nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cost-aware IoT application deployment approach in fog computing
|
Faraji-Mehmandar, Mohammad |
|
|
28 |
3 |
|
artikel |
2 |
Adaptive horizontal scaling in kubernetes clusters with ANN-based load forecasting
|
da Silva, Lucileide M. D. |
|
|
28 |
3 |
|
artikel |
3 |
A formal algebra for document-oriented NoSQL data warehouses: formalisation and evaluation
|
Bouaziz, Senda |
|
|
28 |
3 |
|
artikel |
4 |
A hybrid model of long short-term memory neural networks and quantum behavior PSO for detecting self-admitted technical debt
|
Shahzeidi, Maryam |
|
|
28 |
3 |
|
artikel |
5 |
A new approach for fire and non-fire aerosols discrimination based on multilayer perceptron trained by modified bonobo optimizer
|
Zheng, Rong |
|
|
28 |
3 |
|
artikel |
6 |
A new approach to reduce energy consumption in priority live migration of services based on green cloud computing
|
Wang, Guikun |
|
|
28 |
3 |
|
artikel |
7 |
A new quantum-enhanced approach to AI-driven medical imaging system
|
Ahmadpour, Seyed-Sajad |
|
|
28 |
3 |
|
artikel |
8 |
A novel adjacent matrix-based probabilistic selection mechanism for differential evolution
|
Zhong, Rui |
|
|
28 |
3 |
|
artikel |
9 |
A QoS-aware IoT services composition approach based on the modified violation constraints handling technique and enhanced fireworks algorithm
|
Boukhama, Macilia |
|
|
28 |
3 |
|
artikel |
10 |
Artificial intelligence-enhanced intrusion detection systems for drone security: a real-time evaluation of algorithmic efficacy in mitigating wireless vulnerabilities
|
Senturk, Kenan |
|
|
28 |
3 |
|
artikel |
11 |
A survey on resource scheduling approaches in multi-access edge computing environment: a deep reinforcement learning study
|
Ismail, Ahmed A. |
|
|
28 |
3 |
|
artikel |
12 |
Automatic liver tumor segmentation based on improved Yolo-v5 and B-spline level set
|
Zhang, Lin |
|
|
28 |
3 |
|
artikel |
13 |
Blockchain technology for a trustworthy social credit system: implementation and enforcement perspectives
|
Damaševičius, Robertas |
|
|
28 |
3 |
|
artikel |
14 |
Building a cyber risk treatment taxonomy
|
Sánchez-García, Isaac D. |
|
|
28 |
3 |
|
artikel |
15 |
Burst load scheduling latency optimization through collaborative content caching in edge-cloud computing
|
Chen, Hong |
|
|
28 |
3 |
|
artikel |
16 |
CFL-ATELM: an approach to detect botnet traffic by analyzing non-IID and imbalanced data in IoT-edge based 6G networks
|
Pithani, Ashwini |
|
|
28 |
3 |
|
artikel |
17 |
Chaotic quasi-opposition marine predator algorithm for automatic data clustering
|
Ouertani, Mohamed Wajdi |
|
|
28 |
3 |
|
artikel |
18 |
Classification of radiographic and non-radiographic axial spondylarthritis in pelvic radiography using deep convolution neural network models
|
Kahveci, Abdulvahap |
|
|
28 |
3 |
|
artikel |
19 |
Compound strategy based binary willow catkin optimization for feature selection
|
Chen, Hongming |
|
|
28 |
3 |
|
artikel |
20 |
Correction: The green marine waste collector routing optimization with puma selectison-based neighborhood search algorithm
|
Abdollahzadeh, Benyamin |
|
|
28 |
3 |
|
artikel |
21 |
Critical vector based evolutionary algorithm for large-scale multi-objective optimization
|
Zhu, Shuwei |
|
|
28 |
3 |
|
artikel |
22 |
Defending mutation-based adversarial text perturbation: a black-box approach
|
Deanda, Demetrio |
|
|
28 |
3 |
|
artikel |
23 |
Developing a two stage optimized random vector functional link neural network based predictor model utilizing a swift crow search algorithm
|
Samal, Sidharth |
|
|
28 |
3 |
|
artikel |
24 |
Digital Twin technology for multimodal-based smart mobility using hybrid Co-ABC optimization based deep CNN
|
Wajid, Mohd Anas |
|
|
28 |
3 |
|
artikel |
25 |
Energy-efficient task offloading and efficient resource allocation for edge computing: a quantum inspired particle swarm optimization approach
|
Naik, Banavath Balaji |
|
|
28 |
3 |
|
artikel |
26 |
Enhancing autonomous vehicle performance with ensemble weighted support vector-based optimization in cloud
|
Sethuraman, Ravikumar |
|
|
28 |
3 |
|
artikel |
27 |
Enhancing chernobyl disaster optimization: a novel hybridization approach with modified grey wolf optimizer for solving complex optimization problems
|
Al Afghani Edsa, Said |
|
|
28 |
3 |
|
artikel |
28 |
Enhancing the security of IOT enabled systems using light weight hybrid cryptography models
|
Bhandiwad, Vinita |
|
|
28 |
3 |
|
artikel |
29 |
ESDN: edge computing task scheduling strategy based on dilated convolutional neural network and quasi-newton algorithm
|
Liu, Haoyu |
|
|
28 |
3 |
|
artikel |
30 |
Expertise as a signature: continuous implicit authentication based on behavior
|
Nawal, Sad-Houari |
|
|
28 |
3 |
|
artikel |
31 |
FedCCW: a privacy-preserving Byzantine-robust federated learning with local differential privacy for healthcare
|
Zhang, Lianfu |
|
|
28 |
3 |
|
artikel |
32 |
Federated learning for secure and efficient vehicular communications in open RAN
|
Asad, Muhammad |
|
|
28 |
3 |
|
artikel |
33 |
Fog assisted data size reduction based data management system for optimizing resources in medical IoT
|
Jan, Iqra |
|
|
28 |
3 |
|
artikel |
34 |
Ftmoe: a federated transfer model based on mixture-of-experts for heterogeneous image classification
|
Liu, Wei |
|
|
28 |
3 |
|
artikel |
35 |
Group-driven Remora Optimization Algorithm with multiple search and regeneration strategies
|
Peng, Fei |
|
|
28 |
3 |
|
artikel |
36 |
Hybrid strategy improved Harris Hawks optimization algorithm for global optimization and microgrid economic scheduling problem
|
Liu, Tianbao |
|
|
28 |
3 |
|
artikel |
37 |
IBF network: enhancing network privacy with IoT, blockchain, and fog computing on different consensus mechanisms
|
Reshi, Iraq Ahmad |
|
|
28 |
3 |
|
artikel |
38 |
Improved multi-strategy beluga whale optimization algorithm: a case study for multiple engineering optimization problems
|
Zou, Huanhuan |
|
|
28 |
3 |
|
artikel |
39 |
Improved sparrow search algorithm with adaptive multi-strategy hierarchical mechanism for global optimization and engineering problems
|
Wei, Fengtao |
|
|
28 |
3 |
|
artikel |
40 |
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
|
Al-Qadhi, Abdulrahman K. |
|
|
28 |
3 |
|
artikel |
41 |
Intelligent cache prefetchers in HPC architecture
|
Fargo, Farah |
|
|
28 |
3 |
|
artikel |
42 |
Joint resource autoscaling and request scheduling for serverless edge computing
|
Choupani, Armin |
|
|
28 |
3 |
|
artikel |
43 |
Knowledge-based job scheduling for HPC
|
Diel, Guilherme |
|
|
28 |
3 |
|
artikel |
44 |
Ml assisted techniques in power side channel analysis for trojan classification
|
Bhatta, Niraj Prasad |
|
|
28 |
3 |
|
artikel |
45 |
Modeling and analysis of LoRa-enabled task offloading in edge computing for enhanced battery life in wearable devices
|
Amzil, Abdellah |
|
|
28 |
3 |
|
artikel |
46 |
MP-TMD: A Multidimensional Plausibility-driven Cooperative Trust Model for Multiple Misbehaviour Detection in Intelligent Transportation Systems
|
Lone, Faisal Rasheed |
|
|
28 |
3 |
|
artikel |
47 |
Multilevel learning for enhanced traffic congestion prediction using anomaly detection and ensemble learning
|
Khasawneh, Mohammed A. |
|
|
28 |
3 |
|
artikel |
48 |
Multi-objective dynamic distributed flexible job shop scheduling problem considering uncertain processing time
|
Peng, Ningtao |
|
|
28 |
3 |
|
artikel |
49 |
Multi-scale fusion dynamic graph convolutional recurrent network for traffic forecasting
|
Xiao, Junbi |
|
|
28 |
3 |
|
artikel |
50 |
Multi-strategy ant colony optimization with k-means clustering algorithm for capacitated vehicle routing problem
|
Zhang, Zhaojun |
|
|
28 |
3 |
|
artikel |
51 |
Multi-UAV cooperative task assignment based on multi-strategy improved DBO
|
Zhang, Ran |
|
|
28 |
3 |
|
artikel |
52 |
MutaSwarmClus: enhancing data clustering efficiency with mutation-enhanced swarm algorithm
|
Malik, Saleem |
|
|
28 |
3 |
|
artikel |
53 |
Novel offloading approach of computing task for internet of vehicles based on particle swarm optimization strategy
|
Zhang, DeGan |
|
|
28 |
3 |
|
artikel |
54 |
Optimising peer-to-peer topology for blockchain-based industrial internet of things networks using particle swarm optimisation
|
Antwi, Robert |
|
|
28 |
3 |
|
artikel |
55 |
Optimization of computational offloading in the mobile edge: a game theoretic approach
|
Ait Temghart, Abdelkarim |
|
|
28 |
3 |
|
artikel |
56 |
Personalized service recommendation in smart mobility networks
|
Mezni, Haithem |
|
|
28 |
3 |
|
artikel |
57 |
PriCollabAnalysis: privacy-preserving healthcare collaborative analysis on blockchain using homomorphic encryption and secure multiparty computation
|
Tawfik, Ahmed M. |
|
|
28 |
3 |
|
artikel |
58 |
Proactive DDoS detection: integrating packet marking, traffic analysis, and machine learning for enhanced network security
|
Pasupathi, Subbulakshmi |
|
|
28 |
3 |
|
artikel |
59 |
Qaas: hybrid cryptocurrency wallet-as-a-service based on Quantum RNG
|
Shabir, Muhammad Muneem |
|
|
28 |
3 |
|
artikel |
60 |
Random cluster parallel PBFT global consensus for consistent blockchain distributed ledger
|
Abbessi, Wassim |
|
|
28 |
3 |
|
artikel |
61 |
Reinforcement learning-based task scheduling for heterogeneous computing in end-edge-cloud environment
|
Shen, Wangbo |
|
|
28 |
3 |
|
artikel |
62 |
Retraction Note: Internet of things and distributed security framework for 5G networks
|
Lu, Rui |
|
|
28 |
3 |
|
artikel |
63 |
Review of malicious code detection in data mining applications: challenges, algorithms, and future direction
|
Razaque, Abdul |
|
|
28 |
3 |
|
artikel |
64 |
Robust electroencephalogram-based biometric identification against GAN-generated artificial signals using a novel end-to-end attention-based CNN-LSTM neural network
|
Zarean, Javad |
|
|
28 |
3 |
|
artikel |
65 |
Sample-independent federated learning backdoor attack in speaker recognition
|
Xu, Weida |
|
|
28 |
3 |
|
artikel |
66 |
Stepwise discriminant analysis based optimal frequency band selection and ensemble learning for same limb MI recognition
|
Meng, Yinghui |
|
|
28 |
3 |
|
artikel |
67 |
TDS: fast answering reachability queries with hierarchical traversal trees
|
He, Daoliang |
|
|
28 |
3 |
|
artikel |
68 |
V-shaped and S-shaped binary artificial protozoa optimizer (APO) algorithm for wrapper feature selection on biological data
|
Seyyedabbasi, Amir |
|
|
28 |
3 |
|
artikel |
69 |
WHHO: enhanced Harris hawks optimizer for feature selection in high-dimensional data
|
Zhang, Meilin |
|
|
28 |
3 |
|
artikel |
70 |
Worm propagation modeling considering green worm defense mechanism in complex networks
|
Asadi, Elham |
|
|
28 |
3 |
|
artikel |