nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A constrained multi-objective evolutionary algorithm with tri-populations assisted by an additional objective function
|
Liao, Binrong |
|
|
28 |
4 |
|
artikel |
2 |
A hybrid approach based on tuna swarm and equilibrium optimizers for parameter estimation of different PV models
|
Hassan, Mohamed H. |
|
|
28 |
4 |
|
artikel |
3 |
A multi-strategy improved Coati optimization algorithm for solving global optimization problems
|
Luo, Xin |
|
|
28 |
4 |
|
artikel |
4 |
An adaptive hybrid differential Grey Wolf Optimization algorithm for WSN coverage
|
Yuting, Yuan |
|
|
28 |
4 |
|
artikel |
5 |
An analytical model of a cluster-based service system with application to a cloud environment
|
Salameh, Osama |
|
|
28 |
4 |
|
artikel |
6 |
An efficient framework to combat multidimensionality in multi-criteria recommender systems
|
Anwar, Khalid |
|
|
28 |
4 |
|
artikel |
7 |
An efficient task scheduling algorithm leveraging fuzzy quantum atom search optimizer with innovative migration for cloud computing
|
Mohammad Hasani Zade, Behnam |
|
|
28 |
4 |
|
artikel |
8 |
An energy-aware technique for solving the offloading problem of mobile internet of things using an enhanced neural network-based optimization algorithm
|
Xia, HaoJi |
|
|
28 |
4 |
|
artikel |
9 |
An enhanced method for intrusion detection systems in IoT environment
|
Alzubi, Qusay M. |
|
|
28 |
4 |
|
artikel |
10 |
A new hybrid framework for medical image retrieval and compression using neural networks
|
Khalifeh, Mohammad Hossein |
|
|
28 |
4 |
|
artikel |
11 |
A probabilistic optimization-based event-correlated log repair method using data constraints
|
Chen, Yongqi |
|
|
28 |
4 |
|
artikel |
12 |
A robust federated biased learning algorithm for time series forecasting
|
Song, Mingli |
|
|
28 |
4 |
|
artikel |
13 |
A secure and efficient framework for internet of medical things through blockchain driven customized federated learning
|
Mazid, Abdul |
|
|
28 |
4 |
|
artikel |
14 |
Assessing the performance of a fault tolerant LoRaWAN architecture with a focus on the sensor layer and data retransmission strategy
|
Araújo, Israel |
|
|
28 |
4 |
|
artikel |
15 |
Availability evaluation of a video surveillance system with distributed storage
|
Borges, Ivson |
|
|
28 |
4 |
|
artikel |
16 |
Big time series data forecasting based on deep autoencoding and clustering
|
Abbasimehr, Hossein |
|
|
28 |
4 |
|
artikel |
17 |
Blockchain-enhanced secure guard: a deep Q network framework for robust IoT surveillance person detection
|
Bethu, Srikanth |
|
|
28 |
4 |
|
artikel |
18 |
BlockPres IPFS: performance evaluation of blockchain based secure patients prescription record storage using IPFS for smart prescription management system
|
Khan, Arshad |
|
|
28 |
4 |
|
artikel |
19 |
Chronological Drawer puzzle algorithm based multi-key generation and Lenet Kronecker network enabled privacy protected data classification
|
Kumbhar, Hemant Ramdas |
|
|
28 |
4 |
|
artikel |
20 |
Cloud security modeling: using TCP deltas with data analytics and machine learning techniques
|
Hussain, Mohamed Fazil |
|
|
28 |
4 |
|
artikel |
21 |
Coati optimization algorithm for node localization in sensor enabled-IoT
|
Dohare, Indu |
|
|
28 |
4 |
|
artikel |
22 |
Convergence of personal internet of things into social internet of things
|
Gulzar, Bisma |
|
|
28 |
4 |
|
artikel |
23 |
Correction: A hybrid model of long short-term memory neural networks and quantum behavior PSO for detecting self-admitted technical debt
|
Shahzeidi, Maryam |
|
|
28 |
4 |
|
artikel |
24 |
Correction: A new quantum-enhanced approach to AI-driven medical imaging system
|
Ahmadpour, Seyed-Sajad |
|
|
28 |
4 |
|
artikel |
25 |
Correction: Energy-efficient task offloading and efficient resource allocation for edge computing: a quantum inspired particle swarm optimization approach
|
Naik, Banavath Balaji |
|
|
28 |
4 |
|
artikel |
26 |
CrossFIM: a spark-based hybrid frequent itemset mining algorithm for large datasets
|
Raj, Shashi |
|
|
28 |
4 |
|
artikel |
27 |
CTVAN: a cooperation-based RSU-assisted trust management model for reliable communication in VANETs
|
Shokrollahi, Saeed |
|
|
28 |
4 |
|
artikel |
28 |
Deep learning assisted optimal dispatch for renewable-based energy system considering consumer incentive scheme
|
Kumar, Mantosh |
|
|
28 |
4 |
|
artikel |
29 |
Detecting attacks on the internet of things network in the computing fog layer with an embedded learning approach based on clustering and blockchain
|
Babaei Goushlavandani, Abdolmanan |
|
|
28 |
4 |
|
artikel |
30 |
Detection of MRI brain tumor using residual skip block based modified MobileNet model
|
Khan, Saif Ur Rehman |
|
|
28 |
4 |
|
artikel |
31 |
Divine Religions Algorithm: a novel social-inspired metaheuristic algorithm for engineering and continuous optimization problems
|
Mozhdehi, Ali Toufanzadeh |
|
|
28 |
4 |
|
artikel |
32 |
DUALIPA: a new immune plasma algorithm for path planning of unmanned aerial vehicles
|
Aslan, Selcuk |
|
|
28 |
4 |
|
artikel |
33 |
Dynamic network slicing orchestration in open 5G networks using multi-criteria decision making and secure federated learning techniques
|
Kholidy, Hisham A. |
|
|
28 |
4 |
|
artikel |
34 |
EEG-based emotion recognition model using fuzzy adjacency matrix combined with convolutional multi-head graph attention mechanism
|
Cao, Mingwei |
|
|
28 |
4 |
|
artikel |
35 |
Enhanced zebra optimization algorithm for reliability redundancy allocation and engineering optimization problems
|
Punia, Parul |
|
|
28 |
4 |
|
artikel |
36 |
Enhancing network security: an intrusion detection system using residual network-based convolutional neural network
|
Farhan, Saima |
|
|
28 |
4 |
|
artikel |
37 |
Exploring stacking methods for software effort estimation with hyperparameter tuning
|
Hassanali, Maryam |
|
|
28 |
4 |
|
artikel |
38 |
FEdroid: a lightweight and interpretable machine learning-based android malware detection system
|
Huang, Hong |
|
|
28 |
4 |
|
artikel |
39 |
Forecasting workload in cloud computing: towards uncertainty-aware predictions and transfer learning
|
Rossi, Andrea |
|
|
28 |
4 |
|
artikel |
40 |
Grid-based multi-objective cheetah optimization for engineering applications
|
Sharma, Shubhkirti |
|
|
28 |
4 |
|
artikel |
41 |
Hybrid image encryption: leveraging DNA sequencing and Lorenz chaotic dynamics for enhanced security
|
Benyahia, Kadda |
|
|
28 |
4 |
|
artikel |
42 |
Hyex-net: hybrid efficient Xception network for human activity recognition using multimodalities
|
Gupta, Saurabh |
|
|
28 |
4 |
|
artikel |
43 |
Improved Aquila optimizer and its applications
|
Guo, Runxia |
|
|
28 |
4 |
|
artikel |
44 |
Intelligent multipath congestion control algorithm based on subflow coupling perception
|
Xu, Yanyan |
|
|
28 |
4 |
|
artikel |
45 |
Intrusion detection in smart grids using artificial intelligence-based ensemble modelling
|
Alsirhani, Amjad |
|
|
28 |
4 |
|
artikel |
46 |
K-PAKE: post quantum password authentication key exchange protocol for satellite networks
|
Yang, Yatao |
|
|
28 |
4 |
|
artikel |
47 |
MEARO: A multi-strategy enhanced artificial rabbits optimization for global optimization problems
|
Liao, Zhilin |
|
|
28 |
4 |
|
artikel |
48 |
Model-contrastive federated learning entrenched UWB bi-direction localization through dynamic hexagonal grid construction in indoor WSN environment
|
Prasad, Supriya Kumari |
|
|
28 |
4 |
|
artikel |
49 |
MOSO: multi-objective snake optimizer with density estimation and grid indexing mechanism for edge computing task offloading and scheduling optimization
|
Zhang, Shi-Hui |
|
|
28 |
4 |
|
artikel |
50 |
Multi-objective multicast optimization with deep reinforcement learning
|
Li, Xiaole |
|
|
28 |
4 |
|
artikel |
51 |
Multi-strategy improved snake optimizer based on adaptive lévy flight and dual-lens fusion
|
Gong, Guangming |
|
|
28 |
4 |
|
artikel |
52 |
Network Intrusion Detection System Using Convolutional Neural Networks: NIDS-DL-CNN for IoT Security
|
Kharoubi, Kamir |
|
|
28 |
4 |
|
artikel |
53 |
Optimizing medical data classification: integrating hybrid fuzzy joint mutual information with binary Cheetah optimizer algorithm
|
Hegazy, Ah. E. |
|
|
28 |
4 |
|
artikel |
54 |
Optimizing XGBoost hyperparameters using the dragonfly algorithm for enhanced cyber attack detection in the internet of healthcare things (IoHT)
|
Surbhi, |
|
|
28 |
4 |
|
artikel |
55 |
Parallel Committees: a scalable, secure, and fault-tolerant distributed NoSQL database architecture
|
Solat, Siamak |
|
|
28 |
4 |
|
artikel |
56 |
Precise brain tumor classification from MRI images with hybrid recurrent neural network-bidirectional LSTM and humming bird optimization
|
Kumar, Gokapay Dilip |
|
|
28 |
4 |
|
artikel |
57 |
QoS-aware resource management in cloud computing based on fuzzy meta-heuristic method
|
Long, Guiling |
|
|
28 |
4 |
|
artikel |
58 |
Research on dynamic job shop scheduling problem with AGV based on DQN
|
Li, Zhengfeng |
|
|
28 |
4 |
|
artikel |
59 |
Securing internet of vehicles: a blockchain-based federated learning approach for enhanced intrusion detection
|
Ullah, Irshad |
|
|
28 |
4 |
|
artikel |
60 |
SMOTE oversampling algorithm based on generative adversarial network
|
Liu, Yu |
|
|
28 |
4 |
|
artikel |
61 |
Superb Fairy-wren Optimization Algorithm: a novel metaheuristic algorithm for solving feature selection problems
|
Jia, Heming |
|
|
28 |
4 |
|
artikel |
62 |
TMABKS: a traceable multi authority attribute-based Boolean keywords search authorization for e-health records in cloud
|
Ali, Muqadar |
|
|
28 |
4 |
|
artikel |
63 |
Victoria Amazonica optimization algorithm based on adaptive mutation factor and mathematical distribution for solving minimum spanning tree problem
|
Ma, Xin-Ru |
|
|
28 |
4 |
|
artikel |