Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             49 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT Zhang, Shiqiang

80 5 p. 6778-6808
artikel
2 A deep learning-based framework for road traffic prediction Benabdallah Benarmas, Redouane

80 5 p. 6891-6916
artikel
3 Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems Idrissi, Hind

80 5 p. 6622-6660
artikel
4 Allocating energy-objective aware workflow in distributed edge micro data centres Kadum, Muhanad Mohammed

80 5 p. 6486-6521
artikel
5 A multi-attribute-based data forwarding scheme for delay tolerant networks Abbas, Ali

80 5 p. 6356-6381
artikel
6 An approach for 2-tuple linguistic q-rung orthopair fuzzy MAGDM for the evaluation of historical sites with power Heronian mean Naz, Sumera

80 5 p. 6435-6485
artikel
7 An intelligent returned energy model of cell and grid using a gain sharing knowledge enhanced long short-term memory neural network Al-Janabi, Samaher

80 5 p. 5756-5814
artikel
8 A novel Jarratt butterfly Ebola optimization-based attentional random forest for data anonymization in cloud environment Bushra, S. Nikkath

80 5 p. 5950-5978
artikel
9 An ultra-dense and cost-efficient coplanar RAM cell design in quantum-dot cellular automata technology Patidar, Mukesh

80 5 p. 6989-7027
artikel
10 Application of Jaya algorithm for solving localization problem in a distributed Wireless Sensor Network Shilpi,

80 5 p. 6017-6041
artikel
11 A relation enhanced model for temporal knowledge graph alignment Wang, Zhaojun

80 5 p. 5733-5755
artikel
12 A transmission optimization method for MPI communications Wang, Jubin

80 5 p. 6240-6263
artikel
13 A unified test data volume compression scheme for circular scan architecture using hosted cuckoo optimization Shukla, Neeraj Kumar

80 5 p. 6411-6434
artikel
14 Automatic suppression of false positive alerts in anti-money laundering systems using machine learning Bakry, Ahmed N.

80 5 p. 6264-6284
artikel
15 Chord-based music generation using long short-term memory neural networks in the context of artificial intelligence Li, Fanfan

80 5 p. 6068-6092
artikel
16 Controller placement in SDN using game theory and a discrete hybrid metaheuristic algorithm Khojand, Mahnaz

80 5 p. 6552-6600
artikel
17 Correction to: Load balancing strategy for SDN multi-controller clusters based on load prediction Xiao, Junbi

80 5 p. 7120-7121
artikel
18 Dedicated hardware design for efficient quantum computations using classical logic gates Nedjah, Nadia

80 5 p. 7028-7070
artikel
19 Density peaks clustering algorithm with connected local density and punished relative distance Xiong, Jingwen

80 5 p. 6140-6168
artikel
20 Development of a smart tourism service system based on the Internet of Things and machine learning Ma, Hui

80 5 p. 6725-6745
artikel
21 Distributed homology-based algorithm for solving Set k-Cover problem in heterogeneous directional sensor networks Varposhti, Marzieh

80 5 p. 6946-6964
artikel
22 Distributed homology-based sensor selection and scheduling in wireless sensor networks Varposhti, Marzieh

80 5 p. 6601-6621
artikel
23 Efficient approaches for task offloading in point-of-interest based vehicular fog computing Sun, Yifei

80 5 p. 6285-6310
artikel
24 Electricity consumption modeling by a chaotic convolutional radial basis function network Garcia, Donaldo

80 5 p. 7102-7119
artikel
25 Energy-aware server placement in mobile edge computing using trees social relations optimization algorithm Asghari, Ali

80 5 p. 6382-6410
artikel
26 Enhancing computer-aided translation system with BiLSTM and convolutional neural network using a knowledge graph approach Xiang, Yueting

80 5 p. 5847-5869
artikel
27 Fine-grained bird image classification based on counterfactual method of vision transformer model Chen, Tianhua

80 5 p. 6221-6239
artikel
28 High-speed YOLOv4-tiny hardware accelerator for self-driving automotive Valadanzoj, Zahra

80 5 p. 6699-6724
artikel
29 IDPNet: a light-weight network and its variants for human pose estimation Liu, Huan

80 5 p. 6169-6191
artikel
30 Improving CUDA performance of an unstructured high-order CFD application under OP2 framework Huang, Kangjin

80 5 p. 5832-5846
artikel
31 Influence maximization (IM) in complex networks with limited visibility using statistical methods Ghafouri, Saeid

80 5 p. 6809-6854
artikel
32 Interplanetary file system and blockchain for secured smart grid networks Muthulakshmi, S.

80 5 p. 5900-5922
artikel
33 Linear structure index for network-constrained moving objects Wang, Qianqiu

80 5 p. 6192-6220
artikel
34 MOBRO: multi-objective battle royale optimizer Alp, Sait

80 5 p. 5979-6016
artikel
35 Multimodal medical image protection algorithm based on 3D-CICCM and Fresnel transform Chang, Rui-yun

80 5 p. 6042-6067
artikel
36 Multi objective dynamic task scheduling optimization algorithm based on deep reinforcement learning Cheng, Yuqing

80 5 p. 6917-6945
artikel
37 Nacc-Guard: a lightweight DNN accelerator architecture for secure deep learning Li, Peng

80 5 p. 5815-5831
artikel
38 NEAE: NeuroEvolution AutoEncoder for anomaly detection in internet traffic data Hashim, Ali Jameel

80 5 p. 6746-6777
artikel
39 Novel post-photographic technique based on deep convolutional neural network and blockchain technology Geng, Hongjie

80 5 p. 6119-6139
artikel
40 Personalized agricultural knowledge services: a framework for privacy-protected user portraits and efficient recommendation Wu, Huarui

80 5 p. 6336-6355
artikel
41 Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features Ullah, Inam

80 5 p. 5870-5899
artikel
42 Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain Huang, Yibo

80 5 p. 6661-6698
artikel
43 RMSRM: real-time monitoring-based self-reconfiguration mechanism in reconfigurable PE array Yang, Kun

80 5 p. 7071-7101
artikel
44 SMIGNN: social recommendation with multi-intention knowledge distillation based on graph neural network Niu, Yong

80 5 p. 6965-6988
artikel
45 Spatial-guided informative semantic joint transformer for single-image deraining Li, Haiyan

80 5 p. 6522-6551
artikel
46 TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments Gowda, Naveen Chandra

80 5 p. 6855-6890
artikel
47 TB-TBP: a task-based adaptive routing algorithm for network-on-chip in heterogenous CPU-GPU architectures Fang, Juan

80 5 p. 6311-6335
artikel
48 Tnseg: adversarial networks with multi-scale joint loss for thyroid nodule segmentation Ma, Xiaoxuan

80 5 p. 6093-6118
artikel
49 Unsupervised approach for an optimal representation of the latent space of a failure analysis dataset Rammal, Abbas

80 5 p. 5923-5949
artikel
                             49 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland