Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             70 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive analytical study on meta-heuristic based optimal thresholding using two-stage multi-level image segmentation (TSMIS) approach Günay Yilmaz, Asuman

28 6 artikel
2 A data trading platform based on Ethereum and IPFS Zhang, Jiqun

28 6 artikel
3 Advanced memory forensics for malware classification with deep learning algorithms Odeh, Ammar

28 6 artikel
4 Adversarial resilience in EEG-based BCI systems: a two-tiered approach using GANs and transfer learning Sayah Ben Aissa, Nour El Houda

28 6 artikel
5 A hybrid framework for malware determination: generative pre-trained transformer-inspired approach Ahanger, Tariq Ahamed

28 6 artikel
6 AI-driven security framework for medical sensor networks: enhancing privacy and trust in smart healthcare systems Al-Otaibi, Shaha

28 6 artikel
7 ALB-Chain: achieving scalability and load balance blockchain sharding Wu, Aihua

28 6 artikel
8 Ameliorating clustered federated learning using real-coded genetic algorithm Chaudhary, Rajesh Kumar

28 6 artikel
9 An effective approach for adaptive operator selection and comparison for PSO algorithm Akkaya, Ahmet

28 6 artikel
10 An efficient discretization and transformation scheme for maximizing secure lifetime problem in heterogeneous wireless rotatable camera sensor networks with barrier coverage Binh, Nguyen Thi My

28 6 artikel
11 An efficient low aggressiveness portion (ELAP) cache replacement policy for systems with non-volatile main memory Alzoubi, Shefaa

28 6 artikel
12 An image encryption algorithm using a XOR enhanced 2D-Henon map Sharma, Madhu

28 6 artikel
13 A novel CNN-enhanced detection and mitigation of DDoS attacks in SDN Najar, Ashfaq Ahmad

28 6 artikel
14 A novel communication resources-aware consensus algorithm for blockchain-based key management scheme to secure clustered FANETs Abdelhafidh, Maroua

28 6 artikel
15 A novel image encryption scheme using both pixel-level and bit-level permutations with an improved hyperchaotic system Zhang, Xuncai

28 6 artikel
16 Application of dual-channel high-order graph neural network for intrusion detection with semisupervised learning Wang, Zhendong

28 6 artikel
17 Aqua garbage collector: utilizing AI and IoT for efficient underwater garbage classification Yam, Bonnie

28 6 artikel
18 A secure and energy-efficient authentication framework for the internet of electric things Itoo, Samiulla

28 6 artikel
19 A unified hybrid framework for accurate and early brain tumor diagnosis through MRI analysis Gottipati, Srinivas Babu

28 6 artikel
20 BigOPERA: An OPportunistic and Elastic Resource Allocation for big data frameworks Caderno, Pablo V.

28 6 artikel
21 Bigsids: an efficient SDN-based network intrusion detection systems for big data environments Huynh, Hoang-Hai

28 6 artikel
22 Correction: SFE-EANDS: a simple, fast, and efficient algorithm with external archive and normalized distance-based selection for high-dimensional feature selection Zhong, Rui

28 6 artikel
23 CTourLLM: enhancing LLMs with Chinese tourism knowledge Wei, Qikai

28 6 artikel
24 DCRDA: deadline-constrained function scheduling in serverless-cloud platform Birajdar, Priyanka Ashok

28 6 artikel
25 Dimension selection: an innovative metaheuristic strategy for particle swarm optimization Shami, Tareq M.

28 6 artikel
26 DLT-based personal data access control with key-redistribution Barbàra, Fadi

28 6 artikel
27 3D-SELTML: stacking ensemble learning based on transformer meta-learner for 3D brain tumor segmentation Aboussaleh, Ilyasse

28 6 artikel
28 Dynamic colormap visualization integrated with Harris hawks optimization for enhanced lung CT segmentation and diagnostic precision Drogham, Osama

28 6 artikel
29 Energizing the fog: a systematic survey on task scheduling strategies for energy optimization Nagabushnam, Ganesan

28 6 artikel
30 Energy-aware self-adaptive real-time job scheduling in a cloud environment using deep reinforcement learning focused on quality of service Azari, Hossein Zehtab

28 6 artikel
31 Enhancing heuristic workflow scheduling algorithms using Q-learning technique in cloud computing Namdev, Kanchan

28 6 artikel
32 Enhancing software defect prediction with a hybrid convolutional neural network and antlion optimization model Mahmoud, Alia Nabil

28 6 artikel
33 Faddeer: a deep multi-agent reinforcement learning-based scheduling algorithm for aperiodic tasks in heterogeneous fog computing networks Nagabushnam, Ganesan

28 6 artikel
34 FEAST: Fog enabled auto-scaling technique for IoT-based cloud application Verma Bansal, Shveta

28 6 artikel
35 Federated deep learning for enhanced prediction of electric vehicle charging station availability Douaidi, Lydia

28 6 artikel
36 Improved multi-objective gray wolf optimization for task allocation in multi-UAV heterogeneous targets reconnaissance Xiong, Hui

28 6 artikel
37 Improved task scheduling and load balancing in fog computing infrastructure using hybrid evolutionary method Zhao, Li

28 6 artikel
38 Improving M-Health applications recommendation using fine-tune graph neural networks Ayadi, Manal

28 6 artikel
39 Integrating machine learning with a positioning mechanism for managing interference and power consumption in a multilayer fleet of unmanned aerial platforms Almalki, Faris A.

28 6 artikel
40 Intelligent intrusion forecasting framework for distributed environment using federated learning Sudha, Chinnakka

28 6 artikel
41 Internet of medical things-based ECG monitoring for arrhythmia classification utilizing metaheuristic optimization with ensemble deep learning model Ghamya, K.

28 6 artikel
42 Intrusion detection system based on federated learning using layer-based privacy obfuscation Kumar, Kapil

28 6 artikel
43 Leveraging big data characteristics for enhanced healthcare fraud detection Karami, Amin

28 6 artikel
44 mFCBF based lightweight intrusion detection system for IoT networks Kushwaha, Jai Prakash

28 6 artikel
45 Morphologically reconstructed 2-D histogram with opposition learning based optimization approach for multi-level thresholding Dhal, Krishna Gopal

28 6 artikel
46 Multi-stage BiLinear self-attention network for multi-sensor industrial time series classification Huang, HaoLang

28 6 artikel
47 Multi-view unsupervised feature selection based on consensus indicator graph learning with adaptive similarity Ma, Yingcang

28 6 artikel
48 Mutural and deep features driven recommender system Yu, Aihua

28 6 artikel
49 Network measurements for telehealth optimizations understanding internet paths in remote regions Caballero, Eleonora Stadtmüller

28 6 artikel
50 Optimizing Client Selection in Federated Learning Base on Genetic Algorithm Wu, Jiagao

28 6 artikel
51 Path planning for mobile robots with waypoint management using a hybrid nature inspired optimization algorithm Yadav, Subhash

28 6 artikel
52 Privacy preserving activity recognition framework for high performance smart systems Zamil, Mohammed GH. I. A. L.

28 6 artikel
53 Privacy-preserving cross-chain asset transfers using notary schemes and zero-knowledge proofs Wu, Xiaohua

28 6 artikel
54 Public key-based search on encrypted data using blockchain and non-blockchain enabled cloud storage: a comprehensive survey, analysis and future research scopes Mallick, Debjani

28 6 artikel
55 Revolutionizing electric robot charging infrastructure through federated transfer learning and data route optimization Hayawi, Kadhim

28 6 artikel
56 SD-MoMa: ANN-based mobility prediction and adaptive handover management in SDWSN Narwaria, Abhishek

28 6 artikel
57 Seraph: a stochastic operational approach for the deployment of multi-antenna UAV-assisted networks Eddine, Mohamadi Houssem

28 6 artikel
58 Sfedrl-ids: secure federated deep reinforcement learning-based intrusion detection system for agricultural internet of things Benameur, Rabaie

28 6 artikel
59 Software defect detection via deep convolutional RBM network and kernel enhanced dragonfly PCA approach Li, Yang

28 6 artikel
60 Stellar oscillation optimizer: a nature-inspired metaheuristic optimization algorithm Rodan, Ali

28 6 artikel
61 Streamlined internet of drone things (IoDT) simulator Shibli, Fatima

28 6 artikel
62 Systematic investigation of privacy preservation techniques for industrial IoT-enabled critical edge network Infrastructure Odeh, John Owoicho

28 6 artikel
63 Temporal attention to estimate continuous blood pressure using photoplethysmography signals Maqsood, Sumbal

28 6 artikel
64 The class of bivariate non-chain rings and its application to data security Safdar, Muhammad Umair

28 6 artikel
65 The impact of connectivity and software in Ethereum validator performance Cortes-Goicoechea, Mikel

28 6 artikel
66 Tiny machine learning models for autonomous workload distribution across cloud-edge computing continuum Pour-Hosseini, Mohammad R.

28 6 artikel
67 Towards deep learning enabled cybersecurity risk assessment for microservice architectures Abdulsatar, Majid

28 6 artikel
68 Tracking top-k structural hole spanners in dynamic networks Goel, Diksha

28 6 artikel
69 Transfer learning method based on cluster for drifting data stream classification Zhu, Jian

28 6 artikel
70 Wafl-tscs: an effective strategy to reduce communication costs in federated learning Wang, Debao

28 6 artikel
                             70 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland