nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive two-stage task offloading based on meta reinforcement learning for mobile edge computing
|
Li, Wenjuan |
|
|
81 |
6 |
|
artikel |
2 |
Addressing cost and resource variability for big data task scheduling in heterogeneous cloud environments
|
Ayyadi, Armin |
|
|
81 |
6 |
|
artikel |
3 |
A deep Q-network-based edge service offloading in cloud–edge–terminal environment
|
Cao, Buqing |
|
|
81 |
6 |
|
artikel |
4 |
A heterogeneous attention YOLO model for traffic sign detection
|
Deng, Yan |
|
|
81 |
6 |
|
artikel |
5 |
A modelling approach for estimating energy consumption of NoSQL-based storage systems
|
Souza, Fillipe |
|
|
81 |
6 |
|
artikel |
6 |
A multi-feature fusion supervoxel clustering segmentation method based on energy function
|
Meng, Chao |
|
|
81 |
6 |
|
artikel |
7 |
An adaptive network construction for single-cell clustering
|
Yang, Tianyu |
|
|
81 |
6 |
|
artikel |
8 |
Analyzing performance portability for a SYCL implementation of the 2D shallow water equations
|
Büttner, Markus |
|
|
81 |
6 |
|
artikel |
9 |
An improved discrete Harris Hawks optimization algorithm for the no-wait job shop problem to minimize total weighted tardiness
|
Yin, Jie |
|
|
81 |
6 |
|
artikel |
10 |
An improved snake optimization algorithm based on hybrid strategy
|
Yang, Yahao |
|
|
81 |
6 |
|
artikel |
11 |
An optimized intrusion detection system for resource-constrained IoMT environments: enhancing security through efficient feature selection and classification
|
Salehpour, Arash |
|
|
81 |
6 |
|
artikel |
12 |
A novel metaheuristic algorithm using structured population and virtual particles
|
Cuevas, Erik |
|
|
81 |
6 |
|
artikel |
13 |
Application I/O behavior analysis on leadership cluster system
|
Park, Ju-Won |
|
|
81 |
6 |
|
artikel |
14 |
A provably secure certificateless online/offline signature scheme for internet of things
|
Chen, Yulei |
|
|
81 |
6 |
|
artikel |
15 |
A scientometric analysis of reviews on the Internet of Things
|
Jain, Sarika |
|
|
81 |
6 |
|
artikel |
16 |
A single-point and length-representation-based model for nested named entity recognition
|
Lu, Hangqing |
|
|
81 |
6 |
|
artikel |
17 |
Assessing the impact of high-performance computing on digital transformation: benefits, challenges, and size-dependent differences
|
Almeida, Fernando |
|
|
81 |
6 |
|
artikel |
18 |
A survey analyzing encryption schemes for IoT security measures
|
Dhiman, Shalini |
|
|
81 |
6 |
|
artikel |
19 |
A trust-driven optimization model for reliable authorization in Hadoop Environment
|
Battat, Nadia |
|
|
81 |
6 |
|
artikel |
20 |
A unified temporal link prediction framework based on nonnegative matrix factorization and graph regularization
|
Li, Min |
|
|
81 |
6 |
|
artikel |
21 |
Diagnosis of sacroiliitis using MR images with a simplified custom deep learning model
|
Uzelaltinbulat, Selin |
|
|
81 |
6 |
|
artikel |
22 |
Effective federated XGBoost learning for multi-class classification in Non-IID environments
|
Kang, Sung Won |
|
|
81 |
6 |
|
artikel |
23 |
Efficient and revocable privacy-preserving medical data sharing scheme with data integrity
|
Yang, Xiaohui |
|
|
81 |
6 |
|
artikel |
24 |
Empirical evaluation of ensemble learning and hybrid CNN-LSTM for IoT threat detection on heterogeneous datasets
|
Nazir, Ahsan |
|
|
81 |
6 |
|
artikel |
25 |
Evaluating ChatGPT’s strengths and limitations for data race detection in parallel programming via prompt engineering
|
Alsofyani, May |
|
|
81 |
6 |
|
artikel |
26 |
FDPNet: Deep forgery detection by leveraging multi-scale self-forgery images generating
|
Li, Boyang |
|
|
81 |
6 |
|
artikel |
27 |
F2multisense: a novel approach to fuzzy fusion in multisensor data to improve saving energy in WBSN
|
Shankani, Rana |
|
|
81 |
6 |
|
artikel |
28 |
How to balance the verification burden: a multi-hierarchical aggregate signature for drone swarms
|
Meng, Lei |
|
|
81 |
6 |
|
artikel |
29 |
Improving the transferability of adversarial examples via the high-level interpretable features for object detection
|
Ding, Zhiyi |
|
|
81 |
6 |
|
artikel |
30 |
Machine learning- and deep learning-based anomaly detection in firewalls: a survey
|
Dhrir, Hanen |
|
|
81 |
6 |
|
artikel |
31 |
Mayfly algorithm with elementary functions and mathematical spirals for task scheduling in cloud computing system
|
Sui, Xiao-Fei |
|
|
81 |
6 |
|
artikel |
32 |
Multimodal multiobjective optimization algorithm with fine-grained special crowding distance and dual-space selection mechanism
|
Li, Wei |
|
|
81 |
6 |
|
artikel |
33 |
Multi-objective task scheduling algorithm for load balancing in cloud computing based on improved Harris hawks optimization
|
Emara, Farouk A. |
|
|
81 |
6 |
|
artikel |
34 |
Multi-scale detection of underwater objects using attention mechanisms and normalized Wasserstein distance loss
|
Tsai, Yu-Shiuan |
|
|
81 |
6 |
|
artikel |
35 |
Multi-scale feature enhanced detection of foreign object intrusions on railways
|
Gao, Jialin |
|
|
81 |
6 |
|
artikel |
36 |
Multi-task learning framework using tri-encoder with caption prompt for multimodal aspect-based sentiment analysis
|
Cai, Yuanyuan |
|
|
81 |
6 |
|
artikel |
37 |
Network intrusion detection based on feature fusion of attack dimension
|
Sun, Xiaolong |
|
|
81 |
6 |
|
artikel |
38 |
Numerical computation of fractional Kawahara and modified Kawahara equations in Caputo sense on integral transforms
|
Sahu, Itishree |
|
|
81 |
6 |
|
artikel |
39 |
PDPA: a part-of-speech-driven prompt and attention method for aspect sentiment triplet extraction
|
Wang, Guangchao |
|
|
81 |
6 |
|
artikel |
40 |
Prescribed finite-time adaptive fuzzy-based fault-tolerant control of robotic manipulators using dynamic scaling factor
|
Serajgah, Saman Amini |
|
|
81 |
6 |
|
artikel |
41 |
Proposed method of acquiring train data for early-modern Japanese printed character recognizers
|
Koiso, Norie |
|
|
81 |
6 |
|
artikel |
42 |
PSI-MFS: lightweight multi-objective feature selection for enhanced multi-label classification
|
Verma, Gurudatta |
|
|
81 |
6 |
|
artikel |
43 |
RBC-MSS: asynchronous broadcasting protocol based on multi-secret sharing
|
Bai, Fenhua |
|
|
81 |
6 |
|
artikel |
44 |
Research and application of smart insole assisted gait recognition technology
|
Yuan, Yan |
|
|
81 |
6 |
|
artikel |
45 |
Rethink Reynolds’ rules: flock-inspired network for vehicle trajectory prediction
|
Xue, Qifan |
|
|
81 |
6 |
|
artikel |
46 |
Semantic feature space construction for unsupervised few-shot image classification
|
Wang, Zhicheng |
|
|
81 |
6 |
|
artikel |
47 |
Social recommendation based on contrastive learning of hypergraph convolution
|
Xue, Peng |
|
|
81 |
6 |
|
artikel |
48 |
The ensemble of self-information-based feature selection for heterogeneous data via k-nearest neighborhood rough set model
|
Zhang, Yong Cai |
|
|
81 |
6 |
|
artikel |
49 |
Traffic environmental protection edge computing: a monitoring algorithm and system of truck black smoke emission in complex scene
|
Yang, Kang |
|
|
81 |
6 |
|
artikel |
50 |
Unveiling evasive malware behavior: toward generating a multi-sources benchmark dataset and evasive malware behavior profiling using network traffic and memory analysis
|
Habibi Lashkari, Arash |
|
|
81 |
6 |
|
artikel |
51 |
Urban city data delivery optimization in VNDN using a route-based caching approach with content-type awareness in intelligent transportation system
|
Javeed, Muhammad Awais |
|
|
81 |
6 |
|
artikel |
52 |
Vision and LiDAR multi-modal fusion beam prediction method for millimeter-wave communication system
|
Luo, Wenyu |
|
|
81 |
6 |
|
artikel |
53 |
XGV-BERT: Leveraging contextualized language model and graph neural network for efficient software vulnerability detection
|
Quan, Vu Le Anh |
|
|
81 |
6 |
|
artikel |