nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A BCS code in the f-OFDM system: a promising candidate for 5G wireless communication systems
|
Hussain, Ghasan Ali |
|
|
13 |
8 |
p. 3963-3972 |
artikel |
2 |
A bearing fault diagnosis model based on CNN with wide convolution kernels
|
Song, Xudong |
|
|
13 |
8 |
p. 4041-4056 |
artikel |
3 |
A Fibonacci p-code traversing and unified chaotic map-based image encryption algorithm
|
Anandkumar, R. |
|
|
13 |
8 |
p. 3713-3727 |
artikel |
4 |
A logistic map based blind and fragile watermarking for tamper detection and localization in images
|
Sahu, Aditya Kumar |
|
|
13 |
8 |
p. 3869-3881 |
artikel |
5 |
An approach to detect human body movement using different channel models and machine learning techniques
|
Kaushik, Monica |
|
|
13 |
8 |
p. 3973-3987 |
artikel |
6 |
An enhanced hybrid ant colony optimization routing protocol for vehicular ad-hoc networks
|
Ramamoorthy, Raghu |
|
|
13 |
8 |
p. 3837-3868 |
artikel |
7 |
An optimal and adaptive double threshold-based approach to minimize error probability for spectrum sensing at low SNR regime
|
Mahendru, Garima |
|
|
13 |
8 |
p. 3935-3944 |
artikel |
8 |
A novel application architecture of digital twin in smart grid
|
Jiang, Zongmin |
|
|
13 |
8 |
p. 3819-3835 |
artikel |
9 |
Application of graph domination to defend medical information networks against cyber threats
|
Angel, D. |
|
|
13 |
8 |
p. 3765-3770 |
artikel |
10 |
A proof-of-concept and feasibility analysis of using social sensors in the context of causal machine learning-based emergency management
|
Sahoh, Bukhoree |
|
|
13 |
8 |
p. 3747-3763 |
artikel |
11 |
Banana ripeness stage identification: a deep learning approach
|
Saranya, N. |
|
|
13 |
8 |
p. 4033-4039 |
artikel |
12 |
BiGRU attention capsule neural network for persian text classification
|
Kenarang, Amir |
|
|
13 |
8 |
p. 3923-3933 |
artikel |
13 |
Development of automated billing system in shopping malls
|
Pangasa, Himani |
|
|
13 |
8 |
p. 3883-3891 |
artikel |
14 |
Generalized ordered weighted harmonic averaging operator with trapezoidal neutrosophic numbers for solving MADM problems
|
Paulraj, S. |
|
|
13 |
8 |
p. 4089-4102 |
artikel |
15 |
Generative adversarial network based abnormal behavior detection in massive crowd videos: a Hajj case study
|
Alafif, Tarik |
|
|
13 |
8 |
p. 4077-4088 |
artikel |
16 |
Giraffe kicking optimization algorithm provides efficient routing mechanism in the field of vehicular ad hoc networks
|
Behura, Aradhana |
|
|
13 |
8 |
p. 3989-4008 |
artikel |
17 |
Human emotion modeling (HEM): an interface for IoT systems
|
Elkobaisi, Mohammed R. |
|
|
13 |
8 |
p. 4009-4017 |
artikel |
18 |
LDuAP: lightweight dual auditing protocol to verify data integrity in cloud storage servers
|
Yoosuf, Mohamed Sirajudeen |
|
|
13 |
8 |
p. 3787-3805 |
artikel |
19 |
MADM approach to analyse the performance of fuzzy regression models
|
Kazemifard, Ahmad |
|
|
13 |
8 |
p. 4019-4031 |
artikel |
20 |
Option pricing based on a type of fuzzy process
|
You, Cuilian |
|
|
13 |
8 |
p. 3771-3785 |
artikel |
21 |
Performance analysis of SSA optimized fuzzy 1PD-PI controller on AGC of renewable energy assisted thermal and hydro-thermal power systems
|
Çelik, Emre |
|
|
13 |
8 |
p. 4103-4122 |
artikel |
22 |
RecogHypertension: early recognition of hypertension based on heart rate variability
|
Ni, Hongbo |
|
|
13 |
8 |
p. 3945-3962 |
artikel |
23 |
RETRACTED ARTICLE: Novel deep learning framework for broadcasting abnormal events obtained from surveillance applications
|
Krishnaveni, P. |
|
|
13 |
8 |
p. 4123 |
artikel |
24 |
Secrecy performance of a novel energy efficient hybrid CIoT network with beacon-aided RF energy harvesting under dissimilar fading environments
|
Thakur, Chandrima |
|
|
13 |
8 |
p. 4057-4075 |
artikel |
25 |
Secure quantum fog computing model based on blind quantum computation
|
Qu, Zhiguo |
|
|
13 |
8 |
p. 3807-3817 |
artikel |
26 |
Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography
|
Sandhia, G. K. |
|
|
13 |
8 |
p. 3893-3902 |
artikel |
27 |
Simorgh, a fully decentralized blockchain-based secure communication system
|
Mirzaei, Ebad |
|
|
13 |
8 |
p. 3903-3921 |
artikel |
28 |
Skeleton-based human action recognition with sequential convolutional-LSTM networks and fusion strategies
|
Khowaja, Sunder Ali |
|
|
13 |
8 |
p. 3729-3746 |
artikel |