nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A centralized delay-sensitive hierarchical computation offloading in fog radio access networks
|
Taheri, Samira |
|
|
80 |
19 |
p. 26831-26864 |
artikel |
2 |
A cloud computing approach to superscale colored traveling salesman problems
|
Lin, Zhicheng |
|
|
80 |
19 |
p. 27340-27369 |
artikel |
3 |
A container optimal matching deployment algorithm based on CN-Graph for mobile edge computing
|
Rao, Huanle |
|
|
80 |
19 |
p. 27147-27175 |
artikel |
4 |
A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks
|
Ayad, Aya G. |
|
|
80 |
19 |
p. 26942-26984 |
artikel |
5 |
A multi-objective approach for optimizing IoT applications offloading in fog–cloud environments with NSGA-II
|
Mokni, Ibtissem |
|
|
80 |
19 |
p. 27034-27072 |
artikel |
6 |
An energy-temperature aware routing protocol in wireless body area network: a fuzzy-based approach
|
Hedayati, Sedighe |
|
|
80 |
19 |
p. 27303-27339 |
artikel |
7 |
An integrated CRITIC-MABAC model under 2-tuple linguistic cubic q-rung orthopair fuzzy information with advanced aggregation operators, designed for multiple attribute group decision-making
|
Naz, Sumera |
|
|
80 |
19 |
p. 27244-27302 |
artikel |
8 |
Approximating neural distinguishers using differential-linear imbalance
|
Lv, Guangqiu |
|
|
80 |
19 |
p. 26865-26889 |
artikel |
9 |
A quadratic regression model to quantify certain latest corona treatment drug molecules based on coindices of M-polynomial
|
Zaman, Shahid |
|
|
80 |
19 |
p. 26805-26830 |
artikel |
10 |
A secure VM live migration technique in a cloud computing environment using blowfish and blockchain technology
|
Gupta, Ambika |
|
|
80 |
19 |
p. 27370-27393 |
artikel |
11 |
A sentiment-guided session-aware recommender system
|
Khurana, Purnima |
|
|
80 |
19 |
p. 27204-27243 |
artikel |
12 |
Blockchain-based cross-domain authentication in a multi-domain Internet of drones environment
|
Karmegam, Arivarasan |
|
|
80 |
19 |
p. 27095-27122 |
artikel |
13 |
Data integration from traditional to big data: main features and comparisons of ETL approaches
|
Walha, Afef |
|
|
80 |
19 |
p. 26687-26725 |
artikel |
14 |
End-to-end probability analysis method for multi-core distributed systems
|
Shi, Xianchen |
|
|
80 |
19 |
p. 26751-26775 |
artikel |
15 |
Fast and isolation guaranteed coflow scheduling via traffic forecasting in multi-tenant environment
|
Li, Chenghao |
|
|
80 |
19 |
p. 26726-26750 |
artikel |
16 |
Graph neural network-based attention mechanism to classify spam review over heterogeneous social networks
|
Pal, Monti Babulal |
|
|
80 |
19 |
p. 27176-27203 |
artikel |
17 |
Multi-objective application placement in fog computing using graph neural network-based reinforcement learning
|
Lera, Isaac |
|
|
80 |
19 |
p. 27073-27094 |
artikel |
18 |
NM-polynomial-based topological indices and graph entropies of porphyrazine
|
Khalid, Asma |
|
|
80 |
19 |
p. 27011-27033 |
artikel |
19 |
Noise-tolerant NMF-based parallel algorithm for respiratory rate estimation
|
Revuelta-Sanz, Pablo |
|
|
80 |
19 |
p. 26922-26941 |
artikel |
20 |
Real-time microexpression recognition in educational scenarios using a dual-branch continuous attention network
|
Lv, Yan |
|
|
80 |
19 |
p. 27123-27146 |
artikel |
21 |
Sensor node localization using nature-inspired algorithms with fuzzy logic in WSNs
|
Shilpi, |
|
|
80 |
19 |
p. 26776-26804 |
artikel |
22 |
Single-sample face and ear recognition using virtual sample generation with 2D local patches
|
Tomar, Vivek |
|
|
80 |
19 |
p. 26985-27010 |
artikel |
23 |
Unequal-radius clustering in WSN-based IoT networks: energy optimization and load balancing in UDCOPA protocol
|
Mir, Foudil |
|
|
80 |
19 |
p. 26890-26921 |
artikel |