nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT
|
Zhang, Shiqiang |
|
|
80 |
5 |
p. 6778-6808 |
artikel |
2 |
A deep learning-based framework for road traffic prediction
|
Benabdallah Benarmas, Redouane |
|
|
80 |
5 |
p. 6891-6916 |
artikel |
3 |
Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems
|
Idrissi, Hind |
|
|
80 |
5 |
p. 6622-6660 |
artikel |
4 |
Allocating energy-objective aware workflow in distributed edge micro data centres
|
Kadum, Muhanad Mohammed |
|
|
80 |
5 |
p. 6486-6521 |
artikel |
5 |
A multi-attribute-based data forwarding scheme for delay tolerant networks
|
Abbas, Ali |
|
|
80 |
5 |
p. 6356-6381 |
artikel |
6 |
An approach for 2-tuple linguistic q-rung orthopair fuzzy MAGDM for the evaluation of historical sites with power Heronian mean
|
Naz, Sumera |
|
|
80 |
5 |
p. 6435-6485 |
artikel |
7 |
An intelligent returned energy model of cell and grid using a gain sharing knowledge enhanced long short-term memory neural network
|
Al-Janabi, Samaher |
|
|
80 |
5 |
p. 5756-5814 |
artikel |
8 |
A novel Jarratt butterfly Ebola optimization-based attentional random forest for data anonymization in cloud environment
|
Bushra, S. Nikkath |
|
|
80 |
5 |
p. 5950-5978 |
artikel |
9 |
An ultra-dense and cost-efficient coplanar RAM cell design in quantum-dot cellular automata technology
|
Patidar, Mukesh |
|
|
80 |
5 |
p. 6989-7027 |
artikel |
10 |
Application of Jaya algorithm for solving localization problem in a distributed Wireless Sensor Network
|
Shilpi, |
|
|
80 |
5 |
p. 6017-6041 |
artikel |
11 |
A relation enhanced model for temporal knowledge graph alignment
|
Wang, Zhaojun |
|
|
80 |
5 |
p. 5733-5755 |
artikel |
12 |
A transmission optimization method for MPI communications
|
Wang, Jubin |
|
|
80 |
5 |
p. 6240-6263 |
artikel |
13 |
A unified test data volume compression scheme for circular scan architecture using hosted cuckoo optimization
|
Shukla, Neeraj Kumar |
|
|
80 |
5 |
p. 6411-6434 |
artikel |
14 |
Automatic suppression of false positive alerts in anti-money laundering systems using machine learning
|
Bakry, Ahmed N. |
|
|
80 |
5 |
p. 6264-6284 |
artikel |
15 |
Chord-based music generation using long short-term memory neural networks in the context of artificial intelligence
|
Li, Fanfan |
|
|
80 |
5 |
p. 6068-6092 |
artikel |
16 |
Controller placement in SDN using game theory and a discrete hybrid metaheuristic algorithm
|
Khojand, Mahnaz |
|
|
80 |
5 |
p. 6552-6600 |
artikel |
17 |
Correction to: Load balancing strategy for SDN multi-controller clusters based on load prediction
|
Xiao, Junbi |
|
|
80 |
5 |
p. 7120-7121 |
artikel |
18 |
Dedicated hardware design for efficient quantum computations using classical logic gates
|
Nedjah, Nadia |
|
|
80 |
5 |
p. 7028-7070 |
artikel |
19 |
Density peaks clustering algorithm with connected local density and punished relative distance
|
Xiong, Jingwen |
|
|
80 |
5 |
p. 6140-6168 |
artikel |
20 |
Development of a smart tourism service system based on the Internet of Things and machine learning
|
Ma, Hui |
|
|
80 |
5 |
p. 6725-6745 |
artikel |
21 |
Distributed homology-based algorithm for solving Set k-Cover problem in heterogeneous directional sensor networks
|
Varposhti, Marzieh |
|
|
80 |
5 |
p. 6946-6964 |
artikel |
22 |
Distributed homology-based sensor selection and scheduling in wireless sensor networks
|
Varposhti, Marzieh |
|
|
80 |
5 |
p. 6601-6621 |
artikel |
23 |
Efficient approaches for task offloading in point-of-interest based vehicular fog computing
|
Sun, Yifei |
|
|
80 |
5 |
p. 6285-6310 |
artikel |
24 |
Electricity consumption modeling by a chaotic convolutional radial basis function network
|
Garcia, Donaldo |
|
|
80 |
5 |
p. 7102-7119 |
artikel |
25 |
Energy-aware server placement in mobile edge computing using trees social relations optimization algorithm
|
Asghari, Ali |
|
|
80 |
5 |
p. 6382-6410 |
artikel |
26 |
Enhancing computer-aided translation system with BiLSTM and convolutional neural network using a knowledge graph approach
|
Xiang, Yueting |
|
|
80 |
5 |
p. 5847-5869 |
artikel |
27 |
Fine-grained bird image classification based on counterfactual method of vision transformer model
|
Chen, Tianhua |
|
|
80 |
5 |
p. 6221-6239 |
artikel |
28 |
High-speed YOLOv4-tiny hardware accelerator for self-driving automotive
|
Valadanzoj, Zahra |
|
|
80 |
5 |
p. 6699-6724 |
artikel |
29 |
IDPNet: a light-weight network and its variants for human pose estimation
|
Liu, Huan |
|
|
80 |
5 |
p. 6169-6191 |
artikel |
30 |
Improving CUDA performance of an unstructured high-order CFD application under OP2 framework
|
Huang, Kangjin |
|
|
80 |
5 |
p. 5832-5846 |
artikel |
31 |
Influence maximization (IM) in complex networks with limited visibility using statistical methods
|
Ghafouri, Saeid |
|
|
80 |
5 |
p. 6809-6854 |
artikel |
32 |
Interplanetary file system and blockchain for secured smart grid networks
|
Muthulakshmi, S. |
|
|
80 |
5 |
p. 5900-5922 |
artikel |
33 |
Linear structure index for network-constrained moving objects
|
Wang, Qianqiu |
|
|
80 |
5 |
p. 6192-6220 |
artikel |
34 |
MOBRO: multi-objective battle royale optimizer
|
Alp, Sait |
|
|
80 |
5 |
p. 5979-6016 |
artikel |
35 |
Multimodal medical image protection algorithm based on 3D-CICCM and Fresnel transform
|
Chang, Rui-yun |
|
|
80 |
5 |
p. 6042-6067 |
artikel |
36 |
Multi objective dynamic task scheduling optimization algorithm based on deep reinforcement learning
|
Cheng, Yuqing |
|
|
80 |
5 |
p. 6917-6945 |
artikel |
37 |
Nacc-Guard: a lightweight DNN accelerator architecture for secure deep learning
|
Li, Peng |
|
|
80 |
5 |
p. 5815-5831 |
artikel |
38 |
NEAE: NeuroEvolution AutoEncoder for anomaly detection in internet traffic data
|
Hashim, Ali Jameel |
|
|
80 |
5 |
p. 6746-6777 |
artikel |
39 |
Novel post-photographic technique based on deep convolutional neural network and blockchain technology
|
Geng, Hongjie |
|
|
80 |
5 |
p. 6119-6139 |
artikel |
40 |
Personalized agricultural knowledge services: a framework for privacy-protected user portraits and efficient recommendation
|
Wu, Huarui |
|
|
80 |
5 |
p. 6336-6355 |
artikel |
41 |
Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features
|
Ullah, Inam |
|
|
80 |
5 |
p. 5870-5899 |
artikel |
42 |
Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain
|
Huang, Yibo |
|
|
80 |
5 |
p. 6661-6698 |
artikel |
43 |
RMSRM: real-time monitoring-based self-reconfiguration mechanism in reconfigurable PE array
|
Yang, Kun |
|
|
80 |
5 |
p. 7071-7101 |
artikel |
44 |
SMIGNN: social recommendation with multi-intention knowledge distillation based on graph neural network
|
Niu, Yong |
|
|
80 |
5 |
p. 6965-6988 |
artikel |
45 |
Spatial-guided informative semantic joint transformer for single-image deraining
|
Li, Haiyan |
|
|
80 |
5 |
p. 6522-6551 |
artikel |
46 |
TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments
|
Gowda, Naveen Chandra |
|
|
80 |
5 |
p. 6855-6890 |
artikel |
47 |
TB-TBP: a task-based adaptive routing algorithm for network-on-chip in heterogenous CPU-GPU architectures
|
Fang, Juan |
|
|
80 |
5 |
p. 6311-6335 |
artikel |
48 |
Tnseg: adversarial networks with multi-scale joint loss for thyroid nodule segmentation
|
Ma, Xiaoxuan |
|
|
80 |
5 |
p. 6093-6118 |
artikel |
49 |
Unsupervised approach for an optimal representation of the latent space of a failure analysis dataset
|
Rammal, Abbas |
|
|
80 |
5 |
p. 5923-5949 |
artikel |