Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             47 results found
no title author magazine year volume issue page(s) type
1 A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis Pal, Debranjan

79 6 p. 6252-6289
article
2 Adaptive chimp optimization algorithm with chaotic map for global numerical optimization problems Wang, Yiwen

79 6 p. 6507-6537
article
3 A federated multi-agent deep reinforcement learning for vehicular fog computing Shabir, Balawal

79 6 p. 6141-6167
article
4 An adaptive centralized authentication control method to reduce association delay in the IoT 802.11ah protocol Haimour, Jumana

79 6 p. 6730-6755
article
5 An improved hybrid mayfly algorithm for global optimization Yan, Zheping

79 6 p. 5878-5919
article
6 A novel marine predators algorithm with adaptive update strategy Chen, Tao

79 6 p. 6612-6645
article
7 Application of improved Naive Bayes classification algorithm in 5G signaling analysis Wang, Wanwan

79 6 p. 6941-6964
article
8 Automated cloud resources provisioning with the use of the proximal policy optimization Funika, Włodzimierz

79 6 p. 6674-6704
article
9 CICAPS: a cooperative intersection collision avoidance persistent system for cooperative intersection ADAS Elleuch, Islam

79 6 p. 6087-6114
article
10 Correction to: Aggressive GPU cache bypassing with monolithic 3D-based NoC Do, Cong Thuan

79 6 p. 7061
article
11 Correction to: A secured internet of robotic things (IoRT) for long-term care services in a smart building Chang, Shih-Hao

79 6 p. 7062
article
12 Cost-aware resource management based on market pricing mechanisms in edge federation environments Huang, Fengyi

79 6 p. 5939-5961
article
13 Customizing blendshapes to capture facial details Han, Ju Hee

79 6 p. 6347-6372
article
14 Deep AI military staff: cooperative battlefield situation awareness for commander’s decision making Lee, Chang-Eun

79 6 p. 6040-6069
article
15 Dynamic cost effective solution for efficient cloud infrastructure Mukhopadhyay, Nirmalya

79 6 p. 6471-6506
article
16 Dynamic urban evaluation routing protocol for enhanced vehicle ad hoc networks Ali, Zainab H.

79 6 p. 6017-6039
article
17 Efficient bandwidth allocation in SDN-based peer-to-peer data streaming using machine learning algorithm Aldabbas, Hamza

79 6 p. 6802-6824
article
18 Enhanced dual-level dependency parsing for aspect-based sentiment analysis Zhang, Maoyuan

79 6 p. 6290-6308
article
19 Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers Nandhini, P. S.

79 6 p. 6825-6848
article
20 FPSA-SMS: first price sealed auction-based service migration strategy in mobile edge computing Xu, Jiuyun

79 6 p. 5920-5938
article
21 gCFS: completely fair scheduling on multiple GPUs for improved multi-DNN execution in terms of performance isolation Cho, Hojin

79 6 p. 5851-5877
article
22 High-performance and balanced parallel graph coloring on multicore platforms Giannoula, Christina

79 6 p. 6373-6421
article
23 Improve customer churn prediction through the proposed PCA-PSO-K means algorithm in the communication industry Sadeghi, Maryam

79 6 p. 6871-6888
article
24 Improved multi-class classification approach for imbalanced big data on spark Singh, Tinku

79 6 p. 6583-6611
article
25 Independent vector analysis based on binary grey wolf feature selection and extreme learning machine for bearing fault diagnosis Souaidia, Chouaib

79 6 p. 7014-7036
article
26 Intra-pulse modulation recognition of radar signals based on multi-feature random matching fusion network Liao, Yanping

79 6 p. 6422-6451
article
27 Literature survey of multi-track music generation model based on generative confrontation network in intelligent composition Liu, Weiming

79 6 p. 6560-6582
article
28 Multifactorial brain storm optimization algorithm based on direct search transfer mechanism and concave lens imaging learning strategy Li, Wei

79 6 p. 6168-6202
article
29 New machine learning model based on the time factor for e-commerce recommendation systems Tran, Duy Thanh

79 6 p. 6756-6801
article
30 Novel high-performance QCA Fredkin gate and designing scalable QCA binary to gray and vice versa Safaiezadeh, Behrouz

79 6 p. 7037-7060
article
31 Optimized localization in large-scale heterogeneous WSN Kumar, Sumit

79 6 p. 6705-6729
article
32 Quadro-W learning for human behavior prediction in an evolving environment: a case study of the intelligent butler technology Cheng, Sheng-Tzong

79 6 p. 6309-6346
article
33 RainFormer: a pyramid transformer for single image deraining Yang, Hao

79 6 p. 6115-6140
article
34 Real-time monitoring solution with vibration analysis for industry 4.0 ventilation systems Muñiz, Rubén

79 6 p. 6203-6227
article
35 Retraction Note to: Accurate computation: COVID-19 rRT-PCR positive test dataset using stages classification through textual big data mining with machine learning Ramanathan, Shalini

79 6 p. 7065
article
36 Retraction Note to: Optimal feature-based multi-kernel SVM approach for thyroid disease classification Shankar, K.

79 6 p. 7063-7064
article
37 SaHNoC: an optimal energy efficient hybrid networks-on-chip architecture Alagarsamy, Aravindhan

79 6 p. 6538-6559
article
38 Sequential semi-supervised active learning model in extremely low training set (SSSAL) Khalili, Ebrahim

79 6 p. 6646-6673
article
39 Soft error vulnerability prediction of GPGPU applications Topçu, Burak

79 6 p. 6965-6990
article
40 Source-free domain adaptive object detection based on pseudo-supervised mean teacher Wei, Xing

79 6 p. 6228-6251
article
41 Supercomputing leverages quantum machine learning and Grover’s algorithm Khanal, Bikram

79 6 p. 6918-6940
article
42 TACTIRSO: trust aware clustering technique based on improved rat swarm optimizer for WSN-enabled intelligent transportation system Osamy, Walid

79 6 p. 5962-6016
article
43 The edge fault-tolerant spanning laceability of the enhanced hypercube networks Qiao, Hongwei

79 6 p. 6070-6086
article
44 The predicting public sentiment evolution on public emergencies under deep learning and internet of things Chen, Min

79 6 p. 6452-6470
article
45 Two-channel hierarchical attention mechanism model for short text classification Chang, Guanghui

79 6 p. 6991-7013
article
46 Virtual network function deployment algorithm based on graph convolution deep reinforcement learning Qiu, Rixuan

79 6 p. 6849-6870
article
47 WAVE: designing a heuristics-based three-way breadth-first search on GPUs Yoon, Daegun

79 6 p. 6889-6917
article
                             47 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands