nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive wavelet transform model for time series data prediction
|
Liu, Xin |
|
|
24 |
8 |
p. 5877-5884 |
artikel |
2 |
A dynamic trust model in internet of things
|
Wang, Eric Ke |
|
|
24 |
8 |
p. 5773-5782 |
artikel |
3 |
An attention mechanism and multi-granularity-based Bi-LSTM model for Chinese Q&A system
|
Yu, Xiao-mei |
|
|
24 |
8 |
p. 5831-5845 |
artikel |
4 |
An efficient index structure for distributed k-nearest neighbours query processing
|
Yang, Min |
|
|
24 |
8 |
p. 5539-5550 |
artikel |
5 |
An efficient virtual CPU scheduling in cloud computing
|
Jang, Joonhyouk |
|
|
24 |
8 |
p. 5987-5997 |
artikel |
6 |
An empirical study on effects of electronic word-of-mouth and Internet risk avoidance on purchase intention: from the perspective of big data
|
Yuan, Yu-Hsi |
|
|
24 |
8 |
p. 5713-5728 |
artikel |
7 |
An enhanced heuristic ant colony optimization for mobile robot path planning
|
Gao, Wenxiang |
|
|
24 |
8 |
p. 6139-6150 |
artikel |
8 |
An improved MPPT control strategy based on incremental conductance method
|
Shengqing, Li |
|
|
24 |
8 |
p. 6039-6046 |
artikel |
9 |
A novel metaheuristic inspired by Hitchcock birds’ behavior for efficient optimization of large search spaces of high dimensionality
|
Morais, Reinaldo G. |
|
|
24 |
8 |
p. 5633-5655 |
artikel |
10 |
Application of Kalman filter to Model-based Prognostics for Solenoid Valve
|
Tang, Xilang |
|
|
24 |
8 |
p. 5741-5753 |
artikel |
11 |
A privacy-preserving multi-keyword search approach in cloud computing
|
Manasrah, Ahmed M. |
|
|
24 |
8 |
p. 5609-5631 |
artikel |
12 |
A rough set model based on fuzzifying neighborhood systems
|
Li, Lingqiang |
|
|
24 |
8 |
p. 6085-6099 |
artikel |
13 |
A simple two-phase differential evolution for improved global numerical optimization
|
Ghosh, Arka |
|
|
24 |
8 |
p. 6151-6167 |
artikel |
14 |
Automatic keyphrase extraction using word embeddings
|
Zhang, Yuxiang |
|
|
24 |
8 |
p. 5593-5608 |
artikel |
15 |
A watermarking scheme based on rotating vector for image content authentication
|
Fu, Jianjing |
|
|
24 |
8 |
p. 5755-5772 |
artikel |
16 |
Boolean lifting property in quantales
|
Cheptea, Daniela |
|
|
24 |
8 |
p. 6169-6181 |
artikel |
17 |
Cloud-assisted secure biometric identification with sub-linear search efficiency
|
Zhu, Youwen |
|
|
24 |
8 |
p. 5885-5896 |
artikel |
18 |
Core-reviewer recommendation based on Pull Request topic model and collaborator social network
|
Liao, Zhifang |
|
|
24 |
8 |
p. 5683-5693 |
artikel |
19 |
Correction to: Leveraging cloud computing for the semantic web: review and trends
|
Adedugbe, Oluwasegun |
|
|
24 |
8 |
p. 6015 |
artikel |
20 |
Development and assessment of a haptic-enabled holographic surgical simulator for renal biopsy training
|
Guo, Zhaoxiang |
|
|
24 |
8 |
p. 5783-5794 |
artikel |
21 |
DroidDeep: using Deep Belief Network to characterize and detect android malware
|
Su, Xin |
|
|
24 |
8 |
p. 6017-6030 |
artikel |
22 |
Fast clustering-based weighted twin support vector regression
|
Gu, Binjie |
|
|
24 |
8 |
p. 6101-6117 |
artikel |
23 |
Fuzzy Bezier splines with application to fuzzy functional integral equations
|
Bica, Alexandru Mihai |
|
|
24 |
8 |
p. 6069-6084 |
artikel |
24 |
Generic extended multigranular sets for mixed and incomplete information systems
|
Villuendas-Rey, Yenny |
|
|
24 |
8 |
p. 6119-6137 |
artikel |
25 |
Identity-based data storage scheme with anonymous key generation in fog computing
|
Zhang, Jianhong |
|
|
24 |
8 |
p. 5561-5571 |
artikel |
26 |
Improving traffic flow forecasting with relevance vector machine and a randomized controlled statistical testing
|
Lou, Jungang |
|
|
24 |
8 |
p. 5485-5497 |
artikel |
27 |
Indoor Li-DAR 3D mapping algorithm with semantic-based registration and optimization
|
Sun, Wei |
|
|
24 |
8 |
p. 5909-5920 |
artikel |
28 |
Information retrieval methodology for aiding scientific database search
|
Marcos-Pablos, Samuel |
|
|
24 |
8 |
p. 5551-5560 |
artikel |
29 |
IoT transaction processing through cooperative concurrency control on fog–cloud computing environment
|
Al-Qerem, Ahmad |
|
|
24 |
8 |
p. 5695-5711 |
artikel |
30 |
Leveraging cloud computing for the semantic web: review and trends
|
Adedugbe, Oluwasegun |
|
|
24 |
8 |
p. 5999-6014 |
artikel |
31 |
MABAC method for multiple attribute group decision making under picture 2-tuple linguistic environment
|
Zhang, Siqi |
|
|
24 |
8 |
p. 5819-5829 |
artikel |
32 |
Nickel foam surface defect detection based on spatial-frequency multi-scale MB-LBP
|
Cao, Bin-fang |
|
|
24 |
8 |
p. 5949-5957 |
artikel |
33 |
On one-time cookies protocol based on one-time password
|
He, Junhui |
|
|
24 |
8 |
p. 5657-5670 |
artikel |
34 |
On the number of fuzzy subgroups of dicyclic groups
|
Kamali Ardekani, L. |
|
|
24 |
8 |
p. 6183-6191 |
artikel |
35 |
Optimal control of DAB converter backflow power based on phase-shifting strategy
|
Zeng, Jinhui |
|
|
24 |
8 |
p. 6031-6038 |
artikel |
36 |
Random orthocenter strategy in interior search algorithm and its engineering application
|
Han, Bo |
|
|
24 |
8 |
p. 5933-5948 |
artikel |
37 |
Research on key issues of gesture recognition for artificial intelligence
|
Mo, Taiping |
|
|
24 |
8 |
p. 5795-5803 |
artikel |
38 |
RETRACTED ARTICLE: Research on North Gulf distributed big data submarine 3D terrain computing system based on remote sensing and multi-beam
|
Dong, Yuan |
|
|
24 |
8 |
p. 5847-5857 |
artikel |
39 |
RobNet: real-time road-object 3D point cloud segmentation based on SqueezeNet and cyclic CRF
|
Sun, Wei |
|
|
24 |
8 |
p. 5805-5818 |
artikel |
40 |
Scalable detection of botnets based on DGA
|
Zago, Mattia |
|
|
24 |
8 |
p. 5517-5537 |
artikel |
41 |
Scalable influence maximization based on influential seed successors
|
Chengai, Sun |
|
|
24 |
8 |
p. 5921-5931 |
artikel |
42 |
Secure and efficient big data deduplication in fog computing
|
Yan, Jiajun |
|
|
24 |
8 |
p. 5671-5682 |
artikel |
43 |
Small-scale moving target detection in aerial image by deep inverse reinforcement learning
|
Sun, Wei |
|
|
24 |
8 |
p. 5897-5908 |
artikel |
44 |
Soft computing techniques for big data and cloud computing
|
Gupta, B. B. |
|
|
24 |
8 |
p. 5483-5484 |
artikel |
45 |
Study on a storage location strategy based on clustering and association algorithms
|
Zhou, Li |
|
|
24 |
8 |
p. 5499-5516 |
artikel |
46 |
Tactical maneuver trajectory optimization for unmanned combat aerial vehicle using improved differential evolution
|
Huang, Hanqiao |
|
|
24 |
8 |
p. 5959-5970 |
artikel |
47 |
The zero-divisor graphs of MV-algebras
|
Gan, Aiping |
|
|
24 |
8 |
p. 6059-6068 |
artikel |
48 |
Using the DEMATEL model to expose core causal items of LibQUAL for improving library service quality: from the perspective of big data
|
Wu, Chia-Huei |
|
|
24 |
8 |
p. 5729-5739 |
artikel |
49 |
Wajsberg algebras arising from binary block codes
|
Flaut, Cristina |
|
|
24 |
8 |
p. 6047-6058 |
artikel |
50 |
Weakly supervised facial expression recognition via transferred DAL-CNN and active incremental learning
|
Xu, Ying |
|
|
24 |
8 |
p. 5971-5985 |
artikel |
51 |
Weighted-fusion feature of MB-LBPUH and HOG for facial expression recognition
|
Wang, Yan |
|
|
24 |
8 |
p. 5859-5875 |
artikel |
52 |
WOA + BRNN: An imbalanced big data classification framework using Whale optimization and deep neural network
|
Hassib, Eslam. M. |
|
|
24 |
8 |
p. 5573-5592 |
artikel |