Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             75 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A data lake-based security transmission and storage scheme for streaming big data Zhao, Xiaoyan

27 4 p. 4741-4755
artikel
2 A distributed load balancing method for IoT/Fog/Cloud environments with volatile resource support Shamsa, Zari

27 4 p. 4281-4320
artikel
3 A feature extraction and time warping based neural expansion architecture for cloud resource usage forecasting Singh, Gurjot

27 4 p. 4963-4982
artikel
4 A general and modular framework for dark web analysis Ruiz Ródenas, José Manuel

27 4 p. 4687-4703
artikel
5 A GNSS UWB tight coupling and IMU ESKF algorithm for indoor and outdoor mixed scenario Luo, Jie

27 4 p. 4855-4865
artikel
6 A hybrid approach for fault-tolerance aware load balancing in fog computing Kashyap, Vijaita

27 4 p. 5217-5233
artikel
7 A metaheuristic-based task offloading scheme with a trade-off between delay and resource utilization in IoT platform Kumari, Nidhi

27 4 p. 4589-4603
artikel
8 An energy-efficient black widow-based adaptive VM placement approach for cloud computing Goyal, Sahul

27 4 p. 4659-4672
artikel
9 An ensemble clustering approach for modeling hidden categorization perspectives for cloud workloads Daraghmeh, Mustafa

27 4 p. 4779-4803
artikel
10 A non-fungible token (NFT) chain model and performance study Seol, J.

27 4 p. 3927-3944
artikel
11 An online ensemble method for auto-scaling NFV-based applications in the edge da Silva, Thiago Pereira

27 4 p. 4255-4279
artikel
12 A performance evaluation model for users’ satisfaction in federated clouds Chafai, Zeyneb

27 4 p. 4983-5004
artikel
13 A privacy-preserving federated learning framework for blockchain networks Abuzied, Youssif

27 4 p. 3997-4014
artikel
14 A scalable blockchain storage scheme for VANET Wei, Wenxiang

27 4 p. 3957-3981
artikel
15 A-TSPD: autonomous-two stage algorithm for robust peak detection in online time series Gupta, Aditi

27 4 p. 4063-4076
artikel
16 A two-tier multi-objective service placement in container-based fog-cloud computing platforms Dogani, Javad

27 4 p. 4491-4514
artikel
17 Benchmarking Micro2Micro transformation: an approach with GNN and VAE Chy, Md Showkat Hossain

27 4 p. 4171-4185
artikel
18 Blockchain-driven optimization of IoT in mobile edge computing environment with deep reinforcement learning and multi-criteria decision-making techniques Moghaddasi, Komeil

27 4 p. 4385-4413
artikel
19 Cdascaler: a cost-effective dynamic autoscaling approach for containerized microservices Shafi, Numan

27 4 p. 5195-5215
artikel
20 CD-TMS: a combinatorial design-based token management system to enhance security and performance in blockchain Hadian, Mohammad

27 4 p. 4515-4536
artikel
21 Convergence of the Harris hawks optimization algorithm and fuzzy system for cloud-based task scheduling enhancement Osmanpoor, Mohammad

27 4 p. 4909-4923
artikel
22 DAO-LGBM: dual annealing optimization with light gradient boosting machine for advocates prediction in online customer engagement Abu-Salih, Bilal

27 4 p. 5047-5073
artikel
23 DDoS attack detection in IoT environment using optimized Elman recurrent neural networks based on chaotic bacterial colony optimization Hussan, M. I. Thariq

27 4 p. 4469-4490
artikel
24 DeepLG SecNet: utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments Nanjappan, Manikandan

27 4 p. 5459-5471
artikel
25 Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication Kumar, Uddeshaya

27 4 p. 4867-4881
artikel
26 Distributed medical data storage model based on blockchain technology Duan, Changyu

27 4 p. 4757-4777
artikel
27 DITRA: an efficient event-driven multi-objective optimization algorithm for bandwidth allocation in IoT environments Rouhifar, Mehrin

27 4 p. 5143-5163
artikel
28 DNA-chaos governed cryptosystem for cloud-based medical image repository Chidambaram, Nithya

27 4 p. 4127-4144
artikel
29 DSLSTM: a deep convolutional encoder–decoder architecture for abnormality detection in video surveillance Roka, Sanjay

27 4 p. 4925-4940
artikel
30 Efficient straggler task management in cloud environment using stochastic gradient descent with momentum learning-driven neural networks Swain, Smruti Rekha

27 4 p. 4673-4685
artikel
31 Energy-aware parameter tuning for mixed workloads in cloud server Liang, Jiechao

27 4 p. 4805-4821
artikel
32 Energy consumption optimization through an intelligent task offloading prediction mechanism in vehicular fog networks Mohammadi, Laya

27 4 p. 4705-4723
artikel
33 Energy-efficient aware and predicting bandwidth estimation routing protocol for hybrid communication in wireless body area networks Abdullah, Ako Muhammad

27 4 p. 4187-4206
artikel
34 Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks Atiewi, Saleh

27 4 p. 4551-4568
artikel
35 Federated learning analysis for vehicular traffic flow prediction: evaluation of learning algorithms and aggregation approaches Nidhi,

27 4 p. 5075-5091
artikel
36 F-EVM: improving routing in Internet of Things using fuzzy MAIRCA approach and fuzzy eigenvector method Mohammadi, Mohammad

27 4 p. 5121-5141
artikel
37 Formulating a quality model for cloud-native software architectures: conceptual and methodological considerations Lichtenthäler, Robin

27 4 p. 4077-4093
artikel
38 From static code analysis to visual models of microservice architecture Cerny, Tomas

27 4 p. 4145-4170
artikel
39 HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach Sivasakthi, D. Adhimuga

27 4 p. 5005-5019
artikel
40 Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm Hussain, Muhammad

27 4 p. 5355-5376
artikel
41 Improving fault tolerance in LinuX container-based distributed systems using blockchain Farahmandian, Masoum

27 4 p. 5285-5294
artikel
42 IoT data management for caching performance improvement in NDN Zahedinia, Marzieh Sadat

27 4 p. 4537-4550
artikel
43 K-LionER: meta-heuristic approach for energy efficient cluster based routing for WSN-assisted IoT networks Rekha,

27 4 p. 4207-4221
artikel
44 Machine learning-driven energy-efficient load balancing for real-time heterogeneous systems Rahmani, Taha Abdelazziz

27 4 p. 4883-4908
artikel
45 Microservices enabled bidirectional fault-tolerance scheme for healthcare internet of things Maray, Mohammed

27 4 p. 4621-4633
artikel
46 Modeling the Green Cloud Continuum: integrating energy considerations into Cloud–Edge models Patel, Yashwant Singh

27 4 p. 4095-4125
artikel
47 Multi-objective intelligent clustering routing schema for internet of things enabled wireless sensor networks using deep reinforcement learning Ghamry, Walid K.

27 4 p. 4941-4961
artikel
48 Multi-strategy improved sparrow search algorithm for job shop scheduling problem Li, Zhengfeng

27 4 p. 4605-4619
artikel
49 Neural emulator for nonlinear systems based on PSO algorithm: real-time validation Farhat, Yassin

27 4 p. 5107-5119
artikel
50 Optimizing electric vehicle routing with nonlinear charging and time windows using improved differential evolution algorithm Deng, Jiawen

27 4 p. 5423-5458
artikel
51 OsCoMIT: Osmotic computing-based service management for intelligent transportation systems in 5G network Kaur, Akashdeep

27 4 p. 5403-5421
artikel
52 Persona preserving reputation protocol (P2RP) for enhanced security, privacy, and trust in blockchain oracles You, Shengwei

27 4 p. 3945-3956
artikel
53 Preserving flow table integrity in OpenFlow networks through smart contract Bargayary, Birglang

27 4 p. 4569-4588
artikel
54 Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities Goyat, Rekha

27 4 p. 4823-4839
artikel
55 Privacy-preserving image retrieval based on additive secret sharing in cloud environment Zhang, Bo

27 4 p. 5021-5045
artikel
56 Puma optimizer (PO): a novel metaheuristic optimization algorithm and its application in machine learning Abdollahzadeh, Benyamin

27 4 p. 5235-5283
artikel
57 Refining differential evolution with mutation rate and neighborhood weight local search Sun, Lisheng

27 4 p. 4361-4384
artikel
58 Resource allocation and aging priority-based scheduling of linear workflow applications with transient failures and selective imprecise computations Karatza, Helen D.

27 4 p. 5473-5488
artikel
59 RESTBERTa: a Transformer-based question answering approach for semantic search in Web API documentation Kotstein, Sebastian

27 4 p. 4035-4061
artikel
60 RM-RPL: reliable mobility management framework for RPL-based IoT systems Seyfollahi, Ali

27 4 p. 4449-4468
artikel
61 Robust medical and color image cryptosystem using array index and chaotic S-box Podder, Durgabati

27 4 p. 4321-4346
artikel
62 Scalability meets regulation: UTXO-based sharding and zero-knowledge proofs for regulated digital currencies Jin, Si Yuan

27 4 p. 3983-3996
artikel
63 Secure and efficient decentralized machine learning through group-based model aggregation Mosqueda González, Brandon A.

27 4 p. 3911-3925
artikel
64 SEVCOD: secure and efficient verifiable computation on outsourced data Chakraborty, Partha Sarathi

27 4 p. 4725-4739
artikel
65 Sg: Automated tuning algorithm for storage systems based on simulated environments and group climbing Zhang, Yuchen

27 4 p. 4841-4853
artikel
66 Shortest node-to-node disjoint paths algorithm for symmetric networks AlMansouri, Hesham

27 4 p. 4347-4360
artikel
67 Sine Cosine Embedded Squirrel Search Algorithm for Global Optimization and Engineering Design Zeng, Liang

27 4 p. 4415-4448
artikel
68 Streaming traffic classification: a hybrid deep learning and big data approach Seydali, Mehdi

27 4 p. 5165-5193
artikel
69 Test suite assessment of safety-critical systems using safety tactics and fault-based mutation testing Gurbuz, Havva Gulay

27 4 p. 5377-5401
artikel
70 Towards an IPFS-based highly scalable blockchain for PEV charging and achieve near super-stability in a V2V environment Choubey, Anurag

27 4 p. 5295-5336
artikel
71 Towards establishing intelligent multi-domain edge orchestration for highly distributed immersive services: a virtual touring use case Benmerar, Tarik Zakaria

27 4 p. 4223-4253
artikel
72 Towards maintaining confidentiality and anonymity in secure blockchain-based e-voting Abed, Husni

27 4 p. 4635-4657
artikel
73 Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency Hossain Faruk, Md Jobair

27 4 p. 4015-4034
artikel
74 Uncertainty Level-Based Algorithms by Managing Renewable Energy for Geo-Distributed Datacenters Padhi, Slokashree

27 4 p. 5337-5354
artikel
75 Use of edge resources for DNN model maintenance in 5G IoT networks Sung, Jungwoong

27 4 p. 5093-5105
artikel
                             75 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland