Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             69 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive hyperledger fabric performance evaluation based on resources capacity planning Melo, Carlos

27 9 p. 12395-12410
artikel
2 A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks Jain, Ankit Kumar

27 9 p. 13129-13164
artikel
3 Adaptive spatio-temporal graph convolutional network with attention mechanism for mobile edge network traffic prediction Sha, Ning

27 9 p. 13257-13272
artikel
4 Advanced cost-aware Max–Min workflow tasks allocation and scheduling in cloud computing systems Raeisi-Varzaneh, Mostafa

27 9 p. 13407-13419
artikel
5 A faster deep graph clustering network based on dynamic graph weight update mechanism Li, Xin

27 9 p. 12123-12140
artikel
6 A hybrid deep learning based enhanced and reliable approach for VANET intrusion detection system Barve, Atul

27 9 p. 11839-11850
artikel
7 A hybrid northern goshawk optimization algorithm based on cluster collaboration Wu, Changjun

27 9 p. 13203-13237
artikel
8 An authentication mechanism based on blockchain for IoT environment Zargar, Gholam Reza

27 9 p. 13239-13255
artikel
9 Android malware detection using time-aware machine learning approach AlSobeh, Anas M. R.

27 9 p. 12627-12648
artikel
10 An effective classification using enhanced elephant herding optimization with convolution neural network for intrusion detection in IoMT architecture Praveena Anjelin, D.

27 9 p. 12341-12359
artikel
11 An effective multiclass skin cancer classification approach based on deep convolutional neural network Houssein, Essam H.

27 9 p. 12799-12819
artikel
12 An effective partition-based framework for virtual machine migration in cloud services Luo, Liji

27 9 p. 12899-12917
artikel
13 An improved density peaks clustering algorithm using similarity assignment strategy with K-nearest neighbors Hu, Wei

27 9 p. 12689-12706
artikel
14 An improved Tasmanian devil optimization algorithm based on sine-cosine strategy with dynamic weighting factors Zhang, Huanlong

27 9 p. 12875-12897
artikel
15 A novel evolutionary status guided hyper-heuristic algorithm for continuous optimization Zhong, Rui

27 9 p. 12209-12238
artikel
16 A novel hybrid Artificial Gorilla Troops Optimizer with Honey Badger Algorithm for solving cloud scheduling problem Hussien, Abdelazim G.

27 9 p. 13093-13128
artikel
17 A novel real-time object detection method for complex road scenes based on YOLOv7-tiny Li, Yunfa

27 9 p. 13379-13393
artikel
18 A novel software defect prediction model using two-phase grey wolf optimisation for feature selection Malhotra, Ruchika

27 9 p. 12185-12207
artikel
19 A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection Lin, Yongxing

27 9 p. 13333-13352
artikel
20 A two-way trust routing scheme to improve security in fog computing environment Wang, Jun

27 9 p. 13165-13185
artikel
21 Automatic diagnosis of myopic maculopathy using continuous severity ranking labels Sun, Yun

27 9 p. 12669-12688
artikel
22 Black eagle optimizer: a metaheuristic optimization method for solving engineering optimization problems Zhang, Haobin

27 9 p. 12361-12393
artikel
23 Blockchain cross-chain protocol based on improved hashed time-locked contract Li, Jiao

27 9 p. 12007-12027
artikel
24 Catch fish optimization algorithm: a new human behavior algorithm for solving clustering problems Jia, Heming

27 9 p. 13295-13332
artikel
25 Causal network construction based on KICA-ECCM for root cause diagnosis of industrial processes He, Yayin

27 9 p. 11891-11909
artikel
26 Chaos-BBO: Chaos balanced butterfly optimizer with dynamic continuum chaotic strategies and its applications Zhang, Mengjian

27 9 p. 11911-11952
artikel
27 CloudAIBus: a testbed for AI based cloud computing environments Velu, Sasidharan

27 9 p. 11953-11981
artikel
28 Connecting the dots between stance and fake news detection with blockchain, proof of reputation, and the Hoeffding bound Salah, Ilhem

27 9 p. 13395-13405
artikel
29 Correction: Efficient integer division computation protocols based on partial homomorphic encryption Sun, Yuhong

27 9 p. 12103
artikel
30 DEA2H2: differential evolution architecture based adaptive hyper-heuristic algorithm for continuous optimization Zhong, Rui

27 9 p. 12239-12266
artikel
31 Designing quantum-secure attribute-based encryption Rao, Y. Sreenivasa

27 9 p. 13075-13091
artikel
32 DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN Rajasekar, V. R.

27 9 p. 12029-12068
artikel
33 DyPoA: enhanced PoA protocol with a dynamic set of validators for IoT Wu, Xiaohua

27 9 p. 12527-12545
artikel
34 Eel and grouper optimizer: a nature-inspired optimization algorithm Mohammadzadeh, Ali

27 9 p. 12745-12786
artikel
35 Efficient integer division computation protocols based on partial homomorphic encryption Sun, Yuhong

27 9 p. 12091-12102
artikel
36 Energy-efficient buildings with energy-efficient optimized models: a case study on thermal bridge detection Fişne, Alparslan

27 9 p. 12787-12797
artikel
37 Energy-efficient communication-aware VM placement in cloud datacenter using hybrid ACO–GWO Keshri, Rashmi

27 9 p. 13047-13074
artikel
38 Enhanced K-NN with Bayesian optimization algorithm for predicting energy efficiency of smart grids in IoT Zhao, Wenlong

27 9 p. 12311-12322
artikel
39 Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism Kandoussi, El Mehdi

27 9 p. 12509-12526
artikel
40 Enhancing data authentication in software-defined networking (SDN) using multiparty computation Hendaoui, Fatma

27 9 p. 12649-12668
artikel
41 Enhancing network security with information-guided-enhanced Runge Kutta feature selection for intrusion detection Yuan, Li

27 9 p. 12569-12602
artikel
42 Enhancing resource utilization and privacy in IoT data placement through fuzzy logic and PSO optimization Dhanushkodi, Kavitha

27 9 p. 12603-12626
artikel
43 Extending parallel programming patterns with adaptability features Galante, Guilherme

27 9 p. 12547-12568
artikel
44 Gene-targeting multiplayer battle game optimizer for large-scale global optimization via cooperative coevolution Zhong, Rui

27 9 p. 12483-12508
artikel
45 HOGWO: a fog inspired optimized load balancing approach using hybridized grey wolf algorithm Das, Debashreet

27 9 p. 13273-13294
artikel
46 Hybrid metaheuristics for selective inference task offloading under time and energy constraints for real-time IoT sensing systems Ben Sada, Abdelkarim

27 9 p. 12965-12981
artikel
47 Improved aquila optimizer with mRMR for feature selection of high-dimensional gene expression data Qin, Xiwen

27 9 p. 13005-13027
artikel
48 Lightweight secure authentication protocol for automatic dependent surveillance broadcast system Sher, Burhan

27 9 p. 12267-12282
artikel
49 Machine learning driven four-elements high gain MIMO antenna for wireless connectivity Agrawal, Krishna Kant

27 9 p. 12707-12725
artikel
50 MDA-YOLO Person: a 2D human pose estimation model based on YOLO detection framework Dong, Chengang

27 9 p. 12323-12340
artikel
51 Modeling and verification of software evolution using bigraphical reactive system Pal, Nisha

27 9 p. 12983-13003
artikel
52 Modified clustering and incentivized stable CH selection for reliable VANET communication Kumari, Ashish

27 9 p. 11983-12005
artikel
53 OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things Al-Amiedy, Taief Alaa

27 9 p. 12141-12184
artikel
54 OptFBFN: IOT threat mitigation in software-defined networks based on fuzzy approach Dhanalaxmi, B.

27 9 p. 12943-12963
artikel
55 Optimal power scheduling of microgrid considering renewable sources and demand response management Srivastava, Abhishek

27 9 p. 11851-11872
artikel
56 PPFLV: privacy-preserving federated learning with verifiability Zhou, Qun

27 9 p. 12727-12743
artikel
57 Quantum competitive decision algorithm for the emergency siting problem under given deadline conditions Zhao, Wei

27 9 p. 13029-13046
artikel
58 RAPTS: resource aware prioritized task scheduling technique in heterogeneous fog computing environment Hussain, Mazhar

27 9 p. 13353-13377
artikel
59 Res2Net-ERNN: deep learning based cyberattack classification in software defined network Maddu, Mamatha

27 9 p. 12821-12839
artikel
60 Revolutionizing agri-food supply chain management with blockchain-based traceability and navigation integration Aggarwal, Manoj

27 9 p. 12919-12942
artikel
61 SCIDP–Secure cloud-integrated data dissemination protocol for efficient reprogramming in internet of things Shanmugapriya, R.

27 9 p. 12841-12860
artikel
62 SCRUB: a novel energy-efficient virtual machines selection and migration scheme in cloud data centers Yekta, Mohammad

27 9 p. 12861-12874
artikel
63 Secure and efficient content-based image retrieval using dominant local patterns and watermark encryption in cloud computing Sucharitha, G.

27 9 p. 11873-11889
artikel
64 Soft computing approaches for dynamic multi-objective evaluation of computational offloading: a literature review Khan, Sheharyar

27 9 p. 12459-12481
artikel
65 STTD: spatial-temporal transformer with double recurrent graph convolutional cooperative network for traffic flow prediction Zeng, Hui

27 9 p. 12069-12089
artikel
66 Task scheduling in cloud computing systems using honey badger algorithm with improved density factor and foucault pendulum motion Zhang, Si-Wen

27 9 p. 12411-12457
artikel
67 Three-party evolutionary game-based analysis and stability enhancement of improved PBFT consensus mechanism Wang, Feifan

27 9 p. 12283-12309
artikel
68 Time-limited ownership delegation scheme with revocation security for healthcare Zhao, Xiaoping

27 9 p. 12105-12121
artikel
69 Unmanned aerial vehicle assisted communication: applications, challenges, and future outlook Li, Yilin

27 9 p. 13187-13202
artikel
                             69 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland