nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cloud-fog distributed trust service for wireless sensor networks
|
Ali, Bader A. |
|
|
80 |
16 |
p. 24578-24604 |
artikel |
2 |
Adaptive PUF design to authenticate and evaluate heterogeneous IPs in edge computing
|
Hemavathy, S. |
|
|
80 |
16 |
p. 24689-24717 |
artikel |
3 |
A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification
|
Zeshan, Furkh |
|
|
80 |
16 |
p. 23311-23356 |
artikel |
4 |
A hybrid neural network for urban rail transit short-term flow prediction
|
Zhu, Caihua |
|
|
80 |
16 |
p. 24297-24323 |
artikel |
5 |
A mini I2C bus interface circuit design and its VLSI implementation
|
Huang, Caixia |
|
|
80 |
16 |
p. 23794-23814 |
artikel |
6 |
An adaptive service deployment algorithm for cloud-edge collaborative system based on speedup weights
|
Hu, Zhichao |
|
|
80 |
16 |
p. 23177-23204 |
artikel |
7 |
Analysis of blockchain system based on BMAP/PH[b]/1 queueing model
|
Chakravarthy, Srinivas R. |
|
|
80 |
16 |
p. 23815-23847 |
artikel |
8 |
A network intrusion detection system based on deep learning in the IoT
|
Wang, Xiao |
|
|
80 |
16 |
p. 24520-24558 |
artikel |
9 |
A new integrated steganography scheme for quantum color images
|
Dong, Yumin |
|
|
80 |
16 |
p. 24758-24780 |
artikel |
10 |
APPAs: fast and efficient approximate parallel prefix adders and multipliers
|
Rashidi, Bahram |
|
|
80 |
16 |
p. 24269-24296 |
artikel |
11 |
A resource optimization scheduling model and algorithm for heterogeneous computing clusters based on GNN and RL
|
Zhang, Zhen |
|
|
80 |
16 |
p. 24138-24172 |
artikel |
12 |
A robust two-step algorithm for community detection based on node similarity
|
Lounnas, Bilal |
|
|
80 |
16 |
p. 23592-23608 |
artikel |
13 |
A taxonomy of unsupervised feature selection methods including their pros, cons, and challenges
|
Dwivedi, Rajesh |
|
|
80 |
16 |
p. 24212-24240 |
artikel |
14 |
Centrality-based and similarity-based neighborhood extension in graph neural networks
|
Zohrabi, Mohammadjavad |
|
|
80 |
16 |
p. 24638-24663 |
artikel |
15 |
Community detection based on influential nodes in dynamic networks
|
Kherad, Mahdi |
|
|
80 |
16 |
p. 24664-24688 |
artikel |
16 |
Comprehensive analysis on the existence and uniqueness of solutions for fractional q-integro-differential equations
|
Alaofi, Zaki Mrzog |
|
|
80 |
16 |
p. 23848-23866 |
artikel |
17 |
Convolutional neural network (CNN) and federated learning-based privacy preserving approach for skin disease classification
|
Divya, |
|
|
80 |
16 |
p. 24559-24577 |
artikel |
18 |
Correction: High-performance visual geometric group deep learning architectures for MRI brain tumor classification
|
Veni, N. |
|
|
80 |
16 |
p. 24801 |
artikel |
19 |
Cost-effective clonal selection and AIS-based load balancing in cloud computing environment
|
Mosayebi, Melika |
|
|
80 |
16 |
p. 23271-23310 |
artikel |
20 |
DEKGCI: A double-ended recommendation model for integrating knowledge graph and user–item interaction graph
|
Yang, Yajing |
|
|
80 |
16 |
p. 24781-24800 |
artikel |
21 |
Deriving change-prone thresholds from software evolution using ROC curves
|
Shatnawi, Raed |
|
|
80 |
16 |
p. 23565-23591 |
artikel |
22 |
Dynamic service provisioning in heterogeneous fog computing architecture using deep reinforcement learning
|
Alizadeh Govarchinghaleh, Yaghoub |
|
|
80 |
16 |
p. 23867-23910 |
artikel |
23 |
Efficient MST-based clustering with leader node selection and outlier edge cutting
|
Yao, Yuzhuo |
|
|
80 |
16 |
p. 24358-24378 |
artikel |
24 |
ERR-UWSN: energy-efficient and reliable routing for void hole mitigation in underwater wireless sensor networks
|
Mahmoudabadi, Mojtaba Ahmadian |
|
|
80 |
16 |
p. 24026-24050 |
artikel |
25 |
Exploring recent advances in random grid visual cryptography algorithms
|
Francis, Neetha |
|
|
80 |
16 |
p. 23205-23224 |
artikel |
26 |
Exploring the potential of Wav2vec 2.0 for speech emotion recognition using classifier combination and attention-based feature fusion
|
Nasersharif, Babak |
|
|
80 |
16 |
p. 23667-23688 |
artikel |
27 |
Flattened and simplified SSCU-Net: exploring the convolution potential for medical image segmentation
|
Wang, Yuefei |
|
|
80 |
16 |
p. 23471-23518 |
artikel |
28 |
Fountain code-based multipath reliable transmission scheme with RNN-assisted predictive feedback
|
Liu, Jianhang |
|
|
80 |
16 |
p. 23519-23543 |
artikel |
29 |
Hardware architecture and memristor-crossbar implementation of type-2 fuzzy system with type reduction and in-situ training
|
Haghzad Klidbary, Sajad |
|
|
80 |
16 |
p. 24079-24105 |
artikel |
30 |
Hybrid similarity measure-based image indexing and Gradient Ladybug Beetle optimization for retrieval of brain tumor using MRI
|
Sudhish, Dhanya K. |
|
|
80 |
16 |
p. 24051-24078 |
artikel |
31 |
Hyper star structure fault tolerance of half hypercube
|
Yang, Lulu |
|
|
80 |
16 |
p. 23609-23627 |
artikel |
32 |
Improved V-detector algorithm based on bagging for earthquake prediction with faults
|
Peng, Lu |
|
|
80 |
16 |
p. 24605-24637 |
artikel |
33 |
LATA: learning automata-based task assignment on heterogeneous cloud computing platform
|
Gheisari, Soulmaz |
|
|
80 |
16 |
p. 24106-24137 |
artikel |
34 |
Link fault tolerability of 3-ary n-cube based on g-good-neighbor r-component edge-connectivity
|
Zhang, Qifan |
|
|
80 |
16 |
p. 24738-24757 |
artikel |
35 |
Machine learning-driven performance assessment of network-on-chip architectures
|
Patra, Ramapati |
|
|
80 |
16 |
p. 24483-24519 |
artikel |
36 |
Many-objective evolutionary algorithm with multi-strategy selection mechanism and adaptive reproduction operation
|
Li, Wei |
|
|
80 |
16 |
p. 24435-24482 |
artikel |
37 |
Mscnet: Mask stepwise calibration network for camouflaged object detection
|
Du, Haishun |
|
|
80 |
16 |
p. 24718-24737 |
artikel |
38 |
MTDB: an LSM-tree-based key-value store using a multi-tree structure to improve read performance
|
Lin, Xinwei |
|
|
80 |
16 |
p. 23995-24025 |
artikel |
39 |
Multimodal heterogeneous graph entity-level fusion for named entity recognition with multi-granularity visual guidance
|
Gong, Yunchao |
|
|
80 |
16 |
p. 23767-23793 |
artikel |
40 |
Natural noise management in collaborative recommender systems over time-related information
|
Baldán, Francisco J. |
|
|
80 |
16 |
p. 23628-23666 |
artikel |
41 |
On the continuous probability distribution attribute weight of belief rule base model
|
Zhang, Yunyi |
|
|
80 |
16 |
p. 23225-23270 |
artikel |
42 |
Optimizing U-Net CNN performance: a comparative study of noise filtering techniques for enhanced thermal image analysis
|
Hoorfar, Hamid |
|
|
80 |
16 |
p. 23384-23406 |
artikel |
43 |
Parallel implementation of discrete cosine transform and its inverse for image compression applications
|
Mukherjee, Debasish |
|
|
80 |
16 |
p. 23712-23735 |
artikel |
44 |
Performance evaluation of Cuttlefish optimization-based contention control in Wireless Rechargeable Sensor Network
|
Susan, T. Siron Anita |
|
|
80 |
16 |
p. 24241-24268 |
artikel |
45 |
Research on satellite link allocation algorithm for Earth-Moon space information network
|
Ren, Weiwu |
|
|
80 |
16 |
p. 23689-23711 |
artikel |
46 |
Reserve policy-aware VM positioning based on prediction in multi-cloud environment
|
Kholdi, Elahe |
|
|
80 |
16 |
p. 23736-23766 |
artikel |
47 |
Retraction Note: An improved secure file deduplication avoidance using CKHO based deep learning model in a cloud environment
|
Mageshkumar, N. |
|
|
80 |
16 |
p. 24804 |
artikel |
48 |
Retraction Note: A novel IoT–fog–cloud-based healthcare system for monitoring and predicting COVID-19 outspread
|
Ahanger, Tariq Ahamed |
|
|
80 |
16 |
p. 24802 |
artikel |
49 |
Retraction Note: Construction of feature analysis model for demeanor evidence investigation based on data mining algorithm
|
Zhang, Mengxing |
|
|
80 |
16 |
p. 24805 |
artikel |
50 |
Retraction Note: FRHO: Fuzzy rule-based hybrid optimization for optimal cluster head selection and enhancing quality of service in wireless sensor network
|
Hemavathi, S. |
|
|
80 |
16 |
p. 24803 |
artikel |
51 |
Secure query processing for smart grid data using searchable symmetric encryption
|
Souror, Samia |
|
|
80 |
16 |
p. 24173-24211 |
artikel |
52 |
Spanning k-trees and distance spectral radius in graphs
|
Zhou, Sizhong |
|
|
80 |
16 |
p. 23357-23366 |
artikel |
53 |
Ssd-kdgan: a lightweight SSD target detection method based on knowledge distillation and generative adversarial networks
|
Wang, Huilin |
|
|
80 |
16 |
p. 23544-23564 |
artikel |
54 |
Subgraph matching-based reference placement for printed circuit board designs
|
Zhu, Ziran |
|
|
80 |
16 |
p. 24324-24357 |
artikel |
55 |
Sustainable edge computing with mobile crowd computing: a proof-of-concept with a smart HVAC use case
|
Pramanik, Pijush Kanti Dutta |
|
|
80 |
16 |
p. 23911-23994 |
artikel |
56 |
Temporal patterns decomposition and Legendre projection for long-term time series forecasting
|
Liu, Jianxin |
|
|
80 |
16 |
p. 23407-23441 |
artikel |
57 |
The dynamic analysis, FPGA implementation, and adaptive synchronization control application of a multi‐vortex chaotic system based on nonlinear functions
|
Zhang, Jie |
|
|
80 |
16 |
p. 24379-24412 |
artikel |
58 |
The super edge-connectivity of direct product of a graph and a cycle
|
Guo, Sijia |
|
|
80 |
16 |
p. 23367-23383 |
artikel |
59 |
Traffic flow prediction with multi-feature spatio-temporal coupling based on peak time embedding
|
Wei, Siwei |
|
|
80 |
16 |
p. 23442-23470 |
artikel |
60 |
YOLO-based microglia activation state detection
|
Liu, Jichi |
|
|
80 |
16 |
p. 24413-24434 |
artikel |