nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cognitive effective framework for analysis, monitoring and identifying variant of coronavirus disease
|
Kumari, Sapna |
|
|
80 |
15 |
p. 22563-22597 |
artikel |
2 |
A collaborative cache allocation strategy for performance and link cost in mobile edge computing
|
Xiao, Hui |
|
|
80 |
15 |
p. 22885-22912 |
artikel |
3 |
A conditioned joint-modality attention fusion approach for multimodal aspect-level sentiment analysis
|
Yang, Ying |
|
|
80 |
15 |
p. 21676-21698 |
artikel |
4 |
Adaptive multi-object tracking algorithm based on split trajectory
|
Sun, Lifan |
|
|
80 |
15 |
p. 22287-22314 |
artikel |
5 |
A high-performance, parallel, and hierarchically distributed model for coastal run-up events simulation and forecasting
|
Di Luccio, Diana |
|
|
80 |
15 |
p. 22748-22769 |
artikel |
6 |
A learning-based data and task placement mechanism for IoT applications in fog computing: a context-aware approach
|
Torabi, Esmaeil |
|
|
80 |
15 |
p. 21726-21763 |
artikel |
7 |
An encrypted deduplication scheme based on files diversity
|
He, Xinfeng |
|
|
80 |
15 |
p. 22860-22884 |
artikel |
8 |
An improved SMOTE based on center offset factor and synthesis strategy for imbalanced data classification
|
Zhang, Ying |
|
|
80 |
15 |
p. 22479-22519 |
artikel |
9 |
An unmanned tank combat game driven by FPSO-MADDPG algorithm
|
Wang, Fei |
|
|
80 |
15 |
p. 21615-21641 |
artikel |
10 |
A personalized recommendation model with multimodal preference-based graph attention network
|
Wang, Shuo |
|
|
80 |
15 |
p. 22020-22048 |
artikel |
11 |
Application of an extrapolation method in the Hessenberg algorithm for computing PageRank
|
Hu, Qian-Ying |
|
|
80 |
15 |
p. 22836-22859 |
artikel |
12 |
A real-time approach for smart building operations prediction using rule-based complex event processing and SPARQL query
|
Kumar, Shashi Shekhar |
|
|
80 |
15 |
p. 21569-21591 |
artikel |
13 |
A real-time object detection method for electronic screen GUI test systems
|
Wang, Zhongmin |
|
|
80 |
15 |
p. 22803-22835 |
artikel |
14 |
Aspect-level implicit sentiment analysis model based on semantic wave and knowledge enhancement
|
Zhang, Maoyuan |
|
|
80 |
15 |
p. 22726-22747 |
artikel |
15 |
Blockchain based distributed trust management in IoT and IIoT: a survey
|
Lahbib, Asma |
|
|
80 |
15 |
p. 21867-21919 |
artikel |
16 |
Capacity planning and scheduling for jobs with uncertainty in resource usage and duration
|
Patra, Sunandita |
|
|
80 |
15 |
p. 22428-22461 |
artikel |
17 |
Chebyshev approximation technique: analysis and applications
|
Nicolas, Elie |
|
|
80 |
15 |
p. 22155-22189 |
artikel |
18 |
Cycle-accurate multi-FPGA platform for accelerated emulation of large on-chip networks
|
Romanov, Aleksandr Y. |
|
|
80 |
15 |
p. 22462-22478 |
artikel |
19 |
DBOS_US: a density-based graph under-sampling method to handle class imbalance and class overlap issues in software fault prediction
|
Bhandari, Kirti |
|
|
80 |
15 |
p. 22682-22725 |
artikel |
20 |
DE2RA-RPL: detection and elimination of resource-related attacks in IoT RPL-based protocol
|
Paganraj, Deepavathi |
|
|
80 |
15 |
p. 22397-22427 |
artikel |
21 |
Efficient data race detection for interrupt-driven programs via path feasibility analysis
|
Zhao, Jingwen |
|
|
80 |
15 |
p. 21699-21725 |
artikel |
22 |
Enhancing differential evolution algorithm with a fitness-distance-based selection strategy
|
Huang, Yawei |
|
|
80 |
15 |
p. 22245-22286 |
artikel |
23 |
Enhancing 3D localization in wireless sensor network: a differential evolution method for the DV-Hop algorithm
|
Liu, Zhihua |
|
|
80 |
15 |
p. 23120-23146 |
artikel |
24 |
Enhancing multidimensional scaling through a distributed algorithm
|
Gachkooban, Zahra |
|
|
80 |
15 |
p. 22049-22068 |
artikel |
25 |
Enhancing self-adaptation for efficient decision-making at run-time in streaming applications on multicores
|
Vogel, Adriano |
|
|
80 |
15 |
p. 22213-22244 |
artikel |
26 |
Evaluating machine learning prediction techniques and their impact on proactive resource provisioning for cloud environments
|
Kirchoff, Dionatrã F. |
|
|
80 |
15 |
p. 21920-21951 |
artikel |
27 |
Flood algorithm (FLA): an efficient inspired meta-heuristic for engineering optimization
|
Ghasemi, Mojtaba |
|
|
80 |
15 |
p. 22913-23017 |
artikel |
28 |
GPU-accelerated relaxed graph pattern matching algorithms
|
Benachour, Amira |
|
|
80 |
15 |
p. 21811-21836 |
artikel |
29 |
Guide to developing case-based attack scenarios and establishing defense strategies for cybersecurity exercise in ICS environment
|
Kim, Donghyun |
|
|
80 |
15 |
p. 21642-21675 |
artikel |
30 |
Influence maximization under equilibrious groups in social networks
|
Li, Runzhi |
|
|
80 |
15 |
p. 22190-22212 |
artikel |
31 |
IoV security and privacy survey: issues, countermeasures, and challenges
|
Haddaji, Achref |
|
|
80 |
15 |
p. 23018-23082 |
artikel |
32 |
Las-yolo: a lightweight detection method based on YOLOv7 for small objects in airport surveillance
|
Zhou, Wentao |
|
|
80 |
15 |
p. 21764-21789 |
artikel |
33 |
MiniTomatoNet: a lightweight CNN for tomato leaf disease recognition on heterogeneous FPGA-SoC
|
Sanida, Theodora |
|
|
80 |
15 |
p. 21837-21866 |
artikel |
34 |
MOTORS: multi-objective task offloading and resource scheduling algorithm for heterogeneous fog-cloud computing scenario
|
Shukla, Prashant |
|
|
80 |
15 |
p. 22315-22361 |
artikel |
35 |
On a model-free meta-heuristic approach for unconstrained optimization
|
Xia, Wei |
|
|
80 |
15 |
p. 22548-22562 |
artikel |
36 |
Optimization of containerized application deployment in virtualized environments: a novel mathematical framework for resource-efficient and energy-aware server infrastructure
|
Rabieyan, Reza |
|
|
80 |
15 |
p. 22598-22630 |
artikel |
37 |
Palindromes in involutive Fibonacci arrays
|
Blasiyus, Hannah |
|
|
80 |
15 |
p. 22520-22547 |
artikel |
38 |
Performance evaluation of complex systems based on hierarchical evidential reasoning rule considering disturbances
|
Zhang, Yunyi |
|
|
80 |
15 |
p. 22124-22154 |
artikel |
39 |
Positioning and tracking with ODE-LSTM algorithm for emerging smart rail systems
|
Zhao, Xiao |
|
|
80 |
15 |
p. 21975-21995 |
artikel |
40 |
Privacy-preserving algorithm based on vulnerable nodes for social relationships
|
Shen, Jiawei |
|
|
80 |
15 |
p. 22654-22681 |
artikel |
41 |
Proteo: a framework for the generation and evaluation of malleable MPI applications
|
Martín-Álvarez, Iker |
|
|
80 |
15 |
p. 23083-23119 |
artikel |
42 |
Reliability analysis of complete cubic networks based on extra conditional fault
|
Lv, Mengjie |
|
|
80 |
15 |
p. 21952-21974 |
artikel |
43 |
RepEKShot: an evidential k-nearest neighbor classifier with repulsion loss for few-shot named entity recognition
|
Liu, Haitao |
|
|
80 |
15 |
p. 22069-22098 |
artikel |
44 |
Resource allocation for UAV-enabled multi-access edge computing
|
Falcão, Marcos |
|
|
80 |
15 |
p. 22770-22802 |
artikel |
45 |
SDESA: secure cloud computing with gradient deep belief network and congruential advanced encryption
|
Rani, Sheeja |
|
|
80 |
15 |
p. 23147-23176 |
artikel |
46 |
Securing the perceptual layer of E-payment-based internet of things devices using elliptic curve cryptography over binary field
|
Okediran, T. M. |
|
|
80 |
15 |
p. 21592-21614 |
artikel |
47 |
Semantic difference-based feature extraction technique for fake news detection
|
Gorai, Joy |
|
|
80 |
15 |
p. 22631-22653 |
artikel |
48 |
Sequential predictive maintenance and spare parts management with data mining methods: a case study in bus fleet
|
İfraz, Metin |
|
|
80 |
15 |
p. 22099-22123 |
artikel |
49 |
Spatiotemporal information complementary modeling and group relationship reasoning for group activity recognition
|
Deng, Haigang |
|
|
80 |
15 |
p. 21790-21810 |
artikel |
50 |
The h-faulty-block connectivity of alternating group graphs and split-star networks
|
Hua, Xiaohui |
|
|
80 |
15 |
p. 21996-22019 |
artikel |
51 |
Transforming future technology with quantum-based IoT
|
Khan, Habib Ullah |
|
|
80 |
15 |
p. 22362-22396 |
artikel |