nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
AAPF*: a safer autonomous vehicle path planning algorithm based on the improved A* algorithm and APF algorithm
|
Yang, Yalian |
|
|
27 |
8 |
p. 11393-11406 |
artikel |
2 |
A collective approach to reach known and unknown target in multi agent environment using nature inspired algorithms
|
Sharma, Sanjeev |
|
|
27 |
8 |
p. 11369-11392 |
artikel |
3 |
A cutting-edge intelligent cyber model for intrusion detection in IoT environments leveraging future generations networks
|
Mughaid, Ala |
|
|
27 |
8 |
p. 10359-10375 |
artikel |
4 |
Adaptive dynamic elite opposition-based Ali Baba and the forty thieves algorithm for high-dimensional feature selection
|
Braik, Malik |
|
|
27 |
8 |
p. 10487-10523 |
artikel |
5 |
A family of truthful mechanisms for resource allocation with multi-attribute demand in mobile edge computing
|
Liu, Xi |
|
|
27 |
8 |
p. 11595-11610 |
artikel |
6 |
A Genetic Algorithm-based approach for placement in the fog of latency-sensitive multiplayer game servers
|
Benamer, Amira-Rayane |
|
|
27 |
8 |
p. 11249-11275 |
artikel |
7 |
A hybrid genetic-based task scheduling algorithm for cost-efficient workflow execution in heterogeneous cloud computing environment
|
Khademi Dehnavi, Mohsen |
|
|
27 |
8 |
p. 10833-10858 |
artikel |
8 |
AI-based & heuristic workflow scheduling in cloud and fog computing: a systematic review
|
Khaledian, Navid |
|
|
27 |
8 |
p. 10265-10298 |
artikel |
9 |
A knowledge graph embedding model based on multi-level analogical reasoning
|
Zhao, Xiaofei |
|
|
27 |
8 |
p. 10553-10567 |
artikel |
10 |
A machine learning-based ensemble model for securing the IoT network
|
Singh, Rohit |
|
|
27 |
8 |
p. 10883-10897 |
artikel |
11 |
A multiobjective optimization of task workflow scheduling using hybridization of PSO and WOA algorithms in cloud-fog computing
|
Bansal, Sumit |
|
|
27 |
8 |
p. 10921-10952 |
artikel |
12 |
An autonomous blockchain-based workflow execution broker for e-science
|
Alimoğlu, Alper |
|
|
27 |
8 |
p. 10235-10244 |
artikel |
13 |
An experimental and comparative study examining resource utilization in cloud data center
|
Braiki, Khaoula |
|
|
27 |
8 |
p. 11085-11102 |
artikel |
14 |
An improved density peaks clustering based on sparrow search algorithm
|
Chen, Yaru |
|
|
27 |
8 |
p. 11017-11037 |
artikel |
15 |
An intelligent mechanism for energy consumption scheduling in smart buildings
|
Harb, Hassan |
|
|
27 |
8 |
p. 11149-11165 |
artikel |
16 |
An intelligent offloading and resource allocation using Fuzzy-based HHGA algorithm for IoT applications
|
Chakraborty, Ananya |
|
|
27 |
8 |
p. 11167-11185 |
artikel |
17 |
A novel approach detection for IIoT attacks via artificial intelligence
|
Karacayılmaz, Gökçe |
|
|
27 |
8 |
p. 10467-10485 |
artikel |
18 |
A novel virtual machine consolidation algorithm with server power mode management for energy-efficient cloud data centers
|
Lin, Hongrui |
|
|
27 |
8 |
p. 11709-11725 |
artikel |
19 |
ARIR: an intent recognition-based approach for API recommendation
|
Cao, Buqing |
|
|
27 |
8 |
p. 10819-10832 |
artikel |
20 |
A smart contract-driven access control scheme with integrity checking for electronic health records
|
Li, Hongzhi |
|
|
27 |
8 |
p. 11515-11535 |
artikel |
21 |
A tube-based model predictive control method for intelligent vehicles path tracking
|
Yang, Xu |
|
|
27 |
8 |
p. 10343-10357 |
artikel |
22 |
Binary classification for imbalanced datasets using twin hyperspheres based on conformal method
|
Zheng, Jian |
|
|
27 |
8 |
p. 11299-11315 |
artikel |
23 |
Chaotic marine predator optimization algorithm for feature selection in schizophrenia classification using EEG signals
|
Garip, Zeynep |
|
|
27 |
8 |
p. 11277-11297 |
artikel |
24 |
Comprehensive framework for implementing blockchain-enabled federated learning and full homomorphic encryption for chatbot security system
|
Jalali, Nasir Ahmad |
|
|
27 |
8 |
p. 10859-10882 |
artikel |
25 |
Deep learning adversarial attacks and defenses on license plate recognition system
|
Vizcarra, Conrado |
|
|
27 |
8 |
p. 11627-11644 |
artikel |
26 |
Deep variability modeling to enhance reproducibility of database performance testing
|
Ouared, Abdelkader |
|
|
27 |
8 |
p. 11683-11708 |
artikel |
27 |
Design of distributed network intrusion prevention system based on Spark and P2DR models
|
An, Lei |
|
|
27 |
8 |
p. 10757-10776 |
artikel |
28 |
Easypay: a user-friendly blockchain-powered payment gateway
|
Dutta, Jhuma |
|
|
27 |
8 |
p. 10633-10652 |
artikel |
29 |
Efficient malware detection through inter-component communication analysis
|
Chen, Peng |
|
|
27 |
8 |
p. 11667-11682 |
artikel |
30 |
Efficientnetv2-RegNet: an effective deep learning framework for secure SDN based IOT network
|
Swathi, Baswaraju |
|
|
27 |
8 |
p. 10653-10670 |
artikel |
31 |
Enhanced 3D indoor position estimation from smartphone’s inbuilt IMU and pressure sensor via hybrid approach
|
Sharma, Shiva |
|
|
27 |
8 |
p. 10953-10970 |
artikel |
32 |
Enhancing blockchain scalability and security: the early fraud detection (EFD) framework for optimistic rollups
|
Gupta, Shristy |
|
|
27 |
8 |
p. 10971-10992 |
artikel |
33 |
Enhancing EfficientNetv2 with global and efficient channel attention mechanisms for accurate MRI-Based brain tumor classification
|
Pacal, Ishak |
|
|
27 |
8 |
p. 11187-11212 |
artikel |
34 |
Exploitation of healthcare IoT–fog-based smart e-health gateways: a resource optimization approach
|
Wen, Bo |
|
|
27 |
8 |
p. 10733-10755 |
artikel |
35 |
Fault-tolerant allocation of deadline-constrained tasks through preemptive migration in heterogeneous cloud environments
|
Kirti, Medha |
|
|
27 |
8 |
p. 11427-11454 |
artikel |
36 |
Federated learning for efficient spectrum allocation in open RAN
|
Asad, Muhammad |
|
|
27 |
8 |
p. 11237-11247 |
artikel |
37 |
Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing
|
Zhao, Xiaolong |
|
|
27 |
8 |
p. 10437-10453 |
artikel |
38 |
Graph-ensemble fusion for enhanced IoT intrusion detection: leveraging GCN and deep learning
|
Mittal, Kajol |
|
|
27 |
8 |
p. 10525-10552 |
artikel |
39 |
GTBNN: game-theoretic and bayesian neural networks to tackle security attacks in intelligent transportation systems
|
Gill, Komal Singh |
|
|
27 |
8 |
p. 11645-11665 |
artikel |
40 |
High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform
|
Chan, Jia-Lin |
|
|
27 |
8 |
p. 11213-11235 |
artikel |
41 |
HMM-CPM: a cloud instance resource prediction method tracing the workload trends via hidden Markov model
|
Yang, Zhihe |
|
|
27 |
8 |
p. 11823-11838 |
artikel |
42 |
HTPA: a hybrid traffic pattern aware arbitration strategy for network on chip systems
|
Matin, Mostafa |
|
|
27 |
8 |
p. 11471-11489 |
artikel |
43 |
HyperSegRec: enhanced hypergraph-based recommendation system with user segmentation and item similarity learning
|
Malik, Nidhi |
|
|
27 |
8 |
p. 11727-11745 |
artikel |
44 |
Improvement in task allocation for VM and reduction of Makespan in IaaS model for cloud computing
|
Ullah, Arif |
|
|
27 |
8 |
p. 11407-11426 |
artikel |
45 |
Integration of bat algorithm and salp swarm intelligence with stochastic difference variants for global optimization
|
Li, Hongye |
|
|
27 |
8 |
p. 10777-10818 |
artikel |
46 |
Intelligent patrol inspection of low code enabled electric power communication equipment based on digital transformation
|
Huang, Xing |
|
|
27 |
8 |
p. 10421-10435 |
artikel |
47 |
Internet of things-based secure architecture to automate industry
|
Aljumah, Abdullah |
|
|
27 |
8 |
p. 11103-11118 |
artikel |
48 |
Investigating large language models capabilities for automatic code repair in Python
|
Omari, Safwan |
|
|
27 |
8 |
p. 10717-10731 |
artikel |
49 |
K-means and meta-heuristic algorithms for intrusion detection systems
|
Maazalahi, Mahdieh |
|
|
27 |
8 |
p. 10377-10419 |
artikel |
50 |
MADESANT: malware detection and severity analysis in industrial environments
|
Jayalaxmi, P. L. S. |
|
|
27 |
8 |
p. 11347-11367 |
artikel |
51 |
Medical diagnosis using interval type-2 fuzzy similarity measures
|
Cherif, Sahar |
|
|
27 |
8 |
p. 10455-10466 |
artikel |
52 |
Mobility-enhanced delay-aware cloudlet movement and placement using cluster-based technique in a smart healthcare platform
|
Sahkhar, Lizia |
|
|
27 |
8 |
p. 11803-11821 |
artikel |
53 |
MPTD: optimizing multi-path transport with dynamic target delay in datacenters
|
Li, Mingyan |
|
|
27 |
8 |
p. 11455-11469 |
artikel |
54 |
Multicriteria client selection model using class topper optimization based optimal federated learning for healthcare informatics
|
Narwaria, Mamta |
|
|
27 |
8 |
p. 10325-10342 |
artikel |
55 |
Multi-objective generalized normal distribution optimization: a novel algorithm for multi-objective problems
|
Khodadadi, Nima |
|
|
27 |
8 |
p. 10589-10631 |
artikel |
56 |
Multi-objective task scheduling based on PSO-Ring and intuitionistic fuzzy set
|
Mohammad Hasani Zade, Behnam |
|
|
27 |
8 |
p. 11747-11802 |
artikel |
57 |
Multi-strategy enhanced Grey Wolf Optimizer for global optimization and real world problems
|
Wang, Zhendong |
|
|
27 |
8 |
p. 10671-10715 |
artikel |
58 |
Multivariate time series ensemble model for load prediction on hosts using anomaly detection techniques
|
Bawa, Shabnam |
|
|
27 |
8 |
p. 10993-11016 |
artikel |
59 |
Natural language why-question answering system in business intelligence context
|
Djiroun, Rahma |
|
|
27 |
8 |
p. 11039-11067 |
artikel |
60 |
Performance analysis of ODL and RYU controllers’ against DDoS attack in software defined networks
|
Gupta, Neelam |
|
|
27 |
8 |
p. 10899-10919 |
artikel |
61 |
Performance optimization of Spark MLlib workloads using cost efficient RICG model on exponential projective sampling
|
Sewal, Piyush |
|
|
27 |
8 |
p. 10569-10588 |
artikel |
62 |
Quantum-inspired multi-objective African vultures optimization algorithm with hierarchical structure for software requirement
|
Liu, Bo |
|
|
27 |
8 |
p. 11317-11345 |
artikel |
63 |
Reinforcement learning based task offloading of IoT applications in fog computing: algorithms and optimization techniques
|
Allaoui, Takwa |
|
|
27 |
8 |
p. 10299-10324 |
artikel |
64 |
Secured IoT architecture for personalized marketing using blockchain framework with deep learning technology
|
Khandekar, Apurva |
|
|
27 |
8 |
p. 11069-11084 |
artikel |
65 |
Software defect prediction ensemble learning algorithm based on 2-step sparrow optimizing extreme learning machine
|
Tang, Yu |
|
|
27 |
8 |
p. 11119-11148 |
artikel |
66 |
Spatial-temporal multiscale feature optimization based two-stream convolutional neural network for action recognition
|
Xia, Limin |
|
|
27 |
8 |
p. 11611-11626 |
artikel |
67 |
Stacked ensemble learning for facial gender classification using deep learning based features extraction
|
waris, Fazal |
|
|
27 |
8 |
p. 11491-11513 |
artikel |
68 |
TPBFS: two populations based feature selection method for medical data
|
Quan, Haodi |
|
|
27 |
8 |
p. 11553-11568 |
artikel |
69 |
Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme
|
Chen, Zigang |
|
|
27 |
8 |
p. 10245-10264 |
artikel |
70 |
Workload dynamics implications in permissioned blockchain scalability and performance
|
Thakur, Anita |
|
|
27 |
8 |
p. 11569-11593 |
artikel |
71 |
XsimGCL’s cross-layer for group recommendation using extremely simple graph contrastive learning
|
Liu, Tengjiao |
|
|
27 |
8 |
p. 11537-11552 |
artikel |