nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Advanced computer science and applications for soft computing of converged IT environments
|
Yi, Gangman |
|
2018 |
22 |
20 |
p. 6617-6619 |
artikel |
2 |
A hierarchical soft computing model for parameter estimation of curve fitting problems
|
Karadede, Yusuf |
|
2018 |
22 |
20 |
p. 6937-6964 |
artikel |
3 |
A model for collecting and analyzing action data in a learning process based on activity theory
|
Kim, Kyungrog |
|
2017 |
22 |
20 |
p. 6671-6681 |
artikel |
4 |
An improved genetic algorithm encoded by adaptive degressive ary number
|
Zhang, Yijie |
|
2017 |
22 |
20 |
p. 6861-6875 |
artikel |
5 |
A novel group decision-making model based on triangular neutrosophic numbers
|
Abdel-Basset, Mohamed |
|
2017 |
22 |
20 |
p. 6629-6643 |
artikel |
6 |
A proximal quadratic surface support vector machine for semi-supervised binary classification
|
Yan, Xin |
|
2017 |
22 |
20 |
p. 6905-6919 |
artikel |
7 |
Assessing content-based conformance between software R&D documents and design guidelines using relevance links
|
Shin, Jong-Hwan |
|
2017 |
22 |
20 |
p. 6645-6656 |
artikel |
8 |
A time-sensitive personalized recommendation method based on probabilistic matrix factorization technique
|
Xiao, Yingyuan |
|
2018 |
22 |
20 |
p. 6785-6796 |
artikel |
9 |
Building neural network language model with POS-based negative sampling and stochastic conjugate gradient descent
|
Liu, Jin |
|
2018 |
22 |
20 |
p. 6705-6717 |
artikel |
10 |
Defending against Packet-In messages flooding attack under SDN context
|
Gao, Deyun |
|
2018 |
22 |
20 |
p. 6797-6809 |
artikel |
11 |
Distance-dependent parameter adaption for multi-objective evolutionary algorithm based on decomposition
|
Ning, Weikang |
|
2017 |
22 |
20 |
p. 6845-6859 |
artikel |
12 |
Energy conscious multi-site computation offloading for mobile cloud computing
|
Kumari, Raj |
|
2018 |
22 |
20 |
p. 6751-6764 |
artikel |
13 |
Feature selection for entity extraction from multiple biomedical corpora: A PSO-based approach
|
Yadav, Shweta |
|
2017 |
22 |
20 |
p. 6881-6904 |
artikel |
14 |
Identity-based undetachable digital signature for mobile agents in electronic commerce
|
Shi, Yang |
|
2018 |
22 |
20 |
p. 6921-6935 |
artikel |
15 |
Incremental learning method for cyber intelligence, surveillance, and reconnaissance in closed military network using converged IT techniques
|
Shin, Gyeongil |
|
2018 |
22 |
20 |
p. 6835-6844 |
artikel |
16 |
Indoor positioning method using BITON and linear Kalman filter
|
Lee, Seoung-Hyeon |
|
2018 |
22 |
20 |
p. 6741-6750 |
artikel |
17 |
Motion quaternion-based motion estimation method of MYO using K-means algorithm and Bayesian probability
|
Sung, Yunsick |
|
2018 |
22 |
20 |
p. 6773-6783 |
artikel |
18 |
MTD-Spamguard: a moving target defense-based spammer detection system in social network
|
Park, Jin Ho |
|
2017 |
22 |
20 |
p. 6683-6691 |
artikel |
19 |
Network anomaly detection based on probabilistic analysis
|
Park, JinSoo |
|
2017 |
22 |
20 |
p. 6621-6627 |
artikel |
20 |
Non-white matter tissue extraction and deep convolutional neural network for Alzheimer’s disease detection
|
Vu, Tien-Duong |
|
2018 |
22 |
20 |
p. 6825-6833 |
artikel |
21 |
Optimizing tasks generation for children in the early stages of literacy teaching: a study using bio-inspired metaheuristics
|
Souza, Gilberto Nerino de |
|
2018 |
22 |
20 |
p. 6811-6824 |
artikel |
22 |
Prediction of protein essentiality by the improved particle swarm optimization
|
Liu, Wei |
|
2017 |
22 |
20 |
p. 6657-6669 |
artikel |
23 |
Ransomware detection method based on context-aware entropy analysis
|
Jung, Sangmoon |
|
2018 |
22 |
20 |
p. 6731-6740 |
artikel |
24 |
Reliable fault diagnosis of bearings with varying rotational speeds using envelope spectrum and convolution neural networks
|
Appana, Dileep K. |
|
2018 |
22 |
20 |
p. 6719-6729 |
artikel |
25 |
Routing and wavelength assignment for exchanged crossed cubes on ring-topology optical networks
|
Liu, Yu-Liang |
|
2018 |
22 |
20 |
p. 6693-6703 |
artikel |
26 |
Social control through deterrence on the compliance with information security policy
|
Choi, Myeonggil |
|
2018 |
22 |
20 |
p. 6765-6772 |
artikel |
27 |
When does a generalized Boolean quasiring become a Boolean ring?
|
Chajda, Ivan |
|
2017 |
22 |
20 |
p. 6877-6879 |
artikel |