nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-based framework for automatic SLA management in fog computing environments
|
Battula, Sudheer Kumar |
|
|
|
15 |
p. 16647-16677 |
artikel |
2 |
Adaptive distribution of control messages for improving bandwidth utilization in multiple NoC
|
Yadav, Sonal |
|
|
|
15 |
p. 17208-17246 |
artikel |
3 |
A data distribution scheme for VANET based on fountain code
|
Liu, Jianhang |
|
|
|
15 |
p. 16794-16819 |
artikel |
4 |
AdaXod: a new adaptive and momental bound algorithm for training deep neural networks
|
Liu, Yuanxuan |
|
|
|
15 |
p. 17691-17715 |
artikel |
5 |
ADELA: a conversational virtual assistant to prevent delirium in hospitalized older persons
|
Alonso-Mencía, Javier |
|
|
|
15 |
p. 17670-17690 |
artikel |
6 |
A denoising method of mine microseismic signal based on NAEEMD and frequency-constrained SVD
|
Zhang, Chongchong |
|
|
|
15 |
p. 17095-17113 |
artikel |
7 |
A distributed prediction–compression-based mechanism for energy saving in IoT networks
|
Hussein, Ahmed Mohammed |
|
|
|
15 |
p. 16963-16999 |
artikel |
8 |
Advanced data modeling for industrial drying machine energy optimization
|
Barriga, R. |
|
|
|
15 |
p. 16820-16840 |
artikel |
9 |
A hybrid algorithm for scheduling scientific workflows in IaaS cloud with deadline constraint
|
Hariri, Malihe |
|
|
|
15 |
p. 16975-16996 |
artikel |
10 |
A lightweight authentication and key agreement protocol for heterogeneous IoT with special attention to sensing devices and gateway
|
Hajian, R. |
|
|
|
15 |
p. 16678-16720 |
artikel |
11 |
Ameliorated class topper optimizer for cost optimization using demand side management program in a day-ahead energy market
|
Roy, Chitrangada |
|
|
|
15 |
p. 16688-16719 |
artikel |
12 |
An effective 3-D fast fourier transform framework for multi-GPU accelerated distributed-memory systems
|
Zhou, Binbin |
|
|
|
15 |
p. 17055-17073 |
artikel |
13 |
An efficient certificateless group signcryption scheme using Quantum Chebyshev Chaotic Maps in HC-IoT environments
|
Meshram, Chandrashekhar |
|
|
|
15 |
p. 16914-16939 |
artikel |
14 |
A new chaotic satellite image encryption algorithm based on a 2D filter and Fisher–Yates shuffling
|
Naim, M. |
|
|
|
15 |
p. 17585-17618 |
artikel |
15 |
An improved opposition-based Runge Kutta optimizer for multilevel image thresholding
|
Casas-Ordaz, Angel |
|
|
|
15 |
p. 17247-17354 |
artikel |
16 |
An intelligent clustering framework for substitute recommendation and player selection
|
Das, Nayan Ranjan |
|
|
|
15 |
p. 16409-16441 |
artikel |
17 |
An investigation and comparison of machine learning approaches for intrusion detection in IoMT network
|
Binbusayyis, Adel |
|
|
|
15 |
p. 17403-17422 |
artikel |
18 |
An online and highly-scalable streaming platform for filtering trolls with transfer learning
|
Lai, Chun-Ming |
|
|
|
15 |
p. 16664-16687 |
artikel |
19 |
A novel approach for software vulnerability detection based on intelligent cognitive computing
|
Do Xuan, Cho |
|
|
|
15 |
p. 17042-17078 |
artikel |
20 |
A post-quantum key exchange protocol from the intersection of quadric surfaces
|
Tullio, Daniele Di |
|
|
|
15 |
p. 16529-16558 |
artikel |
21 |
A secret sharing-based scheme for secure and energy efficient data transfer in sensor-based IoT
|
Shivhare, Anubhav |
|
|
|
15 |
p. 17132-17149 |
artikel |
22 |
A self-learning approach for proactive resource and service provisioning in fog environment
|
Faraji-Mehmandar, Mohammad |
|
|
|
15 |
p. 16997-17026 |
artikel |
23 |
A structure-aware algorithm for fault-tolerant scheduling of scientific workflows
|
Masoumi, Maryam |
|
|
|
15 |
p. 17348-17377 |
artikel |
24 |
A traceable and verifiable CP-ABE scheme with blockchain in VANET
|
Huang, Haijun |
|
|
|
15 |
p. 16859-16883 |
artikel |
25 |
AVS_FD_MVITS: an agile IT service design workflow for small data centers
|
Mora, Manuel |
|
|
|
15 |
p. 17519-17561 |
artikel |
26 |
Blockchain-based IoT enabled health monitoring system
|
Rani, Poonam |
|
|
|
15 |
p. 17284-17308 |
artikel |
27 |
Blockchain-based mutual authentication protocol without CA
|
Li, Yue |
|
|
|
15 |
p. 17261-17283 |
artikel |
28 |
CC-RRTMG_SW++: Further optimizing a shortwave radiative transfer scheme on GPU
|
Li, Fei |
|
|
|
15 |
p. 17378-17402 |
artikel |
29 |
CDA: a novel multicore scheduling for cost-aware deadline-constrained scientific workflows on the IaaS cloud
|
Deldari, Arash |
|
|
|
15 |
p. 17027-17054 |
artikel |
30 |
CNN supported framework for automatic extraction and evaluation of dermoscopy images
|
Cheng, Xiaochun |
|
|
|
15 |
p. 17114-17131 |
artikel |
31 |
Composition of caching and classification in edge computing based on quality optimization for SDN-based IoT healthcare solutions
|
Jazaeri, Seyedeh Shabnam |
|
|
|
15 |
p. 17619-17669 |
artikel |
32 |
Computation offloading and heterogeneous task caching in MEC-enabled vehicular networks
|
Wu, Ruizhi |
|
|
|
15 |
p. 17098-17122 |
artikel |
33 |
Correction to: Multimodal feature selection from microarray data based on Dempster–Shafer evidence fusion
|
Nekouie, Nadia |
|
|
|
15 |
p. 17754 |
artikel |
34 |
Correction to: Proactive threshold‑proxy re‑encryption scheme for secure data sharing on cloud
|
Raghav, |
|
|
|
15 |
p. 17755 |
artikel |
35 |
DBAHHO: Deep belief network-based adaptive Harris Hawks optimization for adaptive offloading strategy in mobile edge computing
|
Priya, J. Sathya |
|
|
|
15 |
p. 16745-16769 |
artikel |
36 |
Design and simulation of autonomous military vehicle control system based on machine vision and ensemble movement approach
|
Ahmadi, Kourosh Dadashtabar |
|
|
|
15 |
p. 17309-17347 |
artikel |
37 |
Development an efficient AXI-interconnect unit between set of customized peripheral devices and an implemented dual-core RISC-V processor
|
Emil, Demyana |
|
|
|
15 |
p. 17000-17019 |
artikel |
38 |
DewGame: D2D communication enabled dew computing for 5G IoT using coalition formation game
|
Ghosh, Subha |
|
|
|
15 |
p. 16821-16858 |
artikel |
39 |
Discriminate, locate and mitigate DDoS traffic in presence of Flash Crowd in Software Defined Network
|
Patil, Jitendra |
|
|
|
15 |
p. 16770-16793 |
artikel |
40 |
Dynamic bag-of-tasks scheduling problem in a heterogeneous multi-cloud environment: a taxonomy and a new bi-level multi-follower modeling
|
Karaja, Mouna |
|
|
|
15 |
p. 17716-17753 |
artikel |
41 |
Dynamic resource allocation scheme for mobile edge computing
|
Gong, Changqing |
|
|
|
15 |
p. 17187-17207 |
artikel |
42 |
Energy-aware allocation for delay-sensitive multitask in mobile edge computing
|
Liu, Xi |
|
|
|
15 |
p. 16621-16646 |
artikel |
43 |
Ensemble clustering and feature weighting in time series data
|
Bahramlou, Ainaz |
|
|
|
15 |
p. 16442-16478 |
artikel |
44 |
External-attention dual-modality fusion network for RGBT tracking
|
Yan, Kaixiang |
|
|
|
15 |
p. 17020-17041 |
artikel |
45 |
FGPGAN: a finer-grained CNN pruning via generative adversarial network
|
Liang, Hong |
|
|
|
15 |
p. 16647-16663 |
artikel |
46 |
Financial sequence prediction based on swarm intelligence algorithms and internet of things
|
Gao, Zheng |
|
|
|
15 |
p. 17470-17490 |
artikel |
47 |
Four-dimensional trust propagation model for improving the accuracy of recommender systems
|
Sheibani, Samaneh |
|
|
|
15 |
p. 16793-16820 |
artikel |
48 |
Future trends of path planning framework considering accident attributes for smart cities
|
Singh, Raushan Kumar |
|
|
|
15 |
p. 16884-16913 |
artikel |
49 |
GSAGA: A hybrid algorithm for task scheduling in cloud infrastructure
|
Pirozmand, Poria |
|
|
|
15 |
p. 17423-17449 |
artikel |
50 |
HFBO-KSELM: Hybrid Flash Butterfly Optimization-based Kernel Softplus Extreme Learning Machine for Classification of Chronic Kidney Disease
|
Yadav, Pooja |
|
|
|
15 |
p. 17146-17169 |
artikel |
51 |
Hierarchical dynamic workload scheduling on heterogeneous clusters for grid search of inverse problems
|
Kyriakopoulos, Christos |
|
|
|
15 |
p. 16720-16772 |
artikel |
52 |
Hybrid diagnosis of regular networks under the HPMC fault model
|
Yin, Shanshan |
|
|
|
15 |
p. 17247-17260 |
artikel |
53 |
Hybridized Dragonfly and Jaya algorithm for optimal sensor node location identification in mobile wireless sensor networks
|
Khedr, Ahmed M. |
|
|
|
15 |
p. 16940-16962 |
artikel |
54 |
Hybrid trust and weight evaluation-based trust assessment using ECK-ANFIS and AOMDV-REPO-based optimal routing in MANET environment
|
Dupak, Lucindia |
|
|
|
15 |
p. 17074-17094 |
artikel |
55 |
IDTracS: an Interest-Data-flow tracking-based forwarding scheme for vehicular named data networks
|
Al-Omaisi, Hussein |
|
|
|
15 |
p. 16580-16615 |
artikel |
56 |
IoBT: beamforming design in internet of things
|
Deb, Priti |
|
|
|
15 |
p. 16773-16792 |
artikel |
57 |
Leveraging data aggregation algorithm in LoRa networks
|
Gupta, Sakshi |
|
|
|
15 |
p. 16861-16875 |
artikel |
58 |
LoRa DL: a deep learning model for enhancing the data transmission over LoRa using autoencoder
|
Shilpa, B. |
|
|
|
15 |
p. 17079-17097 |
artikel |
59 |
Low-overhead TRNG based on MUX for cryptographic protection using multiphase sampling
|
Yao, Liang |
|
|
|
15 |
p. 17170-17186 |
artikel |
60 |
Mathematical modeling and performance evaluation of BeRAN for 6G wireless networks
|
Roopa, Vuppula |
|
|
|
15 |
p. 16479-16528 |
artikel |
61 |
Mobi-Sense: mobility-aware sensor-fog paradigm for mission-critical applications using network coding and steganography
|
Mukherjee, Anwesha |
|
|
|
15 |
p. 17495-17518 |
artikel |
62 |
Multimedia content delivery services in the cloud with partial sleep and abandonment
|
Goswami, Veena |
|
|
|
15 |
p. 17178-17201 |
artikel |
63 |
Network attack detection scheme based on variational quantum neural network
|
Gong, Changqing |
|
|
|
15 |
p. 16876-16897 |
artikel |
64 |
New secure and efficient substitution and permutation method for audio encryption algorithm
|
Albahrani, Ekhlas Abbas |
|
|
|
15 |
p. 16616-16646 |
artikel |
65 |
Node-importance ranking in scale-free networks: a network metric response model and its solution algorithm
|
Yu, Anqi |
|
|
|
15 |
p. 17450-17469 |
artikel |
66 |
On the value of parameter tuning in stacking ensemble model for software regression test effort estimation
|
Labidi, Taher |
|
|
|
15 |
p. 17123-17145 |
artikel |
67 |
Optimization of network resource management based on software-defined networking in the 5G environment
|
Wu, Guanqaun |
|
|
|
15 |
p. 16721-16744 |
artikel |
68 |
PARCSIM: a parallel computing simulator for scalable software optimization
|
Cámara, Jesús |
|
|
|
15 |
p. 17231-17246 |
artikel |
69 |
PCGC: a performance compact graph compiler based on multilevel fusion-splitting rules
|
Dong, Dong |
|
|
|
15 |
p. 17419-17444 |
artikel |
70 |
POPS: an off-peak precomputing scheme for privacy-preserving computing
|
Huang, Po-Hsuan |
|
|
|
15 |
p. 16841-16860 |
artikel |
71 |
Publisher Correction to: MISR: a multiple behavior interactive enhanced learning model for social-aware recommendation
|
Liang, Xiufang |
|
|
|
15 |
p. 17758 |
artikel |
72 |
Publisher Correction to: Thermal‑aware virtual machine placement based on multi‑objective optimization
|
Liu, Bo |
|
|
|
15 |
p. 17756-17757 |
artikel |
73 |
RAM: resource allocation in MIMO–MISO cognitive IoT for 5G wireless networks using two-level weighted majority cooperative game
|
Ghosh, Subha |
|
|
|
15 |
p. 16898-16950 |
artikel |
74 |
Resource discovery approaches in cloudIoT: a systematic review
|
Goudarzi, Parisa |
|
|
|
15 |
p. 17202-17230 |
artikel |
75 |
Runtime and energy constrained work scheduling for heterogeneous systems
|
Raca, Valon |
|
|
|
15 |
p. 17150-17177 |
artikel |
76 |
Teaching quality monitoring and evaluation of physical education teaching in ordinary college based on edge computing optimization model
|
Zhang, Junbo |
|
|
|
15 |
p. 16559-16579 |
artikel |
77 |
The position-based compression techniques for DNN model
|
Tang, Minghua |
|
|
|
15 |
p. 17445-17474 |
artikel |
78 |
The short-term prediction of daily traffic volume for rural roads using shallow and deep learning networks: ANN and LSTM
|
Mohammadzadeh, Mojtaba |
|
|
|
15 |
p. 17475-17494 |
artikel |
79 |
TL-CNN-IDS: transfer learning-based intrusion detection system using convolutional neural network
|
Yan, Fengru |
|
|
|
15 |
p. 17562-17584 |
artikel |
80 |
Trusted consensus protocol for blockchain networks based on fuzzy inference system
|
Bala, R. |
|
|
|
15 |
p. 16951-16974 |
artikel |
81 |
Using FPGA-based content-addressable memory for mnemonics instruction searching in assembler design
|
Öztekin, Halit |
|
|
|
15 |
p. 17386-17418 |
artikel |
82 |
Vaccine sentiment analysis using BERT + NBSVM and geo-spatial approaches
|
Umair, Areeba |
|
|
|
15 |
p. 17355-17385 |
artikel |