Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             61 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 ACANet: attention-based context-aware network for infrared small target detection Ling, Siyao

80 12 p. 17068-17096
artikel
2 A computation offloading strategy for multi-access edge computing based on DQUIC protocol Yang, Peng

80 12 p. 18285-18318
artikel
3 A Cost-effective and Machine-learning-based method to identify and cluster redundant mutants in software mutation testing Arasteh, Bahman

80 12 p. 16711-16743
artikel
4 A deep learning-based approach for predicting in-flight estimated time of arrival Silvestre, Jorge

80 12 p. 17212-17246
artikel
5 A deep learning mechanism to detect phishing URLs using the permutation importance method and SMOTE-Tomek link Zaimi, Rania

80 12 p. 17159-17191
artikel
6 A learning-based efficient query model for blockchain in internet of medical things Jia, Dayu

80 12 p. 18260-18284
artikel
7 An effective spatial join method for blockchain-based geospatial data using hierarchical quadrant spatial LSM+ tree Lee, Junghyun

80 12 p. 17492-17523
artikel
8 An enhanced object detection network for ship target detection in SAR images Zou, Haochen

80 12 p. 17377-17399
artikel
9 Anomalies resolution and semantification of tabular data Sharma, Sumit

80 12 p. 18081-18117
artikel
10 A novel approach to synchronizing a biological snap oscillator within a fixed time and expanding the method to various chaotic systems Ouahabi, Rabiaa

80 12 p. 18237-18259
artikel
11 A novel deep learning model-based optimization algorithm for text message spam detection Das, Lipsa

80 12 p. 17823-17848
artikel
12 A novel optimization method: wave search algorithm Zhang, Haobin

80 12 p. 16824-16859
artikel
13 A novel RPL defense mechanism based on trust and deep learning for internet of things Ahmadi, Khatereh

80 12 p. 16979-17003
artikel
14 Ant Mill: an adversarial traffic pattern for low-diameter direct networks Camarero, Cristóbal

80 12 p. 18062-18080
artikel
15 A supervised active learning method for identifying critical nodes in IoT networks Ojaghi, Behnam

80 12 p. 16775-16794
artikel
16 A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions Parihar, Bhawana

80 12 p. 17633-17687
artikel
17 Calculation and selection scheme of node reputation values for notary mechanism in cross-chain Guo, Zhihao

80 12 p. 18177-18198
artikel
18 Can GPU performance increase faster than the code error rate? dos Santos, Fernando Fernandes

80 12 p. 16918-16946
artikel
19 Cleaner fish optimization algorithm: a new bio-inspired meta-heuristic optimization algorithm Zhang, Wenya

80 12 p. 17338-17376
artikel
20 Clustering-assisted gradient-based optimizer for scheduling parallel cloud workflows with budget constraints Li, Huifang

80 12 p. 17097-17134
artikel
21 Correction to: A heuristic hybrid instance reduction approach based on adaptive relative distance and k-means clustering Li, Junnan

80 12 p. 18320
artikel
22 Cross-organizational data exchange based on consortium blockchain with consistency guarantee Geng, Qian

80 12 p. 18199-18236
artikel
23 DDSC-SMOTE: an imbalanced data oversampling algorithm based on data distribution and spectral clustering Li, Xinqi

80 12 p. 17760-17789
artikel
24 Design of a multilayer reversible ALU in QCA technology Faraji, Reza

80 12 p. 17135-17158
artikel
25 Enhancing Grover’s search algorithm: a modified approach to increase the probability of good states Abdulrahman, Ismael

80 12 p. 18048-18061
artikel
26 Enhancing learning environments with IoT: a novel decision-making approach using probabilistic linguistic T-spherical fuzzy set Shafiq, Aqsa

80 12 p. 17524-17574
artikel
27 FCNet: a deep neural network based on multi-channel feature cascading for image denoising Feng, Siling

80 12 p. 17042-17067
artikel
28 FGCF: fault-aware green computing framework in software-defined social internet of vehicle Mishra, Pooja

80 12 p. 17423-17459
artikel
29 Filter channel network based on contextual position weight for aspect-based sentiment classification Zhu, Chao

80 12 p. 17874-17894
artikel
30 Finite difference method for the Riesz space distributed-order advection–diffusion equation with delay in 2D: convergence and stability Saedshoar Heris, Mahdi

80 12 p. 16887-16917
artikel
31 Gaitdlf: global and local fusion for skeleton-based gait recognition in the wild Wei, Siwei

80 12 p. 17606-17632
artikel
32 Gradient scaling and segmented SoftMax Regression Federated Learning (GDS-SRFFL): a novel methodology for attack detection in industrial internet of things (IIoT) networks Rajasekaran, Vijay Anand

80 12 p. 16860-16886
artikel
33 Harmony-driven technique for solving optimization and engineering problems Ewees, Ahmed A.

80 12 p. 17980-18008
artikel
34 HyperTuner: a cross-layer multi-objective hyperparameter auto-tuning framework for data analytic services Dou, Hui

80 12 p. 17460-17491
artikel
35 Intelligent detection method of microparticle virus in silkworm based on YOLOv8 improved algorithm Zhang, Yinguang

80 12 p. 18118-18141
artikel
36 LC-PBFT: Layered cross-chain consensus algorithm based on forest topology Li, Jinhui

80 12 p. 17849-17873
artikel
37 Let’s explain crisis: deep multi-scale hierarchical attention framework for crisis-task identification Priya, Shalini

80 12 p. 17923-17951
artikel
38 LGAFormer: transformer with local and global attention for action detection Zhang, Haiping

80 12 p. 17952-17979
artikel
39 M2BIST-SPNet: RUL prediction for railway signaling electromechanical devices Hu, Xiaoxi

80 12 p. 16744-16774
artikel
40 MS-HRNet: multi-scale high-resolution network for human pose estimation Wang, Yanxia

80 12 p. 17269-17291
artikel
41 On the computation of the gradient in implicit neural networks Szekeres, Béla J.

80 12 p. 17247-17268
artikel
42 Optimized Python library for reconstruction of ensemble-based gene co-expression networks using multi-GPU López-Fernández, Aurelio

80 12 p. 18142-18176
artikel
43 Order structure analysis of node importance based on the temporal inter-layer neighborhood homogeneity rate of the dynamic network Lu, Zhiyu

80 12 p. 17314-17337
artikel
44 Pattern matching algorithms in blockchain for network fees reduction Susik, Robert

80 12 p. 17741-17759
artikel
45 Perception data fusion-based computation offloading in cooperative vehicle infrastructure systems Wu, Ruizhi

80 12 p. 17688-17710
artikel
46 Performance evaluation of Word2vec accelerators exploiting spatial and temporal parallelism on DDR/HBM-based FPGAs Waidyasooriya, Hasitha Muthumala

80 12 p. 17192-17211
artikel
47 PnP-UGCSuperGlue: deep learning drone image matching algorithm for visual localization Guo, Ya

80 12 p. 17711-17740
artikel
48 Post-quantum security design for hierarchical healthcare systems based on lattices Boujelben, Manel

80 12 p. 17292-17313
artikel
49 Publisher Correction: Improving query processing in blockchain systems by using a multi-level sharding mechanism Matani, Alemeh

80 12 p. 18319
artikel
50 Qsmix: Q-learning-based task scheduling approach for mixed-critical applications on heterogeneous multi-cores Afshari, Fatemeh

80 12 p. 17895-17922
artikel
51 Recurrent neural network and long short-term memory models for audio copy-move forgery detection: a comprehensive study Akdeniz, Fulya

80 12 p. 17575-17605
artikel
52 Research of hybrid path planning with improved A* and TEB in static and dynamic environments Zhang, Lin

80 12 p. 18009-18047
artikel
53 Retraction Note: Efficient hybrid algorithm based on genetic with weighted fuzzy rule for developing a decision support system in prediction of heart diseases Hameed, Abdul Zubar

80 12 p. 18322
artikel
54 Retraction Note: Mobile client data security storage protocol based on multifactor node evaluation Zhou, Qianming

80 12 p. 18323
artikel
55 Retraction Note: Robust adversarial uncertainty quantification for deep learning fine-tuning Ahmed, Usman

80 12 p. 18321
artikel
56 Service placement in fog–cloud computing environments: a comprehensive literature review Sarkohaki, Fatemeh

80 12 p. 17790-17822
artikel
57 Simulating stellar merger using HPX/Kokkos on A64FX on Supercomputer Fugaku Diehl, Patrick

80 12 p. 16947-16978
artikel
58 SPD-YOLOv8: an small-size object detection model of UAV imagery in complex scene Zhong, Rui

80 12 p. 17021-17041
artikel
59 The Egyptian national HPC grid (EN-HPCG): open-source Slurm implementation from cluster to grid approach Elshambakey, Mohammed

80 12 p. 16795-16823
artikel
60 TS-Finder: privacy enhanced web crawler detection model using temporal–spatial access behaviors Zhao, Jing

80 12 p. 17400-17422
artikel
61 Unilateral protection scheme for N-qubit GHZ states against decoherence: a resource-efficient approach Sajede, Harraz

80 12 p. 17004-17020
artikel
                             61 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland