Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             70 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A cost-aware IoT application deployment approach in fog computing Faraji-Mehmandar, Mohammad

28 3 artikel
2 Adaptive horizontal scaling in kubernetes clusters with ANN-based load forecasting da Silva, Lucileide M. D.

28 3 artikel
3 A formal algebra for document-oriented NoSQL data warehouses: formalisation and evaluation Bouaziz, Senda

28 3 artikel
4 A hybrid model of long short-term memory neural networks and quantum behavior PSO for detecting self-admitted technical debt Shahzeidi, Maryam

28 3 artikel
5 A new approach for fire and non-fire aerosols discrimination based on multilayer perceptron trained by modified bonobo optimizer Zheng, Rong

28 3 artikel
6 A new approach to reduce energy consumption in priority live migration of services based on green cloud computing Wang, Guikun

28 3 artikel
7 A new quantum-enhanced approach to AI-driven medical imaging system Ahmadpour, Seyed-Sajad

28 3 artikel
8 A novel adjacent matrix-based probabilistic selection mechanism for differential evolution Zhong, Rui

28 3 artikel
9 A QoS-aware IoT services composition approach based on the modified violation constraints handling technique and enhanced fireworks algorithm Boukhama, Macilia

28 3 artikel
10 Artificial intelligence-enhanced intrusion detection systems for drone security: a real-time evaluation of algorithmic efficacy in mitigating wireless vulnerabilities Senturk, Kenan

28 3 artikel
11 A survey on resource scheduling approaches in multi-access edge computing environment: a deep reinforcement learning study Ismail, Ahmed A.

28 3 artikel
12 Automatic liver tumor segmentation based on improved Yolo-v5 and B-spline level set Zhang, Lin

28 3 artikel
13 Blockchain technology for a trustworthy social credit system: implementation and enforcement perspectives Damaševičius, Robertas

28 3 artikel
14 Building a cyber risk treatment taxonomy Sánchez-García, Isaac D.

28 3 artikel
15 Burst load scheduling latency optimization through collaborative content caching in edge-cloud computing Chen, Hong

28 3 artikel
16 CFL-ATELM: an approach to detect botnet traffic by analyzing non-IID and imbalanced data in IoT-edge based 6G networks Pithani, Ashwini

28 3 artikel
17 Chaotic quasi-opposition marine predator algorithm for automatic data clustering Ouertani, Mohamed Wajdi

28 3 artikel
18 Classification of radiographic and non-radiographic axial spondylarthritis in pelvic radiography using deep convolution neural network models Kahveci, Abdulvahap

28 3 artikel
19 Compound strategy based binary willow catkin optimization for feature selection Chen, Hongming

28 3 artikel
20 Correction: The green marine waste collector routing optimization with puma selectison-based neighborhood search algorithm Abdollahzadeh, Benyamin

28 3 artikel
21 Critical vector based evolutionary algorithm for large-scale multi-objective optimization Zhu, Shuwei

28 3 artikel
22 Defending mutation-based adversarial text perturbation: a black-box approach Deanda, Demetrio

28 3 artikel
23 Developing a two stage optimized random vector functional link neural network based predictor model utilizing a swift crow search algorithm Samal, Sidharth

28 3 artikel
24 Digital Twin technology for multimodal-based smart mobility using hybrid Co-ABC optimization based deep CNN Wajid, Mohd Anas

28 3 artikel
25 Energy-efficient task offloading and efficient resource allocation for edge computing: a quantum inspired particle swarm optimization approach Naik, Banavath Balaji

28 3 artikel
26 Enhancing autonomous vehicle performance with ensemble weighted support vector-based optimization in cloud Sethuraman, Ravikumar

28 3 artikel
27 Enhancing chernobyl disaster optimization: a novel hybridization approach with modified grey wolf optimizer for solving complex optimization problems Al Afghani Edsa, Said

28 3 artikel
28 Enhancing the security of IOT enabled systems using light weight hybrid cryptography models Bhandiwad, Vinita

28 3 artikel
29 ESDN: edge computing task scheduling strategy based on dilated convolutional neural network and quasi-newton algorithm Liu, Haoyu

28 3 artikel
30 Expertise as a signature: continuous implicit authentication based on behavior Nawal, Sad-Houari

28 3 artikel
31 FedCCW: a privacy-preserving Byzantine-robust federated learning with local differential privacy for healthcare Zhang, Lianfu

28 3 artikel
32 Federated learning for secure and efficient vehicular communications in open RAN Asad, Muhammad

28 3 artikel
33 Fog assisted data size reduction based data management system for optimizing resources in medical IoT Jan, Iqra

28 3 artikel
34 Ftmoe: a federated transfer model based on mixture-of-experts for heterogeneous image classification Liu, Wei

28 3 artikel
35 Group-driven Remora Optimization Algorithm with multiple search and regeneration strategies Peng, Fei

28 3 artikel
36 Hybrid strategy improved Harris Hawks optimization algorithm for global optimization and microgrid economic scheduling problem Liu, Tianbao

28 3 artikel
37 IBF network: enhancing network privacy with IoT, blockchain, and fog computing on different consensus mechanisms Reshi, Iraq Ahmad

28 3 artikel
38 Improved multi-strategy beluga whale optimization algorithm: a case study for multiple engineering optimization problems Zou, Huanhuan

28 3 artikel
39 Improved sparrow search algorithm with adaptive multi-strategy hierarchical mechanism for global optimization and engineering problems Wei, Fengtao

28 3 artikel
40 Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review Al-Qadhi, Abdulrahman K.

28 3 artikel
41 Intelligent cache prefetchers in HPC architecture Fargo, Farah

28 3 artikel
42 Joint resource autoscaling and request scheduling for serverless edge computing Choupani, Armin

28 3 artikel
43 Knowledge-based job scheduling for HPC Diel, Guilherme

28 3 artikel
44 Ml assisted techniques in power side channel analysis for trojan classification Bhatta, Niraj Prasad

28 3 artikel
45 Modeling and analysis of LoRa-enabled task offloading in edge computing for enhanced battery life in wearable devices Amzil, Abdellah

28 3 artikel
46 MP-TMD: A Multidimensional Plausibility-driven Cooperative Trust Model for Multiple Misbehaviour Detection in Intelligent Transportation Systems Lone, Faisal Rasheed

28 3 artikel
47 Multilevel learning for enhanced traffic congestion prediction using anomaly detection and ensemble learning Khasawneh, Mohammed A.

28 3 artikel
48 Multi-objective dynamic distributed flexible job shop scheduling problem considering uncertain processing time Peng, Ningtao

28 3 artikel
49 Multi-scale fusion dynamic graph convolutional recurrent network for traffic forecasting Xiao, Junbi

28 3 artikel
50 Multi-strategy ant colony optimization with k-means clustering algorithm for capacitated vehicle routing problem Zhang, Zhaojun

28 3 artikel
51 Multi-UAV cooperative task assignment based on multi-strategy improved DBO Zhang, Ran

28 3 artikel
52 MutaSwarmClus: enhancing data clustering efficiency with mutation-enhanced swarm algorithm Malik, Saleem

28 3 artikel
53 Novel offloading approach of computing task for internet of vehicles based on particle swarm optimization strategy Zhang, DeGan

28 3 artikel
54 Optimising peer-to-peer topology for blockchain-based industrial internet of things networks using particle swarm optimisation Antwi, Robert

28 3 artikel
55 Optimization of computational offloading in the mobile edge: a game theoretic approach Ait Temghart, Abdelkarim

28 3 artikel
56 Personalized service recommendation in smart mobility networks Mezni, Haithem

28 3 artikel
57 PriCollabAnalysis: privacy-preserving healthcare collaborative analysis on blockchain using homomorphic encryption and secure multiparty computation Tawfik, Ahmed M.

28 3 artikel
58 Proactive DDoS detection: integrating packet marking, traffic analysis, and machine learning for enhanced network security Pasupathi, Subbulakshmi

28 3 artikel
59 Qaas: hybrid cryptocurrency wallet-as-a-service based on Quantum RNG Shabir, Muhammad Muneem

28 3 artikel
60 Random cluster parallel PBFT global consensus for consistent blockchain distributed ledger Abbessi, Wassim

28 3 artikel
61 Reinforcement learning-based task scheduling for heterogeneous computing in end-edge-cloud environment Shen, Wangbo

28 3 artikel
62 Retraction Note: Internet of things and distributed security framework for 5G networks Lu, Rui

28 3 artikel
63 Review of malicious code detection in data mining applications: challenges, algorithms, and future direction Razaque, Abdul

28 3 artikel
64 Robust electroencephalogram-based biometric identification against GAN-generated artificial signals using a novel end-to-end attention-based CNN-LSTM neural network Zarean, Javad

28 3 artikel
65 Sample-independent federated learning backdoor attack in speaker recognition Xu, Weida

28 3 artikel
66 Stepwise discriminant analysis based optimal frequency band selection and ensemble learning for same limb MI recognition Meng, Yinghui

28 3 artikel
67 TDS: fast answering reachability queries with hierarchical traversal trees He, Daoliang

28 3 artikel
68 V-shaped and S-shaped binary artificial protozoa optimizer (APO) algorithm for wrapper feature selection on biological data Seyyedabbasi, Amir

28 3 artikel
69 WHHO: enhanced Harris hawks optimizer for feature selection in high-dimensional data Zhang, Meilin

28 3 artikel
70 Worm propagation modeling considering green worm defense mechanism in complex networks Asadi, Elham

28 3 artikel
                             70 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland