nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-based framework for circular end-of-life vehicle processing
|
Grati, Rima |
|
|
27 |
1 |
p. 707-720 |
artikel |
2 |
A comprehensive analysis for crowd counting methodologies and algorithms in Internet of Things
|
Gao, Mingliang |
|
|
27 |
1 |
p. 859-873 |
artikel |
3 |
A hybridized approach for minimizing energy in cloud computing
|
Kak, Sanna Mehraj |
|
|
27 |
1 |
p. 53-70 |
artikel |
4 |
A knowledge-driven service composition framework for wildfire prediction
|
Taktak, Hela |
|
|
27 |
1 |
p. 977-996 |
artikel |
5 |
An access control model based on blockchain master-sidechain collaboration
|
Yang, Liang |
|
|
27 |
1 |
p. 477-497 |
artikel |
6 |
An adaptive medical image registration using hybridization of teaching learning-based optimization with affine and speeded up robust features with projective transformation
|
Arora, Paluck |
|
|
27 |
1 |
p. 607-627 |
artikel |
7 |
Analyzing factors influencing the severity of occupational accidents in textile industry using decision tree algorithms
|
Mutlu, Nazli Gulum |
|
|
27 |
1 |
p. 787-825 |
artikel |
8 |
An efficient document information retrieval using hybrid global search optimization algorithm with density based clustering technique
|
Inje, Bhushan |
|
|
27 |
1 |
p. 689-705 |
artikel |
9 |
A new distributed graph coloring algorithm for large graphs
|
Brighen, Assia |
|
|
27 |
1 |
p. 875-891 |
artikel |
10 |
An extended lightweight blockchain based collaborative healthcare system for fraud prevention
|
Settipalli, Lavanya |
|
|
27 |
1 |
p. 563-573 |
artikel |
11 |
An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing
|
Ullah, Shamsher |
|
|
27 |
1 |
p. 721-735 |
artikel |
12 |
An ontology-based approach to designing a NoSQL database for semi-structured and unstructured health data
|
Sen, Poly Sil |
|
|
27 |
1 |
p. 959-976 |
artikel |
13 |
A novel traffic aware reliable gateway selection in wireless mesh network
|
Kushwah, Rashmi |
|
|
27 |
1 |
p. 673-687 |
artikel |
14 |
Application placement in fog-cum-cloud environment based on a low latency policy-making framework
|
Mirzapour-Moshizi, Maryam |
|
|
27 |
1 |
p. 199-217 |
artikel |
15 |
Appropriate number of analogues in analogy based software effort estimation using quality datasets
|
Pal, Nisha |
|
|
27 |
1 |
p. 531-546 |
artikel |
16 |
Artificial neural networks based predictions towards the auto-tuning and optimization of parallel IO bandwidth in HPC system
|
Tipu, Abdul Jabbar Saeed |
|
|
27 |
1 |
p. 71-90 |
artikel |
17 |
Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS
|
Kaur, Jasleen |
|
|
27 |
1 |
p. 1047-1061 |
artikel |
18 |
Banyan tree growth optimization and application
|
Wu, Xian |
|
|
27 |
1 |
p. 411-441 |
artikel |
19 |
BERT-based ensemble learning for multi-aspect hate speech detection
|
Mazari, Ahmed Cherif |
|
|
27 |
1 |
p. 325-339 |
artikel |
20 |
Bi-level optimization of resource allocation and appliance scheduling in residential areas using a Fog of Things (FOT) framework
|
Jain, Ankur |
|
|
27 |
1 |
p. 219-229 |
artikel |
21 |
CAC-WOA: context aware clustering with whale optimization algorithm for knowledge discovery from multidimensional space in electricity application
|
Ahire, Prashant G. |
|
|
27 |
1 |
p. 499-513 |
artikel |
22 |
CBLA_PM: an improved ann-based power consumption prediction algorithm for multi-type jobs on heterogeneous computing server
|
Jing, Chao |
|
|
27 |
1 |
p. 377-394 |
artikel |
23 |
COVID-19 CT-images diagnosis and severity assessment using machine learning algorithm
|
Albataineh, Zaid |
|
|
27 |
1 |
p. 547-562 |
artikel |
24 |
Deep learning-based modelling of pyrolysis
|
Ozcan, Alper |
|
|
27 |
1 |
p. 1089-1108 |
artikel |
25 |
Deep learning-based user experience evaluation in distance learning
|
Sadigov, Rahim |
|
|
27 |
1 |
p. 443-455 |
artikel |
26 |
Design and modeling of moving target defense in workflow-based applications
|
Alhozaimy, Sarah |
|
|
27 |
1 |
p. 945-958 |
artikel |
27 |
Dual Interactive Wasserstein Generative Adversarial Network optimized with arithmetic optimization algorithm-based job scheduling in cloud-based IoT
|
Sravanthi, Gunaganti |
|
|
27 |
1 |
p. 931-944 |
artikel |
28 |
Energy-aware QoS-based dynamic virtual machine consolidation approach based on RL and ANN
|
Rezakhani, Mahshid |
|
|
27 |
1 |
p. 827-843 |
artikel |
29 |
File block multi-replica management technology in cloud storage
|
He, Qinlu |
|
|
27 |
1 |
p. 457-476 |
artikel |
30 |
Foundation and large language models: fundamentals, challenges, opportunities, and social impacts
|
Myers, Devon |
|
|
27 |
1 |
p. 1-26 |
artikel |
31 |
GHB: a cost-effective and energy-efficient data center network structure with greater incremental scalability
|
Zhou, Peng |
|
|
27 |
1 |
p. 91-107 |
artikel |
32 |
Harris Hawks optimization based hybrid deep learning model for efficient network slicing in 5G network
|
Dangi, Ramraj |
|
|
27 |
1 |
p. 395-409 |
artikel |
33 |
Heuristic algorithm for task mapping problem in a hierarchical wireless network-on-chip architecture
|
Sacanamboy, Maribell |
|
|
27 |
1 |
p. 159-175 |
artikel |
34 |
Hybrid approach for suspicious object surveillance using video clips and UAV images in cloud-IoT-based computing environment
|
Ahamad, Rayees |
|
|
27 |
1 |
p. 761-785 |
artikel |
35 |
Hybrid enhanced whale optimization algorithm for contrast and detail enhancement of color images
|
Braik, Malik |
|
|
27 |
1 |
p. 231-267 |
artikel |
36 |
Imperialist competitive based approach for efficient deployment of IoT services in fog computing
|
Zare, Mansoureh |
|
|
27 |
1 |
p. 845-858 |
artikel |
37 |
Machine learning based file type classifier designing in IoT cloud
|
Sharma, Puneet |
|
|
27 |
1 |
p. 109-117 |
artikel |
38 |
Machine learning regression-based RETRO-VLP for real-time and stabilized indoor positioning
|
Alenezi, Ali H. |
|
|
27 |
1 |
p. 299-311 |
artikel |
39 |
Multi-input cloud resource allocation strategy with limited buffer and virtual machine synchronization failure
|
Zhao, Yuan |
|
|
27 |
1 |
p. 119-135 |
artikel |
40 |
Mutation-driven and population grouping PRO algorithm for scheduling budget-constrained workflows in the cloud
|
Li, Huifang |
|
|
27 |
1 |
p. 1137-1158 |
artikel |
41 |
Online-learning task scheduling with GNN-RL scheduler in collaborative edge computing
|
Jian, Chengfeng |
|
|
27 |
1 |
p. 589-605 |
artikel |
42 |
On-line outer bounding ellipsoid algorithm for clustering of hyperplanes in the presence of bounded noise
|
Goudjil, Abdelhak |
|
|
27 |
1 |
p. 575-587 |
artikel |
43 |
Optimization of large-scale UAV cluster confrontation game based on integrated evolution strategy
|
Liu, Haiying |
|
|
27 |
1 |
p. 515-529 |
artikel |
44 |
Parallel multi-GPU implementation of fast decoupled power flow solver with hybrid architecture
|
Zeng, Lei |
|
|
27 |
1 |
p. 1125-1136 |
artikel |
45 |
Pricing the cloud based on multi-attribute auction mechanism
|
Alomari, Zakaria |
|
|
27 |
1 |
p. 629-654 |
artikel |
46 |
Quantum-PSO based unsupervised clustering of users in social networks using attributes
|
Naik, Debadatta |
|
|
27 |
1 |
p. 997-1015 |
artikel |
47 |
Quantum-resistant public-key encryption and signature schemes with smaller key sizes
|
Soni, Lacchita |
|
|
27 |
1 |
p. 285-297 |
artikel |
48 |
Redundancy elimination in IoT oriented big data: a survey, schemes, open challenges and future applications
|
Rani, Ridhima |
|
|
27 |
1 |
p. 1063-1087 |
artikel |
49 |
Research on placement of distributed SDN multiple controllers based on IAVOA
|
Ma, Jiahui |
|
|
27 |
1 |
p. 913-930 |
artikel |
50 |
Robust Federated Learning for execution time-based device model identification under label-flipping attack
|
Sánchez Sánchez, Pedro Miguel |
|
|
27 |
1 |
p. 313-324 |
artikel |
51 |
Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment
|
Alam, Mahfooz |
|
|
27 |
1 |
p. 341-376 |
artikel |
52 |
Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach
|
Mishra, Kamta Nath |
|
|
27 |
1 |
p. 27-52 |
artikel |
53 |
Single-tag and multi-tag RFID data cleaning approach in edge computing
|
Li, Chunlin |
|
|
27 |
1 |
p. 177-197 |
artikel |
54 |
Software effort estimation modeling and fully connected artificial neural network optimization using soft computing techniques
|
Kassaymeh, Sofian |
|
|
27 |
1 |
p. 737-760 |
artikel |
55 |
SRG: a clustering algorithm based on scale division and region growing
|
Jia, Yunwei |
|
|
27 |
1 |
p. 137-157 |
artikel |
56 |
Task scheduling in cloud computing environment based on enhanced marine predator algorithm
|
Gong, Rong |
|
|
27 |
1 |
p. 1109-1123 |
artikel |
57 |
Task scheduling in the internet of things: challenges, solutions, and future trends
|
Bu, Tianqi |
|
|
27 |
1 |
p. 1017-1046 |
artikel |
58 |
Towards adding digital forensics capabilities in software defined networking based moving target defense
|
Hyder, Muhammad Faraz |
|
|
27 |
1 |
p. 893-912 |
artikel |
59 |
Twitter sentiment analysis on online food services based on elephant herd optimization with hybrid deep learning technique
|
Vatambeti, Ramesh |
|
|
27 |
1 |
p. 655-671 |
artikel |
60 |
When blockchain meets IoT: a comparison of the performance of communication protocols in a decentralized identity solution for IoT using blockchain
|
Sharma, Prakhar |
|
|
27 |
1 |
p. 269-284 |
artikel |