Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             82 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain-based framework for automatic SLA management in fog computing environments Battula, Sudheer Kumar

15 p. 16647-16677
artikel
2 Adaptive distribution of control messages for improving bandwidth utilization in multiple NoC Yadav, Sonal

15 p. 17208-17246
artikel
3 A data distribution scheme for VANET based on fountain code Liu, Jianhang

15 p. 16794-16819
artikel
4 AdaXod: a new adaptive and momental bound algorithm for training deep neural networks Liu, Yuanxuan

15 p. 17691-17715
artikel
5 ADELA: a conversational virtual assistant to prevent delirium in hospitalized older persons Alonso-Mencía, Javier

15 p. 17670-17690
artikel
6 A denoising method of mine microseismic signal based on NAEEMD and frequency-constrained SVD Zhang, Chongchong

15 p. 17095-17113
artikel
7 A distributed prediction–compression-based mechanism for energy saving in IoT networks Hussein, Ahmed Mohammed

15 p. 16963-16999
artikel
8 Advanced data modeling for industrial drying machine energy optimization Barriga, R.

15 p. 16820-16840
artikel
9 A hybrid algorithm for scheduling scientific workflows in IaaS cloud with deadline constraint Hariri, Malihe

15 p. 16975-16996
artikel
10 A lightweight authentication and key agreement protocol for heterogeneous IoT with special attention to sensing devices and gateway Hajian, R.

15 p. 16678-16720
artikel
11 Ameliorated class topper optimizer for cost optimization using demand side management program in a day-ahead energy market Roy, Chitrangada

15 p. 16688-16719
artikel
12 An effective 3-D fast fourier transform framework for multi-GPU accelerated distributed-memory systems Zhou, Binbin

15 p. 17055-17073
artikel
13 An efficient certificateless group signcryption scheme using Quantum Chebyshev Chaotic Maps in HC-IoT environments Meshram, Chandrashekhar

15 p. 16914-16939
artikel
14 A new chaotic satellite image encryption algorithm based on a 2D filter and Fisher–Yates shuffling Naim, M.

15 p. 17585-17618
artikel
15 An improved opposition-based Runge Kutta optimizer for multilevel image thresholding Casas-Ordaz, Angel

15 p. 17247-17354
artikel
16 An intelligent clustering framework for substitute recommendation and player selection Das, Nayan Ranjan

15 p. 16409-16441
artikel
17 An investigation and comparison of machine learning approaches for intrusion detection in IoMT network Binbusayyis, Adel

15 p. 17403-17422
artikel
18 An online and highly-scalable streaming platform for filtering trolls with transfer learning Lai, Chun-Ming

15 p. 16664-16687
artikel
19 A novel approach for software vulnerability detection based on intelligent cognitive computing Do Xuan, Cho

15 p. 17042-17078
artikel
20 A post-quantum key exchange protocol from the intersection of quadric surfaces Tullio, Daniele Di

15 p. 16529-16558
artikel
21 A secret sharing-based scheme for secure and energy efficient data transfer in sensor-based IoT Shivhare, Anubhav

15 p. 17132-17149
artikel
22 A self-learning approach for proactive resource and service provisioning in fog environment Faraji-Mehmandar, Mohammad

15 p. 16997-17026
artikel
23 A structure-aware algorithm for fault-tolerant scheduling of scientific workflows Masoumi, Maryam

15 p. 17348-17377
artikel
24 A traceable and verifiable CP-ABE scheme with blockchain in VANET Huang, Haijun

15 p. 16859-16883
artikel
25 AVS_FD_MVITS: an agile IT service design workflow for small data centers Mora, Manuel

15 p. 17519-17561
artikel
26 Blockchain-based IoT enabled health monitoring system Rani, Poonam

15 p. 17284-17308
artikel
27 Blockchain-based mutual authentication protocol without CA Li, Yue

15 p. 17261-17283
artikel
28 CC-RRTMG_SW++: Further optimizing a shortwave radiative transfer scheme on GPU Li, Fei

15 p. 17378-17402
artikel
29 CDA: a novel multicore scheduling for cost-aware deadline-constrained scientific workflows on the IaaS cloud Deldari, Arash

15 p. 17027-17054
artikel
30 CNN supported framework for automatic extraction and evaluation of dermoscopy images Cheng, Xiaochun

15 p. 17114-17131
artikel
31 Composition of caching and classification in edge computing based on quality optimization for SDN-based IoT healthcare solutions Jazaeri, Seyedeh Shabnam

15 p. 17619-17669
artikel
32 Computation offloading and heterogeneous task caching in MEC-enabled vehicular networks Wu, Ruizhi

15 p. 17098-17122
artikel
33 Correction to: Multimodal feature selection from microarray data based on Dempster–Shafer evidence fusion Nekouie, Nadia

15 p. 17754
artikel
34 Correction to: Proactive threshold‑proxy re‑encryption scheme for secure data sharing on cloud Raghav,

15 p. 17755
artikel
35 DBAHHO: Deep belief network-based adaptive Harris Hawks optimization for adaptive offloading strategy in mobile edge computing Priya, J. Sathya

15 p. 16745-16769
artikel
36 Design and simulation of autonomous military vehicle control system based on machine vision and ensemble movement approach Ahmadi, Kourosh Dadashtabar

15 p. 17309-17347
artikel
37 Development an efficient AXI-interconnect unit between set of customized peripheral devices and an implemented dual-core RISC-V processor Emil, Demyana

15 p. 17000-17019
artikel
38 DewGame: D2D communication enabled dew computing for 5G IoT using coalition formation game Ghosh, Subha

15 p. 16821-16858
artikel
39 Discriminate, locate and mitigate DDoS traffic in presence of Flash Crowd in Software Defined Network Patil, Jitendra

15 p. 16770-16793
artikel
40 Dynamic bag-of-tasks scheduling problem in a heterogeneous multi-cloud environment: a taxonomy and a new bi-level multi-follower modeling Karaja, Mouna

15 p. 17716-17753
artikel
41 Dynamic resource allocation scheme for mobile edge computing Gong, Changqing

15 p. 17187-17207
artikel
42 Energy-aware allocation for delay-sensitive multitask in mobile edge computing Liu, Xi

15 p. 16621-16646
artikel
43 Ensemble clustering and feature weighting in time series data Bahramlou, Ainaz

15 p. 16442-16478
artikel
44 External-attention dual-modality fusion network for RGBT tracking Yan, Kaixiang

15 p. 17020-17041
artikel
45 FGPGAN: a finer-grained CNN pruning via generative adversarial network Liang, Hong

15 p. 16647-16663
artikel
46 Financial sequence prediction based on swarm intelligence algorithms and internet of things Gao, Zheng

15 p. 17470-17490
artikel
47 Four-dimensional trust propagation model for improving the accuracy of recommender systems Sheibani, Samaneh

15 p. 16793-16820
artikel
48 Future trends of path planning framework considering accident attributes for smart cities Singh, Raushan Kumar

15 p. 16884-16913
artikel
49 GSAGA: A hybrid algorithm for task scheduling in cloud infrastructure Pirozmand, Poria

15 p. 17423-17449
artikel
50 HFBO-KSELM: Hybrid Flash Butterfly Optimization-based Kernel Softplus Extreme Learning Machine for Classification of Chronic Kidney Disease Yadav, Pooja

15 p. 17146-17169
artikel
51 Hierarchical dynamic workload scheduling on heterogeneous clusters for grid search of inverse problems Kyriakopoulos, Christos

15 p. 16720-16772
artikel
52 Hybrid diagnosis of regular networks under the HPMC fault model Yin, Shanshan

15 p. 17247-17260
artikel
53 Hybridized Dragonfly and Jaya algorithm for optimal sensor node location identification in mobile wireless sensor networks Khedr, Ahmed M.

15 p. 16940-16962
artikel
54 Hybrid trust and weight evaluation-based trust assessment using ECK-ANFIS and AOMDV-REPO-based optimal routing in MANET environment Dupak, Lucindia

15 p. 17074-17094
artikel
55 IDTracS: an Interest-Data-flow tracking-based forwarding scheme for vehicular named data networks Al-Omaisi, Hussein

15 p. 16580-16615
artikel
56 IoBT: beamforming design in internet of things Deb, Priti

15 p. 16773-16792
artikel
57 Leveraging data aggregation algorithm in LoRa networks Gupta, Sakshi

15 p. 16861-16875
artikel
58 LoRa DL: a deep learning model for enhancing the data transmission over LoRa using autoencoder Shilpa, B.

15 p. 17079-17097
artikel
59 Low-overhead TRNG based on MUX for cryptographic protection using multiphase sampling Yao, Liang

15 p. 17170-17186
artikel
60 Mathematical modeling and performance evaluation of BeRAN for 6G wireless networks Roopa, Vuppula

15 p. 16479-16528
artikel
61 Mobi-Sense: mobility-aware sensor-fog paradigm for mission-critical applications using network coding and steganography Mukherjee, Anwesha

15 p. 17495-17518
artikel
62 Multimedia content delivery services in the cloud with partial sleep and abandonment Goswami, Veena

15 p. 17178-17201
artikel
63 Network attack detection scheme based on variational quantum neural network Gong, Changqing

15 p. 16876-16897
artikel
64 New secure and efficient substitution and permutation method for audio encryption algorithm Albahrani, Ekhlas Abbas

15 p. 16616-16646
artikel
65 Node-importance ranking in scale-free networks: a network metric response model and its solution algorithm Yu, Anqi

15 p. 17450-17469
artikel
66 On the value of parameter tuning in stacking ensemble model for software regression test effort estimation Labidi, Taher

15 p. 17123-17145
artikel
67 Optimization of network resource management based on software-defined networking in the 5G environment Wu, Guanqaun

15 p. 16721-16744
artikel
68 PARCSIM: a parallel computing simulator for scalable software optimization Cámara, Jesús

15 p. 17231-17246
artikel
69 PCGC: a performance compact graph compiler based on multilevel fusion-splitting rules Dong, Dong

15 p. 17419-17444
artikel
70 POPS: an off-peak precomputing scheme for privacy-preserving computing Huang, Po-Hsuan

15 p. 16841-16860
artikel
71 Publisher Correction to: MISR: a multiple behavior interactive enhanced learning model for social-aware recommendation Liang, Xiufang

15 p. 17758
artikel
72 Publisher Correction to: Thermal‑aware virtual machine placement based on multi‑objective optimization Liu, Bo

15 p. 17756-17757
artikel
73 RAM: resource allocation in MIMO–MISO cognitive IoT for 5G wireless networks using two-level weighted majority cooperative game Ghosh, Subha

15 p. 16898-16950
artikel
74 Resource discovery approaches in cloudIoT: a systematic review Goudarzi, Parisa

15 p. 17202-17230
artikel
75 Runtime and energy constrained work scheduling for heterogeneous systems Raca, Valon

15 p. 17150-17177
artikel
76 Teaching quality monitoring and evaluation of physical education teaching in ordinary college based on edge computing optimization model Zhang, Junbo

15 p. 16559-16579
artikel
77 The position-based compression techniques for DNN model Tang, Minghua

15 p. 17445-17474
artikel
78 The short-term prediction of daily traffic volume for rural roads using shallow and deep learning networks: ANN and LSTM Mohammadzadeh, Mojtaba

15 p. 17475-17494
artikel
79 TL-CNN-IDS: transfer learning-based intrusion detection system using convolutional neural network Yan, Fengru

15 p. 17562-17584
artikel
80 Trusted consensus protocol for blockchain networks based on fuzzy inference system Bala, R.

15 p. 16951-16974
artikel
81 Using FPGA-based content-addressable memory for mnemonics instruction searching in assembler design Öztekin, Halit

15 p. 17386-17418
artikel
82 Vaccine sentiment analysis using BERT + NBSVM and geo-spatial approaches Umair, Areeba

15 p. 17355-17385
artikel
                             82 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland