 p. 1053-1062
artikel
40 Resilient and dependability management in distributed environments: a systematic and comprehensive literature review Amiri, Zahra

26 2 p. 1565-1600
artikel
41 Security enhancement in cellular networks employing D2D friendly jammer for V2V communication Kumar, J. Senthil

26 2 p. 865-878
artikel
42 Security in IoT-enabled smart agriculture: architecture, security solutions and challenges Vangala, Anusha

26 2 p. 879-902
artikel
43 TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms Sudar, K. Muthamil

26 2 p. 1461-1477
artikel
44 The effect of QoS and QoE requirements for designing task processing controller based on fuzzy logic on IoT environments Yang, Zhengqiang

26 2 p. 1267-1283
artikel
45 Towards a secure and dependable IoT data monetization using blockchain and fog computing Khezr, Seyednima

26 2 p. 1551-1564
artikel
46 Towards performance evaluation prediction in WSNs using artificial neural network multi-perceptron Zroug, Siham

26 2 p. 1405-1423
artikel
47 TrIDS: an intelligent behavioural trust based IDS for smart healthcare system Singh, Ashish

26 2 p. 903-925
artikel
48 Using recommender clustering to improve quality of services with sustainable virtual machines in cloud computing Aghaei, Mehran

26 2 p. 1479-1493
artikel
49 Video coding deep learning-based modeling for long life video streaming over next network generation Alsmirat, Mohammad

26 2 p. 1159-1167
artikel
                             49 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland