nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A generalized approach to construct node probability table for Bayesian belief network using fuzzy logic
|
Kumar, Chandan |
|
|
80 |
1 |
p. 75-97 |
artikel |
2 |
A hot-module-aware mapping approach in network-on-chip
|
Vardi, Fatemeh |
|
|
80 |
1 |
p. 670-702 |
artikel |
3 |
An adaptive stochastic ranking-based tournament selection method for differential evolution
|
Xia, Dahai |
|
|
80 |
1 |
p. 20-49 |
artikel |
4 |
Analyzing and predicting job failures from HPC system log
|
Park, Ju-Won |
|
|
80 |
1 |
p. 435-462 |
artikel |
5 |
A nano-scale arithmetic and logic unit using a reversible logic and quantum-dots
|
Navimipour, Nima Jafari |
|
|
80 |
1 |
p. 395-412 |
artikel |
6 |
An approximation algorithm for virtual machine placement in cloud data centers
|
Mahmoodabadi, Zahra |
|
|
80 |
1 |
p. 915-941 |
artikel |
7 |
An effective chaotic maps image encryption based on metaheuristic optimizers
|
Sameh, Sally Mohamed |
|
|
80 |
1 |
p. 141-201 |
artikel |
8 |
An efficient GAN-based predictive framework for multivariate time series anomaly prediction in cloud data centers
|
Qi, Sibo |
|
|
80 |
1 |
p. 1268-1293 |
artikel |
9 |
A new improved KNN-based recommender system
|
Bahrani, Payam |
|
|
80 |
1 |
p. 800-834 |
artikel |
10 |
A novel Blockchain-based authentication scheme for telecare medical information system
|
Indushree, M. |
|
|
80 |
1 |
p. 1080-1108 |
artikel |
11 |
A novel deep learning model for diabetes melliuts prediction in IoT-based healthcare environment with effective feature selection mechanism
|
Rajalakshmi, R. |
|
|
80 |
1 |
p. 271-291 |
artikel |
12 |
A novel fuzzy control path planning algorithm for intelligent ship based on scale factors
|
Wu, Huafeng |
|
|
80 |
1 |
p. 202-225 |
artikel |
13 |
A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach
|
Abdulhammed, Omar Younis |
|
|
80 |
1 |
p. 226-248 |
artikel |
14 |
A scalable and flexible platform for service placement in multi-fog and multi-cloud environments
|
Azizi, Sadoon |
|
|
80 |
1 |
p. 1109-1136 |
artikel |
15 |
Audio forgery detection and localization with super-resolution spectrogram and keypoint-based clustering approach
|
Ustubioglu, Beste |
|
|
80 |
1 |
p. 486-518 |
artikel |
16 |
Carbon emission-aware job scheduling for Kubernetes deployments
|
Piontek, Tobias |
|
|
80 |
1 |
p. 549-569 |
artikel |
17 |
CoDFi-DL: a hybrid recommender system combining enhanced collaborative and demographic filtering based on deep learning
|
Latrech, Jihene |
|
|
80 |
1 |
p. 1160-1182 |
artikel |
18 |
Comparative analysis of dimensionality reduction techniques for cybersecurity in the SWaT dataset
|
Bozdal, Mehmet |
|
|
80 |
1 |
p. 1059-1079 |
artikel |
19 |
Component edge connectivity and extra edge connectivity of alternating group networks
|
Lai, Yonghao |
|
|
80 |
1 |
p. 313-330 |
artikel |
20 |
Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform
|
Shah, Tariq |
|
|
80 |
1 |
p. 1037-1058 |
artikel |
21 |
Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data
|
Wu, Huafeng |
|
|
80 |
1 |
p. 1363-1364 |
artikel |
22 |
Correction to: Sketching the Krylov subspace: faster computation of the entire ridge regularization path
|
Wang, Yifei |
|
|
80 |
1 |
p. 1366 |
artikel |
23 |
Correction to: The position-based compression techniques for DNN model
|
Tang, Minghua |
|
|
80 |
1 |
p. 1365 |
artikel |
24 |
CovidO: an ontology for COVID-19 metadata
|
Sharma, Sumit |
|
|
80 |
1 |
p. 1238-1267 |
artikel |
25 |
Deep Gaussian convolutional neural network model in classification of cassava diseases using spectral data
|
Ahishakiye, Emmanuel |
|
|
80 |
1 |
p. 463-485 |
artikel |
26 |
Dense Mesh RCNN: assessment of human skin burn and burn depth severity
|
Pabitha, C. |
|
|
80 |
1 |
p. 1331-1362 |
artikel |
27 |
Deploying warehouse robots with confidence: the BRAIN-IoT framework’s functional assurance
|
Baouya, Abdelhakim |
|
|
80 |
1 |
p. 1206-1237 |
artikel |
28 |
Dynamic weight-based connectivity recovery in wireless sensor and actor networks
|
Chiang, Mao-Lun |
|
|
80 |
1 |
p. 734-760 |
artikel |
29 |
E2CSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p)
|
Javeed, Khalid |
|
|
80 |
1 |
p. 50-74 |
artikel |
30 |
Energy optimized container placement for cloud data centers: a meta-heuristic approach
|
Katal, Avita |
|
|
80 |
1 |
p. 98-140 |
artikel |
31 |
FASR-LED: reducing energy consumption in wireless body area networks by an efficient smart method
|
Khalifavi, Maedeh |
|
|
80 |
1 |
p. 1009-1036 |
artikel |
32 |
Hierarchical search algorithm for error detection in floating-point arithmetic expressions
|
Zhang, Zuoyan |
|
|
80 |
1 |
p. 1183-1205 |
artikel |
33 |
Hybrid graph transformer networks for multivariate time series anomaly detection
|
Gao, Rong |
|
|
80 |
1 |
p. 642-669 |
artikel |
34 |
JCF: joint coarse- and fine-grained similarity comparison for plagiarism detection based on NLP
|
Chang, Chih-Yung |
|
|
80 |
1 |
p. 363-394 |
artikel |
35 |
Lifelong iris presentation attack detection without forgetting
|
Zhou, Zhiyong |
|
|
80 |
1 |
p. 1-19 |
artikel |
36 |
Lotus effect optimization algorithm (LEA): a lotus nature-inspired algorithm for engineering design optimization
|
Dalirinia, Elham |
|
|
80 |
1 |
p. 761-799 |
artikel |
37 |
Parallel algorithm design and optimization of geodynamic numerical simulation application on the Tianhe new-generation high-performance computer
|
Yang, Jin |
|
|
80 |
1 |
p. 331-362 |
artikel |
38 |
Parallel program testing based on critical communication and branch transformation
|
Tian, Tian |
|
|
80 |
1 |
p. 519-548 |
artikel |
39 |
Path planning for intelligent vehicles based on improved D* Lite
|
Li, Xiaomei |
|
|
80 |
1 |
p. 1294-1330 |
artikel |
40 |
Per-user network access control kernel module with secure multifactor authentication
|
Cheng, Sheng-Tzong |
|
|
80 |
1 |
p. 970-1008 |
artikel |
41 |
Polynomial linear discriminant analysis
|
Ran, Ruisheng |
|
|
80 |
1 |
p. 413-434 |
artikel |
42 |
Proof of location based delivery system using multi-party virtual state channel: a blockchain model
|
Sahoo, Sujit Sangram |
|
|
80 |
1 |
p. 703-733 |
artikel |
43 |
Research on load-balancing scheduling optimization for wafer surface defect detection
|
Liu, Tundong |
|
|
80 |
1 |
p. 1137-1159 |
artikel |
44 |
SOS-FCI: a secure offloading scheme in fog–cloud-based IoT
|
Salami, Yashar |
|
|
80 |
1 |
p. 570-600 |
artikel |
45 |
Stability and agent dynamics of artificial electric field algorithm
|
Chauhan, Dikshit |
|
|
80 |
1 |
p. 835-864 |
artikel |
46 |
TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor
|
Singh, Namrata |
|
|
80 |
1 |
p. 865-914 |
artikel |
47 |
The effect of activation functions on accuracy, convergence speed, and misclassification confidence in CNN text classification: a comprehensive exploration
|
Emanuel, Rebecca H. K. |
|
|
80 |
1 |
p. 292-312 |
artikel |
48 |
Total variation method based on modified Barzilai–Borwein algorithm to noise reduction in MRI images
|
Jalilian, Hamed |
|
|
80 |
1 |
p. 601-619 |
artikel |
49 |
UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks
|
Kumar, Rakesh |
|
|
80 |
1 |
p. 942-969 |
artikel |
50 |
User satisfaction-based energy-saving computation offloading in fog computing networks
|
Li, Qun |
|
|
80 |
1 |
p. 620-641 |
artikel |
51 |
White blood cell classification based on a novel ensemble convolutional neural network framework
|
Dong, Na |
|
|
80 |
1 |
p. 249-270 |
artikel |