Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             74 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain-based framework for Academic Bank of Credit with transparent credit mobility Choudhary, Ankita

27 5 p. 6667-6688
artikel
2 A coupled generative graph convolution network by capturing dynamic relationship of regional flow for traffic prediction Xu, Jiayang

27 5 p. 6773-6786
artikel
3 A discrete dwarf mongoose optimization algorithm to solve task assignment problems on smart farms Xu, Minzhi

27 5 p. 6185-6204
artikel
4 A distributed intelligence framework for enhancing resilience and data privacy in dynamic cyber-physical systems Azeri, Nabila

27 5 p. 6289-6304
artikel
5 A dynamic and optimized routing approach for VANET communication in smart cities to secure intelligent transportation system via a chaotic multi-verse optimization algorithm Sumit,

27 5 p. 7023-7048
artikel
6 AFL-HCS: asynchronous federated learning based on heterogeneous edge client selection Tang, Bing

27 5 p. 6247-6264
artikel
7 A forecasting-based approach for optimal deployment of edge servers in 5G networks Tiwari, Vaibhav

27 5 p. 5721-5739
artikel
8 A hierarchical optimization approach for industrial task offloading and resource allocation in edge computing systems Dong, Jiadong

27 5 p. 5981-5993
artikel
9 A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS Huang, Der-Chen

27 5 p. 6953-6983
artikel
10 A large-scale multi-objective firefly algorithm based on reward and punishment mechanisms and adaptive dimensional reorganization Pan, Ningkang

27 5 p. 5933-5951
artikel
11 A multi-mechanism balanced advanced learning sparrow search algorithm for UAV path planning Yang, Chao

27 5 p. 6623-6666
artikel
12 An arithmetic and geometric mean-based multi-objective moth-flame optimization algorithm Sahoo, Saroj Kumar

27 5 p. 6527-6561
artikel
13 An effective deep learning architecture leveraging BIRCH clustering for resource usage prediction of heterogeneous machines in cloud data center Garg, Sheetal

27 5 p. 5699-5719
artikel
14 An efficient IoT based crop disease prediction and crop recommendation for precision agriculture Sravanthi, Gunaganti

27 5 p. 5755-5782
artikel
15 An improved cellular goore game-based consensus protocol for blockchain Ameri, Reyhaneh

27 5 p. 6843-6868
artikel
16 An integration of meta-heuristic approach utilizing kernel principal component analysis for multimodal medical image registration Arora, Paluck

27 5 p. 6223-6246
artikel
17 A novel strategy for deterministic workflow scheduling with load balancing using modified min-min heuristic in cloud computing environment Choudhary, Anjali

27 5 p. 6985-7006
artikel
18 A survey on the scheduling mechanisms in serverless computing: a taxonomy, challenges, and trends Ghorbian, Mohsen

27 5 p. 5571-5610
artikel
19 A trusted computing framework for cloud data security using role-based access and pattern recognition Pradhan, Gyanapriya

27 5 p. 6609-6622
artikel
20 Bare-bones based honey badger algorithm of CNN for Sleep Apnea detection Abasi, Ammar Kamal

27 5 p. 6145-6165
artikel
21 Big dermatological data service for precise and immediate diagnosis by utilizing pre-trained learning models Elbes, Mohammed

27 5 p. 6931-6951
artikel
22 Big-IDS: a decentralized multi agent reinforcement learning approach for distributed intrusion detection in big data networks Louati, Faten

27 5 p. 6823-6841
artikel
23 BPaaS placement over optimum cloud availability zones Hedhli, Ameni

27 5 p. 5845-5865
artikel
24 CBPNs: coloured behavioural petri nets for model-based diagnosis Bennoui, Hammadi

27 5 p. 5631-5646
artikel
25 Circulation of legitimate information over VANETs using threshold signature scheme Yadav, Vijay Kumar

27 5 p. 6205-6221
artikel
26 Correction: Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units Saemi, Behzad

27 5 p. 6489
artikel
27 Dataflow-based automatic parallelization of MATLAB/Simulink models for fitting modern multicore architectures Gasmi, Kaouther

27 5 p. 6579-6590
artikel
28 Decentralized multiple hypothesis testing in Cognitive IOT using massive heterogeneous data Jha, Vidyapati

27 5 p. 6889-6929
artikel
29 Deployment and performance monitoring of docker based federated learning framework for software defect prediction Malhotra, Ruchika

27 5 p. 6039-6057
artikel
30 Design and realization of hybrid resource management system for heterogeneous cluster He, Qinlu

27 5 p. 6119-6144
artikel
31 Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection Biyyapu, NarasimhaSwamy

27 5 p. 5913-5931
artikel
32 Distributed privacy preservation for online social network using flexible clustering and whale optimization algorithm Uke, Nilesh J.

27 5 p. 5995-6012
artikel
33 Duck swarm algorithm: theory, numerical optimization, and applications Zhang, Mengjian

27 5 p. 6441-6469
artikel
34 Edge intelligence-assisted smart healthcare solution for health pandemic: a federated environment approach Manocha, Ankush

27 5 p. 5611-5630
artikel
35 Edge server placement and allocation optimization: a tradeoff for enhanced performance Ghasemzadeh, Ardalan

27 5 p. 5783-5797
artikel
36 EMR sharing system with lightweight searchable encryption and rights management Luo, Haotian

27 5 p. 6341-6353
artikel
37 Enhanced pelican optimization algorithm with ensemble-based anomaly detection in industrial internet of things environment Chander, Nenavath

27 5 p. 6491-6509
artikel
38 Enhancement in performance of cloud computing task scheduling using optimization strategies Sandhu, Ramandeep

27 5 p. 6265-6288
artikel
39 EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservation Xu, Chang

27 5 p. 7007-7022
artikel
40 eXtreme Federated Learning (XFL): a layer-wise approach El Mokadem, Rachid

27 5 p. 5741-5754
artikel
41 FBDD: feature-based drift detector for batch processing data Porwik, Piotr

27 5 p. 6805-6822
artikel
42 5 G and beyond wireless network optimization through RIS technology: a pricing game Daoudi, Lhoussaine

27 5 p. 5867-5877
artikel
43 General construction of compressive integrity auditing protocol from strong homomorphic encryption scheme Song, Jing

27 5 p. 5663-5675
artikel
44 GT-scheduler: a hybrid graph-partitioning and tabu-search based task scheduler for distributed data stream processing systems Hadian, Hamid

27 5 p. 5815-5832
artikel
45 Hyperbolic Sine Optimizer: a new metaheuristic algorithm for high performance computing to address computationally intensive tasks Thapliyal, Shivankur

27 5 p. 6703-6772
artikel
46 Identity-based remote data integrity auditing from lattices for secure cloud storage Yang, Songrun

27 5 p. 5833-5844
artikel
47 Improved sparrow algorithm based virtual machine placement Ren, Qianye

27 5 p. 6511-6525
artikel
48 Improving resource utilization and fault tolerance in large simulations via actors Klenk, Kyle

27 5 p. 6323-6340
artikel
49 Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units Saemi, Behzad

27 5 p. 6471-6487
artikel
50 Iot interoperability framework for smart home: MDA-inspired approach Sharma, Renu

27 5 p. 6305-6322
artikel
51 Location-routing and cost-sharing models under joint distribution Qie, Binghui

27 5 p. 5879-5891
artikel
52 Machine learning-based intelligent security framework for secure cloud key management Ahmad, Shahnawaz

27 5 p. 5953-5979
artikel
53 MAIDS: malicious agent identification-based data security model for cloud environments Gupta, Kishu

27 5 p. 6167-6184
artikel
54 MDepthNet based phishing attack detection using integrated deep learning methodologies for cyber security enhancement Yamarthy, Anil Kumar

27 5 p. 6377-6395
artikel
55 Memory orchestration mechanisms in serverless computing: a taxonomy, review and future directions Shojaee rad, Zahra

27 5 p. 5489-5515
artikel
56 Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing Roy, Sujoy

27 5 p. 6013-6038
artikel
57 MLANet: multi-level attention network with multi-scale feature fusion for crowd counting Xiong, Liyan

27 5 p. 6591-6608
artikel
58 MSCA-UNet: multi-scale channel attention-based UNet for segmentation of medical ultrasound images Chen, Zihan

27 5 p. 6787-6804
artikel
59 Multi-level spatial-temporal fusion neural network for traffic flow prediction Peng, Zhiying

27 5 p. 6689-6702
artikel
60 Network states-aware collective communication optimization Wang, Jingyuan

27 5 p. 6869-6887
artikel
61 Ovcosim: an open-source versatile computation offloading simulator for cloud and fog computing Pirbasti, Marzieh Ranjbar

27 5 p. 5647-5661
artikel
62 PerMl-Fed: enabling personalized multi-level federated learning within heterogenous IoT environments for activity recognition Zhang, Chang

27 5 p. 6425-6440
artikel
63 Quantifying the impact of resource redundancy on smart city system dependability: a model-driven approach Silva, Francisco Airton

27 5 p. 6059-6079
artikel
64 Resource optimization in edge and SDN-based edge computing: a comprehensive study Nain, Ajay

27 5 p. 5517-5545
artikel
65 Scalability of blockchain: a comprehensive review and future research direction Rao, Iqra Sadia

27 5 p. 5547-5570
artikel
66 SDDA-IoT: storm-based distributed detection approach for IoT network traffic-based DDoS attacks Shukla, Praveen

27 5 p. 6397-6424
artikel
67 Spark-based multi-verse optimizer as wrapper features selection algorithm for phishing attack challenge Al-Sawwa, Jamil

27 5 p. 5799-5814
artikel
68 Stochastic analysis of fog computing and machine learning for scalable low-latency healthcare monitoring Amzil, Abdellah

27 5 p. 6097-6117
artikel
69 The integration strategy of information system based on artificial intelligence big data technology in metaverse environment Lin, Yechuan

27 5 p. 7049-7057
artikel
70 Three-layer data center-based intelligent slice admission control algorithm for C-RAN using approximate reinforcement learning Khani, Mohsen

27 5 p. 5893-5911
artikel
71 Toward designing highly effective and efficient consensus mechanisms for blockchain-based applications Zhu, Nafei

27 5 p. 5677-5698
artikel
72 UGV-awareness task placement in edge-cloud based urban intelligent video systems Zhang, Gaofeng

27 5 p. 6563-6577
artikel
73 Using a nested virtualization tool for teaching VPN fundamentals Orduña, Juan M.

27 5 p. 6081-6095
artikel
74 Video quality adaptation using CNN and RNN models for cost-effective and scalable video streaming Services Darwich, Mahmoud

27 5 p. 6355-6375
artikel
                             74 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland