Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             50 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A BERT-based recommender system for secure blockchain-based cyber physical drug supply chain management Yazdinejad, Abbas

26 6 p. 3389-3403
artikel
2 A blockchain-based IoT data marketplace Sober, Michael

26 6 p. 3523-3545
artikel
3 A data-driven analysis of renewable energy management: a case study of wind energy technology Altuntas, Fatma

26 6 p. 4133-4152
artikel
4 A machine learning framework for security and privacy issues in building trust for social networking Bhadoria, Robin Singh

26 6 p. 3907-3930
artikel
5 A multi-illusive voids approach for increasing base station anonymity Boulaiche, Mehdi

26 6 p. 3997-4013
artikel
6 A multi-objective task offloading based on BBO algorithm under deadline constrain in mobile edge computing Li, Hongjian

26 6 p. 4051-4067
artikel
7 An efficient energy-aware and service quality improvement strategy applied in cloud computing Wang, Jinjiang

26 6 p. 4031-4049
artikel
8 A new approach based on game theory to reflect meta-cluster dependencies into VoIP attack detection using ensemble clustering Bavifard, Farid

26 6 p. 3889-3906
artikel
9 A new QoS-aware method for production scheduling in the industrial internet of things using elephant herding optimization algorithm Avval, Danial Bakhshayeshi

26 6 p. 3611-3626
artikel
10 An optimized deep networks for securing 5g communication system Naveena, Ambidi

26 6 p. 4015-4029
artikel
11 A quantum inspired hybrid SSA–GWO algorithm for SLA based task scheduling to improve QoS parameter in cloud computing Jain, Richa

26 6 p. 3587-3610
artikel
12 A survey on machine and deep learning in semiconductor industry: methods, opportunities, and challenges Huang, An Chi

26 6 p. 3437-3472
artikel
13 B-FLACS: blockchain-based flexible lightweight access control scheme for data sharing in cloud Tao, Qi

26 6 p. 3931-3941
artikel
14 Channel estimation for massive MIMO system using the shannon entropy function Albataineh, Zaid

26 6 p. 3793-3801
artikel
15 Chatgpt for cybersecurity: practical applications, challenges, and future directions Al-Hawawreh, Muna

26 6 p. 3421-3436
artikel
16 CNN with machine learning approaches using ExtraTreesClassifier and MRMR feature selection techniques to detect liver diseases on cloud Lanjewar, Madhusudan G

26 6 p. 3657-3672
artikel
17 Container-based task scheduling in cloud-edge collaborative environment using priority-aware greedy strategy Tang, Bing

26 6 p. 3689-3705
artikel
18 Controller deployment based on network partition and collaborative scheduling on MEC Li, Chunlin

26 6 p. 4085-4099
artikel
19 Cooperative hybrid consensus with function optimization for blockchain Ipchi Sheshgelani, Mohammadreza

26 6 p. 3565-3576
artikel
20 Correction: A BERT-based recommender system for secure blockchain-based cyber physical drug supply chain management Yazdinejad, Abbas

26 6 p. 3405
artikel
21 Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger Iftikhar, Zainab

26 6 p. 3379
artikel
22 Decision making for cloud service selection: a novel and hybrid MCDM approach Tomar, Abhinav

26 6 p. 3869-3887
artikel
23 Decision-making of transportation vehicle routing based on particle swarm optimization algorithm in logistics distribution management Cai, Linya

26 6 p. 3707-3718
artikel
24 Detection of K-complexes in EEG signals using deep transfer learning and YOLOv3 Khasawneh, Natheer

26 6 p. 3985-3995
artikel
25 Efficient job placement using two-way offloading technique over fog-cloud architectures Khan, Saad Ahmad

26 6 p. 3503-3521
artikel
26 Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems Wang, Zhiqiang

26 6 p. 3839-3854
artikel
27 Enhanced multi-objective virtual machine replacement in cloud data centers: combinations of fuzzy logic with reinforcement learning and biogeography-based optimization algorithms Ghasemi, Arezoo

26 6 p. 3855-3868
artikel
28 Estimation of execution time for computing tasks Bielecki, Jan

26 6 p. 3943-3956
artikel
29 Examining deep learning’s capability to spot code smells: a systematic literature review Malhotra, Ruchika

26 6 p. 3473-3501
artikel
30 GMM-LSTM: a component driven resource utilization prediction model leveraging LSTM and gaussian mixture model Garg, Sheetal

26 6 p. 3547-3563
artikel
31 Gpu-based and streaming-enabled implementation of pre-processing flow towards enhancing optical character recognition accuracy and efficiency Serhan, Gener

26 6 p. 3407-3419
artikel
32 High-capacity reversible data hiding in encrypted images based on adaptive arithmetic coding and static Huffman coding Liu, Mengqi

26 6 p. 3627-3645
artikel
33 Intelligent control method of main road traffic flow based on multi-sensor information fusion Deng, Zhao

26 6 p. 3577-3586
artikel
34 Intelligent intrusion detection based on fuzzy Big Data classification Jemili, Farah

26 6 p. 3719-3736
artikel
35 Internet of Things intrusion detection systems: a comprehensive review and future directions Heidari, Arash

26 6 p. 3753-3780
artikel
36 lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning Hazman, Chaimae

26 6 p. 4069-4083
artikel
37 Light-weight privacy enabled topology establishment and communication protocol for swarm IoT networks Sheena, N.

26 6 p. 4101-4117
artikel
38 Multi objective task scheduling algorithm in cloud computing using grey wolf optimization Mangalampalli, Sudheer

26 6 p. 3803-3822
artikel
39 Numerical simulation of the land subsidence induced by groundwater mining Chen, Hong

26 6 p. 3647-3656
artikel
40 Performance enhancement of vision based fall detection using ensemble of machine learning model Rastogi, Shikha

26 6 p. 4119-4132
artikel
41 Performance evaluation and optimization of long range IoT network using whale optimization algorithm Kaur, Gagandeep

26 6 p. 3737-3751
artikel
42 Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger Iftikhar, Zainab

26 6 p. 3361-3377
artikel
43 QoS correlation-based service composition algorithm for multi-constraint optimal path selection Yu, Jian

26 6 p. 3823-3837
artikel
44 Real-time progressive compression method of massive data based on improved clustering algorithm Yang, Hengxiang

26 6 p. 3781-3791
artikel
45 Retraction Note: Discrete Noetherian ring variational pattern feature sets for space-air-ground network protocol monitoring Lin, Wenliang

26 6 p. 4153
artikel
46 Retraction Note: Unsaturated dynamic constitutive model under cyclic loading Cui, Kai

26 6 p. 4155
artikel
47 Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud Shrivastava, Pranav

26 6 p. 3673-3688
artikel
48 Slow Subscribers: a novel IoT-MQTT based denial of service attack Liu, Yifeng

26 6 p. 3973-3984
artikel
49 Small files access efficiency in hadoop distributed file system a case study performed on British library text files Alange, Neeta

26 6 p. 3381-3388
artikel
50 XACSim: a new tool for measuring similarity of XACML security policies Katebi, Zahra

26 6 p. 3957-3972
artikel
                             50 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland