nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A clustering-based short-term load forecasting using independent component analysis and multi-scale decomposition transform
|
Keshvari, Roohollah |
|
|
78 |
6 |
p. 7908-7935 |
artikel |
2 |
A flexible deadline-driven resource provisioning and scheduling algorithm for multiple workflows with VM sharing protocol on WaaS-cloud
|
Rajasekar, P. |
|
|
78 |
6 |
p. 8025-8055 |
artikel |
3 |
A hybrid machine learning approach for detecting unprecedented DDoS attacks
|
Najafimehr, Mohammad |
|
|
78 |
6 |
p. 8106-8136 |
artikel |
4 |
AI-based stroke prediction system using body motion biosignals during walking
|
Yu, Jaehak |
|
|
78 |
6 |
p. 8867-8889 |
artikel |
5 |
An automatic query expansion based on hybrid CMO-COOT algorithm for optimized information retrieval
|
Alqahtani, Abdullah Saleh |
|
|
78 |
6 |
p. 8625-8643 |
artikel |
6 |
A new selfish thing detection method based on Voronoi diagram for Internet of Things
|
Razzaghi, Nasim |
|
|
78 |
6 |
p. 8389-8408 |
artikel |
7 |
An extended visual methods to perform data cluster assessment in distributed data systems
|
Subba Reddy, K. |
|
|
78 |
6 |
p. 8810-8829 |
artikel |
8 |
An image classification approach for hole detection in wireless sensor networks
|
Cheong, Se-Hang |
|
|
78 |
6 |
p. 8774-8809 |
artikel |
9 |
AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems
|
Shariq, Mohd |
|
|
78 |
6 |
p. 8577-8602 |
artikel |
10 |
An optimized hardware design of a two-dimensional guide filter and its application in image denoising
|
Tang, Xin |
|
|
78 |
6 |
p. 8445-8466 |
artikel |
11 |
A novel approach with an extensive case study and experiment for automatic code generation from the XMI schema Of UML models
|
Durai, Anand Deva |
|
|
78 |
6 |
p. 7677-7699 |
artikel |
12 |
A novel elephant herd optimization model with a deep extreme Learning machine for solar radiation prediction using weather forecasts
|
Reddy, K. Nageswara |
|
|
78 |
6 |
p. 8560-8576 |
artikel |
13 |
A novel fog-computing-assisted architecture of E-healthcare system for pregnant women
|
Beri, Rydhm |
|
|
78 |
6 |
p. 7591-7615 |
artikel |
14 |
A novel method to improve computational and classification performance of rice plant disease identification
|
Archana, K. S. |
|
|
78 |
6 |
p. 8925-8945 |
artikel |
15 |
An reinforcement learning-based speech censorship chatbot system
|
Cai, Shaokang |
|
|
78 |
6 |
p. 8751-8773 |
artikel |
16 |
Application of intelligent real-time image processing in fitness motion detection under internet of things
|
Cai, Hang |
|
|
78 |
6 |
p. 7788-7804 |
artikel |
17 |
APT-Dt-KC: advanced persistent threat detection based on kill-chain model
|
Panahnejad, Maryam |
|
|
78 |
6 |
p. 8644-8677 |
artikel |
18 |
Attention-based framework for weakly supervised video anomaly detection
|
Ma, Hualin |
|
|
78 |
6 |
p. 8409-8429 |
artikel |
19 |
A unified approach to reliability and edge fault tolerance of cube-based interconnection networks under three hypotheses
|
Zhang, Mingzu |
|
|
78 |
6 |
p. 7936-7947 |
artikel |
20 |
Blockchain-based cloud storage system with CP-ABE-based access control and revocation process
|
Sharma, Pratima |
|
|
78 |
6 |
p. 7700-7728 |
artikel |
21 |
CAVLCU: an efficient GPU-based implementation of CAVLC
|
Fuentes-Alventosa, Antonio |
|
|
78 |
6 |
p. 7556-7590 |
artikel |
22 |
Clustering with a high-performance secure routing protocol for mobile ad hoc networks
|
Srinivas, Maganti |
|
|
78 |
6 |
p. 8830-8851 |
artikel |
23 |
Correction to: AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems
|
Shariq, Mohd |
|
|
78 |
6 |
p. 8603 |
artikel |
24 |
Deep brain emotional learning-based intelligent controller applied to an inverted pendulum system
|
Silva, Jeydson |
|
|
78 |
6 |
p. 8346-8366 |
artikel |
25 |
Design and energy dissipation analysis of simple QCA multiplexer for nanocomputing
|
Khan, Angshuman |
|
|
78 |
6 |
p. 8430-8444 |
artikel |
26 |
Design and implementation of efficient QCA full-adders using fault-tolerant majority gates
|
Bravo-Montes, J. A. |
|
|
78 |
6 |
p. 8056-8080 |
artikel |
27 |
DewBCity: blockchain network-based dew-cloud modeling for distributed and decentralized smart cities
|
Hati, Sourav |
|
|
78 |
6 |
p. 8977-8997 |
artikel |
28 |
Driver attention prediction based on convolution and transformers
|
Gou, Chao |
|
|
78 |
6 |
p. 8268-8284 |
artikel |
29 |
Dynamic and scalable multi-level trust management model for Social Internet of Things
|
Abdelghani, Wafa |
|
|
78 |
6 |
p. 8137-8193 |
artikel |
30 |
Energy optimization for CAN bus and media controls in electric vehicles using deep learning algorithms
|
Salunkhe, Satish S. |
|
|
78 |
6 |
p. 8493-8508 |
artikel |
31 |
Epileptic seizure endorsement technique using DWT power spectrum
|
Ghuli, Anand |
|
|
78 |
6 |
p. 8604-8624 |
artikel |
32 |
Evaluating cloud interactions with costs and SLAs
|
Bernal, Adrián |
|
|
78 |
6 |
p. 7529-7555 |
artikel |
33 |
Evaluating low-level software-based hardening techniques for configurable GPU architectures
|
Goncalves, Marcio M. |
|
|
78 |
6 |
p. 8081-8105 |
artikel |
34 |
Feature engineering and deep learning-based intrusion detection framework for securing edge IoT
|
Nasir, Muneeba |
|
|
78 |
6 |
p. 8852-8866 |
artikel |
35 |
High-fidelity reversible data hiding based on PVO and median preserving
|
Weng, Chi-Yao |
|
|
78 |
6 |
p. 8367-8388 |
artikel |
36 |
Human pose, hand and mesh estimation using deep learning: a survey
|
Toshpulatov, Mukhiddin |
|
|
78 |
6 |
p. 7616-7654 |
artikel |
37 |
Identity-based public data integrity verification scheme in cloud storage system via blockchain
|
Yuan, Yilin |
|
|
78 |
6 |
p. 8509-8530 |
artikel |
38 |
Kinematic and dynamic control model of wheeled mobile robot under internet of things and neural network
|
Liu, Qiang |
|
|
78 |
6 |
p. 8678-8707 |
artikel |
39 |
KS-DDoS: Kafka streams-based classification approach for DDoS attacks
|
Patil, Nilesh Vishwasrao |
|
|
78 |
6 |
p. 8946-8976 |
artikel |
40 |
LBTM: A lightweight blockchain-based trust management system for social internet of things
|
Amiri-Zarandi, Mohammad |
|
|
78 |
6 |
p. 8302-8320 |
artikel |
41 |
LETHOR: a thermal-aware proactive routing algorithm for 3D NoCs with less entrance to hot regions
|
Safari, Maede |
|
|
78 |
6 |
p. 1-25 |
artikel |
42 |
Manipulating cyber army in pilot case forensics on social media
|
Chiang, Chang-Po |
|
|
78 |
6 |
p. 7749-7767 |
artikel |
43 |
Matrix-product neural network based on sequence block matrix product
|
Shan, Chuanhui |
|
|
78 |
6 |
p. 8467-8492 |
artikel |
44 |
MVDLSTM: MultiView deep LSTM framework for online ride-hailing order prediction
|
Wu, Yonghao |
|
|
78 |
6 |
p. 8531-8559 |
artikel |
45 |
Novel scheme for reducing communication data traffic in advanced metering infrastructure networks
|
Hsieh, Sun-Yuan |
|
|
78 |
6 |
p. 8219-8246 |
artikel |
46 |
OFP-TM: an online VM failure prediction and tolerance model towards high availability of cloud computing environments
|
Saxena, Deepika |
|
|
78 |
6 |
p. 8003-8024 |
artikel |
47 |
OHUQI: Mining on-shelf high-utility quantitative itemsets
|
Chen, Lili |
|
|
78 |
6 |
p. 8321-8345 |
artikel |
48 |
Online energy-efficient fair scheduling for heterogeneous multi-cores considering shared resource contention
|
Salami, Bagher |
|
|
78 |
6 |
p. 7729-7748 |
artikel |
49 |
OpenMP as runtime for providing high-level stream parallelism on multi-cores
|
Hoffmann, Renato B. |
|
|
78 |
6 |
p. 7655-7676 |
artikel |
50 |
Optimal deployment of mobile cloudlets for mobile applications in edge computing
|
Jin, Xiaomin |
|
|
78 |
6 |
p. 7888-7907 |
artikel |
51 |
PanoVILD: a challenging panoramic vision, inertial and LiDAR dataset for simultaneous localization and mapping
|
Javed, Zeeshan |
|
|
78 |
6 |
p. 8247-8267 |
artikel |
52 |
Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large WSN
|
Naresh, Vankamamidi S. |
|
|
78 |
6 |
p. 8708-8732 |
artikel |
53 |
Resource pricing and offloading decisions in mobile edge computing based on the Stackelberg game
|
Liu, Zongyun |
|
|
78 |
6 |
p. 7805-7824 |
artikel |
54 |
RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures
|
Rehman, Eid |
|
|
78 |
6 |
p. 8890-8924 |
artikel |
55 |
Selecting services in the cloud: a decision support methodology focused on infrastructure-as-a-service context
|
Belusso, Cássio L. M. |
|
|
78 |
6 |
p. 7825-7860 |
artikel |
56 |
Stealth assessment strategy in distributed systems using optimal deep learning with game based learning
|
Rajendran, Dineshkumar |
|
|
78 |
6 |
p. 8285-8301 |
artikel |
57 |
Temporal and spatial parallel processing of simulated quantum annealing on a multicore CPU
|
Waidyasooriya, Hasitha Muthumala |
|
|
78 |
6 |
p. 8733-8750 |
artikel |
58 |
TFMD-SDVN: a trust framework for misbehavior detection in the edge of software-defined vehicular network
|
Nayak, Rajendra Prasad |
|
|
78 |
6 |
p. 7948-7981 |
artikel |
59 |
Traffic sign detection based on improved faster R-CNN for autonomous driving
|
Li, Xiaomei |
|
|
78 |
6 |
p. 7982-8002 |
artikel |
60 |
TRAPPY: a truthfulness and reliability aware application placement policy in fog computing
|
Baranwal, Gaurav |
|
|
78 |
6 |
p. 7861-7887 |
artikel |
61 |
Z-Voter: a novel high-impedance voter for efficient realization of tristate logic in quantum-dot cellular automata technology
|
Mahdiani, H. R. |
|
|
78 |
6 |
p. 7768-7787 |
artikel |