Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             77 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A background-based new scheduling approach for scheduling the IoT network task with data storage in cloud environment Shakya, Santosh

27 6 p. 8577-8594
artikel
2 A balanced leader election algorithm based on replica distribution in Kubernetes cluster Liu, Junnan

27 6 p. 7241-7250
artikel
3 A binary hybrid sine cosine white shark optimizer for feature selection Hammouri, Abdelaziz I.

27 6 p. 7825-7867
artikel
4 Accelerating erasure coding by exploiting multiple repair paths in distributed storage systems Kim, Chanki

27 6 p. 8621-8635
artikel
5 A DRL-based online real-time task scheduling method with ISSA strategy Zhu, Zhikuan

27 6 p. 8207-8223
artikel
6 A local global attention based spatiotemporal network for traffic flow forecasting Lan, Yuanchun

27 6 p. 8459-8475
artikel
7 A mobility-aware task scheduling by hybrid PSO and GA for mobile edge computing Sang, Yongxuan

27 6 p. 7439-7454
artikel
8 A multi-threaded particle swarm optimization-kmeans algorithm based on MapReduce Wang, Xikang

27 6 p. 8031-8044
artikel
9 An adaptive vulture based deep belief mechanism for searching user's resources in mobile P2P environment Vijaya Lakshmi, Meeniga

27 6 p. 7689-7704
artikel
10 Analyzing the impact of various parameters on job scheduling in the Google cluster dataset Shahmirzadi, Danyal

27 6 p. 7673-7687
artikel
11 An energy-aware module placement strategy in fog-based healthcare monitoring systems Hossam, Hadeer S.

27 6 p. 7351-7372
artikel
12 An enhanced sea-horse optimizer for solving global problems and cluster head selection in wireless sensor networks Houssein, Essam H.

27 6 p. 7775-7802
artikel
13 A new energy-aware technique to improve the network lifetime of wireless Internet of Things using a most valuable player algorithm Xiao, Yongjun

27 6 p. 7251-7271
artikel
14 An Improved blockchain-based secure medical record sharing scheme Bodur, Hüseyin

27 6 p. 7981-8000
artikel
15 An improved cuckoo search algorithm for global optimization Tian, Yunsheng

27 6 p. 8595-8619
artikel
16 An industrial network intrusion detection algorithm based on IGWO-GRU Yang, Wei

27 6 p. 7199-7217
artikel
17 A novel energy-based task scheduling in fog computing environment: an improved artificial rabbits optimization approach Ghafari, Reyhane

27 6 p. 8413-8458
artikel
18 A real-time stable competitive auction-based task offloading market for heterogeneous mobile cloud (HMC) Ahani, Keyvan

27 6 p. 7323-7349
artikel
19 A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree Heidari, Arash

27 6 p. 7521-7539
artikel
20 Artificial intelligence assisted IoT-fog based framework for emergency fire response in smart buildings Saini, Munish

27 6 p. 7915-7938
artikel
21 A secure paillier cryptosystem based privacy-preserving data aggregation and query processing models for smart grid Kumar, Jatinder

27 6 p. 7389-7400
artikel
22 A service mesh approach to integrate processing patterns into microservices applications Nicolas-Plata, Antonio

27 6 p. 7417-7438
artikel
23 A systematic mapping on software testing for blockchains Elakaş, Anıl

27 6 p. 7111-7126
artikel
24 A task offloading strategy considering forwarding errors based on cloud–fog collaboration Zhao, Yuan

27 6 p. 8531-8555
artikel
25 A transfer learning-based intrusion detection system for zero-day attack in communication-based train control system Lu, He

27 6 p. 8477-8492
artikel
26 BE-AC: reliable blockchain-based anti-counterfeiting traceability solution for pharmaceutical industry Cao, Youliang

27 6 p. 8119-8139
artikel
27 Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm Agrawal, Ruchi

27 6 p. 8015-8030
artikel
28 Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage Gautam, Deepika

27 6 p. 8159-8172
artikel
29 Blockchain technology for society 4.0: a comprehensive review of key applications, requirement analysis, research trends, challenges and future avenues Majumdar, Parijata

27 6 p. 7059-7081
artikel
30 BRL-ETDM: Bayesian reinforcement learning-based explainable threat detection model for industry 5.0 network Dey, Arun Kumar

27 6 p. 8243-8268
artikel
31 BSAS: blockchain-based shareable authentication scheme for smart healthcare Rani, Divya

27 6 p. 7955-7979
artikel
32 Community detection in attributed networks using neighborhood information Wang, Xiaozong

27 6 p. 8349-8366
artikel
33 Correction: Accelerating erasure coding by exploiting multiple repair paths in distributed storage systems Kim, Chanki

27 6 p. 8637
artikel
34 Correction: A multi-threaded particle swarm optimization-kmeans algorithm based on MapReduce Wang, Xikang

27 6 p. 8045
artikel
35 Correction: Artificial intelligence assisted IoT-fog based framework for emergency fire response in smart buildings Saini, Munish

27 6 p. 7939
artikel
36 Cost and response time optimization of edge architectures Entrialgo, Joaquín

27 6 p. 7757-7773
artikel
37 CyberDefender: an integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems Krishnaveni, S.

27 6 p. 7273-7306
artikel
38 Data fusion and network intrusion detection systems Ahmad, Rasheed

27 6 p. 7493-7519
artikel
39 Data repair accelerating scheme for erasure-coded storage system based on FPGA and hierarchical parallel decoding structure Chen, Junqi

27 6 p. 7803-7823
artikel
40 Distribution of resources beyond 5G networks with heterogeneous parallel processing and graph optimization algorithms Khadidos, Alaa O.

27 6 p. 8269-8287
artikel
41 Dynamic random mutation hybrid Harris hawk optimization and its application to training kernel extreme learning machine Song, Ruiqi

27 6 p. 8493-8530
artikel
42 Efficient fog node placement using nature-inspired metaheuristic for IoT applications Naouri, Abdenacer

27 6 p. 8225-8241
artikel
43 Elevating security and disease forecasting in smart healthcare through artificial neural synchronized federated learning Hai, Tao

27 6 p. 7889-7914
artikel
44 Energy-delay-aware VNF scheduling: a reinforcement learning approach with hierarchical reward enhancement Yang, Xi-Wei

27 6 p. 7657-7671
artikel
45 Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain Nazir, Ahsan

27 6 p. 8367-8392
artikel
46 Entity relation joint extraction method for manufacturing industry knowledge data based on improved BERT algorithm Han, Jiao

27 6 p. 7941-7954
artikel
47 Fine-grained resource adjustment of edge server in cloud-edge collaborative environment Peng, Yu

27 6 p. 7581-7598
artikel
48 FS-DBoost: cross-server energy efficiency and performance prediction in cloud based on transfer regression Wu, Guokai

27 6 p. 7705-7719
artikel
49 Fusion of deep and local gradient-based features for multimodal finger knuckle print identification Aiadi, Oussama

27 6 p. 7541-7557
artikel
50 GHA-Inst: a real-time instance segmentation model utilizing YOLO detection framework Dong, Chengang

27 6 p. 7401-7415
artikel
51 IoT-based eHealth using blockchain technology: a survey Allam, Aya H.

27 6 p. 7083-7110
artikel
52 Line-of-sight aware accurate collaborative localization based on joint TDoA and AoA measurements in UWB-MIMO environment Al-Khaddour, Mohammad

27 6 p. 7637-7655
artikel
53 Locality-aware virtual machine placement based on similarity properties in mobile edge computing Mostafavi Amjad, Davoud

27 6 p. 7559-7580
artikel
54 Maintaining the completion-time mechanism for Greening tasks scheduling on DVFS-enabled computing platforms Hagras, Tarek

27 6 p. 7373-7388
artikel
55 Malicious detection model with artificial neural network in IoT-based smart farming security Mohy-eddine, Mouaad

27 6 p. 7307-7322
artikel
56 Multi-factor authentication scheme based on custom attributes Zhu, Dexin

27 6 p. 7741-7756
artikel
57 Multi-objective task offloading optimization in fog computing environment using INSCSA algorithm Fard, Alireza Froozani

27 6 p. 7469-7491
artikel
58 Multiplayer battle game-inspired optimizer for complex optimization problems Xu, Yuefeng

27 6 p. 8307-8331
artikel
59 Multi-strategy boosted Aquila optimizer for function optimization and engineering design problems Cui, Hao

27 6 p. 7147-7198
artikel
60 Network-aware virtual machine placement using enriched butterfly optimisation algorithm in cloud computing paradigm Shanmugam, Veeramani

27 6 p. 8557-8575
artikel
61 On efficient interest forwarding in named data networks over IEEE 802.15.4: a comprehensive performance evaluation Ould Khaoua, Adel Salah

27 6 p. 8065-8097
artikel
62 Optimizing task allocation in multi-query edge analytics Michailidou, Anna-Valentini

27 6 p. 8289-8306
artikel
63 PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks Mehta, Prarthana J.

27 6 p. 8099-8117
artikel
64 P4httpGuard: detection and prevention of slow-rate DDoS attacks using machine learning techniques in P4 switch Kapourchali, Reza Fallahi

27 6 p. 8047-8064
artikel
65 Power-aware QoS-centric strategy for ultra reliable low latency communication in 5G beyond wireless networks Papachary, Biroju

27 6 p. 7455-7468
artikel
66 PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval Chhabra, Archana

27 6 p. 8189-8206
artikel
67 Probe mechanism based particle swarm optimization for feature selection Zhang, Hongbo

27 6 p. 8393-8411
artikel
68 QoS and reliability aware matched bald eagle task scheduling framework based on IoT-cloud in educational applications Chowdhary, Sunil Kumar

27 6 p. 8141-8158
artikel
69 Quantum software engineering and quantum software development lifecycle: a survey Dwivedi, Kanishk

27 6 p. 7127-7145
artikel
70 Reliability through an optimal SDS controller’s placement in a SDDC and smart city Bangash, Yawar Abbas

27 6 p. 7219-7240
artikel
71 Securing internet of medical devices using energy efficient blockchain for healthcare 4.0 Kumar, Ashish

27 6 p. 8333-8348
artikel
72 Smart flow: a provenance-supported smart contract workflow architecture Mertens, Dani

27 6 p. 8173-8187
artikel
73 Task scheduling using fuzzy logic with best-fit-decreasing for cloud computing environment Thapliyal, Nitin

27 6 p. 7621-7636
artikel
74 Timely detection of DDoS attacks in IoT with dimensionality reduction Kumari, Pooja

27 6 p. 7869-7887
artikel
75 Tournament based equilibrium optimization for minimizing energy consumption on dynamic task scheduling in cloud-edge computing Souri, Alireza

27 6 p. 8001-8013
artikel
76 Uit-DGAdetector: detect domains generated by algorithms using machine learning Cam, Nguyen Tan

27 6 p. 7599-7619
artikel
77 Unsupervised text feature selection by binary fire hawk optimizer for text clustering Msallam, Mohammed M.

27 6 p. 7721-7740
artikel
                             77 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland