Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             51 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A generalized approach to construct node probability table for Bayesian belief network using fuzzy logic Kumar, Chandan

80 1 p. 75-97
artikel
2 A hot-module-aware mapping approach in network-on-chip Vardi, Fatemeh

80 1 p. 670-702
artikel
3 An adaptive stochastic ranking-based tournament selection method for differential evolution Xia, Dahai

80 1 p. 20-49
artikel
4 Analyzing and predicting job failures from HPC system log Park, Ju-Won

80 1 p. 435-462
artikel
5 A nano-scale arithmetic and logic unit using a reversible logic and quantum-dots Navimipour, Nima Jafari

80 1 p. 395-412
artikel
6 An approximation algorithm for virtual machine placement in cloud data centers Mahmoodabadi, Zahra

80 1 p. 915-941
artikel
7 An effective chaotic maps image encryption based on metaheuristic optimizers Sameh, Sally Mohamed

80 1 p. 141-201
artikel
8 An efficient GAN-based predictive framework for multivariate time series anomaly prediction in cloud data centers Qi, Sibo

80 1 p. 1268-1293
artikel
9 A new improved KNN-based recommender system Bahrani, Payam

80 1 p. 800-834
artikel
10 A novel Blockchain-based authentication scheme for telecare medical information system Indushree, M.

80 1 p. 1080-1108
artikel
11 A novel deep learning model for diabetes melliuts prediction in IoT-based healthcare environment with effective feature selection mechanism Rajalakshmi, R.

80 1 p. 271-291
artikel
12 A novel fuzzy control path planning algorithm for intelligent ship based on scale factors Wu, Huafeng

80 1 p. 202-225
artikel
13 A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach Abdulhammed, Omar Younis

80 1 p. 226-248
artikel
14 A scalable and flexible platform for service placement in multi-fog and multi-cloud environments Azizi, Sadoon

80 1 p. 1109-1136
artikel
15 Audio forgery detection and localization with super-resolution spectrogram and keypoint-based clustering approach Ustubioglu, Beste

80 1 p. 486-518
artikel
16 Carbon emission-aware job scheduling for Kubernetes deployments Piontek, Tobias

80 1 p. 549-569
artikel
17 CoDFi-DL: a hybrid recommender system combining enhanced collaborative and demographic filtering based on deep learning Latrech, Jihene

80 1 p. 1160-1182
artikel
18 Comparative analysis of dimensionality reduction techniques for cybersecurity in the SWaT dataset Bozdal, Mehmet

80 1 p. 1059-1079
artikel
19 Component edge connectivity and extra edge connectivity of alternating group networks Lai, Yonghao

80 1 p. 313-330
artikel
20 Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform Shah, Tariq

80 1 p. 1037-1058
artikel
21 Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data Wu, Huafeng

80 1 p. 1363-1364
artikel
22 Correction to: Sketching the Krylov subspace: faster computation of the entire ridge regularization path Wang, Yifei

80 1 p. 1366
artikel
23 Correction to: The position-based compression techniques for DNN model Tang, Minghua

80 1 p. 1365
artikel
24 CovidO: an ontology for COVID-19 metadata Sharma, Sumit

80 1 p. 1238-1267
artikel
25 Deep Gaussian convolutional neural network model in classification of cassava diseases using spectral data Ahishakiye, Emmanuel

80 1 p. 463-485
artikel
26 Dense Mesh RCNN: assessment of human skin burn and burn depth severity Pabitha, C.

80 1 p. 1331-1362
artikel
27 Deploying warehouse robots with confidence: the BRAIN-IoT framework’s functional assurance Baouya, Abdelhakim

80 1 p. 1206-1237
artikel
28 Dynamic weight-based connectivity recovery in wireless sensor and actor networks Chiang, Mao-Lun

80 1 p. 734-760
artikel
29 E2CSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p) Javeed, Khalid

80 1 p. 50-74
artikel
30 Energy optimized container placement for cloud data centers: a meta-heuristic approach Katal, Avita

80 1 p. 98-140
artikel
31 FASR-LED: reducing energy consumption in wireless body area networks by an efficient smart method Khalifavi, Maedeh

80 1 p. 1009-1036
artikel
32 Hierarchical search algorithm for error detection in floating-point arithmetic expressions Zhang, Zuoyan

80 1 p. 1183-1205
artikel
33 Hybrid graph transformer networks for multivariate time series anomaly detection Gao, Rong

80 1 p. 642-669
artikel
34 JCF: joint coarse- and fine-grained similarity comparison for plagiarism detection based on NLP Chang, Chih-Yung

80 1 p. 363-394
artikel
35 Lifelong iris presentation attack detection without forgetting Zhou, Zhiyong

80 1 p. 1-19
artikel
36 Lotus effect optimization algorithm (LEA): a lotus nature-inspired algorithm for engineering design optimization Dalirinia, Elham

80 1 p. 761-799
artikel
37 Parallel algorithm design and optimization of geodynamic numerical simulation application on the Tianhe new-generation high-performance computer Yang, Jin

80 1 p. 331-362
artikel
38 Parallel program testing based on critical communication and branch transformation Tian, Tian

80 1 p. 519-548
artikel
39 Path planning for intelligent vehicles based on improved D* Lite Li, Xiaomei

80 1 p. 1294-1330
artikel
40 Per-user network access control kernel module with secure multifactor authentication Cheng, Sheng-Tzong

80 1 p. 970-1008
artikel
41 Polynomial linear discriminant analysis Ran, Ruisheng

80 1 p. 413-434
artikel
42 Proof of location based delivery system using multi-party virtual state channel: a blockchain model Sahoo, Sujit Sangram

80 1 p. 703-733
artikel
43 Research on load-balancing scheduling optimization for wafer surface defect detection Liu, Tundong

80 1 p. 1137-1159
artikel
44 SOS-FCI: a secure offloading scheme in fog–cloud-based IoT Salami, Yashar

80 1 p. 570-600
artikel
45 Stability and agent dynamics of artificial electric field algorithm Chauhan, Dikshit

80 1 p. 835-864
artikel
46 TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor Singh, Namrata

80 1 p. 865-914
artikel
47 The effect of activation functions on accuracy, convergence speed, and misclassification confidence in CNN text classification: a comprehensive exploration Emanuel, Rebecca H. K.

80 1 p. 292-312
artikel
48 Total variation method based on modified Barzilai–Borwein algorithm to noise reduction in MRI images Jalilian, Hamed

80 1 p. 601-619
artikel
49 UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks Kumar, Rakesh

80 1 p. 942-969
artikel
50 User satisfaction-based energy-saving computation offloading in fog computing networks Li, Qun

80 1 p. 620-641
artikel
51 White blood cell classification based on a novel ensemble convolutional neural network framework Dong, Na

80 1 p. 249-270
artikel
                             51 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland