nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A better exploration strategy in Grey Wolf Optimizer
|
Bansal, Jagdish Chand |
|
|
12 |
1 |
p. 1099-1118 |
artikel |
2 |
A cooperative coevolutionary method for optimizing random weight networks and its application for medical classification problems
|
Rawashdeh, Enas F. |
|
|
12 |
1 |
p. 321-342 |
artikel |
3 |
A Decision-centric approach for secure and energy-efficient cyber-physical systems
|
Jithish, J. |
|
|
12 |
1 |
p. 417-441 |
artikel |
4 |
A differential privacy based probabilistic mechanism for mobility datasets releasing
|
Zhang, Jianpei |
|
|
12 |
1 |
p. 201-212 |
artikel |
5 |
A framework for monitoring multiple databases in industries using OPC UA
|
Mathias, Selvine G. |
|
|
12 |
1 |
p. 47-56 |
artikel |
6 |
A β-hill climbing optimizer for examination timetabling problem
|
Al-Betar, Mohammed Azmi |
|
|
12 |
1 |
p. 653-666 |
artikel |
7 |
A joint hybrid corona based opportunistic routing design with quasi mobile sink for IoT based wireless sensor network
|
Thyagarajan, Jayavignesh |
|
|
12 |
1 |
p. 991-1009 |
artikel |
8 |
A moving energy-based routing in DTNs with speed heterogeneity
|
Luo, Chaohu |
|
|
12 |
1 |
p. 183-192 |
artikel |
9 |
An anomaly based distributed detection system for DDoS attacks in Tier-2 ISP networks
|
Bhandari, Abhinav |
|
|
12 |
1 |
p. 1387-1406 |
artikel |
10 |
An efficient algorithm for identifying (ℓ, d) motif from huge DNA datasets
|
Masood, M. Mohamed Divan |
|
|
12 |
1 |
p. 485-495 |
artikel |
11 |
An energy and coverage sensitive approach to hierarchical data collection for mobile sink based wireless sensor networks
|
Roy, Saugata |
|
|
12 |
1 |
p. 1267-1291 |
artikel |
12 |
An energy-efficient fuzzy-based scheme for unequal multihop clustering in wireless sensor networks
|
Phoemphon, Songyut |
|
|
12 |
1 |
p. 873-895 |
artikel |
13 |
An energy saving medium access control protocol for wireless sensor networks
|
Debasis, Kumar |
|
|
12 |
1 |
p. 1435-1448 |
artikel |
14 |
An enhanced ride sharing model based on human characteristics, machine learning recommender system, and user threshold time
|
Narman, Husnu S. |
|
|
12 |
1 |
p. 13-26 |
artikel |
15 |
An ensembled data frequency prediction based framework for fast processing using hybrid cache optimization
|
Arora, Sumedha |
|
|
12 |
1 |
p. 285-301 |
artikel |
16 |
A neuro fuzzy system for incorporating ethics in the internet of things
|
Sholla, Sahil |
|
|
12 |
1 |
p. 1487-1501 |
artikel |
17 |
A new framework for predicting customer behavior in terms of RFM by considering the temporal aspect based on time series techniques
|
Abbasimehr, Hossein |
|
|
12 |
1 |
p. 515-531 |
artikel |
18 |
An optimization model for the transportation network with hierarchical structure: the case of China Post
|
Wang, Yong |
|
|
12 |
1 |
p. 167-182 |
artikel |
19 |
A novel synthetic aperture radar image change detection system using radial basis function-based deep convolutional neural network
|
Pandeeswari, B. |
|
|
12 |
1 |
p. 897-910 |
artikel |
20 |
A partial key pre-distribution based en-route filtering scheme for wireless sensor networks
|
Kumar, Alok |
|
|
12 |
1 |
p. 1471-1486 |
artikel |
21 |
A review on distributed cluster based routing approaches in mobile wireless sensor networks
|
Sumathi, Jayalekshmi |
|
|
12 |
1 |
p. 835-849 |
artikel |
22 |
Artificial intelligence neural network based on intelligent diagnosis
|
Li, Xiren |
|
|
12 |
1 |
p. 923-931 |
artikel |
23 |
A secure image watermarking for tamper detection and localization
|
Bhalerao, Siddharth |
|
|
12 |
1 |
p. 1057-1068 |
artikel |
24 |
A secure IoT sensors communication in industry 4.0 using blockchain technology
|
Rathee, Geetanjali |
|
|
12 |
1 |
p. 533-545 |
artikel |
25 |
A secure three factor based authentication scheme for health care systems using IoT enabled devices
|
Sahoo, Shreeya Swagatika |
|
|
12 |
1 |
p. 1419-1434 |
artikel |
26 |
A survey of neural networks usage for intrusion detection systems
|
Drewek-Ossowicka, Anna |
|
|
12 |
1 |
p. 497-514 |
artikel |
27 |
Attack classification using feature selection techniques: a comparative study
|
Thakkar, Ankit |
|
|
12 |
1 |
p. 1249-1266 |
artikel |
28 |
Building the summarization model of micro-blog topic
|
Cai, Jun |
|
|
12 |
1 |
p. 797-809 |
artikel |
29 |
Can driving patterns predict identity and gender?
|
Abul, Osman |
|
|
12 |
1 |
p. 151-166 |
artikel |
30 |
Comparative study of Pareto optimal multi objective cuckoo search algorithm and multi objective particle swarm optimization for power loss minimization incorporating UPFC
|
Rao, Nartu Tejeswara |
|
|
12 |
1 |
p. 1069-1080 |
artikel |
31 |
Consensus and majority vote feature selection methods and a detection technique for web phishing
|
Alotaibi, Bandar |
|
|
12 |
1 |
p. 717-727 |
artikel |
32 |
Cooperative flow regulation protocol for real-time and non-real-time applications over satellite network
|
Govindarajan, J. |
|
|
12 |
1 |
p. 979-990 |
artikel |
33 |
Data recovery in wireless sensor networks based on attribute correlation and extremely randomized trees
|
Cheng, Hongju |
|
|
12 |
1 |
p. 245-259 |
artikel |
34 |
Deep learning-based hybrid dynamic biased track (DL-HDBT) routing for under water acoustic sensor networks
|
Hemavathy, N. |
|
|
12 |
1 |
p. 1211-1225 |
artikel |
35 |
Deep learning neural networks for medical image segmentation of brain tumours for diagnosis: a recent review and taxonomy
|
Devunooru, Sindhu |
|
|
12 |
1 |
p. 455-483 |
artikel |
36 |
Deep nonlinear regression least squares polynomial fit to detect malicious attack on IoT devices
|
Arul, E. |
|
|
12 |
1 |
p. 769-779 |
artikel |
37 |
Desmogging of still smoggy images using a novel channel prior
|
Jain, Arpit |
|
|
12 |
1 |
p. 1161-1177 |
artikel |
38 |
Distracted driving recognition method based on deep convolutional neural network
|
Rao, Xuli |
|
|
12 |
1 |
p. 193-200 |
artikel |
39 |
Distributed and scalable platform architecture for smart cities complex events data collection: Covid19 pandemic use case
|
Basmi, Wadii |
|
|
12 |
1 |
p. 75-83 |
artikel |
40 |
Dynamic service migration and resource management for vehicular clouds
|
Pande, Sohan Kumar |
|
|
12 |
1 |
p. 1227-1247 |
artikel |
41 |
Efficient fog-assisted heterogeneous data services in software defined VANETs
|
Xiao, Ke |
|
|
12 |
1 |
p. 261-273 |
artikel |
42 |
Enhanced F-OFDM candidate for 5G applications
|
Taher, Montadar Abas |
|
|
12 |
1 |
p. 635-652 |
artikel |
43 |
FCM clustering and FLS based CH selection to enhance sustainability of wireless sensor networks for environmental monitoring applications
|
Rajput, Anagha |
|
|
12 |
1 |
p. 1139-1159 |
artikel |
44 |
Flood hazard assessment based on fuzzy clustering iterative model and chaotic particle swarm optimization
|
He, Yaoyao |
|
|
12 |
1 |
p. 933-942 |
artikel |
45 |
Fruit fly optimization algorithm based on a novel fluctuation model and its application in band selection for hyperspectral image
|
Ding, Guoshen |
|
|
12 |
1 |
p. 1517-1539 |
artikel |
46 |
GIS-based hierarchical fuzzy multicriteria decision-making method for urban planning
|
Cardone, Barbara |
|
|
12 |
1 |
p. 601-615 |
artikel |
47 |
Gradient flow-based deep residual networks for enhancing visibility of scenery images degraded by foggy weather conditions
|
Suganya, R. |
|
|
12 |
1 |
p. 1503-1516 |
artikel |
48 |
Hybrid convolutional neural network (CNN) and long-short term memory (LSTM) based deep learning model for detecting shilling attack in the social-aware network
|
Vivekanandan, K. |
|
|
12 |
1 |
p. 1197-1210 |
artikel |
49 |
Improved many-to-one architecture based on discrete wavelet packet transform for industrial IoT applications using channel coding
|
Saadaoui, Safa |
|
|
12 |
1 |
p. 275-283 |
artikel |
50 |
Improved resource allocation scheme for optimizing the performance of cell-edge users in LTE-A system
|
Gatti, Ravi |
|
|
12 |
1 |
p. 811-819 |
artikel |
51 |
Integrating machine learning and open data into social Chatbot for filtering information rumor
|
Hsu, I-Ching |
|
|
12 |
1 |
p. 1023-1037 |
artikel |
52 |
Internet of Health Things (IoHT) for personalized health care using integrated edge-fog-cloud network
|
Mukherjee, Anwesha |
|
|
12 |
1 |
p. 943-959 |
artikel |
53 |
Interval-valued intuitionistic fuzzy parameterized interval-valued intuitionistic fuzzy soft sets and their application in decision-making
|
Aydın, Tuğçe |
|
|
12 |
1 |
p. 1541-1558 |
artikel |
54 |
Interval valued trapezoidal neutrosophic set: multi-attribute decision making for prioritization of non-functional requirements
|
Khatter, Kiran |
|
|
12 |
1 |
p. 1039-1055 |
artikel |
55 |
Low power consumption and reliability of wireless communication network in intelligent parking system
|
Lin, Lin |
|
|
12 |
1 |
p. 1305-1313 |
artikel |
56 |
Modified ride-NN optimizer for the IoT based plant disease detection
|
Mishra, Monalisa |
|
|
12 |
1 |
p. 691-703 |
artikel |
57 |
Multilevel thresholding based image segmentation using new multistage hybrid optimization algorithm
|
Upadhyay, Pankaj |
|
|
12 |
1 |
p. 1081-1098 |
artikel |
58 |
Multi-period mean-semi-entropy portfolio management with transaction costs and bankruptcy control
|
Zhou, Jiandong |
|
|
12 |
1 |
p. 705-715 |
artikel |
59 |
My avatar and I. A study on avatars, personality traits, self-attributes, and their perceived importance
|
Fokides, Emmanuel |
|
|
12 |
1 |
p. 359-373 |
artikel |
60 |
nQSV-Net: a novel queuing search variant for global space search and workload modeling
|
Nguyen, Binh Minh |
|
|
12 |
1 |
p. 27-46 |
artikel |
61 |
Object detection using Metaheuristic algorithm for volley ball sports application
|
Balaji, S. R. |
|
|
12 |
1 |
p. 375-385 |
artikel |
62 |
On the use of semantic technologies for video analytics
|
Greco, Luca |
|
|
12 |
1 |
p. 567-587 |
artikel |
63 |
Optimal bicycle trip impediments resolution by data fusion
|
Knapen, Luk |
|
|
12 |
1 |
p. 103-120 |
artikel |
64 |
Optimal day-ahead scheduling of autonomous operation for the hybrid micro-grid including PV, WT, diesel generator, and pump as turbine system
|
Alizadeh Bidgoli, Mohsen |
|
|
12 |
1 |
p. 961-977 |
artikel |
65 |
Optimal placement of UAVs of an aerial mesh network in an emergency situation
|
Gupta, Manali |
|
|
12 |
1 |
p. 343-358 |
artikel |
66 |
Optimized deployment method and performance evaluation of gas sensor network based on field experiment
|
Jiang, Ye |
|
|
12 |
1 |
p. 729-744 |
artikel |
67 |
Persistent transportation traffic volume estimation with differential privacy
|
Yang, Wenjian |
|
|
12 |
1 |
p. 213-231 |
artikel |
68 |
P-MOIA-RS: a multi-objective optimization and decision-making algorithm for recommendation systems
|
Chai, Zhengyi |
|
|
12 |
1 |
p. 443-454 |
artikel |
69 |
Prediction model for stock price trend based on recurrent neural network
|
Zhao, Jinghua |
|
|
12 |
1 |
p. 745-753 |
artikel |
70 |
Reallocation of unoccupied beds among requesting wards
|
Pishnamazzadeh, Mohammad |
|
|
12 |
1 |
p. 1449-1469 |
artikel |
71 |
Recognition of positive and negative valence states in children with autism spectrum disorder (ASD) using discrete wavelet transform (DWT) analysis of electrocardiogram signals (ECG)
|
Bagirathan, Anandhi |
|
|
12 |
1 |
p. 405-416 |
artikel |
72 |
Reliability evaluation method for warm standby embryonic cellular array
|
Wang, Tao |
|
|
12 |
1 |
p. 617-634 |
artikel |
73 |
Requirements-preserving design automation for multiprocessor embedded system applications
|
Maruf, Md Al |
|
|
12 |
1 |
p. 821-833 |
artikel |
74 |
Research on intelligent algorithm for alerting vehicle impact based on multi-agent deep reinforcement learning
|
Wang, Zexue |
|
|
12 |
1 |
p. 1337-1347 |
artikel |
75 |
Research on the system function-structure analysis based on its implicit relation
|
Li, Shasha |
|
|
12 |
1 |
p. 755-767 |
artikel |
76 |
Resolution for bounded-splitting jobs scheduling problem on a single machine in available time-windows
|
Son, Trang Hong |
|
|
12 |
1 |
p. 1179-1196 |
artikel |
77 |
RETRACTED ARTICLE: Hybrid Grey Wolf: Bald Eagle search optimized support vector regression for traffic flow forecasting
|
Angayarkanni, S. A. |
|
|
12 |
1 |
p. 1293-1304 |
artikel |
78 |
RETRACTED ARTICLE: Modelling of F3I based feature selection approach for PCOS classification and prediction
|
Maheswari, K. |
|
|
12 |
1 |
p. 1349-1362 |
artikel |
79 |
RETRACTED ARTICLE: Parallel deep convolutional neural network for content based medical image retrieval
|
Haripriya, P. |
|
|
12 |
1 |
p. 781-795 |
artikel |
80 |
RRCF: an abnormal pulse diagnosis factor for road abnormal hotspots detection
|
Zeng, Lingqiu |
|
|
12 |
1 |
p. 233-243 |
artikel |
81 |
Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
|
Qazi, Rosheen |
|
|
12 |
1 |
p. 547-566 |
artikel |
82 |
Simultaneous prediction of valence / arousal and emotion categories and its application in an HRC scenario
|
Handrich, Sebastian |
|
|
12 |
1 |
p. 57-73 |
artikel |
83 |
Single and multi-objective optimal power flow using a new differential-based harmony search algorithm
|
Abbasi, Maysam |
|
|
12 |
1 |
p. 851-871 |
artikel |
84 |
Smart city oriented optimization of residential blocks on intensive urban sensing data based on fuzzy evaluation algorithm
|
Zhu, Jizhou |
|
|
12 |
1 |
p. 911-921 |
artikel |
85 |
Smart-Green-Mult (SGM): overhear from topological kingpins in software defined wireless sensor networks
|
Banerjee, Anuradha |
|
|
12 |
1 |
p. 387-404 |
artikel |
86 |
Social mining-based clustering process for big-data integration
|
Jung, Hoill |
|
|
12 |
1 |
p. 589-600 |
artikel |
87 |
Software architecture of the internet of things (IoT) for smart city, healthcare and agriculture: analysis and improvement directions
|
Gavrilović, Nebojša |
|
|
12 |
1 |
p. 1315-1336 |
artikel |
88 |
Special issue on advances in data intelligence and modelling
|
Shakshuki, Elhadi M. |
|
|
12 |
1 |
p. 1-3 |
artikel |
89 |
Special issue on vehicles as sensing devices: from observations to actionable insights
|
Chen, Chao |
|
|
12 |
1 |
p. 147-149 |
artikel |
90 |
STIMF: a smart traffic incident management framework
|
Farrag, Siham G. |
|
|
12 |
1 |
p. 85-101 |
artikel |
91 |
Study of the key technology on the Geo-hazard spatial information sharing platform in Meizoseismal Region of Wenchuan Earthquake Zone
|
Wang, Zhoufeng |
|
|
12 |
1 |
p. 1011-1022 |
artikel |
92 |
The multi-demeanor fusion based robust intrusion detection system for anomaly and misuse detection in computer networks
|
Gupta, Akshay Rameshbhai |
|
|
12 |
1 |
p. 303-319 |
artikel |
93 |
Three-tier IoT-edge-cloud (3T-IEC) architectural paradigm for real-time event recommendation in event-based social networks
|
Mahajan, Pratibha |
|
|
12 |
1 |
p. 1363-1386 |
artikel |
94 |
Topology-based generation of sport training sessions
|
Fister Jr., Iztok |
|
|
12 |
1 |
p. 667-678 |
artikel |
95 |
Transport electrification based on embedded electrical network and smart synchronization device
|
Benmahdjoub, Mohammed Amine |
|
|
12 |
1 |
p. 679-690 |
artikel |
96 |
Understanding the relation between travel duration and station choice behavior of cyclists in the metropolitan region of Amsterdam
|
van Kampen, Jullian |
|
|
12 |
1 |
p. 137-145 |
artikel |
97 |
Using neural nets to predict transportation mode choice: Amsterdam network change analysis
|
Buijs, Ruurd |
|
|
12 |
1 |
p. 121-135 |
artikel |
98 |
Vibration control of semi-active suspension system using PID controller with advanced firefly algorithm and particle swarm optimization
|
Ab Talib, Mat Hussin |
|
|
12 |
1 |
p. 1119-1137 |
artikel |
99 |
Wireless backhaul network’s capacity optimization using time series forecasting approach
|
Mahmood, Atif |
|
|
12 |
1 |
p. 1407-1418 |
artikel |
100 |
YOLO fish detection with Euclidean tracking in fish farms
|
Wageeh, Youssef |
|
|
12 |
1 |
p. 5-12 |
artikel |