nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparative analysis of prominently used MCDM methods in cloud environment
|
Neeraj, |
|
|
77 |
4 |
p. 3422-3449 |
artikel |
2 |
A compensation textures dehazing method for water alike area
|
Zhang, Jian |
|
|
77 |
4 |
p. 3555-3570 |
artikel |
3 |
A lightweight solution to epileptic seizure prediction based on EEG synchronization measurement
|
Zhang, Shasha |
|
|
77 |
4 |
p. 3914-3932 |
artikel |
4 |
A low redundancy and high time efficiency large-scale task assignment strategy for heterogeneous service-oriented cloud computing systems
|
Zhu, Jiang |
|
|
77 |
4 |
p. 3450-3483 |
artikel |
5 |
A multiple multilayer perceptron neural network with an adaptive learning algorithm for thyroid disease diagnosis in the internet of medical things
|
Hosseinzadeh, Mehdi |
|
|
77 |
4 |
p. 3616-3637 |
artikel |
6 |
Analysis and comparison of machine learning classifiers and deep neural networks techniques for recognition of Farsi handwritten digits
|
Nanehkaran, Y. A. |
|
|
77 |
4 |
p. 3193-3222 |
artikel |
7 |
Analysis of blockchain system based on M/(M1,M2)/1 vacation queueing model
|
Fan, Jiaqi |
|
|
77 |
4 |
p. 3673-3694 |
artikel |
8 |
An efficient management scheme of blockchain-based cloud user information using probabilistic weighting
|
Jeong, Yoon-Su |
|
|
77 |
4 |
p. 3339-3358 |
artikel |
9 |
A new method of abnormal behavior detection using LSTM network with temporal attention mechanism
|
Xia, Limin |
|
|
77 |
4 |
p. 3223-3241 |
artikel |
10 |
An improved model for predicting trip mode distribution using convolution deep learning
|
Nezarat, Amin |
|
|
77 |
4 |
p. 3638-3652 |
artikel |
11 |
A novel attention fusion network-based framework to ensemble the predictions of CNNs for lymph node metastasis detection
|
Rane, Chinmay |
|
|
77 |
4 |
p. 4201-4220 |
artikel |
12 |
A novel enhanced region proposal network and modified loss function: threat object detection in secure screening using deep learning
|
Steno, Priscilla |
|
|
77 |
4 |
p. 3840-3869 |
artikel |
13 |
A performance- and energy-oriented extended tuning process for time-step-based scientific applications
|
Kalinnik, Natalia |
|
|
77 |
4 |
p. 3484-3515 |
artikel |
14 |
A secure three-factor-based authentication with key agreement protocol for e-Health clouds
|
Chen, Yulei |
|
|
77 |
4 |
p. 3359-3380 |
artikel |
15 |
A semi-supervised approach in detecting sentiment and emotion based on digital payment reviews
|
Balakrishnan, Vimala |
|
|
77 |
4 |
p. 3795-3810 |
artikel |
16 |
Bayesian neural networks at scale: a performance analysis and pruning study
|
Sharma, Himanshu |
|
|
77 |
4 |
p. 3811-3839 |
artikel |
17 |
Centroid-Based Routing protocol with moving sink node for uniform and non-uniform distribution of wireless sensor nodes
|
Basumatary, Habila |
|
|
77 |
4 |
p. 3727-3751 |
artikel |
18 |
Construction and verification of retinal vessel segmentation algorithm for color fundus image under BP neural network model
|
Tang, Siyuan |
|
|
77 |
4 |
p. 3870-3884 |
artikel |
19 |
Development of data governance components using DEMATEL and content analysis
|
Jang, Kyoung-ae |
|
|
77 |
4 |
p. 3695-3709 |
artikel |
20 |
DNetUnet: a semi-supervised CNN of medical image segmentation for super-computing AI service
|
Tseng, Kuo-Kun |
|
|
77 |
4 |
p. 3594-3615 |
artikel |
21 |
Efficient code development for improving execution performance in high-performance computing centers
|
Corral-García, Javier |
|
|
77 |
4 |
p. 3261-3288 |
artikel |
22 |
Ensemble-based clustering of large probabilistic graphs using neighborhood and distance metric learning
|
Danesh, Malihe |
|
|
77 |
4 |
p. 4107-4134 |
artikel |
23 |
Facilitating the learning process in parallel computing by using instant messaging
|
Guerrero-Higueras, Ángel Manuel |
|
|
77 |
4 |
p. 3899-3913 |
artikel |
24 |
Gait recognition for person re-identification
|
Elharrouss, Omar |
|
|
77 |
4 |
p. 3653-3672 |
artikel |
25 |
Generalized sparse filtering for rotating machinery fault diagnosis
|
Cheng, Chun |
|
|
77 |
4 |
p. 3402-3421 |
artikel |
26 |
High-capacity ride-sharing via shortest path clustering on large road networks
|
Zuo, Haojia |
|
|
77 |
4 |
p. 4081-4106 |
artikel |
27 |
Improving the learning of self-driving vehicles based on real driving behavior using deep neural network techniques
|
Zaghari, Nayereh |
|
|
77 |
4 |
p. 3752-3794 |
artikel |
28 |
Lower bounds for dilation, wirelength, and edge congestion of embedding graphs into hypercubes
|
Sundara Rajan, R. |
|
|
77 |
4 |
p. 4135-4150 |
artikel |
29 |
Network intrusion detection using multi-architectural modular deep neural network
|
Atefinia, Ramin |
|
|
77 |
4 |
p. 3571-3593 |
artikel |
30 |
On the use of many-core Marvell ThunderX2 processor for HPC workloads
|
Soria-Pardos, Víctor |
|
|
77 |
4 |
p. 3315-3338 |
artikel |
31 |
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA
|
Lee, Wai-Kong |
|
|
77 |
4 |
p. 3289-3314 |
artikel |
32 |
PerficientCloudSim: a tool to simulate large-scale computation in heterogeneous clouds
|
Zakarya, Muhammad |
|
|
77 |
4 |
p. 3959-4013 |
artikel |
33 |
Performance prediction of parallel applications: a systematic literature review
|
Flores-Contreras, Jesus |
|
|
77 |
4 |
p. 4014-4055 |
artikel |
34 |
RenyiBS: Renyi entropy basis selection from wavelet packet decomposition tree for phonocardiogram classification
|
Safara, Fatemeh |
|
|
77 |
4 |
p. 3710-3726 |
artikel |
35 |
SINGLETON: A lightweight and secure end-to-end encryption protocol for the sensor networks in the Internet of Things based on cryptographic ratchets
|
Hassani Karbasi, Amir |
|
|
77 |
4 |
p. 3516-3554 |
artikel |
36 |
SMOaaS: a Scalable Matrix Operation as a Service model in Cloud
|
Ujjwal, KC |
|
|
77 |
4 |
p. 3381-3401 |
artikel |
37 |
Static and incremental dynamic approaches for multi-objective bitmap join indexes selection in data warehouses
|
Toumi, Lyazid |
|
|
77 |
4 |
p. 3933-3958 |
artikel |
38 |
Structure fault tolerance of balanced hypercubes
|
Yang, Yuxing |
|
|
77 |
4 |
p. 3885-3898 |
artikel |
39 |
Suspicious activity detection using deep learning in secure assisted living IoT environments
|
Vallathan, G. |
|
|
77 |
4 |
p. 3242-3260 |
artikel |
40 |
Toward the inclusion of end-to-end security in the OM2M platform
|
Patonico, Simone |
|
|
77 |
4 |
p. 4056-4080 |
artikel |
41 |
Two-phase node deployment for target coverage in rechargeable WSNs using genetic algorithm and integer linear programming
|
Zameni, Mahsa |
|
|
77 |
4 |
p. 4172-4200 |
artikel |
42 |
Ultrasound image analysis technology under deep belief networks in evaluation on the effects of diagnosis and chemotherapy of cervical cancer
|
Zhou, Hongzhen |
|
|
77 |
4 |
p. 4151-4171 |
artikel |