Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             65 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive analytical study on meta-heuristic based optimal thresholding using two-stage multi-level image segmentation (TSMIS) approach Günay Yilmaz, Asuman

28 6 artikel
2 A data trading platform based on Ethereum and IPFS Zhang, Jiqun

28 6 artikel
3 Advanced memory forensics for malware classification with deep learning algorithms Odeh, Ammar

28 6 artikel
4 Adversarial resilience in EEG-based BCI systems: a two-tiered approach using GANs and transfer learning Sayah Ben Aissa, Nour El Houda

28 6 artikel
5 A hybrid framework for malware determination: generative pre-trained transformer-inspired approach Ahanger, Tariq Ahamed

28 6 artikel
6 AI-driven security framework for medical sensor networks: enhancing privacy and trust in smart healthcare systems Al-Otaibi, Shaha

28 6 artikel
7 ALB-Chain: achieving scalability and load balance blockchain sharding Wu, Aihua

28 6 artikel
8 An effective approach for adaptive operator selection and comparison for PSO algorithm Akkaya, Ahmet

28 6 artikel
9 An efficient discretization and transformation scheme for maximizing secure lifetime problem in heterogeneous wireless rotatable camera sensor networks with barrier coverage Binh, Nguyen Thi My

28 6 artikel
10 An image encryption algorithm using a XOR enhanced 2D-Henon map Sharma, Madhu

28 6 artikel
11 A novel CNN-enhanced detection and mitigation of DDoS attacks in SDN Najar, Ashfaq Ahmad

28 6 artikel
12 A novel communication resources-aware consensus algorithm for blockchain-based key management scheme to secure clustered FANETs Abdelhafidh, Maroua

28 6 artikel
13 A novel image encryption scheme using both pixel-level and bit-level permutations with an improved hyperchaotic system Zhang, Xuncai

28 6 artikel
14 Application of dual-channel high-order graph neural network for intrusion detection with semisupervised learning Wang, Zhendong

28 6 artikel
15 Aqua garbage collector: utilizing AI and IoT for efficient underwater garbage classification Yam, Bonnie

28 6 artikel
16 A secure and energy-efficient authentication framework for the internet of electric things Itoo, Samiulla

28 6 artikel
17 A unified hybrid framework for accurate and early brain tumor diagnosis through MRI analysis Gottipati, Srinivas Babu

28 6 artikel
18 BigOPERA: An OPportunistic and Elastic Resource Allocation for big data frameworks Caderno, Pablo V.

28 6 artikel
19 Bigsids: an efficient SDN-based network intrusion detection systems for big data environments Huynh, Hoang-Hai

28 6 artikel
20 CTourLLM: enhancing LLMs with Chinese tourism knowledge Wei, Qikai

28 6 artikel
21 DCRDA: deadline-constrained function scheduling in serverless-cloud platform Birajdar, Priyanka Ashok

28 6 artikel
22 Dimension selection: an innovative metaheuristic strategy for particle swarm optimization Shami, Tareq M.

28 6 artikel
23 DLT-based personal data access control with key-redistribution Barbàra, Fadi

28 6 artikel
24 3D-SELTML: stacking ensemble learning based on transformer meta-learner for 3D brain tumor segmentation Aboussaleh, Ilyasse

28 6 artikel
25 Dynamic colormap visualization integrated with Harris hawks optimization for enhanced lung CT segmentation and diagnostic precision Drogham, Osama

28 6 artikel
26 Energizing the fog: a systematic survey on task scheduling strategies for energy optimization Nagabushnam, Ganesan

28 6 artikel
27 Energy-aware self-adaptive real-time job scheduling in a cloud environment using deep reinforcement learning focused on quality of service Azari, Hossein Zehtab

28 6 artikel
28 Enhancing heuristic workflow scheduling algorithms using Q-learning technique in cloud computing Namdev, Kanchan

28 6 artikel
29 Enhancing software defect prediction with a hybrid convolutional neural network and antlion optimization model Mahmoud, Alia Nabil

28 6 artikel
30 Faddeer: a deep multi-agent reinforcement learning-based scheduling algorithm for aperiodic tasks in heterogeneous fog computing networks Nagabushnam, Ganesan

28 6 artikel
31 FEAST: Fog enabled auto-scaling technique for IoT-based cloud application Verma Bansal, Shveta

28 6 artikel
32 Federated deep learning for enhanced prediction of electric vehicle charging station availability Douaidi, Lydia

28 6 artikel
33 Improved multi-objective gray wolf optimization for task allocation in multi-UAV heterogeneous targets reconnaissance Xiong, Hui

28 6 artikel
34 Improved task scheduling and load balancing in fog computing infrastructure using hybrid evolutionary method Zhao, Li

28 6 artikel
35 Improving M-Health applications recommendation using fine-tune graph neural networks Ayadi, Manal

28 6 artikel
36 Integrating machine learning with a positioning mechanism for managing interference and power consumption in a multilayer fleet of unmanned aerial platforms Almalki, Faris A.

28 6 artikel
37 Intelligent intrusion forecasting framework for distributed environment using federated learning Sudha, Chinnakka

28 6 artikel
38 Internet of medical things-based ECG monitoring for arrhythmia classification utilizing metaheuristic optimization with ensemble deep learning model Ghamya, K.

28 6 artikel
39 Leveraging big data characteristics for enhanced healthcare fraud detection Karami, Amin

28 6 artikel
40 Morphologically reconstructed 2-D histogram with opposition learning based optimization approach for multi-level thresholding Dhal, Krishna Gopal

28 6 artikel
41 Multi-stage BiLinear self-attention network for multi-sensor industrial time series classification Huang, HaoLang

28 6 artikel
42 Multi-view unsupervised feature selection based on consensus indicator graph learning with adaptive similarity Ma, Yingcang

28 6 artikel
43 Mutural and deep features driven recommender system Yu, Aihua

28 6 artikel
44 Network measurements for telehealth optimizations understanding internet paths in remote regions Caballero, Eleonora Stadtmüller

28 6 artikel
45 Optimizing Client Selection in Federated Learning Base on Genetic Algorithm Wu, Jiagao

28 6 artikel
46 Path planning for mobile robots with waypoint management using a hybrid nature inspired optimization algorithm Yadav, Subhash

28 6 artikel
47 Privacy preserving activity recognition framework for high performance smart systems Zamil, Mohammed GH. I. A. L.

28 6 artikel
48 Privacy-preserving cross-chain asset transfers using notary schemes and zero-knowledge proofs Wu, Xiaohua

28 6 artikel
49 Public key-based search on encrypted data using blockchain and non-blockchain enabled cloud storage: a comprehensive survey, analysis and future research scopes Mallick, Debjani

28 6 artikel
50 Revolutionizing electric robot charging infrastructure through federated transfer learning and data route optimization Hayawi, Kadhim

28 6 artikel
51 SD-MoMa: ANN-based mobility prediction and adaptive handover management in SDWSN Narwaria, Abhishek

28 6 artikel
52 Seraph: a stochastic operational approach for the deployment of multi-antenna UAV-assisted networks Eddine, Mohamadi Houssem

28 6 artikel
53 Sfedrl-ids: secure federated deep reinforcement learning-based intrusion detection system for agricultural internet of things Benameur, Rabaie

28 6 artikel
54 Software defect detection via deep convolutional RBM network and kernel enhanced dragonfly PCA approach Li, Yang

28 6 artikel
55 Stellar oscillation optimizer: a nature-inspired metaheuristic optimization algorithm Rodan, Ali

28 6 artikel
56 Streamlined internet of drone things (IoDT) simulator Shibli, Fatima

28 6 artikel
57 Systematic investigation of privacy preservation techniques for industrial IoT-enabled critical edge network Infrastructure Odeh, John Owoicho

28 6 artikel
58 Temporal attention to estimate continuous blood pressure using photoplethysmography signals Maqsood, Sumbal

28 6 artikel
59 The class of bivariate non-chain rings and its application to data security Safdar, Muhammad Umair

28 6 artikel
60 The impact of connectivity and software in Ethereum validator performance Cortes-Goicoechea, Mikel

28 6 artikel
61 Tiny machine learning models for autonomous workload distribution across cloud-edge computing continuum Pour-Hosseini, Mohammad R.

28 6 artikel
62 Towards deep learning enabled cybersecurity risk assessment for microservice architectures Abdulsatar, Majid

28 6 artikel
63 Tracking top-k structural hole spanners in dynamic networks Goel, Diksha

28 6 artikel
64 Transfer learning method based on cluster for drifting data stream classification Zhu, Jian

28 6 artikel
65 Wafl-tscs: an effective strategy to reduce communication costs in federated learning Wang, Debao

28 6 artikel
                             65 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland