Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             50 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain-based privacy-preserving anti-collusion data auction mechanism with an off-chain approach Emami, Ashkan

80 6 p. 7507-7556
artikel
2 Advancements in scalability of blockchain infrastructure through IPFS and dual blockchain methodology Mahmud, Minhaz

80 6 p. 8383-8405
artikel
3 A graph attention network-based model for anomaly detection in multivariate time series Zhang, Wei

80 6 p. 8529-8549
artikel
4 A hybrid four-stage detection model to pre-identify the sustainable manufacturing process of Li-ion battery pack Chen, You-Shyang

80 6 p. 7624-7661
artikel
5 A hybrid framework for detection of autism using ConvNeXt-T and embedding clusters Kanwal, Ayesha

80 6 p. 8156-8178
artikel
6 An adaptive XGBoost-based optimized sliding window for concept drift handling in non-stationary spatiotemporal data streams classifications Angbera, Ature

80 6 p. 7781-7811
artikel
7 An effective link prediction method for industrial knowledge graphs by incorporating entity description and neighborhood structure information Shu, Yiming

80 6 p. 8297-8329
artikel
8 An efficient optimization algorithm for nonlinear 2D fractional optimal control problems Moradikashkooli, A.

80 6 p. 7906-7930
artikel
9 An energy-efficient task scheduling method for heterogeneous cloud computing systems using capuchin search and inverted ant colony optimization algorithm Rostami, Safdar

80 6 p. 7812-7848
artikel
10 A new decomposition transform method for solving nonlinear fractional logistic differential equation Khalouta, Ali

80 6 p. 8179-8201
artikel
11 A novel model for Sybil attack detection in online social network using optimal three-stream double attention network Antony, Blessy

80 6 p. 7433-7482
artikel
12 ARdetector: android ransomware detection framework Li, Dan

80 6 p. 7557-7584
artikel
13 A survey on IoT trust model frameworks Ferraris, Davide

80 6 p. 8259-8296
artikel
14 A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication Mittal, Shweta

80 6 p. 7955-7992
artikel
15 Attention-based variable-size feature compression module for edge inference Li, Shibao

80 6 p. 8469-8484
artikel
16 Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model Al Shahrani, Ali M.

80 6 p. 7849-7875
artikel
17 Chipping value prediction for dicing saw based on sparrow search algorithm and neural networks Shi, Jun

80 6 p. 7483-7506
artikel
18 Correction: K-means tree: an optimal clustering tree for unsupervised learning Tavallali, Pooya

80 6 p. 8551
artikel
19 Correction to: A trustworthy neural architecture search framework for pneumonia image classification utilizing blockchain technology Yang, Yi

80 6 p. 8550
artikel
20 Depression clinical detection model based on social media: a federated deep learning approach Liu, Yang

80 6 p. 7931-7954
artikel
21 Distributed independent vector machine for big data classification problems Almaspoor, Mohammad Hassan

80 6 p. 7207-7244
artikel
22 Entropy-driven differential privacy protection scheme based on social graphlet attributes Zhang, Jing

80 6 p. 7399-7432
artikel
23 Extracting gait and balance pattern features from skeleton data to diagnose attention deficit/hyperactivity disorder in children Rohani, Faezeh

80 6 p. 8330-8356
artikel
24 Frequency-domain characteristic analysis of PCNN Deng, Xiangyu

80 6 p. 8060-8093
artikel
25 GLNET: global–local CNN's-based informed model for detection of breast cancer categories from histopathological slides Khan, Saif Ur Rehman

80 6 p. 7316-7348
artikel
26 Heterogeneous ant colony algorithm based on selective evolution mechanism and game strategy Wu, Lisheng

80 6 p. 7171-7206
artikel
27 Highly efficient low-area gate-diffusion-input-based approximate full adders for image processing computing Roodbali, Khadijeh Moeini

80 6 p. 8129-8155
artikel
28 Hybrid booting with incremental hibernation for the baseboard management controllers Jang, Joonhyouk

80 6 p. 8485-8504
artikel
29 ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks Ali, Bakht Sher

80 6 p. 7876-7905
artikel
30 Integrating Healthcare 4.0 and WBAN: efficient redundancy reduction and adaptive packet scheduling using AR-DRL Gupta, Arti

80 6 p. 8406-8433
artikel
31 LBCNet: A lightweight bilateral cascaded feature fusion network for real-time semantic segmentation Song, Yuqin

80 6 p. 7293-7315
artikel
32 Malware detection for container runtime based on virtual machine introspection He, Xinfeng

80 6 p. 7245-7268
artikel
33 Multi-scale adaptive atrous graph convolution for point cloud analysis Wang, Xiaohong

80 6 p. 7147-7170
artikel
34 Online mode development of Korean art learning in the post-epidemic era based on artificial intelligence and deep learning Deng, Kaiyi

80 6 p. 8505-8528
artikel
35 Optimized fog community framework with advanced genetic algorithm for enhanced performance dynamics Verma, Nilesh Kumar

80 6 p. 8202-8235
artikel
36 PCP–ACO: a hybrid deadline-constrained workflow scheduling algorithm for cloud environment Shobeiri, Peyman

80 6 p. 7750-7780
artikel
37 PLEACH: a new heuristic algorithm for pure parsimony haplotyping problem Feizabadi, Reza

80 6 p. 8236-8258
artikel
38 Plus-profile energy harvested prediction and adaptive energy management for solar-powered wireless sensor networks Wang, Yuanxiang

80 6 p. 7585-7603
artikel
39 REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare Nikooghadam, Mahdi

80 6 p. 8434-8468
artikel
40 Research of ReLU output device in ternary optical computer based on parallel fully connected layer Song, Kai

80 6 p. 7269-7292
artikel
41 RI-RPL: a new high-quality RPL-based routing protocol using Q-learning algorithm Zahedy, Niloofar

80 6 p. 7691-7749
artikel
42 Rumor identification and diffusion impact analysis in real-time text stream using deep learning Singh, Tajinder

80 6 p. 7993-8037
artikel
43 ST-YOLOX: a lightweight and accurate object detection network based on Swin Transformer Han, Jingjing

80 6 p. 8038-8059
artikel
44 Terahertz video-based hidden object detection using YOLOv5m and mutation-enabled salp swarm algorithm for enhanced accuracy and faster recognition Jayachitra, J.

80 6 p. 8357-8382
artikel
45 The use of fuzzy authentication integrated with convolutional neural networks in digital content protection Wang, Junfeng

80 6 p. 7123-7146
artikel
46 Three-phases hybrid feature selection for facial expression recognition Sidhom, Ones

80 6 p. 8094-8128
artikel
47 Transformer oil leakage detection with sampling-WIoU module Wang, Chenghao

80 6 p. 7349-7368
artikel
48 Triple-channel graph attention network for improving aspect-level sentiment analysis Zhu, Chao

80 6 p. 7604-7623
artikel
49 Using personalized next session to improve session-based recommender systems Chen, Yen-Liang

80 6 p. 7369-7398
artikel
50 Variational auto encoder fused with Gaussian process for unsupervised anomaly detection Guan, Yaonan

80 6 p. 7662-7690
artikel
                             50 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland