nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A deep feature matching pipeline with triple search strategy
|
Feng, Shuai |
|
|
79 |
18 |
p. 20878-20898 |
artikel |
2 |
An AI-driven fault-tolerant aggregation model for smart grid
|
Singh, Ashutosh Kumar |
|
|
79 |
18 |
p. 20665-20683 |
artikel |
3 |
An Archimedes metaheuristic algorithm based optimum relay coordination in microgrid and combined overhead/cable distribution network
|
Kudkelwar, Sagar B. |
|
|
79 |
18 |
p. 21166-21184 |
artikel |
4 |
A network anomaly detection algorithm based on semi-supervised learning and adaptive multiclass balancing
|
Zhang, Hao |
|
|
79 |
18 |
p. 20445-20480 |
artikel |
5 |
A new deep learning approach based on grayscale conversion and DWT for object detection on adversarial attacked images
|
Tasyurek, Murat |
|
|
79 |
18 |
p. 20383-20416 |
artikel |
6 |
A new proposed GLCM texture feature: modified Rényi Deng entropy
|
Özkan, Kürşad |
|
|
79 |
18 |
p. 21507-21527 |
artikel |
7 |
An osmotic approach-based dynamic deadline-aware task offloading in edge–fog–cloud computing environment
|
Reddy, Posham Bhargava |
|
|
79 |
18 |
p. 20938-20960 |
artikel |
8 |
A novel dynamic multi-objective task scheduling optimization based on Dueling DQN and PER
|
Chraibi, Amine |
|
|
79 |
18 |
p. 21368-21423 |
artikel |
9 |
A novel learning approach in deep spiking neural networks with multi-objective optimization algorithms for automatic digit speech recognition
|
Hamian, Melika |
|
|
79 |
18 |
p. 20263-20288 |
artikel |
10 |
A password less authentication protocol for multi-server environment using physical unclonable function
|
Praveen Kumar, E. |
|
|
79 |
18 |
p. 21474-21506 |
artikel |
11 |
A two-tier coordinated load balancing strategy over skewed data streams
|
Sun, Dawei |
|
|
79 |
18 |
p. 21028-21056 |
artikel |
12 |
Automatic detection of COVID-19 and pneumonia from chest X-ray images using texture features
|
Sheikhi, Farnaz |
|
|
79 |
18 |
p. 21449-21473 |
artikel |
13 |
Clustering-based re-routing framework for network traffic congestion avoidance on urban vehicular roads
|
Ali, Muhammad |
|
|
79 |
18 |
p. 21144-21165 |
artikel |
14 |
Continuous community search with attribute constraints in temporal graphs
|
Du, Ming |
|
|
79 |
18 |
p. 21089-21115 |
artikel |
15 |
Convolutional neural network pruning based on misclassification cost
|
Ahmadluei, Saeed |
|
|
79 |
18 |
p. 21185-21234 |
artikel |
16 |
Correction to: Future trends of path planning framework considering accident attributes for smart cities
|
Singh, Raushan Kumar |
|
|
79 |
18 |
p. 21528 |
artikel |
17 |
Development of a novel activation function based on Chebyshev polynomials: an aid for classification and denoising of images
|
Deepthi, M. |
|
|
79 |
18 |
p. 20515-20531 |
artikel |
18 |
Device-specific security challenges and solution in IoT edge computing: a review
|
Roy, Aditi |
|
|
79 |
18 |
p. 20790-20825 |
artikel |
19 |
DialogueINAB: an interaction neural network based on attitudes and behaviors of interlocutors for dialogue emotion recognition
|
Ding, Junyuan |
|
|
79 |
18 |
p. 20481-20514 |
artikel |
20 |
Economic mining of thermal power plant based on improved Hadoop-based framework and Spark-based algorithms
|
Wen, Xiaoqiang |
|
|
79 |
18 |
p. 20235-20262 |
artikel |
21 |
Efficient parallel kernel based on Cholesky decomposition to accelerate multichannel nonnegative matrix factorization
|
Muñoz-Montoro, Antonio J. |
|
|
79 |
18 |
p. 20649-20664 |
artikel |
22 |
Evaluation of pre-training large language models on leadership-class supercomputers
|
Yin, Junqi |
|
|
79 |
18 |
p. 20747-20768 |
artikel |
23 |
Fog-inspired framework for emergency rescue operations in post-disaster scenario
|
Saini, Kanika |
|
|
79 |
18 |
p. 21057-21088 |
artikel |
24 |
Graphene-based area efficient power planning architecture design methodology for nanomagnetic logic implementation
|
Sivasubramani, Santhosh |
|
|
79 |
18 |
p. 20961-20983 |
artikel |
25 |
Graph-enhanced multi-answer summarization under question-driven guidance
|
Li, Bing |
|
|
79 |
18 |
p. 20417-20444 |
artikel |
26 |
Improved discrete salp swarm algorithm using exploration and exploitation techniques for feature selection in intrusion detection systems
|
Barhoush, Malek |
|
|
79 |
18 |
p. 21265-21309 |
artikel |
27 |
Improved range-free localization algorithm based on reliable node optimization and enhanced sand cat optimization algorithm
|
Sun, Haibin |
|
|
79 |
18 |
p. 20289-20323 |
artikel |
28 |
Improving generalization in deep neural network using knowledge transformation based on fisher criterion
|
Morabbi, Sajedeh |
|
|
79 |
18 |
p. 20899-20922 |
artikel |
29 |
Improving quantum-to-classical data decoding using optimized quantum wavelet transform
|
Jeng, Mingyoung |
|
|
79 |
18 |
p. 20532-20561 |
artikel |
30 |
Intrusion detection of manifold regularized broad learning system based on LU decomposition
|
Liu, Yaodi |
|
|
79 |
18 |
p. 20600-20648 |
artikel |
31 |
iPartition: a distributed partitioning algorithm for block-centric graph processing systems
|
Sagharichian, Masoud |
|
|
79 |
18 |
p. 21116-21143 |
artikel |
32 |
MSSAMTO-IoV: modified sparrow search algorithm for multi-hop task offloading for IoV
|
Alseid, Marya |
|
|
79 |
18 |
p. 20769-20789 |
artikel |
33 |
Multi-head attention-based model for reconstructing continuous missing time series data
|
Wu, Huafeng |
|
|
79 |
18 |
p. 20684-20711 |
artikel |
34 |
Node position estimation based on optimal clustering and detection of coverage hole in wireless sensor networks using hybrid deep reinforcement learning
|
Chowdhuri, Rajib |
|
|
79 |
18 |
p. 20845-20877 |
artikel |
35 |
NoSQL-based storage systems: influence of consistency on performance, availability and energy consumption
|
Gomes, Carlos |
|
|
79 |
18 |
p. 21424-21448 |
artikel |
36 |
Performance of representation fusion model for entity and relationship extraction within unstructured text
|
Liao, Jing |
|
|
79 |
18 |
p. 20826-20844 |
artikel |
37 |
Secure kNN query of outsourced spatial data using two-cloud architecture
|
Ghunaim, Tasneem |
|
|
79 |
18 |
p. 21310-21345 |
artikel |
38 |
Similarity evaluation of graphic design based on deep visual saliency features
|
Liu, Zhuohua |
|
|
79 |
18 |
p. 21346-21367 |
artikel |
39 |
STM-GCN: a spatiotemporal multi-graph convolutional network for pedestrian trajectory prediction
|
Youssef, Taki |
|
|
79 |
18 |
p. 20923-20937 |
artikel |
40 |
Substructure-aware subgraph reasoning for inductive relation prediction
|
Sun, Kai |
|
|
79 |
18 |
p. 21008-21027 |
artikel |
41 |
Switching algorithm in listen-and-talk-based MAC protocols for full-duplex cognitive radio networks with type 2 fuzzy cooperative spectrum sensing
|
Joshi, Nandkishor |
|
|
79 |
18 |
p. 21235-21264 |
artikel |
42 |
Tree-based indexing technique for efficient and real-time label retrieval in the object tracking system
|
Benrazek, Ala-Eddine |
|
|
79 |
18 |
p. 20562-20599 |
artikel |
43 |
Trigger-free cybersecurity event detection based on contrastive learning
|
Tang, Mengmeng |
|
|
79 |
18 |
p. 20984-21007 |
artikel |
44 |
Two phased Yarn scheduling with novel binary hypergraphed PSO
|
Sharma, Sonia |
|
|
79 |
18 |
p. 20712-20746 |
artikel |
45 |
Verifiable and Boolean keyword searchable attribute-based signcryption for electronic medical record storage and retrieval in cloud computing environment
|
Bera, Sourav |
|
|
79 |
18 |
p. 20324-20382 |
artikel |