nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparative analysis of meta-heuristic optimization algorithms for feature selection on ML-based classification of heart-related diseases
|
Ay, Şevket |
|
|
79 |
11 |
p. 11797-11826 |
artikel |
2 |
A fast MILP solver for high-level synthesis based on heuristic model reduction and enhanced branch and bound algorithm
|
Mirhosseini, Mina |
|
|
79 |
11 |
p. 12042-12073 |
artikel |
3 |
A heuristic-based package-aware function scheduling approach for creating a trade-off between cold start time and cost in FaaS computing environments
|
Ebrahimpour, Hossein |
|
|
79 |
11 |
p. 12142-12190 |
artikel |
4 |
A lightweight blockchain-based framework for medical cyber-physical system
|
Kumar, Ashish |
|
|
79 |
11 |
p. 12013-12041 |
artikel |
5 |
A lightweight certificate-based authentication scheme for 6LoWPAN-based internet of things
|
Thungon, Leki Chom |
|
|
79 |
11 |
p. 12523-12548 |
artikel |
6 |
An autonomous planning model for solving IoT service placement problem using the imperialist competitive algorithm
|
Zare, Mansoureh |
|
|
79 |
11 |
p. 12671-12690 |
artikel |
7 |
An enhanced decomposition-based multiobjective evolutionary algorithm with adaptive neighborhood operator and extended distance-based environmental selection
|
Li, Wei |
|
|
79 |
11 |
p. 12341-12393 |
artikel |
8 |
An ensemble-based framework for user behaviour anomaly detection and classification for cybersecurity
|
Folino, Gianluigi |
|
|
79 |
11 |
p. 11660-11683 |
artikel |
9 |
A new LTMA-ABE location and time access security control scheme for mobile cloud
|
Merdassi, Imen |
|
|
79 |
11 |
p. 12074-12105 |
artikel |
10 |
An improved sentiment classification model based on data quality and word embeddings
|
Siagh, Asma |
|
|
79 |
11 |
p. 11871-11894 |
artikel |
11 |
An intuitive pre-processing method based on human–robot interactions: zero-shot learning semantic segmentation based on synthetic semantic template
|
Chen, Yen-Chun |
|
|
79 |
11 |
p. 11743-11766 |
artikel |
12 |
An unsupervised and hierarchical intrusion detection system for software-defined wireless sensor networks
|
Arkan, AhmadShahab |
|
|
79 |
11 |
p. 11844-11870 |
artikel |
13 |
CNN-VAE: An intelligent text representation algorithm
|
Xu, Saijuan |
|
|
79 |
11 |
p. 12266-12291 |
artikel |
14 |
CryptoQNRG: a new framework for evaluation of cryptographic strength in quantum and pseudorandom number generation for key-scheduling algorithms
|
Saini, A. |
|
|
79 |
11 |
p. 12219-12237 |
artikel |
15 |
Design of evaluation items of the security levels for suppliers in the manufacturing industry
|
Choi, Yurim |
|
|
79 |
11 |
p. 11707-11742 |
artikel |
16 |
ECC-reliant secure authentication protocol for cloud server and smart devices in IoT
|
Selvi, K. |
|
|
79 |
11 |
p. 12191-12218 |
artikel |
17 |
E-CropReco: a dew-edge-based multi-parametric crop recommendation framework for internet of agricultural things
|
Bera, Somnath |
|
|
79 |
11 |
p. 11965-11999 |
artikel |
18 |
Efficient design of a quantum absolute-value circuit using Clifford+T gates
|
Orts, Francisco |
|
|
79 |
11 |
p. 12656-12670 |
artikel |
19 |
Fault detection in seismic data using graph convolutional network
|
Palo, Patitapaban |
|
|
79 |
11 |
p. 12737-12765 |
artikel |
20 |
Fault-tolerant quantum algorithm for dual-threshold image segmentation
|
López, Luis O. |
|
|
79 |
11 |
p. 12549-12562 |
artikel |
21 |
Forecast of seasonal consumption behavior of consumers and privacy-preserving data mining with new S-Apriori algorithm
|
Tran, Duy Thanh |
|
|
79 |
11 |
p. 12691-12736 |
artikel |
22 |
FPGA implementation of hardware accelerated RTOS based on real-time event handling
|
Zagan, Ionel |
|
|
79 |
11 |
p. 12441-12471 |
artikel |
23 |
Gait recognition based on 3D human body reconstruction and multi-granular feature fusion
|
Meng, Chunyun |
|
|
79 |
11 |
p. 12106-12125 |
artikel |
24 |
HyPar-FCA+: an improved workload-aware elastic framework for FCA
|
Packiaraj, Muneeswaran |
|
|
79 |
11 |
p. 11767-11796 |
artikel |
25 |
Improving clinical documentation: automatic inference of ICD-10 codes from patient notes using BERT model
|
Al-Bashabsheh, Emran |
|
|
79 |
11 |
p. 12766-12790 |
artikel |
26 |
Investigation of the impact of different versions of GCC on various metaheuristic-based solvers for traveling salesman problem
|
Dal, Deniz |
|
|
79 |
11 |
p. 12394-12440 |
artikel |
27 |
Machine learning-based models for the qualitative classification of potassium ferrocyanide using electrochemical methods
|
Kayali, Devrim |
|
|
79 |
11 |
p. 12472-12491 |
artikel |
28 |
MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats
|
Ruiz-Villafranca, Sergio |
|
|
79 |
11 |
p. 11895-11933 |
artikel |
29 |
Metapath-guided dual semantic-aware filtering for HIN-based recommendation
|
Yan, Surong |
|
|
79 |
11 |
p. 11934-11964 |
artikel |
30 |
MinLA of (K9-C9)n and its optimal layout into certain trees
|
Afiya, Syeda |
|
|
79 |
11 |
p. 12000-12012 |
artikel |
31 |
Multimodal feature selection from microarray data based on Dempster–Shafer evidence fusion
|
Nekouie, Nadia |
|
|
79 |
11 |
p. 12591-12621 |
artikel |
32 |
On design and performance analysis of improved shuffle exchange gamma interconnection network layouts
|
Khanna, Gaurav |
|
|
79 |
11 |
p. 11611-11640 |
artikel |
33 |
On the use of deep learning and parallelism techniques to significantly reduce the HEVC intra-coding time
|
Galiano, Vicente |
|
|
79 |
11 |
p. 11641-11659 |
artikel |
34 |
Optimal uniformization for non-uniform two-level loops using a hybrid method
|
Mahjoub, Shabnam |
|
|
79 |
11 |
p. 12791-12814 |
artikel |
35 |
Parallelisation of decision-making techniques in aquaculture enterprises
|
Ibáñez, Mario |
|
|
79 |
11 |
p. 11827-11843 |
artikel |
36 |
Predicting the next word using the Markov chain model according to profiling personality
|
Elbaghazaoui, Bahaa Eddine |
|
|
79 |
11 |
p. 12126-12141 |
artikel |
37 |
RETRACTED ARTICLE: FRHO: Fuzzy rule-based hybrid optimization for optimal cluster head selection and enhancing quality of service in wireless sensor network
|
Hemavathi, S. |
|
|
79 |
11 |
p. 12238-12265 |
artikel |
38 |
Secrecy aware key management scheme for Internet of Healthcare Things
|
Trivedi, Chandan |
|
|
79 |
11 |
p. 12492-12522 |
artikel |
39 |
Smooth support vector machine with generalized pinball loss for Pattern Classification
|
Makmuang, Dawrawee |
|
|
79 |
11 |
p. 11684-11706 |
artikel |
40 |
Stacked Deep Learning Framework for Edge-Based Intelligent Threat Detection in IoT Network
|
Santhadevi, D. |
|
|
79 |
11 |
p. 12622-12655 |
artikel |
41 |
SURFBCS: speeded up robust features based fuzzy vault scheme in biometric cryptosystem
|
Kaur, Prabhjot |
|
|
79 |
11 |
p. 12292-12316 |
artikel |
42 |
Thermal-aware virtual machine placement based on multi-objective optimization
|
Liu, Bo |
|
|
79 |
11 |
p. 12563-12590 |
artikel |
43 |
WSMP: a warp scheduling strategy based on MFQ and PPF
|
Fang, Juan |
|
|
79 |
11 |
p. 12317-12340 |
artikel |