Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             62 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive detection and mitigation mechanism to protect SD-IoV systems against controller-targeted DDoS attacks Alemu, Behaylu Tadele

27 10 p. 14295-14313
artikel
2 A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks Sharma, Ankit

27 10 p. 13809-13834
artikel
3 A hybrid approach of ALNS with alternative initialization and acceptance mechanisms for capacitated vehicle routing problems Kuyu, Yiğit Çağatay

27 10 p. 13583-13606
artikel
4 A hybrid butterfly and Newton–Raphson swarm intelligence algorithm based on opposition-based learning Li, Chuan

27 10 p. 14469-14514
artikel
5 A hybrid multi-objective algorithm based on slime mould algorithm and sine cosine algorithm for overlapping community detection in social networks Heydariyan, Ahmad

27 10 p. 13897-13917
artikel
6 A multi-strategy improved beluga whale optimization algorithm for constrained engineering problems Chen, Xinyi

27 10 p. 14685-14727
artikel
7 An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing Shrivastava, Pranav

27 10 p. 13675-13691
artikel
8 An efficient quantum oblivious transfer protocol Sarkar, Sushmita

27 10 p. 14037-14048
artikel
9 An energy-aware ant colony optimization strategy for virtual machine placement in cloud computing Duan, Lin-Tao

27 10 p. 14269-14282
artikel
10 An improved honey badger algorithm for global optimization and multilevel thresholding segmentation: real case with brain tumor images Houssein, Essam H.

27 10 p. 14315-14364
artikel
11 An improved moth flame optimization for optimal DG and battery energy storage allocation in distribution systems Elseify, Mohamed A.

27 10 p. 14767-14810
artikel
12 An improved scheduling with advantage actor-critic for Storm workloads Dong, Gaoqiang

27 10 p. 13421-13433
artikel
13 An improved weighted mean of vectors optimizer for multi-threshold image segmentation: case study of breast cancer Hao, Shuhui

27 10 p. 13945-14004
artikel
14 A novel approach for energy consumption management in cloud centers based on adaptive fuzzy neural systems Huang, Hong

27 10 p. 14515-14538
artikel
15 A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification Ebrahimi, Seyed Hossein Seyed

27 10 p. 14049-14093
artikel
16 A quantitative analysis of the security of PoW-based blockchains Alharby, Maher

27 10 p. 14113-14130
artikel
17 A scalable and power efficient MAC protocol with adaptive TDMA for M2M communication Kampelli, Narender Reddy

27 10 p. 14811-14834
artikel
18 A survey on privacy-preserving federated learning against poisoning attacks Xia, Feng

27 10 p. 13565-13582
artikel
19 A weighted multi-view clustering via sparse graph learning Zhou, Jie

27 10 p. 13517-13530
artikel
20 BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment Chaurasia, Akhil

27 10 p. 13919-13944
artikel
21 Blockchain enabled secured, smart healthcare system for smart cities: a systematic review on architecture, technology, and service management Samantray, Bhabani Sankar

27 10 p. 14387-14415
artikel
22 Blockchain enabled secure pharmaceutical supply chain framework with traceability: an efficient searchable pharmachain approach Mishra, Rahul

27 10 p. 13621-13641
artikel
23 BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm Abed-alguni, Bilal H.

27 10 p. 14417-14449
artikel
24 Channel estimation for RIS-aided MIMO systems in MmWave wireless communications with a few active elements Ghamry, Walid K.

27 10 p. 14247-14267
artikel
25 DDoS attack detection techniques in IoT networks: a survey Pakmehr, Amir

27 10 p. 14637-14668
artikel
26 Deep Convolutional Neural Network with a Fuzzy (DCNN-F) technique for energy and time optimized scheduling of cloud computing Rajendran, Logesh

27 10 p. 13763-13775
artikel
27 DNA sequences design under many objective evolutionary algorithm Guo, Huaiyu

27 10 p. 14167-14183
artikel
28 Empowering bonobo optimizer for global optimization and cloud scheduling problem Mostafa, Reham R.

27 10 p. 14557-14584
artikel
29 Empowering e-learning approach by the use of federated edge computing Arfaoui, Nouha

27 10 p. 13737-13748
artikel
30 Energy-efficient virtual machine placement in heterogeneous cloud data centers: a clustering-enhanced multi-objective, multi-reward reinforcement learning approach Ghasemi, Arezoo

27 10 p. 14149-14166
artikel
31 Enhancing image encryption using chaotic maps: a multi-map approach for robust security and performance optimization Abodawood, Mostafa

27 10 p. 14611-14635
artikel
32 Enhancing security and scalability by AI/ML workload optimization in the cloud Priyadarshini, Sabina

27 10 p. 13455-13469
artikel
33 Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features Tashtoush, Yahya

27 10 p. 13717-13736
artikel
34 File chunking towards on-chain storage: a blockchain-based data preservation framework Tmeizeh, Muhammed

27 10 p. 13531-13546
artikel
35 G-SAM: GMM-based segment anything model for medical image classification and segmentation Liu, Xiaoxiao

27 10 p. 14231-14245
artikel
36 HPTCollector: high-performance telemetry collector Hussain, Mazahir

27 10 p. 14729-14744
artikel
37 Intelligent and efficient task caching for mobile edge computing Moradi, Amir

27 10 p. 14095-14112
artikel
38 Lattice-based ring signcryption scheme for smart healthcare management Sourav,

27 10 p. 14131-14148
artikel
39 Leveraging large language model to generate a novel metaheuristic algorithm with CRISPE framework Zhong, Rui

27 10 p. 13835-13869
artikel
40 Localization of try block and generation of catch block to handle exception using an improved LSTM Purohit, Preetesh

27 10 p. 14451-14468
artikel
41 Metaheuristic algorithms and their applications in wireless sensor networks: review, open issues, and challenges Houssein, Essam H.

27 10 p. 13643-13673
artikel
42 Migration of containers on the basis of load prediction with dynamic inertia weight based PSO algorithm Bawa, Shabnam

27 10 p. 14585-14609
artikel
43 MTV-SCA: multi-trial vector-based sine cosine algorithm Nadimi-Shahraki, Mohammad H.

27 10 p. 13471-13515
artikel
44 Multi-attention gated temporal graph convolution neural Network for traffic flow forecasting Huang, Xiaohui

27 10 p. 13795-13808
artikel
45 Multi-strategy improved sparrow search algorithm based on first definition of ellipse and group co-evolutionary mechanism for engineering optimization problems Chen, Gang

27 10 p. 14005-14035
artikel
46 Multi-threshold image segmentation using a boosted whale optimization: case study of breast invasive ductal carcinomas Shi, Jinge

27 10 p. 14891-14949
artikel
47 Nature inspired optimization algorithms for medical image segmentation: a comprehensive review Houssein, Essam H.

27 10 p. 14745-14766
artikel
48 OntoXAI: a semantic web rule language approach for explainable artificial intelligence Sharma, Sumit

27 10 p. 14951-14975
artikel
49 Performance analysis of ML models on 5G sub-6 GHz bands: An experimental study Reddy, Avuthu Avinash

27 10 p. 14283-14294
artikel
50 PSO-ACO-based bi-phase lightweight intrusion detection system combined with GA optimized ensemble classifiers Srivastava, Arpita

27 10 p. 14835-14890
artikel
51 PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model Sharma, Sangeeta

27 10 p. 13749-13762
artikel
52 Quantitative and qualitative similarity measure for data clustering analysis AlShaqsi, Jamil

27 10 p. 14977-15002
artikel
53 Research and optimization of task scheduling algorithm based on heterogeneous multi-core processor Liu, Junnan

27 10 p. 13435-13453
artikel
54 Saver: a proactive microservice resource scheduling strategy based on STGCN Jiang, Yi

27 10 p. 13547-13564
artikel
55 Secure speech-recognition data transfer in the internet of things using a power system and a tried-and-true key generation technique Wang, Zhe

27 10 p. 14669-14684
artikel
56 Service selection based on blockchain smart contracts in cloud-edge environment Ning, Yingying

27 10 p. 13693-13715
artikel
57 Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication Boualem, Adda

27 10 p. 13777-13793
artikel
58 Stochastic biogeography-based learning improved RIME algorithm: application to image segmentation of lupus nephritis Zheng, Boli

27 10 p. 14185-14229
artikel
59 TFCNN-BiGRU with self-attention mechanism for automatic human emotion recognition using multi-channel EEG data Houssein, Essam H.

27 10 p. 14365-14385
artikel
60 TruPro: a blockchain-based decentralised prosumer electricity trading platform for electrical vehicles (EVs) Khan, Kashif Mehboob

27 10 p. 13871-13896
artikel
61 Vehicle edge server deployment based on reinforcement learning in cloud-edge collaborative environment Guo, Feiyan

27 10 p. 14539-14556
artikel
62 Visual identification of sleep spindles in EEG waveform images using deep learning object detection (YOLOv4 vs YOLOX) Fraiwan, Mohammad

27 10 p. 13607-13620
artikel
                             62 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland