Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             61 results found
no title author magazine year volume issue page(s) type
1 A clustering-based short-term load forecasting using independent component analysis and multi-scale decomposition transform Keshvari, Roohollah

78 6 p. 7908-7935
article
2 A flexible deadline-driven resource provisioning and scheduling algorithm for multiple workflows with VM sharing protocol on WaaS-cloud Rajasekar, P.

78 6 p. 8025-8055
article
3 A hybrid machine learning approach for detecting unprecedented DDoS attacks Najafimehr, Mohammad

78 6 p. 8106-8136
article
4 AI-based stroke prediction system using body motion biosignals during walking Yu, Jaehak

78 6 p. 8867-8889
article
5 An automatic query expansion based on hybrid CMO-COOT algorithm for optimized information retrieval Alqahtani, Abdullah Saleh

78 6 p. 8625-8643
article
6 A new selfish thing detection method based on Voronoi diagram for Internet of Things Razzaghi, Nasim

78 6 p. 8389-8408
article
7 An extended visual methods to perform data cluster assessment in distributed data systems Subba Reddy, K.

78 6 p. 8810-8829
article
8 An image classification approach for hole detection in wireless sensor networks Cheong, Se-Hang

78 6 p. 8774-8809
article
9 AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems Shariq, Mohd

78 6 p. 8577-8602
article
10 An optimized hardware design of a two-dimensional guide filter and its application in image denoising Tang, Xin

78 6 p. 8445-8466
article
11 A novel approach with an extensive case study and experiment for automatic code generation from the XMI schema Of UML models Durai, Anand Deva

78 6 p. 7677-7699
article
12 A novel elephant herd optimization model with a deep extreme Learning machine for solar radiation prediction using weather forecasts Reddy, K. Nageswara

78 6 p. 8560-8576
article
13 A novel fog-computing-assisted architecture of E-healthcare system for pregnant women Beri, Rydhm

78 6 p. 7591-7615
article
14 A novel method to improve computational and classification performance of rice plant disease identification Archana, K. S.

78 6 p. 8925-8945
article
15 An reinforcement learning-based speech censorship chatbot system Cai, Shaokang

78 6 p. 8751-8773
article
16 Application of intelligent real-time image processing in fitness motion detection under internet of things Cai, Hang

78 6 p. 7788-7804
article
17 APT-Dt-KC: advanced persistent threat detection based on kill-chain model Panahnejad, Maryam

78 6 p. 8644-8677
article
18 Attention-based framework for weakly supervised video anomaly detection Ma, Hualin

78 6 p. 8409-8429
article
19 A unified approach to reliability and edge fault tolerance of cube-based interconnection networks under three hypotheses Zhang, Mingzu

78 6 p. 7936-7947
article
20 Blockchain-based cloud storage system with CP-ABE-based access control and revocation process Sharma, Pratima

78 6 p. 7700-7728
article
21 CAVLCU: an efficient GPU-based implementation of CAVLC Fuentes-Alventosa, Antonio

78 6 p. 7556-7590
article
22 Clustering with a high-performance secure routing protocol for mobile ad hoc networks Srinivas, Maganti

78 6 p. 8830-8851
article
23 Correction to: AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems Shariq, Mohd

78 6 p. 8603
article
24 Deep brain emotional learning-based intelligent controller applied to an inverted pendulum system Silva, Jeydson

78 6 p. 8346-8366
article
25 Design and energy dissipation analysis of simple QCA multiplexer for nanocomputing Khan, Angshuman

78 6 p. 8430-8444
article
26 Design and implementation of efficient QCA full-adders using fault-tolerant majority gates Bravo-Montes, J. A.

78 6 p. 8056-8080
article
27 DewBCity: blockchain network-based dew-cloud modeling for distributed and decentralized smart cities Hati, Sourav

78 6 p. 8977-8997
article
28 Driver attention prediction based on convolution and transformers Gou, Chao

78 6 p. 8268-8284
article
29 Dynamic and scalable multi-level trust management model for Social Internet of Things Abdelghani, Wafa

78 6 p. 8137-8193
article
30 Energy optimization for CAN bus and media controls in electric vehicles using deep learning algorithms Salunkhe, Satish S.

78 6 p. 8493-8508
article
31 Epileptic seizure endorsement technique using DWT power spectrum Ghuli, Anand

78 6 p. 8604-8624
article
32 Evaluating cloud interactions with costs and SLAs Bernal, Adrián

78 6 p. 7529-7555
article
33 Evaluating low-level software-based hardening techniques for configurable GPU architectures Goncalves, Marcio M.

78 6 p. 8081-8105
article
34 Feature engineering and deep learning-based intrusion detection framework for securing edge IoT Nasir, Muneeba

78 6 p. 8852-8866
article
35 High-fidelity reversible data hiding based on PVO and median preserving Weng, Chi-Yao

78 6 p. 8367-8388
article
36 Human pose, hand and mesh estimation using deep learning: a survey Toshpulatov, Mukhiddin

78 6 p. 7616-7654
article
37 Identity-based public data integrity verification scheme in cloud storage system via blockchain Yuan, Yilin

78 6 p. 8509-8530
article
38 Kinematic and dynamic control model of wheeled mobile robot under internet of things and neural network Liu, Qiang

78 6 p. 8678-8707
article
39 KS-DDoS: Kafka streams-based classification approach for DDoS attacks Patil, Nilesh Vishwasrao

78 6 p. 8946-8976
article
40 LBTM: A lightweight blockchain-based trust management system for social internet of things Amiri-Zarandi, Mohammad

78 6 p. 8302-8320
article
41 LETHOR: a thermal-aware proactive routing algorithm for 3D NoCs with less entrance to hot regions Safari, Maede

78 6 p. 1-25
article
42 Manipulating cyber army in pilot case forensics on social media Chiang, Chang-Po

78 6 p. 7749-7767
article
43 Matrix-product neural network based on sequence block matrix product Shan, Chuanhui

78 6 p. 8467-8492
article
44 MVDLSTM: MultiView deep LSTM framework for online ride-hailing order prediction Wu, Yonghao

78 6 p. 8531-8559
article
45 Novel scheme for reducing communication data traffic in advanced metering infrastructure networks Hsieh, Sun-Yuan

78 6 p. 8219-8246
article
46 OFP-TM: an online VM failure prediction and tolerance model towards high availability of cloud computing environments Saxena, Deepika

78 6 p. 8003-8024
article
47 OHUQI: Mining on-shelf high-utility quantitative itemsets Chen, Lili

78 6 p. 8321-8345
article
48 Online energy-efficient fair scheduling for heterogeneous multi-cores considering shared resource contention Salami, Bagher

78 6 p. 7729-7748
article
49 OpenMP as runtime for providing high-level stream parallelism on multi-cores Hoffmann, Renato B.

78 6 p. 7655-7676
article
50 Optimal deployment of mobile cloudlets for mobile applications in edge computing Jin, Xiaomin

78 6 p. 7888-7907
article
51 PanoVILD: a challenging panoramic vision, inertial and LiDAR dataset for simultaneous localization and mapping Javed, Zeeshan

78 6 p. 8247-8267
article
52 Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large WSN Naresh, Vankamamidi S.

78 6 p. 8708-8732
article
53 Resource pricing and offloading decisions in mobile edge computing based on the Stackelberg game Liu, Zongyun

78 6 p. 7805-7824
article
54 RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures Rehman, Eid

78 6 p. 8890-8924
article
55 Selecting services in the cloud: a decision support methodology focused on infrastructure-as-a-service context Belusso, Cássio L. M.

78 6 p. 7825-7860
article
56 Stealth assessment strategy in distributed systems using optimal deep learning with game based learning Rajendran, Dineshkumar

78 6 p. 8285-8301
article
57 Temporal and spatial parallel processing of simulated quantum annealing on a multicore CPU Waidyasooriya, Hasitha Muthumala

78 6 p. 8733-8750
article
58 TFMD-SDVN: a trust framework for misbehavior detection in the edge of software-defined vehicular network Nayak, Rajendra Prasad

78 6 p. 7948-7981
article
59 Traffic sign detection based on improved faster R-CNN for autonomous driving Li, Xiaomei

78 6 p. 7982-8002
article
60 TRAPPY: a truthfulness and reliability aware application placement policy in fog computing Baranwal, Gaurav

78 6 p. 7861-7887
article
61 Z-Voter: a novel high-impedance voter for efficient realization of tristate logic in quantum-dot cellular automata technology Mahdiani, H. R.

78 6 p. 7768-7787
article
                             61 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands