Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             51 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A big graph clustering method to support parallel processing by perceiving graph’s application algorithm semantics Cheng, Tengteng

80 2 p. 2838-2861
artikel
2 Active learning-based hyperspectral image classification: a reinforcement learning approach Patel, Usha

80 2 p. 2461-2486
artikel
3 A deep learning-enabled IoT framework for early hypoxia detection in aqua water using light weight spatially shared attention-LSTM network Arepalli, Peda Gopi

80 2 p. 2718-2747
artikel
4 A fast nondominated sorting-based MOEA with convergence and diversity adjusted adaptively Gao, Xiaoxin

80 2 p. 1426-1463
artikel
5 An efficient distributed and secure algorithm for transaction confirmation in IOTA using cloud computing Alavizadeh, Alavieh Sadat

80 2 p. 1491-1521
artikel
6 An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments Meshram, Chandrashekhar

80 2 p. 2514-2537
artikel
7 A neural gas network-based scheme for SDN many-field packet classification Ghasemi, Bahar

80 2 p. 2601-2632
artikel
8 An integrative extraction approach for index-tracking portfolio construction and forecasting under a deep learning framework Wang, Yu-Ju

80 2 p. 2047-2066
artikel
9 A novel evolutionary approach-based multimodal model to detect fake news in OSNs using text and metadata Uppada, Santosh Kumar

80 2 p. 1522-1553
artikel
10 A novel light GBM-optimized long short-term memory for enhancing quality and security in web service recommendation system Sivanandam, Chakaravarthi

80 2 p. 2428-2460
artikel
11 A novel malware detection method based on API embedding and API parameters Zhou, Bo

80 2 p. 2748-2766
artikel
12 A novel routing protocol for stable route selection in IoT networks Darabkh, Khalid A.

80 2 p. 2572-2600
artikel
13 A robust MRI-based brain tumor classification via a hybrid deep learning technique Nassar, Shaimaa E.

80 2 p. 2403-2427
artikel
14 A stochastic multi-objective optimization method for railways scheduling: a NSGA-II-based hybrid approach Seifpour, Massoud

80 2 p. 2128-2163
artikel
15 A trustworthy neural architecture search framework for pneumonia image classification utilizing blockchain technology Yang, Yi

80 2 p. 1694-1727
artikel
16 Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems Nasr Esfahani, Maryam

80 2 p. 2067-2127
artikel
17 Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM) Mathivanan, P.

80 2 p. 2164-2195
artikel
18 Computer-aided diagnostic model for retinal vascular diseases using graph-based attention mechanism Sivapriya, G.

80 2 p. 2862-2888
artikel
19 Concentration phenomenon about h-extra edge-connectivity of the n-th cartesian product of complete graph K4 with large-scale faulty links Tian, Zhaoxia

80 2 p. 1640-1667
artikel
20 Constructing edge-disjoint spanning trees in several cube-based networks with applications to edge fault-tolerant communication Zhang, Huanwen

80 2 p. 1907-1934
artikel
21 Correction to: A CNN-BiLSTM model with attention mechanism for earthquake prediction Kavianpour, Parisa

80 2 p. 2913
artikel
22 Correction to: Future trends of path planning framework considering accident attributes for smart cities Singh, Raushan Kumar

80 2 p. 2912
artikel
23 Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures Rostampour, Samad

80 2 p. 2914-2915
artikel
24 Design and implementation of carry-save adder using quantum-dot cellular automata Amiri, Melika

80 2 p. 1554-1567
artikel
25 Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network Rani, Divya

80 2 p. 2681-2717
artikel
26 DG-means: a superior greedy algorithm for clustering distributed data Haraty, Ramzi A.

80 2 p. 1990-2024
artikel
27 Disruption mitigation in the semiconductors supply chain by using public blockchains Magdy, Mirna

80 2 p. 1852-1906
artikel
28 Dual BiGRU-CNN-based sentiment classification method combining global and local attention Wang, Youwei

80 2 p. 2799-2837
artikel
29 Dual graph neural network for overlapping community detection Li, Xiaohong

80 2 p. 2196-2222
artikel
30 Efficient facial expression recognition framework based on edge computing Aikyn, Nartay

80 2 p. 1935-1972
artikel
31 Evolutionary reinforcement learning algorithm for large-scale multi-agent cooperation and confrontation applications Liu, Haiying

80 2 p. 2319-2346
artikel
32 Fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple errors detection Rashidi, Bahram

80 2 p. 1464-1490
artikel
33 Feed-forward ANN and traditional machine learning-based prediction of biogas generation rate from meteorological and organic waste parameters Singh, Tinka

80 2 p. 2538-2571
artikel
34 MFCINet: multi-level feature and context information fusion network for RGB-D salient object detection Xia, Chenxing

80 2 p. 2487-2513
artikel
35 Mobile crowd computing: potential, architecture, requirements, challenges, and applications Pramanik, Pijush Kanti Dutta

80 2 p. 2223-2318
artikel
36 Novel area-efficient and flexible architectures for optimal Ate pairing on FPGA Azzouzi, Oussama

80 2 p. 2633-2659
artikel
37 NRWalk2Vec-HIN: spammer group detection based on heterogeneous information network embedding over social media Mewada, Arvind

80 2 p. 1818-1851
artikel
38 OpenMP offloading data transfer optimization for DCUs Guo, Hengliang

80 2 p. 2381-2402
artikel
39 Optimization of K-means clustering method using hybrid capuchin search algorithm Qtaish, Amjad

80 2 p. 1728-1787
artikel
40 Optimized convolutional neural network for the classification of lung cancer Paikaray, Divya

80 2 p. 1973-1989
artikel
41 OptiSembleForecasting: optimization-based ensemble forecasting using MCS algorithm and PCA-based error index Yeasin, Md.

80 2 p. 1568-1597
artikel
42 Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networks Kamboj, Anil Kumar

80 2 p. 2660-2680
artikel
43 Research streams and open challenges in the metaverse Carrión, Carmen

80 2 p. 1598-1639
artikel
44 RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing Qi, Lijun

80 2 p. 2767-2798
artikel
45 Scalable short-entry dual-grain coherence directories with flexible region granularity Tang, Yuxin

80 2 p. 2889-2911
artikel
46 Semantic segmentation of satellite images for crop type identification in smallholder farms Buttar, Preetpal Kaur

80 2 p. 1367-1395
artikel
47 SlowTrack: detecting slow rate Denial of Service attacks against HTTP with behavioral parameters Sood, Shaurya

80 2 p. 1788-1817
artikel
48 Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing Zhonghua, Chen

80 2 p. 1396-1425
artikel
49 Unified automated deep learning framework for segmentation and classification of liver tumors Saumiya, S.

80 2 p. 2347-2380
artikel
50 Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures Rostampour, Samad

80 2 p. 1668-1693
artikel
51 YOLO-SG: Small traffic signs detection method in complex scene Han, Yanjiang

80 2 p. 2025-2046
artikel
                             51 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland