nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive analytical study on meta-heuristic based optimal thresholding using two-stage multi-level image segmentation (TSMIS) approach
|
Günay Yilmaz, Asuman |
|
|
28 |
6 |
|
artikel |
2 |
A data trading platform based on Ethereum and IPFS
|
Zhang, Jiqun |
|
|
28 |
6 |
|
artikel |
3 |
Advanced memory forensics for malware classification with deep learning algorithms
|
Odeh, Ammar |
|
|
28 |
6 |
|
artikel |
4 |
Adversarial resilience in EEG-based BCI systems: a two-tiered approach using GANs and transfer learning
|
Sayah Ben Aissa, Nour El Houda |
|
|
28 |
6 |
|
artikel |
5 |
A hybrid framework for malware determination: generative pre-trained transformer-inspired approach
|
Ahanger, Tariq Ahamed |
|
|
28 |
6 |
|
artikel |
6 |
AI-driven security framework for medical sensor networks: enhancing privacy and trust in smart healthcare systems
|
Al-Otaibi, Shaha |
|
|
28 |
6 |
|
artikel |
7 |
ALB-Chain: achieving scalability and load balance blockchain sharding
|
Wu, Aihua |
|
|
28 |
6 |
|
artikel |
8 |
An effective approach for adaptive operator selection and comparison for PSO algorithm
|
Akkaya, Ahmet |
|
|
28 |
6 |
|
artikel |
9 |
An efficient discretization and transformation scheme for maximizing secure lifetime problem in heterogeneous wireless rotatable camera sensor networks with barrier coverage
|
Binh, Nguyen Thi My |
|
|
28 |
6 |
|
artikel |
10 |
An image encryption algorithm using a XOR enhanced 2D-Henon map
|
Sharma, Madhu |
|
|
28 |
6 |
|
artikel |
11 |
A novel CNN-enhanced detection and mitigation of DDoS attacks in SDN
|
Najar, Ashfaq Ahmad |
|
|
28 |
6 |
|
artikel |
12 |
A novel communication resources-aware consensus algorithm for blockchain-based key management scheme to secure clustered FANETs
|
Abdelhafidh, Maroua |
|
|
28 |
6 |
|
artikel |
13 |
A novel image encryption scheme using both pixel-level and bit-level permutations with an improved hyperchaotic system
|
Zhang, Xuncai |
|
|
28 |
6 |
|
artikel |
14 |
Application of dual-channel high-order graph neural network for intrusion detection with semisupervised learning
|
Wang, Zhendong |
|
|
28 |
6 |
|
artikel |
15 |
Aqua garbage collector: utilizing AI and IoT for efficient underwater garbage classification
|
Yam, Bonnie |
|
|
28 |
6 |
|
artikel |
16 |
A secure and energy-efficient authentication framework for the internet of electric things
|
Itoo, Samiulla |
|
|
28 |
6 |
|
artikel |
17 |
A unified hybrid framework for accurate and early brain tumor diagnosis through MRI analysis
|
Gottipati, Srinivas Babu |
|
|
28 |
6 |
|
artikel |
18 |
BigOPERA: An OPportunistic and Elastic Resource Allocation for big data frameworks
|
Caderno, Pablo V. |
|
|
28 |
6 |
|
artikel |
19 |
Bigsids: an efficient SDN-based network intrusion detection systems for big data environments
|
Huynh, Hoang-Hai |
|
|
28 |
6 |
|
artikel |
20 |
CTourLLM: enhancing LLMs with Chinese tourism knowledge
|
Wei, Qikai |
|
|
28 |
6 |
|
artikel |
21 |
DCRDA: deadline-constrained function scheduling in serverless-cloud platform
|
Birajdar, Priyanka Ashok |
|
|
28 |
6 |
|
artikel |
22 |
Dimension selection: an innovative metaheuristic strategy for particle swarm optimization
|
Shami, Tareq M. |
|
|
28 |
6 |
|
artikel |
23 |
DLT-based personal data access control with key-redistribution
|
Barbàra, Fadi |
|
|
28 |
6 |
|
artikel |
24 |
3D-SELTML: stacking ensemble learning based on transformer meta-learner for 3D brain tumor segmentation
|
Aboussaleh, Ilyasse |
|
|
28 |
6 |
|
artikel |
25 |
Dynamic colormap visualization integrated with Harris hawks optimization for enhanced lung CT segmentation and diagnostic precision
|
Drogham, Osama |
|
|
28 |
6 |
|
artikel |
26 |
Energizing the fog: a systematic survey on task scheduling strategies for energy optimization
|
Nagabushnam, Ganesan |
|
|
28 |
6 |
|
artikel |
27 |
Energy-aware self-adaptive real-time job scheduling in a cloud environment using deep reinforcement learning focused on quality of service
|
Azari, Hossein Zehtab |
|
|
28 |
6 |
|
artikel |
28 |
Enhancing heuristic workflow scheduling algorithms using Q-learning technique in cloud computing
|
Namdev, Kanchan |
|
|
28 |
6 |
|
artikel |
29 |
Enhancing software defect prediction with a hybrid convolutional neural network and antlion optimization model
|
Mahmoud, Alia Nabil |
|
|
28 |
6 |
|
artikel |
30 |
Faddeer: a deep multi-agent reinforcement learning-based scheduling algorithm for aperiodic tasks in heterogeneous fog computing networks
|
Nagabushnam, Ganesan |
|
|
28 |
6 |
|
artikel |
31 |
FEAST: Fog enabled auto-scaling technique for IoT-based cloud application
|
Verma Bansal, Shveta |
|
|
28 |
6 |
|
artikel |
32 |
Federated deep learning for enhanced prediction of electric vehicle charging station availability
|
Douaidi, Lydia |
|
|
28 |
6 |
|
artikel |
33 |
Improved multi-objective gray wolf optimization for task allocation in multi-UAV heterogeneous targets reconnaissance
|
Xiong, Hui |
|
|
28 |
6 |
|
artikel |
34 |
Improved task scheduling and load balancing in fog computing infrastructure using hybrid evolutionary method
|
Zhao, Li |
|
|
28 |
6 |
|
artikel |
35 |
Improving M-Health applications recommendation using fine-tune graph neural networks
|
Ayadi, Manal |
|
|
28 |
6 |
|
artikel |
36 |
Integrating machine learning with a positioning mechanism for managing interference and power consumption in a multilayer fleet of unmanned aerial platforms
|
Almalki, Faris A. |
|
|
28 |
6 |
|
artikel |
37 |
Intelligent intrusion forecasting framework for distributed environment using federated learning
|
Sudha, Chinnakka |
|
|
28 |
6 |
|
artikel |
38 |
Internet of medical things-based ECG monitoring for arrhythmia classification utilizing metaheuristic optimization with ensemble deep learning model
|
Ghamya, K. |
|
|
28 |
6 |
|
artikel |
39 |
Leveraging big data characteristics for enhanced healthcare fraud detection
|
Karami, Amin |
|
|
28 |
6 |
|
artikel |
40 |
Morphologically reconstructed 2-D histogram with opposition learning based optimization approach for multi-level thresholding
|
Dhal, Krishna Gopal |
|
|
28 |
6 |
|
artikel |
41 |
Multi-stage BiLinear self-attention network for multi-sensor industrial time series classification
|
Huang, HaoLang |
|
|
28 |
6 |
|
artikel |
42 |
Multi-view unsupervised feature selection based on consensus indicator graph learning with adaptive similarity
|
Ma, Yingcang |
|
|
28 |
6 |
|
artikel |
43 |
Mutural and deep features driven recommender system
|
Yu, Aihua |
|
|
28 |
6 |
|
artikel |
44 |
Network measurements for telehealth optimizations understanding internet paths in remote regions
|
Caballero, Eleonora Stadtmüller |
|
|
28 |
6 |
|
artikel |
45 |
Optimizing Client Selection in Federated Learning Base on Genetic Algorithm
|
Wu, Jiagao |
|
|
28 |
6 |
|
artikel |
46 |
Path planning for mobile robots with waypoint management using a hybrid nature inspired optimization algorithm
|
Yadav, Subhash |
|
|
28 |
6 |
|
artikel |
47 |
Privacy preserving activity recognition framework for high performance smart systems
|
Zamil, Mohammed GH. I. A. L. |
|
|
28 |
6 |
|
artikel |
48 |
Privacy-preserving cross-chain asset transfers using notary schemes and zero-knowledge proofs
|
Wu, Xiaohua |
|
|
28 |
6 |
|
artikel |
49 |
Public key-based search on encrypted data using blockchain and non-blockchain enabled cloud storage: a comprehensive survey, analysis and future research scopes
|
Mallick, Debjani |
|
|
28 |
6 |
|
artikel |
50 |
Revolutionizing electric robot charging infrastructure through federated transfer learning and data route optimization
|
Hayawi, Kadhim |
|
|
28 |
6 |
|
artikel |
51 |
SD-MoMa: ANN-based mobility prediction and adaptive handover management in SDWSN
|
Narwaria, Abhishek |
|
|
28 |
6 |
|
artikel |
52 |
Seraph: a stochastic operational approach for the deployment of multi-antenna UAV-assisted networks
|
Eddine, Mohamadi Houssem |
|
|
28 |
6 |
|
artikel |
53 |
Sfedrl-ids: secure federated deep reinforcement learning-based intrusion detection system for agricultural internet of things
|
Benameur, Rabaie |
|
|
28 |
6 |
|
artikel |
54 |
Software defect detection via deep convolutional RBM network and kernel enhanced dragonfly PCA approach
|
Li, Yang |
|
|
28 |
6 |
|
artikel |
55 |
Stellar oscillation optimizer: a nature-inspired metaheuristic optimization algorithm
|
Rodan, Ali |
|
|
28 |
6 |
|
artikel |
56 |
Streamlined internet of drone things (IoDT) simulator
|
Shibli, Fatima |
|
|
28 |
6 |
|
artikel |
57 |
Systematic investigation of privacy preservation techniques for industrial IoT-enabled critical edge network Infrastructure
|
Odeh, John Owoicho |
|
|
28 |
6 |
|
artikel |
58 |
Temporal attention to estimate continuous blood pressure using photoplethysmography signals
|
Maqsood, Sumbal |
|
|
28 |
6 |
|
artikel |
59 |
The class of bivariate non-chain rings and its application to data security
|
Safdar, Muhammad Umair |
|
|
28 |
6 |
|
artikel |
60 |
The impact of connectivity and software in Ethereum validator performance
|
Cortes-Goicoechea, Mikel |
|
|
28 |
6 |
|
artikel |
61 |
Tiny machine learning models for autonomous workload distribution across cloud-edge computing continuum
|
Pour-Hosseini, Mohammad R. |
|
|
28 |
6 |
|
artikel |
62 |
Towards deep learning enabled cybersecurity risk assessment for microservice architectures
|
Abdulsatar, Majid |
|
|
28 |
6 |
|
artikel |
63 |
Tracking top-k structural hole spanners in dynamic networks
|
Goel, Diksha |
|
|
28 |
6 |
|
artikel |
64 |
Transfer learning method based on cluster for drifting data stream classification
|
Zhu, Jian |
|
|
28 |
6 |
|
artikel |
65 |
Wafl-tscs: an effective strategy to reduce communication costs in federated learning
|
Wang, Debao |
|
|
28 |
6 |
|
artikel |