Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             73 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A cellular traffic prediction method based on diffusion convolutional GRU and multi-head attention mechanism Xiao, Junbi

28 2 artikel
2 Adaptive reinforcement learning based joint approach for energy efficiency in ultra dense networks: ARJUN model Rajule, Nilakshee

28 2 artikel
3 A deep residual SConv1D-attention intrusion detection model for industrial Internet of Things Wang, Zhendong

28 2 artikel
4 Advancing elderly social care dropout prediction with federated learning: client selection and imbalanced data management Nikolaidis, Christos Chrysanthos

28 2 artikel
5 AE-CIAM: a hybrid AI-enabled framework for low-rate DDoS attack detection in cloud computing Najar, Ashfaq Ahmad

28 2 artikel
6 A fast-flying particle swarm optimization for resolving constrained optimization and feature selection problems Mahapatra, Ajit Kumar

28 2 artikel
7 A heuristic task scheduling algorithm in cloud computing environment: an overall cost minimization approach Boroumand, Ali

28 2 artikel
8 A hybrid PSO and GA algorithm with rescheduling for task offloading in device–edge–cloud collaborative computing Wang, Yuping

28 2 artikel
9 A Jaya algorithm based on self-adaptive method for parameters identification of photovoltaic cell and module Feng, Zhiyu

28 2 artikel
10 A multi-agent deep reinforcement learning approach for optimal resource management in serverless computing Singh, Ashutosh Kumar

28 2 artikel
11 A multi-strategy enhanced reptile search algorithm for global optimization and engineering optimization design problems Zhou, Liping

28 2 artikel
12 An enhanced DV-hop localization algorithm based on hop distance correction and multi-strategy modified Aquila Optimizer in HWSNs Wu, Suqian

28 2 artikel
13 A path planning method in three-dimensional complex space based on Bézier curves and a hybrid zebra optimization algorithm Huang, Hanqiao

28 2 artikel
14 A secure lightweight authentication model with interference aware routing and attack detection approach in VANET Kaur, Gurjot

28 2 artikel
15 Blockchain for securing electronic voting systems: a survey of architectures, trends, solutions, and challenges Ohize, Henry O.

28 2 artikel
16 Botnet detection and information leakage mitigation with differential privacy under generative adversarial networks Feizi, Sanaz

28 2 artikel
17 Bppfl: a blockchain-based framework for privacy-preserving federated learning Asad, Muhammad

28 2 artikel
18 Combination of ant colony and student psychology based optimization for the multi-depot electric vehicle routing problem with time windows Wei, Xiaoxu

28 2 artikel
19 Combining genetic algorithms and bayesian neural networks for resource usage prediction in multi-tenant container environments Park, Soyeon

28 2 artikel
20 Deadline and budget-constrained archimedes optimization algorithm for workflow scheduling in cloud Kushwaha, Shweta

28 2 artikel
21 Deep learning fusion for effective malware detection: leveraging visual features Johny, Jahez Abraham

28 2 artikel
22 Dependent task offloading for air-ground integrated MEC networks: a multi-agent collaboration approach Wang, Yuchen

28 2 artikel
23 3DLBS-BCHO: a three-dimensional deep learning approach based on branch splitter and binary chimp optimization for intrusion detection in IoT Zareh Farkhady, Roya

28 2 artikel
24 Dynamic load balancing of traffic in the IoT edge computing environment using a clustering approach based on deep learning and genetic algorithms Merah, Malha

28 2 artikel
25 EBIDS: efficient BERT-based intrusion detection system in the network and application layers of IoT Sattarpour, Shiva

28 2 artikel
26 Efficient technique utilizing an embedding hierarchical clustering-based representation into crossed cubes for TSP optimization Selmi, Aymen Takie Eddine

28 2 artikel
27 Empowering healthcare with BIEH - blockchain inter-operable electronic health record scheme Gupta, Pallav

28 2 artikel
28 Ensembling Harmony Search Algorithm with case-based reasoning for software development effort estimation Mustyala, Sarika

28 2 artikel
29 Escape after love: Philoponella prominens optimizer and its application to 3D path planning Gao, Yuansheng

28 2 artikel
30 Exploring malware complexities: a behavior and characteristic analysis approach for robust and accurate cybersecurity Wang, Weiye

28 2 artikel
31 Feature selection using importance-based two-stage multi-modal multiobjective particle swarm optimization Ling, Qinghua

28 2 artikel
32 FedBlocks: federated learning and blockchainbased privacy-preserved pioneering framework for IoT healthcare using IPFS in web 3.0 era Purohit, Ravindrakumar M.

28 2 artikel
33 Federated learning client selection algorithm based on gradient similarity Hu, Lingxi

28 2 artikel
34 Federated learning incentivize with privacy-preserving for IoT in edge computing in the context of B5G Jalali, Nasir Ahmad

28 2 artikel
35 Fedgac: optimizing generalization in personalized federated learning via adaptive initialization and strategic client selection Yu, Yichun

28 2 artikel
36 Filter pruning via annealing decaying for deep convolutional neural networks acceleration Huang, Jiawen

28 2 artikel
37 HG-Net: a novel neural network with hierarchical grouped convolution for indoor fingerprint positioning Meng, Xiangxu

28 2 artikel
38 IG-PGFT: A secure and efficient intelligent grouping PBFT consensus algorithm for the Industrial Internet of Things Wang, Yue

28 2 artikel
39 Improved exponential distribution optimizer: enhancing global numerical optimization problem solving and optimizing machine learning parameters Adegboye, Oluwatayomi Rereloluwa

28 2 artikel
40 Integrated fuzzy decision tree based blockchain federated safety-as-a-service for IIoT Tripathi, Arun Mani

28 2 artikel
41 Integrating binary classification and clustering for multi-class dysarthria severity level classification: a two-stage approach Al-Ali, Afnan S.

28 2 artikel
42 Integrating of IOTA-based blockchain with edge computing for task offloading powering the metaverse Priyadarshni,

28 2 artikel
43 Intelligent monitoring system for environmental protection during the construction period of pumped storage power station Xu, Shuangquan

28 2 artikel
44 Investigating the effects of SQL hints on diverse storage devices through empirical analysis Kim, Changjong

28 2 artikel
45 Joint resource allocation and privacy protection for MEC task offloading in industrial Internet Wang, Zhongmin

28 2 artikel
46 Latency aware graph-based microservice placement in the edge-cloud continuum Khan, Shawal

28 2 artikel
47 Lcsa-fed: a low cost semi-asynchronous federated learning based on lag tolerance for services QoS prediction Cai, Lingru

28 2 artikel
48 Leveraging explainable artificial intelligence for emotional label prediction through health sensor monitoring Houssein, Essam H.

28 2 artikel
49 LIRAD: lightweight tree-based approaches on resource constrained IoT devices for attack detection Mishra, Sanket

28 2 artikel
50 Machine learning-centric prediction and decision based resource management in cloud computing environments Kashyap, Shobhana

28 2 artikel
51 Metaheuristic-based task scheduling for latency-sensitive IoT applications in edge computing Satouf, Aram

28 2 artikel
52 Microservice deployment in cloud-edge environment using enhanced global search grey wolf optimizer-greedy algorithm Wang, Shudong

28 2 artikel
53 Modified parallel PSO algorithm in cloud computing for performance improvement Pradhan, Arabinda

28 2 artikel
54 Modified Tasmanian devil optimization for solving single and multi-objective optimal power flow in conventional and advanced power systems Farhat, Mohamed

28 2 artikel
55 Multiple adaptive fusion network with Mittag Leffler IoU loss for aircraft detection in remote sensing images Wang, Fengxian

28 2 artikel
56 Multi-resource maximin share fair allocation in the cloud-edge collaborative computing system with bandwidth demand compression Guo, Hao

28 2 artikel
57 Network-aware container scheduling in edge computing Qiao, Ying

28 2 artikel
58 Optimizing smart health monitoring systems: enahancing energy efficiency and reducing latency with multi-level clustering and grey wolf optimizer Gharaei, Niayesh

28 2 artikel
59 Practical evasion attack against neural network-based macro-malware detection method Mimura, Mamoru

28 2 artikel
60 Resilient vehicular fog computing networks: an analytical approach to system reliability under breakdown and vacation interruptions Mohtadi, Hibat Eallah

28 2 artikel
61 RETRACTED ARTICLE: Internet of things and distributed security framework for 5G networks Lu, Rui

28 2 artikel
62 Retraction Note: Real-time network virtualization based on SDN and Docker container He, Qinlu

28 2 artikel
63 Role division approach for firefly algorithm based on t-distribution perturbation and differential mutation Chen, Juan

28 2 artikel
64 Secure data transmission in cloud computing using a cyber-security trust model with multi-risk protection scheme in smart IOT application Kamble, Torana

28 2 artikel
65 Securing decentralized federated learning: cryptographic mechanisms for privacy and trust Saidi, Ahmed

28 2 artikel
66 Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices Mansoor, Khwaja

28 2 artikel
67 Security-aware resource allocation in fog computing using a meta-heuristic algorithm Mohammadi, Mina

28 2 artikel
68 Sparse dual-weighting ensemble clustering Xu, Pan

28 2 artikel
69 Sppdp-fl: adaptive client selection and dimensional projection for performance enhancement in personalized differential privacy federated learning Xiao, Junbi

28 2 artikel
70 Symbiotic mechanism-based honey badger algorithm for continuous optimization Xu, Yuefeng

28 2 artikel
71 The green marine waste collector routing optimization with puma selection-based neighborhood search algorithm Abdollahzadeh, Benyamin

28 2 artikel
72 Three-dimensional dynamic collaborative path planning for multiple UCAVs using an improved NSGAII Zhong, Keyu

28 2 artikel
73 Time delay-based routing protocol using genetic algorithm in vehicular Ad Hoc networks Ghaemi, Yashar

28 2 artikel
                             73 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland