nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A background-based new scheduling approach for scheduling the IoT network task with data storage in cloud environment
|
Shakya, Santosh |
|
|
27 |
6 |
p. 8577-8594 |
artikel |
2 |
A balanced leader election algorithm based on replica distribution in Kubernetes cluster
|
Liu, Junnan |
|
|
27 |
6 |
p. 7241-7250 |
artikel |
3 |
A binary hybrid sine cosine white shark optimizer for feature selection
|
Hammouri, Abdelaziz I. |
|
|
27 |
6 |
p. 7825-7867 |
artikel |
4 |
Accelerating erasure coding by exploiting multiple repair paths in distributed storage systems
|
Kim, Chanki |
|
|
27 |
6 |
p. 8621-8635 |
artikel |
5 |
A DRL-based online real-time task scheduling method with ISSA strategy
|
Zhu, Zhikuan |
|
|
27 |
6 |
p. 8207-8223 |
artikel |
6 |
A local global attention based spatiotemporal network for traffic flow forecasting
|
Lan, Yuanchun |
|
|
27 |
6 |
p. 8459-8475 |
artikel |
7 |
A mobility-aware task scheduling by hybrid PSO and GA for mobile edge computing
|
Sang, Yongxuan |
|
|
27 |
6 |
p. 7439-7454 |
artikel |
8 |
A multi-threaded particle swarm optimization-kmeans algorithm based on MapReduce
|
Wang, Xikang |
|
|
27 |
6 |
p. 8031-8044 |
artikel |
9 |
An adaptive vulture based deep belief mechanism for searching user's resources in mobile P2P environment
|
Vijaya Lakshmi, Meeniga |
|
|
27 |
6 |
p. 7689-7704 |
artikel |
10 |
Analyzing the impact of various parameters on job scheduling in the Google cluster dataset
|
Shahmirzadi, Danyal |
|
|
27 |
6 |
p. 7673-7687 |
artikel |
11 |
An energy-aware module placement strategy in fog-based healthcare monitoring systems
|
Hossam, Hadeer S. |
|
|
27 |
6 |
p. 7351-7372 |
artikel |
12 |
An enhanced sea-horse optimizer for solving global problems and cluster head selection in wireless sensor networks
|
Houssein, Essam H. |
|
|
27 |
6 |
p. 7775-7802 |
artikel |
13 |
A new energy-aware technique to improve the network lifetime of wireless Internet of Things using a most valuable player algorithm
|
Xiao, Yongjun |
|
|
27 |
6 |
p. 7251-7271 |
artikel |
14 |
An Improved blockchain-based secure medical record sharing scheme
|
Bodur, Hüseyin |
|
|
27 |
6 |
p. 7981-8000 |
artikel |
15 |
An improved cuckoo search algorithm for global optimization
|
Tian, Yunsheng |
|
|
27 |
6 |
p. 8595-8619 |
artikel |
16 |
An industrial network intrusion detection algorithm based on IGWO-GRU
|
Yang, Wei |
|
|
27 |
6 |
p. 7199-7217 |
artikel |
17 |
A novel energy-based task scheduling in fog computing environment: an improved artificial rabbits optimization approach
|
Ghafari, Reyhane |
|
|
27 |
6 |
p. 8413-8458 |
artikel |
18 |
A real-time stable competitive auction-based task offloading market for heterogeneous mobile cloud (HMC)
|
Ahani, Keyvan |
|
|
27 |
6 |
p. 7323-7349 |
artikel |
19 |
A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree
|
Heidari, Arash |
|
|
27 |
6 |
p. 7521-7539 |
artikel |
20 |
Artificial intelligence assisted IoT-fog based framework for emergency fire response in smart buildings
|
Saini, Munish |
|
|
27 |
6 |
p. 7915-7938 |
artikel |
21 |
A secure paillier cryptosystem based privacy-preserving data aggregation and query processing models for smart grid
|
Kumar, Jatinder |
|
|
27 |
6 |
p. 7389-7400 |
artikel |
22 |
A service mesh approach to integrate processing patterns into microservices applications
|
Nicolas-Plata, Antonio |
|
|
27 |
6 |
p. 7417-7438 |
artikel |
23 |
A systematic mapping on software testing for blockchains
|
Elakaş, Anıl |
|
|
27 |
6 |
p. 7111-7126 |
artikel |
24 |
A task offloading strategy considering forwarding errors based on cloud–fog collaboration
|
Zhao, Yuan |
|
|
27 |
6 |
p. 8531-8555 |
artikel |
25 |
A transfer learning-based intrusion detection system for zero-day attack in communication-based train control system
|
Lu, He |
|
|
27 |
6 |
p. 8477-8492 |
artikel |
26 |
BE-AC: reliable blockchain-based anti-counterfeiting traceability solution for pharmaceutical industry
|
Cao, Youliang |
|
|
27 |
6 |
p. 8119-8139 |
artikel |
27 |
Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm
|
Agrawal, Ruchi |
|
|
27 |
6 |
p. 8015-8030 |
artikel |
28 |
Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage
|
Gautam, Deepika |
|
|
27 |
6 |
p. 8159-8172 |
artikel |
29 |
Blockchain technology for society 4.0: a comprehensive review of key applications, requirement analysis, research trends, challenges and future avenues
|
Majumdar, Parijata |
|
|
27 |
6 |
p. 7059-7081 |
artikel |
30 |
BRL-ETDM: Bayesian reinforcement learning-based explainable threat detection model for industry 5.0 network
|
Dey, Arun Kumar |
|
|
27 |
6 |
p. 8243-8268 |
artikel |
31 |
BSAS: blockchain-based shareable authentication scheme for smart healthcare
|
Rani, Divya |
|
|
27 |
6 |
p. 7955-7979 |
artikel |
32 |
Community detection in attributed networks using neighborhood information
|
Wang, Xiaozong |
|
|
27 |
6 |
p. 8349-8366 |
artikel |
33 |
Correction: Accelerating erasure coding by exploiting multiple repair paths in distributed storage systems
|
Kim, Chanki |
|
|
27 |
6 |
p. 8637 |
artikel |
34 |
Correction: A multi-threaded particle swarm optimization-kmeans algorithm based on MapReduce
|
Wang, Xikang |
|
|
27 |
6 |
p. 8045 |
artikel |
35 |
Correction: Artificial intelligence assisted IoT-fog based framework for emergency fire response in smart buildings
|
Saini, Munish |
|
|
27 |
6 |
p. 7939 |
artikel |
36 |
Cost and response time optimization of edge architectures
|
Entrialgo, Joaquín |
|
|
27 |
6 |
p. 7757-7773 |
artikel |
37 |
CyberDefender: an integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems
|
Krishnaveni, S. |
|
|
27 |
6 |
p. 7273-7306 |
artikel |
38 |
Data fusion and network intrusion detection systems
|
Ahmad, Rasheed |
|
|
27 |
6 |
p. 7493-7519 |
artikel |
39 |
Data repair accelerating scheme for erasure-coded storage system based on FPGA and hierarchical parallel decoding structure
|
Chen, Junqi |
|
|
27 |
6 |
p. 7803-7823 |
artikel |
40 |
Distribution of resources beyond 5G networks with heterogeneous parallel processing and graph optimization algorithms
|
Khadidos, Alaa O. |
|
|
27 |
6 |
p. 8269-8287 |
artikel |
41 |
Dynamic random mutation hybrid Harris hawk optimization and its application to training kernel extreme learning machine
|
Song, Ruiqi |
|
|
27 |
6 |
p. 8493-8530 |
artikel |
42 |
Efficient fog node placement using nature-inspired metaheuristic for IoT applications
|
Naouri, Abdenacer |
|
|
27 |
6 |
p. 8225-8241 |
artikel |
43 |
Elevating security and disease forecasting in smart healthcare through artificial neural synchronized federated learning
|
Hai, Tao |
|
|
27 |
6 |
p. 7889-7914 |
artikel |
44 |
Energy-delay-aware VNF scheduling: a reinforcement learning approach with hierarchical reward enhancement
|
Yang, Xi-Wei |
|
|
27 |
6 |
p. 7657-7671 |
artikel |
45 |
Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain
|
Nazir, Ahsan |
|
|
27 |
6 |
p. 8367-8392 |
artikel |
46 |
Entity relation joint extraction method for manufacturing industry knowledge data based on improved BERT algorithm
|
Han, Jiao |
|
|
27 |
6 |
p. 7941-7954 |
artikel |
47 |
Fine-grained resource adjustment of edge server in cloud-edge collaborative environment
|
Peng, Yu |
|
|
27 |
6 |
p. 7581-7598 |
artikel |
48 |
FS-DBoost: cross-server energy efficiency and performance prediction in cloud based on transfer regression
|
Wu, Guokai |
|
|
27 |
6 |
p. 7705-7719 |
artikel |
49 |
Fusion of deep and local gradient-based features for multimodal finger knuckle print identification
|
Aiadi, Oussama |
|
|
27 |
6 |
p. 7541-7557 |
artikel |
50 |
GHA-Inst: a real-time instance segmentation model utilizing YOLO detection framework
|
Dong, Chengang |
|
|
27 |
6 |
p. 7401-7415 |
artikel |
51 |
IoT-based eHealth using blockchain technology: a survey
|
Allam, Aya H. |
|
|
27 |
6 |
p. 7083-7110 |
artikel |
52 |
Line-of-sight aware accurate collaborative localization based on joint TDoA and AoA measurements in UWB-MIMO environment
|
Al-Khaddour, Mohammad |
|
|
27 |
6 |
p. 7637-7655 |
artikel |
53 |
Locality-aware virtual machine placement based on similarity properties in mobile edge computing
|
Mostafavi Amjad, Davoud |
|
|
27 |
6 |
p. 7559-7580 |
artikel |
54 |
Maintaining the completion-time mechanism for Greening tasks scheduling on DVFS-enabled computing platforms
|
Hagras, Tarek |
|
|
27 |
6 |
p. 7373-7388 |
artikel |
55 |
Malicious detection model with artificial neural network in IoT-based smart farming security
|
Mohy-eddine, Mouaad |
|
|
27 |
6 |
p. 7307-7322 |
artikel |
56 |
Multi-factor authentication scheme based on custom attributes
|
Zhu, Dexin |
|
|
27 |
6 |
p. 7741-7756 |
artikel |
57 |
Multi-objective task offloading optimization in fog computing environment using INSCSA algorithm
|
Fard, Alireza Froozani |
|
|
27 |
6 |
p. 7469-7491 |
artikel |
58 |
Multiplayer battle game-inspired optimizer for complex optimization problems
|
Xu, Yuefeng |
|
|
27 |
6 |
p. 8307-8331 |
artikel |
59 |
Multi-strategy boosted Aquila optimizer for function optimization and engineering design problems
|
Cui, Hao |
|
|
27 |
6 |
p. 7147-7198 |
artikel |
60 |
Network-aware virtual machine placement using enriched butterfly optimisation algorithm in cloud computing paradigm
|
Shanmugam, Veeramani |
|
|
27 |
6 |
p. 8557-8575 |
artikel |
61 |
On efficient interest forwarding in named data networks over IEEE 802.15.4: a comprehensive performance evaluation
|
Ould Khaoua, Adel Salah |
|
|
27 |
6 |
p. 8065-8097 |
artikel |
62 |
Optimizing task allocation in multi-query edge analytics
|
Michailidou, Anna-Valentini |
|
|
27 |
6 |
p. 8289-8306 |
artikel |
63 |
PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks
|
Mehta, Prarthana J. |
|
|
27 |
6 |
p. 8099-8117 |
artikel |
64 |
P4httpGuard: detection and prevention of slow-rate DDoS attacks using machine learning techniques in P4 switch
|
Kapourchali, Reza Fallahi |
|
|
27 |
6 |
p. 8047-8064 |
artikel |
65 |
Power-aware QoS-centric strategy for ultra reliable low latency communication in 5G beyond wireless networks
|
Papachary, Biroju |
|
|
27 |
6 |
p. 7455-7468 |
artikel |
66 |
PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval
|
Chhabra, Archana |
|
|
27 |
6 |
p. 8189-8206 |
artikel |
67 |
Probe mechanism based particle swarm optimization for feature selection
|
Zhang, Hongbo |
|
|
27 |
6 |
p. 8393-8411 |
artikel |
68 |
QoS and reliability aware matched bald eagle task scheduling framework based on IoT-cloud in educational applications
|
Chowdhary, Sunil Kumar |
|
|
27 |
6 |
p. 8141-8158 |
artikel |
69 |
Quantum software engineering and quantum software development lifecycle: a survey
|
Dwivedi, Kanishk |
|
|
27 |
6 |
p. 7127-7145 |
artikel |
70 |
Reliability through an optimal SDS controller’s placement in a SDDC and smart city
|
Bangash, Yawar Abbas |
|
|
27 |
6 |
p. 7219-7240 |
artikel |
71 |
Securing internet of medical devices using energy efficient blockchain for healthcare 4.0
|
Kumar, Ashish |
|
|
27 |
6 |
p. 8333-8348 |
artikel |
72 |
Smart flow: a provenance-supported smart contract workflow architecture
|
Mertens, Dani |
|
|
27 |
6 |
p. 8173-8187 |
artikel |
73 |
Task scheduling using fuzzy logic with best-fit-decreasing for cloud computing environment
|
Thapliyal, Nitin |
|
|
27 |
6 |
p. 7621-7636 |
artikel |
74 |
Timely detection of DDoS attacks in IoT with dimensionality reduction
|
Kumari, Pooja |
|
|
27 |
6 |
p. 7869-7887 |
artikel |
75 |
Tournament based equilibrium optimization for minimizing energy consumption on dynamic task scheduling in cloud-edge computing
|
Souri, Alireza |
|
|
27 |
6 |
p. 8001-8013 |
artikel |
76 |
Uit-DGAdetector: detect domains generated by algorithms using machine learning
|
Cam, Nguyen Tan |
|
|
27 |
6 |
p. 7599-7619 |
artikel |
77 |
Unsupervised text feature selection by binary fire hawk optimizer for text clustering
|
Msallam, Mohammed M. |
|
|
27 |
6 |
p. 7721-7740 |
artikel |