Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             86 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain assisted public auditing scheme for cloud-based digital twin healthcare services Kumari, Deepika

27 3 p. 2593-2609
artikel
2 A comparative study of optimization algorithms for feature selection on ML-based classification of agricultural data Garip, Zeynep

27 3 p. 3341-3362
artikel
3 Adaptive cloud resource allocation for large-scale crowdsourced multimedia live streaming services Kim, Jeong-Hoon

27 3 p. 3233-3257
artikel
4 A decentralized blockchain-based authentication scheme for cross-communication in IoT networks Chaira, Mahmoud

27 3 p. 2505-2523
artikel
5 A low-cost, high-throughput neuromorphic computer for online SNN learning Siddique, Ali

27 3 p. 2447-2464
artikel
6 A method of system selection for shuttle-based storage and retrieval system considering cost and performance Yang, Dong

27 3 p. 3703-3716
artikel
7 An efficient firefly and honeybee based load balancing mechanism in cloud infrastructure Srivastava, Ankita

27 3 p. 2805-2827
artikel
8 A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things Souri, Alireza

27 3 p. 3639-3655
artikel
9 A new hybrid multi-objective optimization algorithm for task scheduling in cloud systems Malti, Arslan Nedhir

27 3 p. 2525-2548
artikel
10 A novel DDoS detection and mitigation technique using hybrid machine learning model and redirect illegitimate traffic in SDN network Singh, Avtar

27 3 p. 3537-3557
artikel
11 A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis Chaudhari, Ashish

27 3 p. 3753-3769
artikel
12 A novel revocation management for distributed environment: a detailed study Santhosh, Gayathri

27 3 p. 2947-2958
artikel
13 AP-Net: a metallic surface defect detection approach with lightweight adaptive attention and enhanced feature pyramid Chen, Faquan

27 3 p. 3837-3851
artikel
14 Application and user-specific data prefetching and parallel read algorithms for distributed file systems Nalajala, Anusha

27 3 p. 3593-3613
artikel
15 A security framework to enhance IoT device identity and data access through blockchain consensus model Janani, Kariyappa

27 3 p. 2877-2900
artikel
16 A smart admission control and cache replacement approach in content delivery networks Abdo, Lamis

27 3 p. 2427-2445
artikel
17 A task allocation schema based on response time optimization in cloud computing Jiang, Zhengtao

27 3 p. 3893-3910
artikel
18 Benchmark assessment for the DeepSpeed acceleration library on image classification Liang, Gongbo

27 3 p. 2959-2970
artikel
19 Blockchain-based biometric identity management Salem, Sherif Hamdy Gomaa

27 3 p. 3741-3752
artikel
20 Blockchain-based optimized edge node selection and privacy preserved framework for federated learning Qammar, Attia

27 3 p. 3203-3218
artikel
21 Boosting the visibility of services in microservice architecture Tokmak, Ahmet Vedat

27 3 p. 3099-3111
artikel
22 BRIEFBCS: binary robust independent elementary features based fuzzy vault scheme in BCS Kaur, Prabhjot

27 3 p. 3135-3148
artikel
23 Cloud security game theory scoring from predation models in simulation Alsup, Damon

27 3 p. 2381-2398
artikel
24 Cluster based similarity extraction upon distributed datasets Moustakas, Thanasis

27 3 p. 2917-2929
artikel
25 Comparative analysis between a pixel-wise image encryption scheme and AES in a web application context Mokhnache, Abdelaziz

27 3 p. 2971-2982
artikel
26 Correction: Improved clustering-based hybrid recommendation system to offer personalized cloud services Nabli, Hajer

27 3 p. 2875
artikel
27 Cost-optimized cloud resource management for video streaming: ARIMA predictive approach Darwich, Mahmoud

27 3 p. 3163-3177
artikel
28 CPOCEDS-concept preserving online clustering for evolving data streams Jafseer, K. T.

27 3 p. 2983-2998
artikel
29 Cybersecurity for autonomous vehicles against malware attacks in smart-cities Aurangzeb, Sana

27 3 p. 3363-3378
artikel
30 Decentralized knowledge discovery using massive heterogenous data in Cognitive IoT Jha, Vidyapati

27 3 p. 3657-3682
artikel
31 Design and implementation of blockchain-based supply chain framework with improved traceability, privacy, and ownership Mohit,

27 3 p. 2345-2363
artikel
32 Design of a distributed offloading and real-time data unified access platform for IoT within command and control communication networks Yang, YiZhuo

27 3 p. 2313-2327
artikel
33 Design of the implementation information management platform for distributed generation in distribution network based on information integration Yan, Yuping

27 3 p. 3293-3305
artikel
34 Double auction mechanisms in edge computing resource allocation for blockchain networks Xie, Ning

27 3 p. 3017-3035
artikel
35 DRDChain: a blockchain-based distributed resource directory for the internet of things Zaghouani, Kheireddine

27 3 p. 3853-3874
artikel
36 Effectiveness of machine learning based android malware detectors against adversarial attacks Jyothish, A.

27 3 p. 2549-2569
artikel
37 Efficient resource allocation with dynamic traffic arrivals on D2D communication for beyond 5G networks Papachary, Biroju

27 3 p. 2829-2843
artikel
38 Energy data classification at the edge: a comparative studyfor energy efficiency applications Alsalemi, Abdullah

27 3 p. 3259-3275
artikel
39 Energy efficient power cap configurations through Pareto front analysis and machine learning categorization Cabrera, Alberto

27 3 p. 3433-3449
artikel
40 Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach Akbar, Mohd

27 3 p. 3683-3702
artikel
41 Exploiting the adaptive neural fuzzy inference system for predicting the effect of notch depth on elastic new strain-concentration factor under combined loading Al-Jarrah, Rami

27 3 p. 3055-3073
artikel
42 Factitious or fact? Learning textual representations for fake online review detection Mohawesh, Rami

27 3 p. 3307-3322
artikel
43 Federated deep reinforcement learning-based online task offloading and resource allocation in harsh mobile edge computing environment Xiang, Hui

27 3 p. 3323-3339
artikel
44 Federated learning for feature-fusion based requirement classification Wang, Ruiwen

27 3 p. 3397-3416
artikel
45 Federated learning inspired privacy sensitive emotion recognition based on multi-modal physiological sensors Gahlan, Neha

27 3 p. 3179-3201
artikel
46 Hardening of the Internet of Things by using an intrusion detection system based on deep learning Varastan, Bahman

27 3 p. 2465-2488
artikel
47 Hilbert curves-based location privacy technique for vehicular cloud networks Al-Balasmeh, Hani

27 3 p. 2489-2504
artikel
48 Hybrid artificial immune algorithm for energy-efficient distributed flexible job shop in semiconductor manufacturing Xiaolong, Chen

27 3 p. 3075-3098
artikel
49 Hybridhadoop: CPU-GPU hybrid scheduling in hadoop Oh, Chanyoung

27 3 p. 3875-3892
artikel
50 IDS-XGbFS: a smart intrusion detection system using XGboostwith recent feature selection for VANET safety Amaouche, Sara

27 3 p. 3521-3535
artikel
51 Improved clustering-based hybrid recommendation system to offer personalized cloud services Nabli, Hajer

27 3 p. 2845-2874
artikel
52 Intrusion detection based on ensemble learning for big data classification Jemili, Farah

27 3 p. 3771-3798
artikel
53 Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM Hanafi, Amir Vafid

27 3 p. 2673-2690
artikel
54 I/O-signature-based feature analysis and classification of high-performance computing applications Park, Ju-Won

27 3 p. 3219-3231
artikel
55 Large-scale response-aware online ANN search in dynamic datasets Andrade, Guilherme

27 3 p. 3499-3519
artikel
56 Lightweight PCB defect detection algorithm based on MSD-YOLO Zhou, Guoao

27 3 p. 3559-3573
artikel
57 Low-latency controller load balancing strategy and offloading decision generation algorithm based on lyapunov optimization in SDN mobile edge computing environment Chang, Shuai

27 3 p. 2571-2591
artikel
58 Machine learning-based intrusion detection: feature selection versus feature extraction Ngo, Vu-Duc

27 3 p. 2365-2379
artikel
59 Mixtran: an efficient and fair scheduler for mixed deep learning workloads in heterogeneous GPU environments Zhang, Xiao

27 3 p. 2775-2784
artikel
60 Monitoring and analyzing as a service (MAaaS) through cloud edge based on intelligent transportation applications Souki, Olfa

27 3 p. 3379-3395
artikel
61 MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile Li, Shaoyong

27 3 p. 2653-2671
artikel
62 Multi-ant colony optimization algorithm based on game strategy and hierarchical temporal memory model Wu, Qihuan

27 3 p. 3113-3133
artikel
63 Multi-scale attention graph convolutional recurrent network for traffic forecasting Xiong, Liyan

27 3 p. 3277-3291
artikel
64 Multi-stage intrusion detection system aided by grey wolf optimization algorithm Chatterjee, Somnath

27 3 p. 3819-3836
artikel
65 Novel hybrid success history intelligent optimizer with Gaussian transformation: application in CNN hyperparameter tuning Fakhouri, Hussam N.

27 3 p. 3717-3739
artikel
66 Novel lightweight and fine-grained fast access control using RNS properties in fog computing Alizadeh, Mohammad Ali

27 3 p. 3799-3817
artikel
67 Operator placement for data stream processing based on publisher/subscriber in hybrid cloud-fog-edge infrastructure Tang, Bing

27 3 p. 2741-2759
artikel
68 Parallel and streaming wavelet neural networks for classification and regression under apache spark Eduru, Harindra Venkatesh

27 3 p. 3451-3469
artikel
69 Performance analysis of P2p network content delivery based on queueing model Ma, Zhanyou

27 3 p. 2901-2915
artikel
70 pHPCe: a hybrid power conservation approach for containerized HPC environment Kuity, Animesh

27 3 p. 2611-2634
artikel
71 Quantification and analysis of performance fluctuation in distributed file system Zhang, Yuchen

27 3 p. 3149-3162
artikel
72 RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things Goyat, Rekha

27 3 p. 2691-2713
artikel
73 RetinaNet-vline: a flexible small target detection algorithm for efficient aggregation of information Liu, Yihong

27 3 p. 2761-2773
artikel
74 Secure and energy-efficient data transmission framework for IoT-based healthcare applications using EMCQLR and EKECC Balakrishnan, D.

27 3 p. 2999-3016
artikel
75 Secure electronic medical records sharing scheme based on blockchain and quantum key Zhu, Dexin

27 3 p. 3037-3054
artikel
76 Secure gene profile data processing using lightweight cryptography and blockchain Mahajan, Hemant

27 3 p. 2785-2803
artikel
77 Secure peer-to-peer learning using feature embeddings Kasturi, Anirudh

27 3 p. 3471-3479
artikel
78 SEKad: a scalable protocol for blockchain networks with enhanced broadcast efficiency Shen, Tao

27 3 p. 3481-3498
artikel
79 Self-adaptive autoscaling algorithm for SLA-sensitive applications running on the Kubernetes clusters Pozdniakova, Olesia

27 3 p. 2399-2426
artikel
80 SETL: a transfer learning based dynamic ensemble classifier for concept drift detection in streaming data Arora, Shruti

27 3 p. 3417-3432
artikel
81 Software defect prediction using a bidirectional LSTM network combined with oversampling techniques Khleel, Nasraldeen Alnor Adam

27 3 p. 3615-3638
artikel
82 Target positioning method based on B-spline level set and GC Yolo-v3 Zhang, Lin

27 3 p. 3575-3591
artikel
83 The balance of utility, privacy, and trust in network services Wan, Yi

27 3 p. 2931-2946
artikel
84 The cellular goore game-based consensus protocol: a cognitive model for blockchain consensus Ameri, Reyhaneh

27 3 p. 2715-2740
artikel
85 Utilizing 3D magnetic source imaging with landmark-based features and multi-classification for Alzheimer’s Disease diagnosis Al-Rahayfeh, Amer

27 3 p. 2635-2651
artikel
86 YOLO-CEA: a real-time industrial defect detection method based on contextual enhancement and attention Zhao, Shilong

27 3 p. 2329-2344
artikel
                             86 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland