nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A card-based internet of things game ideation tool for museum context
|
Huang, Hai |
|
|
12 |
10 |
p. 9229-9240 |
artikel |
2 |
A deep learning based wearable system for food and drink intake recognition
|
Ortega Anderez, Dario |
|
|
12 |
10 |
p. 9435-9447 |
artikel |
3 |
A discrete chaotic multi-objective SCA-ALO optimization algorithm for an optimal virtual machine placement in cloud data center
|
Gharehpasha, Sasan |
|
|
12 |
10 |
p. 9323-9339 |
artikel |
4 |
A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks
|
Kumar, Prabhat |
|
|
12 |
10 |
p. 9555-9572 |
artikel |
5 |
Agent-based autonomous pollution source localization for complex environment
|
Xiao, Dehu |
|
|
12 |
10 |
p. 9481-9489 |
artikel |
6 |
Analysis and design of fuzzy-based manoeuvring model for mid-vehicle collision avoidance system
|
Narayanan, Prabhakaran |
|
|
12 |
10 |
p. 9909-9922 |
artikel |
7 |
An enhanced moth-swarm algorithm for efficient energy management based multi dimensions OPF problem
|
Bentouati, Bachir |
|
|
12 |
10 |
p. 9499-9519 |
artikel |
8 |
A new graph-based extractive text summarization using keywords or topic modeling
|
Belwal, Ramesh Chandra |
|
|
12 |
10 |
p. 8975-8990 |
artikel |
9 |
An extended ACO-based mobile sink path determination in wireless sensor networks
|
Donta, Praveen Kumar |
|
|
12 |
10 |
p. 8991-9006 |
artikel |
10 |
Anomaly-based network intrusion detection with ensemble classifiers and meta-heuristic scale (ECMHS) in traffic flow streams
|
Dasari, Durga Bhavani |
|
|
12 |
10 |
p. 9241-9268 |
artikel |
11 |
A practical solution based on convolutional neural network for non-intrusive load monitoring
|
Moradzadeh, Arash |
|
|
12 |
10 |
p. 9775-9789 |
artikel |
12 |
A pyramidal community detection algorithm based on a generalization of the clustering coefficient
|
Midoun, Mohamed Amine |
|
|
12 |
10 |
p. 9111-9125 |
artikel |
13 |
A survey on healthcare data security in wireless body area networks
|
Jabeen, Tallat |
|
|
12 |
10 |
p. 9841-9854 |
artikel |
14 |
Automated leather defect inspection using statistical approach on image intensity
|
Gan, Y. S. |
|
|
12 |
10 |
p. 9269-9285 |
artikel |
15 |
Big data analytics as a tool for fighting pandemics: a systematic review of literature
|
Corsi, Alana |
|
|
12 |
10 |
p. 9163-9180 |
artikel |
16 |
Brain tumor segmentation using cluster ensemble and deep super learner for classification of MRI
|
Ramya, P. |
|
|
12 |
10 |
p. 9939-9952 |
artikel |
17 |
Certain investigations of ANFIS assisted CPHO algorithm tuned MPPT controller for PV arrays under partial shading conditions
|
Pachaivannan, Nammalvar |
|
|
12 |
10 |
p. 9923-9938 |
artikel |
18 |
Composite deep neural network with gated-attention mechanism for diabetic retinopathy severity classification
|
Bodapati, Jyostna Devi |
|
|
12 |
10 |
p. 9825-9839 |
artikel |
19 |
Customisable assistive plans as dynamic composition of services with normed-QoS
|
Di Napoli, Claudia |
|
|
12 |
10 |
p. 9667-9692 |
artikel |
20 |
Deep convolutional neural network based secure wireless voice communication for underground mines
|
Dey, Prasanjit |
|
|
12 |
10 |
p. 9591-9610 |
artikel |
21 |
Design and performance evaluation of V2X communication protocol based on Nakagami-m outage probability
|
Wang, Tong |
|
|
12 |
10 |
p. 9405-9421 |
artikel |
22 |
Differential analysis of gene regulatory networks modeled with structural equation models
|
Li, Yan |
|
|
12 |
10 |
p. 9181-9192 |
artikel |
23 |
Discrete quality factors aware channel scheduling in Cognitive Radio Ad-hoc Networks
|
Dasari, Ramesh |
|
|
12 |
10 |
p. 9097-9110 |
artikel |
24 |
Efficient communication and EEG signal classification in wavelet domain for epilepsy patients
|
El-Gindy, Saly Abd-Elateif |
|
|
12 |
10 |
p. 9193-9208 |
artikel |
25 |
Enabling self-adaptability of small scale and large scale security systems using dynamic partial reconfiguration
|
Manjith, B. C. |
|
|
12 |
10 |
p. 9387-9403 |
artikel |
26 |
Energy-efficient sensor selection for multi-channel cooperative spectrum sensing based on game theory
|
Bagheri, Asma |
|
|
12 |
10 |
p. 9363-9374 |
artikel |
27 |
Extensive hotel reviews classification using long short term memory
|
Ishaq, Abid |
|
|
12 |
10 |
p. 9375-9385 |
artikel |
28 |
Historical data based approach for straggler avoidance in a heterogeneous Hadoop cluster
|
Bawankule, Kamalakant Laxman |
|
|
12 |
10 |
p. 9573-9589 |
artikel |
29 |
Image classification using regularized convolutional neural network design with dimensionality reduction modules: RCNN–DRM
|
Sajja, Tulasi Krishna |
|
|
12 |
10 |
p. 9423-9434 |
artikel |
30 |
Incorporating multidimensional information into dynamic recommendation process to cope with cold start and data sparsity problems
|
Kolahkaj, Maral |
|
|
12 |
10 |
p. 9535-9554 |
artikel |
31 |
Information-theoretic approach for secure localization against sybil attack in wireless sensor network
|
Giri, Arindam |
|
|
12 |
10 |
p. 9491-9497 |
artikel |
32 |
Intelligent hybrid technique for cascaded multilevel inverter based three phase grid-tie hybrid power system: a WPSNN technique
|
Kumar, S. Satish |
|
|
12 |
10 |
p. 9637-9666 |
artikel |
33 |
Large-scale multiple criteria decision-making with missing values: project selection through TOPSIS-OPA
|
Mahmoudi, Amin |
|
|
12 |
10 |
p. 9341-9362 |
artikel |
34 |
(lp1,…,lpn)-Privacy: privacy preservation models for numerical quasi-identifiers and multiple sensitive attributes
|
Riyana, Surapon |
|
|
12 |
10 |
p. 9713-9729 |
artikel |
35 |
Mitigation of power quality issues in smart grid using levy flight based moth flame optimization algorithm
|
Suja, K. R. |
|
|
12 |
10 |
p. 9209-9228 |
artikel |
36 |
Modeling user preference dynamics with coupled tensor factorization for social media recommendation
|
Tahmasbi, Hamidreza |
|
|
12 |
10 |
p. 9693-9712 |
artikel |
37 |
Multi-objective long-short term memory recurrent neural networks for speech enhancement
|
Saleem, Nasir |
|
|
12 |
10 |
p. 9037-9052 |
artikel |
38 |
New adaptive intelligent grey wolf optimizer based multi-objective quantitative classification rules mining approaches
|
Yildirim, Gungor |
|
|
12 |
10 |
p. 9611-9635 |
artikel |
39 |
Opposition-based learning inspired particle swarm optimization (OPSO) scheme for task scheduling problem in cloud computing
|
Agarwal, Mohit |
|
|
12 |
10 |
p. 9855-9875 |
artikel |
40 |
PAPIR: privacy-aware personalized information retrieval
|
El-Ansari, Anas |
|
|
12 |
10 |
p. 9891-9907 |
artikel |
41 |
PCS-ABE (t, n): a secure threshold multi authority CP-ABE scheme based efficient access control systems for cloud environment
|
Ramesh, Dharavath |
|
|
12 |
10 |
p. 9303-9322 |
artikel |
42 |
Predicting mental health using smart-phone usage and sensor data
|
Thakur, Saurabh Singh |
|
|
12 |
10 |
p. 9145-9161 |
artikel |
43 |
Predicting the energy consumption in software defined wireless sensor networks: a probabilistic Markov model approach
|
Rahimifar, Atefeh |
|
|
12 |
10 |
p. 9053-9066 |
artikel |
44 |
Real-time fast fog removal approach for assisting drivers during dense fog on hilly roads
|
Mandal, Gouranga |
|
|
12 |
10 |
p. 9877-9889 |
artikel |
45 |
Reinforcement learning-based spatial sorting based dynamic task allocation on networked multicore GPU processors
|
Ramesh, K. |
|
|
12 |
10 |
p. 9731-9738 |
artikel |
46 |
Reliable verification of distributed encoded data fragments in the cloud
|
Chouhan, Vikas |
|
|
12 |
10 |
p. 9127-9143 |
artikel |
47 |
Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications
|
El-Shafai, Walid |
|
|
12 |
10 |
p. 9007-9035 |
artikel |
48 |
Script pattern identification of word images using multi-directional and multi-scalable textures
|
Sahare, Parul |
|
|
12 |
10 |
p. 9739-9755 |
artikel |
49 |
SDN-based security management of multiple WoT Smart Spaces
|
El Jaouhari, Saad |
|
|
12 |
10 |
p. 9081-9096 |
artikel |
50 |
Smart electrical grids based on cloud, IoT, and big data technologies: state of the art
|
Rabie, Asmaa H. |
|
|
12 |
10 |
p. 9449-9480 |
artikel |
51 |
Stock prediction and mutual fund portfolio management using curve fitting techniques
|
Maji, Giridhar |
|
|
12 |
10 |
p. 9521-9534 |
artikel |
52 |
Study for classification and recognition of radar emitter intra-pulse signals based on the energy cumulant of CWD
|
Dong, Pengyu |
|
|
12 |
10 |
p. 9809-9823 |
artikel |
53 |
SV2VCS: a secure vehicle-to-vehicle communication scheme based on lightweight authentication and concurrent data collection trees
|
Tandon, Righa |
|
|
12 |
10 |
p. 9791-9807 |
artikel |
54 |
TextSpamDetector: textual content based deep learning framework for social spam detection using conjoint attention mechanism
|
Elakkiya, E. |
|
|
12 |
10 |
p. 9287-9302 |
artikel |
55 |
The evolution of data gathering static and mobility models in underwater wireless sensor networks: a survey
|
Gupta, Osho |
|
|
12 |
10 |
p. 9757-9773 |
artikel |
56 |
T-spherical fuzzy power aggregation operators and their applications in multi-attribute decision making
|
Garg, Harish |
|
|
12 |
10 |
p. 9067-9080 |
artikel |