Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             71 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 AAPF*: a safer autonomous vehicle path planning algorithm based on the improved A* algorithm and APF algorithm Yang, Yalian

27 8 p. 11393-11406
artikel
2 A collective approach to reach known and unknown target in multi agent environment using nature inspired algorithms Sharma, Sanjeev

27 8 p. 11369-11392
artikel
3 A cutting-edge intelligent cyber model for intrusion detection in IoT environments leveraging future generations networks Mughaid, Ala

27 8 p. 10359-10375
artikel
4 Adaptive dynamic elite opposition-based Ali Baba and the forty thieves algorithm for high-dimensional feature selection Braik, Malik

27 8 p. 10487-10523
artikel
5 A family of truthful mechanisms for resource allocation with multi-attribute demand in mobile edge computing Liu, Xi

27 8 p. 11595-11610
artikel
6 A Genetic Algorithm-based approach for placement in the fog of latency-sensitive multiplayer game servers Benamer, Amira-Rayane

27 8 p. 11249-11275
artikel
7 A hybrid genetic-based task scheduling algorithm for cost-efficient workflow execution in heterogeneous cloud computing environment Khademi Dehnavi, Mohsen

27 8 p. 10833-10858
artikel
8 AI-based & heuristic workflow scheduling in cloud and fog computing: a systematic review Khaledian, Navid

27 8 p. 10265-10298
artikel
9 A knowledge graph embedding model based on multi-level analogical reasoning Zhao, Xiaofei

27 8 p. 10553-10567
artikel
10 A machine learning-based ensemble model for securing the IoT network Singh, Rohit

27 8 p. 10883-10897
artikel
11 A multiobjective optimization of task workflow scheduling using hybridization of PSO and WOA algorithms in cloud-fog computing Bansal, Sumit

27 8 p. 10921-10952
artikel
12 An autonomous blockchain-based workflow execution broker for e-science Alimoğlu, Alper

27 8 p. 10235-10244
artikel
13 An experimental and comparative study examining resource utilization in cloud data center Braiki, Khaoula

27 8 p. 11085-11102
artikel
14 An improved density peaks clustering based on sparrow search algorithm Chen, Yaru

27 8 p. 11017-11037
artikel
15 An intelligent mechanism for energy consumption scheduling in smart buildings Harb, Hassan

27 8 p. 11149-11165
artikel
16 An intelligent offloading and resource allocation using Fuzzy-based HHGA algorithm for IoT applications Chakraborty, Ananya

27 8 p. 11167-11185
artikel
17 A novel approach detection for IIoT attacks via artificial intelligence Karacayılmaz, Gökçe

27 8 p. 10467-10485
artikel
18 A novel virtual machine consolidation algorithm with server power mode management for energy-efficient cloud data centers Lin, Hongrui

27 8 p. 11709-11725
artikel
19 ARIR: an intent recognition-based approach for API recommendation Cao, Buqing

27 8 p. 10819-10832
artikel
20 A smart contract-driven access control scheme with integrity checking for electronic health records Li, Hongzhi

27 8 p. 11515-11535
artikel
21 A tube-based model predictive control method for intelligent vehicles path tracking Yang, Xu

27 8 p. 10343-10357
artikel
22 Binary classification for imbalanced datasets using twin hyperspheres based on conformal method Zheng, Jian

27 8 p. 11299-11315
artikel
23 Chaotic marine predator optimization algorithm for feature selection in schizophrenia classification using EEG signals Garip, Zeynep

27 8 p. 11277-11297
artikel
24 Comprehensive framework for implementing blockchain-enabled federated learning and full homomorphic encryption for chatbot security system Jalali, Nasir Ahmad

27 8 p. 10859-10882
artikel
25 Deep learning adversarial attacks and defenses on license plate recognition system Vizcarra, Conrado

27 8 p. 11627-11644
artikel
26 Deep variability modeling to enhance reproducibility of database performance testing Ouared, Abdelkader

27 8 p. 11683-11708
artikel
27 Design of distributed network intrusion prevention system based on Spark and P2DR models An, Lei

27 8 p. 10757-10776
artikel
28 Easypay: a user-friendly blockchain-powered payment gateway Dutta, Jhuma

27 8 p. 10633-10652
artikel
29 Efficient malware detection through inter-component communication analysis Chen, Peng

27 8 p. 11667-11682
artikel
30 Efficientnetv2-RegNet: an effective deep learning framework for secure SDN based IOT network Swathi, Baswaraju

27 8 p. 10653-10670
artikel
31 Enhanced 3D indoor position estimation from smartphone’s inbuilt IMU and pressure sensor via hybrid approach Sharma, Shiva

27 8 p. 10953-10970
artikel
32 Enhancing blockchain scalability and security: the early fraud detection (EFD) framework for optimistic rollups Gupta, Shristy

27 8 p. 10971-10992
artikel
33 Enhancing EfficientNetv2 with global and efficient channel attention mechanisms for accurate MRI-Based brain tumor classification Pacal, Ishak

27 8 p. 11187-11212
artikel
34 Exploitation of healthcare IoT–fog-based smart e-health gateways: a resource optimization approach Wen, Bo

27 8 p. 10733-10755
artikel
35 Fault-tolerant allocation of deadline-constrained tasks through preemptive migration in heterogeneous cloud environments Kirti, Medha

27 8 p. 11427-11454
artikel
36 Federated learning for efficient spectrum allocation in open RAN Asad, Muhammad

27 8 p. 11237-11247
artikel
37 Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing Zhao, Xiaolong

27 8 p. 10437-10453
artikel
38 Graph-ensemble fusion for enhanced IoT intrusion detection: leveraging GCN and deep learning Mittal, Kajol

27 8 p. 10525-10552
artikel
39 GTBNN: game-theoretic and bayesian neural networks to tackle security attacks in intelligent transportation systems Gill, Komal Singh

27 8 p. 11645-11665
artikel
40 High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform Chan, Jia-Lin

27 8 p. 11213-11235
artikel
41 HMM-CPM: a cloud instance resource prediction method tracing the workload trends via hidden Markov model Yang, Zhihe

27 8 p. 11823-11838
artikel
42 HTPA: a hybrid traffic pattern aware arbitration strategy for network on chip systems Matin, Mostafa

27 8 p. 11471-11489
artikel
43 HyperSegRec: enhanced hypergraph-based recommendation system with user segmentation and item similarity learning Malik, Nidhi

27 8 p. 11727-11745
artikel
44 Improvement in task allocation for VM and reduction of Makespan in IaaS model for cloud computing Ullah, Arif

27 8 p. 11407-11426
artikel
45 Integration of bat algorithm and salp swarm intelligence with stochastic difference variants for global optimization Li, Hongye

27 8 p. 10777-10818
artikel
46 Intelligent patrol inspection of low code enabled electric power communication equipment based on digital transformation Huang, Xing

27 8 p. 10421-10435
artikel
47 Internet of things-based secure architecture to automate industry Aljumah, Abdullah

27 8 p. 11103-11118
artikel
48 Investigating large language models capabilities for automatic code repair in Python Omari, Safwan

27 8 p. 10717-10731
artikel
49 K-means and meta-heuristic algorithms for intrusion detection systems Maazalahi, Mahdieh

27 8 p. 10377-10419
artikel
50 MADESANT: malware detection and severity analysis in industrial environments Jayalaxmi, P. L. S.

27 8 p. 11347-11367
artikel
51 Medical diagnosis using interval type-2 fuzzy similarity measures Cherif, Sahar

27 8 p. 10455-10466
artikel
52 Mobility-enhanced delay-aware cloudlet movement and placement using cluster-based technique in a smart healthcare platform Sahkhar, Lizia

27 8 p. 11803-11821
artikel
53 MPTD: optimizing multi-path transport with dynamic target delay in datacenters Li, Mingyan

27 8 p. 11455-11469
artikel
54 Multicriteria client selection model using class topper optimization based optimal federated learning for healthcare informatics Narwaria, Mamta

27 8 p. 10325-10342
artikel
55 Multi-objective generalized normal distribution optimization: a novel algorithm for multi-objective problems Khodadadi, Nima

27 8 p. 10589-10631
artikel
56 Multi-objective task scheduling based on PSO-Ring and intuitionistic fuzzy set Mohammad Hasani Zade, Behnam

27 8 p. 11747-11802
artikel
57 Multi-strategy enhanced Grey Wolf Optimizer for global optimization and real world problems Wang, Zhendong

27 8 p. 10671-10715
artikel
58 Multivariate time series ensemble model for load prediction on hosts using anomaly detection techniques Bawa, Shabnam

27 8 p. 10993-11016
artikel
59 Natural language why-question answering system in business intelligence context Djiroun, Rahma

27 8 p. 11039-11067
artikel
60 Performance analysis of ODL and RYU controllers’ against DDoS attack in software defined networks Gupta, Neelam

27 8 p. 10899-10919
artikel
61 Performance optimization of Spark MLlib workloads using cost efficient RICG model on exponential projective sampling Sewal, Piyush

27 8 p. 10569-10588
artikel
62 Quantum-inspired multi-objective African vultures optimization algorithm with hierarchical structure for software requirement Liu, Bo

27 8 p. 11317-11345
artikel
63 Reinforcement learning based task offloading of IoT applications in fog computing: algorithms and optimization techniques Allaoui, Takwa

27 8 p. 10299-10324
artikel
64 Secured IoT architecture for personalized marketing using blockchain framework with deep learning technology Khandekar, Apurva

27 8 p. 11069-11084
artikel
65 Software defect prediction ensemble learning algorithm based on 2-step sparrow optimizing extreme learning machine Tang, Yu

27 8 p. 11119-11148
artikel
66 Spatial-temporal multiscale feature optimization based two-stream convolutional neural network for action recognition Xia, Limin

27 8 p. 11611-11626
artikel
67 Stacked ensemble learning for facial gender classification using deep learning based features extraction waris, Fazal

27 8 p. 11491-11513
artikel
68 TPBFS: two populations based feature selection method for medical data Quan, Haodi

27 8 p. 11553-11568
artikel
69 Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme Chen, Zigang

27 8 p. 10245-10264
artikel
70 Workload dynamics implications in permissioned blockchain scalability and performance Thakur, Anita

27 8 p. 11569-11593
artikel
71 XsimGCL’s cross-layer for group recommendation using extremely simple graph contrastive learning Liu, Tengjiao

27 8 p. 11537-11552
artikel
                             71 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland