nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A binary bat algorithm with improved crossover operators and Cauchy mutation for unit commitment problem
|
Pang, Aokang |
|
|
80 |
8 |
p. 11261-11292 |
artikel |
2 |
A Boolean circuit-based revocable ciphertext policy attribute-based encryption scheme
|
Ma, Chao |
|
|
80 |
8 |
p. 11762-11797 |
artikel |
3 |
A cross-layered cluster embedding learning network with regularization for multivariate time series anomaly detection
|
Long, Jing |
|
|
80 |
8 |
p. 10444-10468 |
artikel |
4 |
A deep learning and transfer learning model for intra-change detection in images
|
Thirumurthy, Bagyammal |
|
|
80 |
8 |
p. 11640-11660 |
artikel |
5 |
Advancing medical data classification through federated learning and blockchain incentive mechanism: implications for modern software systems and applications
|
Yu, Haifeng |
|
|
80 |
8 |
p. 10469-10484 |
artikel |
6 |
A fast and energy-efficient hybrid 4–2 compressor for multiplication in nanotechnology
|
Maleknejad, Mojtaba |
|
|
80 |
8 |
p. 11066-11088 |
artikel |
7 |
AMEA-YOLO: a lightweight remote sensing vehicle detection algorithm based on attention mechanism and efficient architecture
|
Wang, Shou-Bin |
|
|
80 |
8 |
p. 11241-11260 |
artikel |
8 |
A modular approach to build a hardware testbed for cloud resource management research
|
Pons, Lucia |
|
|
80 |
8 |
p. 10552-10583 |
artikel |
9 |
An efficient meta-heuristic algorithm based on water flow optimizer for data clustering
|
Sahoo, Ramesh Chandra |
|
|
80 |
8 |
p. 10301-10326 |
artikel |
10 |
An intelligent real-time workloads allocation in IoT-fog networks
|
Sadeghzadeh, Mohammad |
|
|
80 |
8 |
p. 11191-11213 |
artikel |
11 |
A novel health state prediction approach based on artificial intelligence combination strategy for compensation capacitors in track circuit
|
Wang, Conghui |
|
|
80 |
8 |
p. 11661-11681 |
artikel |
12 |
A novel time series forecasting model for capacity degradation path prediction of lithium-ion battery pack
|
Chen, Xiang |
|
|
80 |
8 |
p. 10959-10984 |
artikel |
13 |
A parallel feature selection method based on NMI-XGBoost and distance correlation for typhoon trajectory prediction
|
Qiao, Baiyou |
|
|
80 |
8 |
p. 11293-11321 |
artikel |
14 |
A performance assessment method for urban rail transit last train network based on percolation theory
|
Zhu, Tianlei |
|
|
80 |
8 |
p. 11474-11490 |
artikel |
15 |
A pricing strategy for federated learning in UAV-enabled MEC
|
Song, Mingyang |
|
|
80 |
8 |
p. 10584-10609 |
artikel |
16 |
A privacy-preserved IoMT-based mental stress detection framework with federated learning
|
Alahmadi, Abdulrahman |
|
|
80 |
8 |
p. 10255-10274 |
artikel |
17 |
Boosting HPC data analysis performance with the ParSoDA-Py library
|
Belcastro, Loris |
|
|
80 |
8 |
p. 11741-11761 |
artikel |
18 |
Collaborative framework for UAVs-assisted mobile edge computing: a proximity policy optimization approach
|
Du, Ruizhong |
|
|
80 |
8 |
p. 10485-10510 |
artikel |
19 |
Computing offloading and resource scheduling based on DDPG in ultra-dense edge computing networks
|
Du, Ruizhong |
|
|
80 |
8 |
p. 10275-10300 |
artikel |
20 |
Correction to: Simulation-based uprighting of a capsized ship in wave-induced environments
|
Pan, Dewei |
|
|
80 |
8 |
p. 11843 |
artikel |
21 |
C-VoNNI: a precise fingerprint construction for indoor positioning systems using natural neighbor methods with clustering-based Voronoi diagrams
|
Yong, Yun Fen |
|
|
80 |
8 |
p. 10667-10694 |
artikel |
22 |
Depression detection via a Chinese social media platform: a novel causal relation-aware deep learning approach
|
Liu, Yang |
|
|
80 |
8 |
p. 10327-10356 |
artikel |
23 |
Efficient computation of maximum weighted independent sets on weighted dynamic graph
|
Tan, Yuting |
|
|
80 |
8 |
p. 10418-10443 |
artikel |
24 |
Energy-efficient cluster head using modified fuzzy logic with WOA and path selection using enhanced CSO in IoT-enabled smart agriculture systems
|
Chandrasekaran, Senthil Kumar |
|
|
80 |
8 |
p. 11149-11190 |
artikel |
25 |
Explainable recommendation based on fusion representation of multi-type feature embedding
|
Zheng, Jianxing |
|
|
80 |
8 |
p. 10370-10393 |
artikel |
26 |
Exploring privacy measurement in federated learning
|
Jagarlamudi, Gopi Krishna |
|
|
80 |
8 |
p. 10511-10551 |
artikel |
27 |
FASE: fast deployment for dependent applications in serverless environments
|
Saha, Rounak |
|
|
80 |
8 |
p. 10394-10417 |
artikel |
28 |
HCDQN-ORA: a novel hybrid clustering and deep Q-network technique for dynamic user location-based optimal resource allocation in a fog environment
|
Ahlawat, Chanchal |
|
|
80 |
8 |
p. 11014-11065 |
artikel |
29 |
IAFCO: an intelligent agent-based framework for combinatorial optimization
|
Tajgardan, Mahjoubeh |
|
|
80 |
8 |
p. 10863-10930 |
artikel |
30 |
Label propagation algorithm for community discovery based on centrality and common neighbours
|
Douadi, Asma |
|
|
80 |
8 |
p. 11816-11842 |
artikel |
31 |
Limited environmental information path planning based on 3D point cloud reconstruction
|
Wang, Hanyu |
|
|
80 |
8 |
p. 10931-10958 |
artikel |
32 |
Local and soft feature selection for value function approximation in batch reinforcement learning for robot navigation
|
Fathinezhad, Fatemeh |
|
|
80 |
8 |
p. 10720-10745 |
artikel |
33 |
Lowest revenue limit-based truthful auction mechanism for cloud resource allocation
|
Zhang, Jixian |
|
|
80 |
8 |
p. 10637-10666 |
artikel |
34 |
Massively parallel simulations of multi-stage compressors on Sunway TaihuLight
|
Wang, Ziwei |
|
|
80 |
8 |
p. 11089-11128 |
artikel |
35 |
MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment
|
Jagadeesh, G. |
|
|
80 |
8 |
p. 10223-10254 |
artikel |
36 |
Multi-level trust-based secure and optimal IoT-WSN routing for environmental monitoring applications
|
Sharma, Vishal |
|
|
80 |
8 |
p. 11338-11381 |
artikel |
37 |
Multi-strategy text data augmentation for enhanced aspect-based sentiment analysis in resource-limited scenarios
|
Zhao, Chuanjun |
|
|
80 |
8 |
p. 11129-11148 |
artikel |
38 |
Multi-stream P&U adaptive graph convolutional networks for skeleton-based action recognition
|
Chen, Minglong |
|
|
80 |
8 |
p. 11614-11639 |
artikel |
39 |
On modified l-embedded edge-connectivity of enhanced hypercubes
|
Liu, Hongxi |
|
|
80 |
8 |
p. 10357-10369 |
artikel |
40 |
Out of kernel tuning and optimizations for portable large-scale docking experiments on GPUs
|
Accordi, Gianmarco |
|
|
80 |
8 |
p. 11798-11815 |
artikel |
41 |
Parallel chaos-based image encryption algorithm: high-level synthesis and FPGA implementation
|
Moghimi Moghaddam, Saeed Sharifian |
|
|
80 |
8 |
p. 10985-11013 |
artikel |
42 |
Parallel design of SFO optimization algorithm based on FPGA
|
Naji, Hamid Reza |
|
|
80 |
8 |
p. 10796-10817 |
artikel |
43 |
Performance-driven scheduling for malleable workloads
|
Almaaitah, Njoud O. |
|
|
80 |
8 |
p. 11556-11584 |
artikel |
44 |
Performance improvement of distributed cache using middleware session
|
Jafari, Bita |
|
|
80 |
8 |
p. 10818-10862 |
artikel |
45 |
Prism refraction search: a novel physics-based metaheuristic algorithm
|
Kundu, Rohit |
|
|
80 |
8 |
p. 10746-10795 |
artikel |
46 |
Progress in the prime factorization of large numbers
|
Zhang, Dan |
|
|
80 |
8 |
p. 11382-11400 |
artikel |
47 |
QPU integration in OpenCL for heterogeneous programming
|
Vázquez-Pérez, Jorge |
|
|
80 |
8 |
p. 11682-11703 |
artikel |
48 |
Quantum circuit implementations of lightweight authenticated encryption ASCON
|
Zheng, Yuanmeng |
|
|
80 |
8 |
p. 11322-11337 |
artikel |
49 |
Real-time design patterns for the verification of safety-critical embedded systems in model-based approach
|
Mzid, Rania |
|
|
80 |
8 |
p. 11431-11473 |
artikel |
50 |
Reliability analysis of the augmented cubes in terms of the h-extra r-component edge-connectivity
|
Zhang, Yushen |
|
|
80 |
8 |
p. 11704-11718 |
artikel |
51 |
Reliability evaluation of generalized exchanged X-cubes under the Rg-conditional restriction
|
Lin, Wanling |
|
|
80 |
8 |
p. 11401-11430 |
artikel |
52 |
Retraction Note: An improved privacy-preserving data mining technique using singular value decomposition with three-dimensional rotation data perturbation
|
Kousika, N. |
|
|
80 |
8 |
p. 11844 |
artikel |
53 |
Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions
|
Alam, Mahfooz |
|
|
80 |
8 |
p. 11491-11555 |
artikel |
54 |
Singular value decomposition for complex matrices using two-sided Jacobi method
|
Chiyonobu, Miho |
|
|
80 |
8 |
p. 11719-11740 |
artikel |
55 |
STIGCN: spatial–temporal interaction-aware graph convolution network for pedestrian trajectory prediction
|
Chen, Wangxing |
|
|
80 |
8 |
p. 10695-10719 |
artikel |
56 |
Structure damage diagnosis of bleacher based on DSKNet model
|
Cai, Chaozhi |
|
|
80 |
8 |
p. 10197-10222 |
artikel |
57 |
TGIE4REC: enhancing session-based recommendation with transition and global information
|
Gao, Shiwei |
|
|
80 |
8 |
p. 11585-11613 |
artikel |
58 |
Thermal-aware application mapping using genetic and fuzzy logic techniques for minimizing temperature in three-dimensional network-on-chip
|
Asadzadeh, Farzaneh |
|
|
80 |
8 |
p. 11214-11240 |
artikel |
59 |
Toward efficient structured-grid triangular solver on sunway many-core processors
|
Li, Jianjiang |
|
|
80 |
8 |
p. 10610-10636 |
artikel |