nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
ACGRIME: adaptive chaotic Gaussian RIME optimizer for global optimization and feature selection
|
Batis, Mohammed |
|
|
28 |
1 |
|
artikel |
2 |
Adaptive virtual machine placement: a dynamic approach for energy-efficiency, QoS enhancement, and security optimization
|
Shirafkan, Homa |
|
|
28 |
1 |
|
artikel |
3 |
A distributed algorithm with dynamic event-triggered mechanism for resource allocation problems
|
Chen, Baitong |
|
|
28 |
1 |
|
artikel |
4 |
Aggregation-chain: a consortium blockchain based multi-chain data sharing framework with efficient query
|
Qu, Leda |
|
|
28 |
1 |
|
artikel |
5 |
A hierarchical data partitioning strategy for irregular applications: a case study in digital pathology
|
Barreiros, Willian |
|
|
28 |
1 |
|
artikel |
6 |
A hybrid decision support system in medical emergencies using artificial neural network and hyperbolic secant grey wolf optimization techniques
|
Chander, G Punnam |
|
|
28 |
1 |
|
artikel |
7 |
A hybrid evolutionary algorithm to improve task scheduling and load balancing in fog computing
|
Yu, Dongxian |
|
|
28 |
1 |
|
artikel |
8 |
A lightweight machine learning methods for malware classification
|
Farfoura, Mahmoud E. |
|
|
28 |
1 |
|
artikel |
9 |
A multi-strategy improved dung beetle optimisation algorithm and its application
|
Gu, WeiGuang |
|
|
28 |
1 |
|
artikel |
10 |
An adaptive coordinate systems for constrained differential evolution
|
Boualem, Sid Ahmed El Mahdi |
|
|
28 |
1 |
|
artikel |
11 |
An auto-scaling multi-tiered node-organizing blockchain design model for the internet of things
|
Elsaadany, Riham |
|
|
28 |
1 |
|
artikel |
12 |
An efficient class-dependent learning label approach using feature selection to improve multi-label classification algorithms
|
Zhao, Hao |
|
|
28 |
1 |
|
artikel |
13 |
An efficient content based image retrieval framework using separable CNNs
|
Rani, Sunita |
|
|
28 |
1 |
|
artikel |
14 |
An efficient deep reinforcement learning based task scheduler in cloud-fog environment
|
Choppara, Prashanth |
|
|
28 |
1 |
|
artikel |
15 |
An efficient dynamic sampling method for energy harvesting body sensor node
|
Mohammadi, Razieh |
|
|
28 |
1 |
|
artikel |
16 |
An efficient position-sensitive fuzzy keyword search scheme for encrypted data on hybrid cloud
|
Li, Nan |
|
|
28 |
1 |
|
artikel |
17 |
An optimized RDMA QP communication mechanism for hyperscale AI infrastructure
|
Wang, Junliang |
|
|
28 |
1 |
|
artikel |
18 |
A novel hybrid differential particle swarm optimization based on particle influence
|
Wang, Yufeng |
|
|
28 |
1 |
|
artikel |
19 |
A novel niching genetic algorithm with heterosis for edge server placement
|
Chen, Ming |
|
|
28 |
1 |
|
artikel |
20 |
A Robust Mutual Authentication Scheme for Health-Focused Connected Intelligent Objects
|
Hammami, Hamza |
|
|
28 |
1 |
|
artikel |
21 |
A scalable rule learning approach fusing multiple sources of information
|
Zhao, Xiaofei |
|
|
28 |
1 |
|
artikel |
22 |
A smart model integrating LSTM and XGBoost for improving IoT-enabled smart cities security
|
Hazman, Chaimae |
|
|
28 |
1 |
|
artikel |
23 |
Augmented access pattern-based I/O performance prediction using directed acyclic graph regression
|
Kumar, Manish |
|
|
28 |
1 |
|
artikel |
24 |
Authenticated reversible image hiding algorithm based on blockchain technology
|
Ye, Guodong |
|
|
28 |
1 |
|
artikel |
25 |
A vehicular edge computing content caching solution based on content prediction and D4PG
|
Li, Bingxian |
|
|
28 |
1 |
|
artikel |
26 |
Battle Royale deep reinforcement learning algorithm for effective load balancing in cloud computing
|
Haris, Mohammad |
|
|
28 |
1 |
|
artikel |
27 |
Benchmarking and revisiting time series forecasting methods in cloud workload prediction
|
Lin, Shengsheng |
|
|
28 |
1 |
|
artikel |
28 |
BGAS: blockchain-based secure and efficient group key agreement scheme for dynamic vehicular platoon
|
Wang, Zihan |
|
|
28 |
1 |
|
artikel |
29 |
Blockchain-based remote data integrity auditing scheme with deduplication mechanism
|
Feng, Shuai |
|
|
28 |
1 |
|
artikel |
30 |
Blockchain federated learning with sparsity for IoMT devices
|
Ba, Abdoul Fatakhou |
|
|
28 |
1 |
|
artikel |
31 |
BPPF: a bilinear plaintext-power fusion method for enhanced profiling side-channel analysis
|
Zhang, Yezhou |
|
|
28 |
1 |
|
artikel |
32 |
Context-aware resource allocation for IoRT-aware business processes based on decentralized multi-agent reinforcement learning
|
Fattouch, Najla |
|
|
28 |
1 |
|
artikel |
33 |
DELIGHT: a willingness-aware collaborative edge service offloading utilizing deep reinforcement learning
|
Ye, Hongfan |
|
|
28 |
1 |
|
artikel |
34 |
Detection of road extraction from satellite images with deep learning method
|
Aslan, Emrah |
|
|
28 |
1 |
|
artikel |
35 |
Dmaf: data-model anti-forgetting for federated incremental learning
|
Zhu, Kongshang |
|
|
28 |
1 |
|
artikel |
36 |
Dynamic deep graph convolution with enhanced transformer networks for time series anomaly detection in IoT
|
Gao, Rong |
|
|
28 |
1 |
|
artikel |
37 |
Dynamic object removal by fusing deep learning and multiview geometry
|
Liu, Yanli |
|
|
28 |
1 |
|
artikel |
38 |
Dynamic step opposition-based learning sparrow search algorithm for UAV path planning
|
He, Yong |
|
|
28 |
1 |
|
artikel |
39 |
Edge AI: A Taxonomy, Systematic Review and Future Directions
|
Gill, Sukhpal Singh |
|
|
28 |
1 |
|
artikel |
40 |
Enhancing cloud security with intelligent load balancing and malicious request classification
|
Krishna Sowjanya, K |
|
|
28 |
1 |
|
artikel |
41 |
Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks
|
Zeghida, Hayette |
|
|
28 |
1 |
|
artikel |
42 |
Ensemble clustering by block diagonal representation
|
Yang, Xiaofei |
|
|
28 |
1 |
|
artikel |
43 |
Ensemble deep learning techniques for time series analysis: a comprehensive review, applications, open issues, challenges, and future directions
|
Sakib, Mohd |
|
|
28 |
1 |
|
artikel |
44 |
Evolution of computing energy efficiency: Koomey's law revisited
|
Prieto, Alberto |
|
|
28 |
1 |
|
artikel |
45 |
Exploring the role of project status information in effective code smell detection
|
Alkharabsheh, Khalid |
|
|
28 |
1 |
|
artikel |
46 |
Graph-based robust 3D point cloud map merging approach for large scale
|
Gui, Linqiu |
|
|
28 |
1 |
|
artikel |
47 |
Greedy algorithm for dynamic allocation of intelligent services in vehicular edge computing
|
Omranian, Seyed Alireza |
|
|
28 |
1 |
|
artikel |
48 |
High-performance network attack detection in unknown scenarios based on improved vertical model
|
Hou, Shuling |
|
|
28 |
1 |
|
artikel |
49 |
Improved snow ablation optimization for multilevel threshold image segmentation
|
Zhong, Rui |
|
|
28 |
1 |
|
artikel |
50 |
Multi-depot vehicle routing problem with drones in emergency logistics
|
Weng, Xun |
|
|
28 |
1 |
|
artikel |
51 |
Multi-indicator collaborative evolutionary algorithm for many-objective optimization
|
Gan, Wei |
|
|
28 |
1 |
|
artikel |
52 |
Multi-strategy arithmetic optimization algorithm for global optimization and uncertain motion tracking
|
Gao, Zeng |
|
|
28 |
1 |
|
artikel |
53 |
Multi-strategy fusion snake optimizer on task offloading and scheduling for IoT-based fog computing multi-tasks learning
|
Zhang, Shi-Hui |
|
|
28 |
1 |
|
artikel |
54 |
Network service function chaining: a performance study varying topologies
|
Araújo, Gabriel |
|
|
28 |
1 |
|
artikel |
55 |
Object detection in low-light conditions based on DBS-YOLOv8
|
Zhou, Lei |
|
|
28 |
1 |
|
artikel |
56 |
Optimizing edge server placement and allocation for enhanced energy efficiency: a multi-objective approach based on decision space and elitism
|
Ghasemzadeh, Ardalan |
|
|
28 |
1 |
|
artikel |
57 |
Optimizing service function chaining and scheduling with deep Q-learning for enhanced quality of experience in edge networks
|
Baharvand, Negar |
|
|
28 |
1 |
|
artikel |
58 |
Optimizing support vector regression using grey wolf optimizer for enhancing energy efficiency and building prototype architecture
|
Sakib, Mohd |
|
|
28 |
1 |
|
artikel |
59 |
Privacy preserving spatio-temporal attribute-based encryption for cloud applications
|
Routray, Kasturi |
|
|
28 |
1 |
|
artikel |
60 |
Protecting against modeling attacks: design and analysis of lightweight dynamic physical unclonable function
|
Dofe, Jaya |
|
|
28 |
1 |
|
artikel |
61 |
Quantum image encryption protocol for secure communication in healthcare networks
|
Prajapat, Sunil |
|
|
28 |
1 |
|
artikel |
62 |
Quantum-safe blockchain-assisted data encryption protocol for internet of things networks
|
Prajapat, Sunil |
|
|
28 |
1 |
|
artikel |
63 |
Quasi-opposition Remora Optimizer based Nelder–Mead algorithm for tasks scheduling in cloud
|
Talha, Adnane |
|
|
28 |
1 |
|
artikel |
64 |
Region of interest encryption algorithm for images based on lifting scheme and object detection
|
Wang, Lujie |
|
|
28 |
1 |
|
artikel |
65 |
Resource optimization in smart electronic health systems using IoT for heart disease prediction via feedforward neural networks
|
Li, Huan |
|
|
28 |
1 |
|
artikel |
66 |
Ride-hailing pick-up area recommendation in a vehicle-cloud collaborative environment: a feature-aware personalized clustering federated learning approach
|
Zhou, Xinyu |
|
|
28 |
1 |
|
artikel |
67 |
SCECA U-Net crop classification for UAV remote sensing image
|
Yan, Hangjia |
|
|
28 |
1 |
|
artikel |
68 |
Securing fog-assisted IoT smart homes: a federated learning-based intrusion detection approach
|
Bensaid, Radjaa |
|
|
28 |
1 |
|
artikel |
69 |
Securing supply chain through blockchain-integrated algorithmic system: ensuring product quality and counterfeiting tags detection
|
Jahani, Meysam |
|
|
28 |
1 |
|
artikel |
70 |
Towards an enhanced next activity prediction using attention based neural networks
|
Alibakhshi, Alireza |
|
|
28 |
1 |
|
artikel |
71 |
Towards a reliable spam detection: an ensemble classification with rejection option
|
Olivo, Cleber |
|
|
28 |
1 |
|
artikel |
72 |
Towards GPU-enabled serverless cloud edge platforms for accelerating HEVC video coding
|
Salcedo-Navarro, Andoni |
|
|
28 |
1 |
|
artikel |
73 |
uitSDD: Protect software defined networks from distributed denial-of-service using multi machine learning models
|
Cam, Nguyen Tan |
|
|
28 |
1 |
|
artikel |
74 |
Utilizing convolutional neural networks for resource allocation bottleneck analysis in cloud ecosystems
|
Aditi, |
|
|
28 |
1 |
|
artikel |