Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             61 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A clustering-based short-term load forecasting using independent component analysis and multi-scale decomposition transform Keshvari, Roohollah

78 6 p. 7908-7935
artikel
2 A flexible deadline-driven resource provisioning and scheduling algorithm for multiple workflows with VM sharing protocol on WaaS-cloud Rajasekar, P.

78 6 p. 8025-8055
artikel
3 A hybrid machine learning approach for detecting unprecedented DDoS attacks Najafimehr, Mohammad

78 6 p. 8106-8136
artikel
4 AI-based stroke prediction system using body motion biosignals during walking Yu, Jaehak

78 6 p. 8867-8889
artikel
5 An automatic query expansion based on hybrid CMO-COOT algorithm for optimized information retrieval Alqahtani, Abdullah Saleh

78 6 p. 8625-8643
artikel
6 A new selfish thing detection method based on Voronoi diagram for Internet of Things Razzaghi, Nasim

78 6 p. 8389-8408
artikel
7 An extended visual methods to perform data cluster assessment in distributed data systems Subba Reddy, K.

78 6 p. 8810-8829
artikel
8 An image classification approach for hole detection in wireless sensor networks Cheong, Se-Hang

78 6 p. 8774-8809
artikel
9 AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems Shariq, Mohd

78 6 p. 8577-8602
artikel
10 An optimized hardware design of a two-dimensional guide filter and its application in image denoising Tang, Xin

78 6 p. 8445-8466
artikel
11 A novel approach with an extensive case study and experiment for automatic code generation from the XMI schema Of UML models Durai, Anand Deva

78 6 p. 7677-7699
artikel
12 A novel elephant herd optimization model with a deep extreme Learning machine for solar radiation prediction using weather forecasts Reddy, K. Nageswara

78 6 p. 8560-8576
artikel
13 A novel fog-computing-assisted architecture of E-healthcare system for pregnant women Beri, Rydhm

78 6 p. 7591-7615
artikel
14 A novel method to improve computational and classification performance of rice plant disease identification Archana, K. S.

78 6 p. 8925-8945
artikel
15 An reinforcement learning-based speech censorship chatbot system Cai, Shaokang

78 6 p. 8751-8773
artikel
16 Application of intelligent real-time image processing in fitness motion detection under internet of things Cai, Hang

78 6 p. 7788-7804
artikel
17 APT-Dt-KC: advanced persistent threat detection based on kill-chain model Panahnejad, Maryam

78 6 p. 8644-8677
artikel
18 Attention-based framework for weakly supervised video anomaly detection Ma, Hualin

78 6 p. 8409-8429
artikel
19 A unified approach to reliability and edge fault tolerance of cube-based interconnection networks under three hypotheses Zhang, Mingzu

78 6 p. 7936-7947
artikel
20 Blockchain-based cloud storage system with CP-ABE-based access control and revocation process Sharma, Pratima

78 6 p. 7700-7728
artikel
21 CAVLCU: an efficient GPU-based implementation of CAVLC Fuentes-Alventosa, Antonio

78 6 p. 7556-7590
artikel
22 Clustering with a high-performance secure routing protocol for mobile ad hoc networks Srinivas, Maganti

78 6 p. 8830-8851
artikel
23 Correction to: AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems Shariq, Mohd

78 6 p. 8603
artikel
24 Deep brain emotional learning-based intelligent controller applied to an inverted pendulum system Silva, Jeydson

78 6 p. 8346-8366
artikel
25 Design and energy dissipation analysis of simple QCA multiplexer for nanocomputing Khan, Angshuman

78 6 p. 8430-8444
artikel
26 Design and implementation of efficient QCA full-adders using fault-tolerant majority gates Bravo-Montes, J. A.

78 6 p. 8056-8080
artikel
27 DewBCity: blockchain network-based dew-cloud modeling for distributed and decentralized smart cities Hati, Sourav

78 6 p. 8977-8997
artikel
28 Driver attention prediction based on convolution and transformers Gou, Chao

78 6 p. 8268-8284
artikel
29 Dynamic and scalable multi-level trust management model for Social Internet of Things Abdelghani, Wafa

78 6 p. 8137-8193
artikel
30 Energy optimization for CAN bus and media controls in electric vehicles using deep learning algorithms Salunkhe, Satish S.

78 6 p. 8493-8508
artikel
31 Epileptic seizure endorsement technique using DWT power spectrum Ghuli, Anand

78 6 p. 8604-8624
artikel
32 Evaluating cloud interactions with costs and SLAs Bernal, Adrián

78 6 p. 7529-7555
artikel
33 Evaluating low-level software-based hardening techniques for configurable GPU architectures Goncalves, Marcio M.

78 6 p. 8081-8105
artikel
34 Feature engineering and deep learning-based intrusion detection framework for securing edge IoT Nasir, Muneeba

78 6 p. 8852-8866
artikel
35 High-fidelity reversible data hiding based on PVO and median preserving Weng, Chi-Yao

78 6 p. 8367-8388
artikel
36 Human pose, hand and mesh estimation using deep learning: a survey Toshpulatov, Mukhiddin

78 6 p. 7616-7654
artikel
37 Identity-based public data integrity verification scheme in cloud storage system via blockchain Yuan, Yilin

78 6 p. 8509-8530
artikel
38 Kinematic and dynamic control model of wheeled mobile robot under internet of things and neural network Liu, Qiang

78 6 p. 8678-8707
artikel
39 KS-DDoS: Kafka streams-based classification approach for DDoS attacks Patil, Nilesh Vishwasrao

78 6 p. 8946-8976
artikel
40 LBTM: A lightweight blockchain-based trust management system for social internet of things Amiri-Zarandi, Mohammad

78 6 p. 8302-8320
artikel
41 LETHOR: a thermal-aware proactive routing algorithm for 3D NoCs with less entrance to hot regions Safari, Maede

78 6 p. 1-25
artikel
42 Manipulating cyber army in pilot case forensics on social media Chiang, Chang-Po

78 6 p. 7749-7767
artikel
43 Matrix-product neural network based on sequence block matrix product Shan, Chuanhui

78 6 p. 8467-8492
artikel
44 MVDLSTM: MultiView deep LSTM framework for online ride-hailing order prediction Wu, Yonghao

78 6 p. 8531-8559
artikel
45 Novel scheme for reducing communication data traffic in advanced metering infrastructure networks Hsieh, Sun-Yuan

78 6 p. 8219-8246
artikel
46 OFP-TM: an online VM failure prediction and tolerance model towards high availability of cloud computing environments Saxena, Deepika

78 6 p. 8003-8024
artikel
47 OHUQI: Mining on-shelf high-utility quantitative itemsets Chen, Lili

78 6 p. 8321-8345
artikel
48 Online energy-efficient fair scheduling for heterogeneous multi-cores considering shared resource contention Salami, Bagher

78 6 p. 7729-7748
artikel
49 OpenMP as runtime for providing high-level stream parallelism on multi-cores Hoffmann, Renato B.

78 6 p. 7655-7676
artikel
50 Optimal deployment of mobile cloudlets for mobile applications in edge computing Jin, Xiaomin

78 6 p. 7888-7907
artikel
51 PanoVILD: a challenging panoramic vision, inertial and LiDAR dataset for simultaneous localization and mapping Javed, Zeeshan

78 6 p. 8247-8267
artikel
52 Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large WSN Naresh, Vankamamidi S.

78 6 p. 8708-8732
artikel
53 Resource pricing and offloading decisions in mobile edge computing based on the Stackelberg game Liu, Zongyun

78 6 p. 7805-7824
artikel
54 RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures Rehman, Eid

78 6 p. 8890-8924
artikel
55 Selecting services in the cloud: a decision support methodology focused on infrastructure-as-a-service context Belusso, Cássio L. M.

78 6 p. 7825-7860
artikel
56 Stealth assessment strategy in distributed systems using optimal deep learning with game based learning Rajendran, Dineshkumar

78 6 p. 8285-8301
artikel
57 Temporal and spatial parallel processing of simulated quantum annealing on a multicore CPU Waidyasooriya, Hasitha Muthumala

78 6 p. 8733-8750
artikel
58 TFMD-SDVN: a trust framework for misbehavior detection in the edge of software-defined vehicular network Nayak, Rajendra Prasad

78 6 p. 7948-7981
artikel
59 Traffic sign detection based on improved faster R-CNN for autonomous driving Li, Xiaomei

78 6 p. 7982-8002
artikel
60 TRAPPY: a truthfulness and reliability aware application placement policy in fog computing Baranwal, Gaurav

78 6 p. 7861-7887
artikel
61 Z-Voter: a novel high-impedance voter for efficient realization of tristate logic in quantum-dot cellular automata technology Mahdiani, H. R.

78 6 p. 7768-7787
artikel
                             61 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland