nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-based framework for Academic Bank of Credit with transparent credit mobility
|
Choudhary, Ankita |
|
|
27 |
5 |
p. 6667-6688 |
artikel |
2 |
A coupled generative graph convolution network by capturing dynamic relationship of regional flow for traffic prediction
|
Xu, Jiayang |
|
|
27 |
5 |
p. 6773-6786 |
artikel |
3 |
A discrete dwarf mongoose optimization algorithm to solve task assignment problems on smart farms
|
Xu, Minzhi |
|
|
27 |
5 |
p. 6185-6204 |
artikel |
4 |
A distributed intelligence framework for enhancing resilience and data privacy in dynamic cyber-physical systems
|
Azeri, Nabila |
|
|
27 |
5 |
p. 6289-6304 |
artikel |
5 |
A dynamic and optimized routing approach for VANET communication in smart cities to secure intelligent transportation system via a chaotic multi-verse optimization algorithm
|
Sumit, |
|
|
27 |
5 |
p. 7023-7048 |
artikel |
6 |
AFL-HCS: asynchronous federated learning based on heterogeneous edge client selection
|
Tang, Bing |
|
|
27 |
5 |
p. 6247-6264 |
artikel |
7 |
A forecasting-based approach for optimal deployment of edge servers in 5G networks
|
Tiwari, Vaibhav |
|
|
27 |
5 |
p. 5721-5739 |
artikel |
8 |
A hierarchical optimization approach for industrial task offloading and resource allocation in edge computing systems
|
Dong, Jiadong |
|
|
27 |
5 |
p. 5981-5993 |
artikel |
9 |
A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS
|
Huang, Der-Chen |
|
|
27 |
5 |
p. 6953-6983 |
artikel |
10 |
A large-scale multi-objective firefly algorithm based on reward and punishment mechanisms and adaptive dimensional reorganization
|
Pan, Ningkang |
|
|
27 |
5 |
p. 5933-5951 |
artikel |
11 |
A multi-mechanism balanced advanced learning sparrow search algorithm for UAV path planning
|
Yang, Chao |
|
|
27 |
5 |
p. 6623-6666 |
artikel |
12 |
An arithmetic and geometric mean-based multi-objective moth-flame optimization algorithm
|
Sahoo, Saroj Kumar |
|
|
27 |
5 |
p. 6527-6561 |
artikel |
13 |
An effective deep learning architecture leveraging BIRCH clustering for resource usage prediction of heterogeneous machines in cloud data center
|
Garg, Sheetal |
|
|
27 |
5 |
p. 5699-5719 |
artikel |
14 |
An efficient IoT based crop disease prediction and crop recommendation for precision agriculture
|
Sravanthi, Gunaganti |
|
|
27 |
5 |
p. 5755-5782 |
artikel |
15 |
An improved cellular goore game-based consensus protocol for blockchain
|
Ameri, Reyhaneh |
|
|
27 |
5 |
p. 6843-6868 |
artikel |
16 |
An integration of meta-heuristic approach utilizing kernel principal component analysis for multimodal medical image registration
|
Arora, Paluck |
|
|
27 |
5 |
p. 6223-6246 |
artikel |
17 |
A novel strategy for deterministic workflow scheduling with load balancing using modified min-min heuristic in cloud computing environment
|
Choudhary, Anjali |
|
|
27 |
5 |
p. 6985-7006 |
artikel |
18 |
A survey on the scheduling mechanisms in serverless computing: a taxonomy, challenges, and trends
|
Ghorbian, Mohsen |
|
|
27 |
5 |
p. 5571-5610 |
artikel |
19 |
A trusted computing framework for cloud data security using role-based access and pattern recognition
|
Pradhan, Gyanapriya |
|
|
27 |
5 |
p. 6609-6622 |
artikel |
20 |
Bare-bones based honey badger algorithm of CNN for Sleep Apnea detection
|
Abasi, Ammar Kamal |
|
|
27 |
5 |
p. 6145-6165 |
artikel |
21 |
Big dermatological data service for precise and immediate diagnosis by utilizing pre-trained learning models
|
Elbes, Mohammed |
|
|
27 |
5 |
p. 6931-6951 |
artikel |
22 |
Big-IDS: a decentralized multi agent reinforcement learning approach for distributed intrusion detection in big data networks
|
Louati, Faten |
|
|
27 |
5 |
p. 6823-6841 |
artikel |
23 |
BPaaS placement over optimum cloud availability zones
|
Hedhli, Ameni |
|
|
27 |
5 |
p. 5845-5865 |
artikel |
24 |
CBPNs: coloured behavioural petri nets for model-based diagnosis
|
Bennoui, Hammadi |
|
|
27 |
5 |
p. 5631-5646 |
artikel |
25 |
Circulation of legitimate information over VANETs using threshold signature scheme
|
Yadav, Vijay Kumar |
|
|
27 |
5 |
p. 6205-6221 |
artikel |
26 |
Correction: Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units
|
Saemi, Behzad |
|
|
27 |
5 |
p. 6489 |
artikel |
27 |
Dataflow-based automatic parallelization of MATLAB/Simulink models for fitting modern multicore architectures
|
Gasmi, Kaouther |
|
|
27 |
5 |
p. 6579-6590 |
artikel |
28 |
Decentralized multiple hypothesis testing in Cognitive IOT using massive heterogeneous data
|
Jha, Vidyapati |
|
|
27 |
5 |
p. 6889-6929 |
artikel |
29 |
Deployment and performance monitoring of docker based federated learning framework for software defect prediction
|
Malhotra, Ruchika |
|
|
27 |
5 |
p. 6039-6057 |
artikel |
30 |
Design and realization of hybrid resource management system for heterogeneous cluster
|
He, Qinlu |
|
|
27 |
5 |
p. 6119-6144 |
artikel |
31 |
Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection
|
Biyyapu, NarasimhaSwamy |
|
|
27 |
5 |
p. 5913-5931 |
artikel |
32 |
Distributed privacy preservation for online social network using flexible clustering and whale optimization algorithm
|
Uke, Nilesh J. |
|
|
27 |
5 |
p. 5995-6012 |
artikel |
33 |
Duck swarm algorithm: theory, numerical optimization, and applications
|
Zhang, Mengjian |
|
|
27 |
5 |
p. 6441-6469 |
artikel |
34 |
Edge intelligence-assisted smart healthcare solution for health pandemic: a federated environment approach
|
Manocha, Ankush |
|
|
27 |
5 |
p. 5611-5630 |
artikel |
35 |
Edge server placement and allocation optimization: a tradeoff for enhanced performance
|
Ghasemzadeh, Ardalan |
|
|
27 |
5 |
p. 5783-5797 |
artikel |
36 |
EMR sharing system with lightweight searchable encryption and rights management
|
Luo, Haotian |
|
|
27 |
5 |
p. 6341-6353 |
artikel |
37 |
Enhanced pelican optimization algorithm with ensemble-based anomaly detection in industrial internet of things environment
|
Chander, Nenavath |
|
|
27 |
5 |
p. 6491-6509 |
artikel |
38 |
Enhancement in performance of cloud computing task scheduling using optimization strategies
|
Sandhu, Ramandeep |
|
|
27 |
5 |
p. 6265-6288 |
artikel |
39 |
EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservation
|
Xu, Chang |
|
|
27 |
5 |
p. 7007-7022 |
artikel |
40 |
eXtreme Federated Learning (XFL): a layer-wise approach
|
El Mokadem, Rachid |
|
|
27 |
5 |
p. 5741-5754 |
artikel |
41 |
FBDD: feature-based drift detector for batch processing data
|
Porwik, Piotr |
|
|
27 |
5 |
p. 6805-6822 |
artikel |
42 |
5 G and beyond wireless network optimization through RIS technology: a pricing game
|
Daoudi, Lhoussaine |
|
|
27 |
5 |
p. 5867-5877 |
artikel |
43 |
General construction of compressive integrity auditing protocol from strong homomorphic encryption scheme
|
Song, Jing |
|
|
27 |
5 |
p. 5663-5675 |
artikel |
44 |
GT-scheduler: a hybrid graph-partitioning and tabu-search based task scheduler for distributed data stream processing systems
|
Hadian, Hamid |
|
|
27 |
5 |
p. 5815-5832 |
artikel |
45 |
Hyperbolic Sine Optimizer: a new metaheuristic algorithm for high performance computing to address computationally intensive tasks
|
Thapliyal, Shivankur |
|
|
27 |
5 |
p. 6703-6772 |
artikel |
46 |
Identity-based remote data integrity auditing from lattices for secure cloud storage
|
Yang, Songrun |
|
|
27 |
5 |
p. 5833-5844 |
artikel |
47 |
Improved sparrow algorithm based virtual machine placement
|
Ren, Qianye |
|
|
27 |
5 |
p. 6511-6525 |
artikel |
48 |
Improving resource utilization and fault tolerance in large simulations via actors
|
Klenk, Kyle |
|
|
27 |
5 |
p. 6323-6340 |
artikel |
49 |
Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units
|
Saemi, Behzad |
|
|
27 |
5 |
p. 6471-6487 |
artikel |
50 |
Iot interoperability framework for smart home: MDA-inspired approach
|
Sharma, Renu |
|
|
27 |
5 |
p. 6305-6322 |
artikel |
51 |
Location-routing and cost-sharing models under joint distribution
|
Qie, Binghui |
|
|
27 |
5 |
p. 5879-5891 |
artikel |
52 |
Machine learning-based intelligent security framework for secure cloud key management
|
Ahmad, Shahnawaz |
|
|
27 |
5 |
p. 5953-5979 |
artikel |
53 |
MAIDS: malicious agent identification-based data security model for cloud environments
|
Gupta, Kishu |
|
|
27 |
5 |
p. 6167-6184 |
artikel |
54 |
MDepthNet based phishing attack detection using integrated deep learning methodologies for cyber security enhancement
|
Yamarthy, Anil Kumar |
|
|
27 |
5 |
p. 6377-6395 |
artikel |
55 |
Memory orchestration mechanisms in serverless computing: a taxonomy, review and future directions
|
Shojaee rad, Zahra |
|
|
27 |
5 |
p. 5489-5515 |
artikel |
56 |
Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing
|
Roy, Sujoy |
|
|
27 |
5 |
p. 6013-6038 |
artikel |
57 |
MLANet: multi-level attention network with multi-scale feature fusion for crowd counting
|
Xiong, Liyan |
|
|
27 |
5 |
p. 6591-6608 |
artikel |
58 |
MSCA-UNet: multi-scale channel attention-based UNet for segmentation of medical ultrasound images
|
Chen, Zihan |
|
|
27 |
5 |
p. 6787-6804 |
artikel |
59 |
Multi-level spatial-temporal fusion neural network for traffic flow prediction
|
Peng, Zhiying |
|
|
27 |
5 |
p. 6689-6702 |
artikel |
60 |
Network states-aware collective communication optimization
|
Wang, Jingyuan |
|
|
27 |
5 |
p. 6869-6887 |
artikel |
61 |
Ovcosim: an open-source versatile computation offloading simulator for cloud and fog computing
|
Pirbasti, Marzieh Ranjbar |
|
|
27 |
5 |
p. 5647-5661 |
artikel |
62 |
PerMl-Fed: enabling personalized multi-level federated learning within heterogenous IoT environments for activity recognition
|
Zhang, Chang |
|
|
27 |
5 |
p. 6425-6440 |
artikel |
63 |
Quantifying the impact of resource redundancy on smart city system dependability: a model-driven approach
|
Silva, Francisco Airton |
|
|
27 |
5 |
p. 6059-6079 |
artikel |
64 |
Resource optimization in edge and SDN-based edge computing: a comprehensive study
|
Nain, Ajay |
|
|
27 |
5 |
p. 5517-5545 |
artikel |
65 |
Scalability of blockchain: a comprehensive review and future research direction
|
Rao, Iqra Sadia |
|
|
27 |
5 |
p. 5547-5570 |
artikel |
66 |
SDDA-IoT: storm-based distributed detection approach for IoT network traffic-based DDoS attacks
|
Shukla, Praveen |
|
|
27 |
5 |
p. 6397-6424 |
artikel |
67 |
Spark-based multi-verse optimizer as wrapper features selection algorithm for phishing attack challenge
|
Al-Sawwa, Jamil |
|
|
27 |
5 |
p. 5799-5814 |
artikel |
68 |
Stochastic analysis of fog computing and machine learning for scalable low-latency healthcare monitoring
|
Amzil, Abdellah |
|
|
27 |
5 |
p. 6097-6117 |
artikel |
69 |
The integration strategy of information system based on artificial intelligence big data technology in metaverse environment
|
Lin, Yechuan |
|
|
27 |
5 |
p. 7049-7057 |
artikel |
70 |
Three-layer data center-based intelligent slice admission control algorithm for C-RAN using approximate reinforcement learning
|
Khani, Mohsen |
|
|
27 |
5 |
p. 5893-5911 |
artikel |
71 |
Toward designing highly effective and efficient consensus mechanisms for blockchain-based applications
|
Zhu, Nafei |
|
|
27 |
5 |
p. 5677-5698 |
artikel |
72 |
UGV-awareness task placement in edge-cloud based urban intelligent video systems
|
Zhang, Gaofeng |
|
|
27 |
5 |
p. 6563-6577 |
artikel |
73 |
Using a nested virtualization tool for teaching VPN fundamentals
|
Orduña, Juan M. |
|
|
27 |
5 |
p. 6081-6095 |
artikel |
74 |
Video quality adaptation using CNN and RNN models for cost-effective and scalable video streaming Services
|
Darwich, Mahmoud |
|
|
27 |
5 |
p. 6355-6375 |
artikel |