nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abnormality detection and intelligent severity assessment of human chest computed tomography scans using deep learning: a case study on SARS-COV-2 assessment
|
Ibrahim, Mohamed Ramzy |
|
|
14 |
5 |
p. 5665-5688 |
artikel |
2 |
Accurate classification of ECG arrhythmia using MOWPT enhanced fast compression deep learning networks
|
Huang, Jing-Shan |
|
|
14 |
5 |
p. 5703-5720 |
artikel |
3 |
A comparison between heart-rate monitoring smart devices for ambient assisted living
|
Alsulami, Majid H. |
|
|
14 |
5 |
p. 6137-6148 |
artikel |
4 |
A design of lightweight ECC based cryptographic algorithm coupled with linear congruential method for resource constraint area in IoT
|
Aswathy, R. H. |
|
|
14 |
5 |
p. 5097-5106 |
artikel |
5 |
A differential approach and deep neural network based data privacy-preserving model in cloud environment
|
Gupta, Rishabh |
|
|
14 |
5 |
p. 4659-4674 |
artikel |
6 |
A fuzzy logic-based model for filtering dishonest recommendations in the Social Internet of Things
|
Ouechtati, Hamdi |
|
|
14 |
5 |
p. 6181-6200 |
artikel |
7 |
A hybrid ARIMA-LSTM model optimized by BP in the forecast of outpatient visits
|
Deng, Yamin |
|
|
14 |
5 |
p. 5517-5527 |
artikel |
8 |
AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes
|
Javed, Abdul Rehman |
|
|
14 |
5 |
p. 4869-4882 |
artikel |
9 |
Analyzing customer acceptance of the internet of things (IoT) in the retail industry
|
Nawi, Noorshella Che |
|
|
14 |
5 |
p. 5225-5237 |
artikel |
10 |
An approach to investigate the best location for the central node placement for energy efficient WBAN
|
Arora, Neha |
|
|
14 |
5 |
p. 5789-5800 |
artikel |
11 |
An automatic crisis information recognition model based on BP neural networks
|
Yang, Li |
|
|
14 |
5 |
p. 6201-6212 |
artikel |
12 |
Android malware detection method based on bytecode image
|
Ding, Yuxin |
|
|
14 |
5 |
p. 6401-6410 |
artikel |
13 |
An effective vitiligo intelligent classification system
|
Luo, Wei |
|
|
14 |
5 |
p. 5479-5488 |
artikel |
14 |
An efficient group signcryption scheme supporting batch verification for securing transmitted data in the Internet of Things
|
Alamer, Abdulrahman |
|
|
14 |
5 |
p. 5885-5902 |
artikel |
15 |
An elderly health monitoring system based on biological and behavioral indicators in internet of things
|
Hosseinzadeh, Mehdi |
|
|
14 |
5 |
p. 5085-5095 |
artikel |
16 |
An enhanced intrusion detection method for AIM of smart grid
|
Zhao, Huiqi |
|
|
14 |
5 |
p. 4827-4839 |
artikel |
17 |
A new framework for multi-scale CNN-based malignancy classification of pulmonary lung nodules
|
Sakshiwala, |
|
|
14 |
5 |
p. 4675-4683 |
artikel |
18 |
An improved air quality and climate control monitoring system using fuzzy logic for enclosed areas
|
Bushnag, Anas |
|
|
14 |
5 |
p. 6339-6347 |
artikel |
19 |
An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things
|
Kumar, Devender |
|
|
14 |
5 |
p. 5067-5083 |
artikel |
20 |
A novel fast and fair asynchronous channel hopping rendezvous scheme in cognitive radio networks for internet of things
|
Asifuddola, Mohd |
|
|
14 |
5 |
p. 6123-6135 |
artikel |
21 |
A novel lightweight PUF based authentication protocol for IoT without explicit CRPs in verifier database
|
Nimmy, K. |
|
|
14 |
5 |
p. 6227-6242 |
artikel |
22 |
A novel quantum-inspired solution for high-performance energy-efficient data acquisition from IoT networks
|
Bhatia, Munish |
|
|
14 |
5 |
p. 5001-5020 |
artikel |
23 |
Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model
|
Movassagh, Ali Akbar |
|
|
14 |
5 |
p. 6017-6025 |
artikel |
24 |
A scalable semantic data fusion framework for heterogeneous sensors data
|
Al-Baltah, Ibrahim Ahmed |
|
|
14 |
5 |
p. 5047-5066 |
artikel |
25 |
A scalable semantic framework for IoT healthcare applications
|
Zgheib, Rita |
|
|
14 |
5 |
p. 4883-4901 |
artikel |
26 |
A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques
|
Hameed, Mohamed Abdel |
|
|
14 |
5 |
p. 4639-4657 |
artikel |
27 |
A sensor deployment approach for target coverage problem in wireless sensor networks
|
Yarinezhad, Ramin |
|
|
14 |
5 |
p. 5941-5956 |
artikel |
28 |
A simple cross-layer mechanism for congestion control and performance enhancement in a localized multiple wireless body area networks
|
Liu, Qingling |
|
|
14 |
5 |
p. 6095-6112 |
artikel |
29 |
Automated breast cancer detection using hybrid extreme learning machine classifier
|
Melekoodappattu, Jayesh George |
|
|
14 |
5 |
p. 5489-5498 |
artikel |
30 |
BLE injection-free attack: a novel attack on bluetooth low energy devices
|
Santos, Aellison C. T. |
|
|
14 |
5 |
p. 5749-5759 |
artikel |
31 |
Blockchain-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
|
Gong, Cheng |
|
|
14 |
5 |
p. 6273-6286 |
artikel |
32 |
Blockchain-based federated learning with checksums to increase security in Internet of Things solutions
|
Prokop, Katarzyna |
|
|
14 |
5 |
p. 4685-4694 |
artikel |
33 |
Challenges facing the implementation of 5G
|
Alsulami, Majid H. |
|
|
14 |
5 |
p. 6213-6226 |
artikel |
34 |
Channel assignment in TSCH-based wireless sensor networks using fuzzy logic
|
Queiroz, Diego V. |
|
|
14 |
5 |
p. 6043-6062 |
artikel |
35 |
CHPT: an improved coverage-hole patching technique based on tree-center in wireless sensor networks
|
Das, Smita |
|
|
14 |
5 |
p. 5873-5884 |
artikel |
36 |
Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy
|
Muhammad, Zia |
|
|
14 |
5 |
p. 4785-4794 |
artikel |
37 |
Cloud of Things: architecture, applications and challenges
|
Alhaidari, Fahd |
|
|
14 |
5 |
p. 5957-5975 |
artikel |
38 |
Compressive sensing and paillier cryptosystem based secure data collection in WSN
|
Ifzarne, Samir |
|
|
14 |
5 |
p. 6243-6250 |
artikel |
39 |
Context‐aware computation offloading for mobile edge computing
|
Farahbakhsh, Fariba |
|
|
14 |
5 |
p. 5123-5135 |
artikel |
40 |
Contextual triple inference using a semantic reasoner rule to reduce the weight of semantically annotated data on fail–safe gateway for WSN
|
Urkude, Giridhar |
|
|
14 |
5 |
p. 5107-5121 |
artikel |
41 |
Cover feature: guest editors’ introduction title: internet of things for everyday living: ubiquitous intelligence at Scale
|
Okeyo, George |
|
|
14 |
5 |
p. 4865-4868 |
artikel |
42 |
DeCrypt: a 3DES inspired optimised cryptographic algorithm
|
Chowdhury, Deepraj |
|
|
14 |
5 |
p. 4745-4755 |
artikel |
43 |
Deep learning methods for biomedical information analysis
|
Zhang, Yudong |
|
|
14 |
5 |
p. 5293-5296 |
artikel |
44 |
Deep multitask learning for pervasive BMI estimation and identity recognition in smart beds
|
Davoodnia, Vandad |
|
|
14 |
5 |
p. 5463-5477 |
artikel |
45 |
Deep neural networks to predict diabetic retinopathy
|
Gadekallu, Thippa Reddy |
|
|
14 |
5 |
p. 5407-5420 |
artikel |
46 |
Deep soft clustering: simultaneous deep embedding and soft-partition clustering
|
Li, Kang |
|
|
14 |
5 |
p. 5581-5593 |
artikel |
47 |
DEFECT: discover and eradicate fool around node in emergency network using combinatorial techniques
|
Arun, S. |
|
|
14 |
5 |
p. 5995-6006 |
artikel |
48 |
DEODORANT: a novel approach for early detection and prevention of polycystic ovary syndrome using association rule in hypergraph with the dominating set property
|
Pradeepa, S. |
|
|
14 |
5 |
p. 5421-5437 |
artikel |
49 |
Design, analysis, and implementation of a new lightweight block cipher for protecting IoT smart devices
|
Ragab, Ahmed Ab. M. |
|
|
14 |
5 |
p. 6077-6094 |
artikel |
50 |
Designing a model for the usability of fog computing on the internet of things
|
Fazel, Elham |
|
|
14 |
5 |
p. 5193-5209 |
artikel |
51 |
Design of decision support system to identify crop water need
|
Poonia, Ramesh Chandra |
|
|
14 |
5 |
p. 5171-5178 |
artikel |
52 |
Detecting anomalies within smart buildings using do-it-yourself internet of things
|
Majib, Yasar |
|
|
14 |
5 |
p. 4727-4743 |
artikel |
53 |
Detection of abnormalities in mammograms using deep features
|
Tavakoli, Nasrin |
|
|
14 |
5 |
p. 5355-5367 |
artikel |
54 |
Diagnosis of cerebral microbleed via VGG and extreme learning machine trained by Gaussian map bat algorithm
|
Lu, Siyuan |
|
|
14 |
5 |
p. 5395-5406 |
artikel |
55 |
Diffusion tensor imaging denoising based on Riemann nonlocal similarity
|
Liu, Shuaiqi |
|
|
14 |
5 |
p. 5369-5382 |
artikel |
56 |
DL-VSM based document indexing approach for information retrieval
|
Boukhari, Kabil |
|
|
14 |
5 |
p. 5383-5394 |
artikel |
57 |
Dm6A-TSVM: detection of N6-methyladenosine (m6A) sites from RNA transcriptomes using the twin support vector machines
|
Liu, Zhaoyang |
|
|
14 |
5 |
p. 5499-5505 |
artikel |
58 |
DPN: detail-preserving network with high resolution representation for efficient segmentation of retinal vessels
|
Guo, Song |
|
|
14 |
5 |
p. 5689-5702 |
artikel |
59 |
EERBCR: Energy-efficient regional based cooperative routing protocol for underwater sensor networks with sink mobility
|
Gul, Haseena |
|
|
14 |
5 |
p. 6063-6075 |
artikel |
60 |
Empirical study of shallow and deep learning models for sarcasm detection using context in benchmark datasets
|
Kumar, Akshi |
|
|
14 |
5 |
p. 5327-5342 |
artikel |
61 |
Enclosing and monitoring of disaster area boundary using multi-UAV network
|
Joshi, Abhishek |
|
|
14 |
5 |
p. 6287-6305 |
artikel |
62 |
Energy harvesting relay selection and power allocation in cooperative secure NOMA networks with imperfect SIC over Nakagami-m channel
|
Najimi, Maryam |
|
|
14 |
5 |
p. 6251-6261 |
artikel |
63 |
Enhanced query processing over semantic cache for cloud based relational databases
|
Ahmad, Munir |
|
|
14 |
5 |
p. 5853-5871 |
artikel |
64 |
Extraction and analysis of brain functional statuses for early mild cognitive impairment using variational auto-encoder
|
Jiao, Zhuqing |
|
|
14 |
5 |
p. 5439-5450 |
artikel |
65 |
Flexible synthetic mobility modeling to discover trajectories for complex areas of mobile wireless networks
|
Ibadah, Nisrine |
|
|
14 |
5 |
p. 5735-5748 |
artikel |
66 |
Fuzzy logic and Fog based Secure Architecture for Internet of Things (FLFSIoT)
|
Zahra, Syed Rameem |
|
|
14 |
5 |
p. 5903-5927 |
artikel |
67 |
GRBF-NN based ambient aware realtime adaptive communication in DVB-S2
|
Rahman, Atta |
|
|
14 |
5 |
p. 5929-5939 |
artikel |
68 |
GroupShop: monitoring group shopping behavior in real world using mobile devices
|
Du, He |
|
|
14 |
5 |
p. 6367-6378 |
artikel |
69 |
Guest Editorial: Advanced information hiding techniques for industrial applications
|
Singh, Amit Kumar |
|
|
14 |
5 |
p. 4635-4638 |
artikel |
70 |
Identification and prediction of attacks to industrial control systems using temporal point processes
|
Fortino, Giancarlo |
|
|
14 |
5 |
p. 4771-4783 |
artikel |
71 |
Implementation of key predistribution scheme in WSN based on binary Goppa codes and Reed Solomon codes with enhanced connectivity and resiliency
|
Biswas, Chinmoy |
|
|
14 |
5 |
p. 5801-5816 |
artikel |
72 |
In-store customer traffic and path monitoring in small-scale supermarket using UWB-based localization and SSD-based detection
|
Alipio, Melchizedek I. |
|
|
14 |
5 |
p. 4955-4969 |
artikel |
73 |
Integer wavelet transform based an effective fragile watermarking scheme for exact authentication and restoration
|
Singh, Durgesh |
|
|
14 |
5 |
p. 4841-4852 |
artikel |
74 |
Internet of Things and artificial intelligence enable energy efficiency
|
Tomazzoli, Claudio |
|
|
14 |
5 |
p. 4933-4954 |
artikel |
75 |
Intrusion detection for the internet of things (IoT) based on the emperor penguin colony optimization algorithm
|
Alweshah, Mohammed |
|
|
14 |
5 |
p. 6349-6366 |
artikel |
76 |
IoT-based system to measure thermal insulation efficiency
|
Abdalgader, Khaled |
|
|
14 |
5 |
p. 5265-5278 |
artikel |
77 |
IoT-inspired machine learning-assisted sedentary behavior analysis in smart healthcare industry
|
Manocha, Ankush |
|
|
14 |
5 |
p. 5179-5192 |
artikel |
78 |
IoT-inspired smart home based urine infection prediction
|
Bhatia, Munish |
|
|
14 |
5 |
p. 5249-5263 |
artikel |
79 |
Link discontinuity and optimal route data delivery for random waypoint model
|
Kumar, Jogendra |
|
|
14 |
5 |
p. 6165-6179 |
artikel |
80 |
Long range wide area network for agricultural wireless underground sensor networks
|
Wu, Shiyang |
|
|
14 |
5 |
p. 4903-4919 |
artikel |
81 |
LRBC: a lightweight block cipher design for resource constrained IoT devices
|
Biswas, A. |
|
|
14 |
5 |
p. 5773-5787 |
artikel |
82 |
Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks
|
Alsarhan, Ayoub |
|
|
14 |
5 |
p. 6113-6122 |
artikel |
83 |
Machine learning techniques for the Schizophrenia diagnosis: a comprehensive review and future research directions
|
Verma, Shradha |
|
|
14 |
5 |
p. 4795-4807 |
artikel |
84 |
MCNN: a multi-level CNN model for the classification of brain tumors in IoT-healthcare system
|
Haq, Amin ul |
|
|
14 |
5 |
p. 4695-4706 |
artikel |
85 |
MDO: a novel murmuration-flight based dispersive optimization algorithm and its application to image security
|
Bharti, Vandana |
|
|
14 |
5 |
p. 4809-4826 |
artikel |
86 |
Medical assistive system for automatic identification of prescribed medicines by visually challenged from the medicine box using invariant feature extraction
|
Vasavi, S. |
|
|
14 |
5 |
p. 5721-5730 |
artikel |
87 |
Mitigation of commutation failure method in LCC converter based on HVDC systems by mean of modeling and simulation
|
Mankour, Mohamed |
|
|
14 |
5 |
p. 5837-5852 |
artikel |
88 |
Model of an intelligent smart home system based on ambient intelligence and user profiling
|
Đuric, Igor |
|
|
14 |
5 |
p. 5137-5149 |
artikel |
89 |
Module partitioning for multilayer brain functional network using weighted clustering ensemble
|
Jiao, Zhuqing |
|
|
14 |
5 |
p. 5343-5353 |
artikel |
90 |
Molecular cancer classification method on microarrays gene expression data using hybrid deep neural network and grey wolf algorithm
|
Hajieskandar, AliReza |
|
|
14 |
5 |
p. 5297-5307 |
artikel |
91 |
Moving target extraction and background reconstruction algorithm
|
Qiu, Shi |
|
|
14 |
5 |
p. 6007-6015 |
artikel |
92 |
Multiview human activity recognition using uniform rotation invariant local binary patterns
|
Nigam, Swati |
|
|
14 |
5 |
p. 4707-4725 |
artikel |
93 |
Network traffic discrimination improvement in software defined network (SDN) with deep autoencoder and ensemble method
|
Shirmarz, Alireza |
|
|
14 |
5 |
p. 6321-6337 |
artikel |
94 |
Novel framework based on deep learning and cloud analytics for smart patient monitoring and recommendation (SPMR)
|
Motwani, Anand |
|
|
14 |
5 |
p. 5565-5580 |
artikel |
95 |
Novel multi-view Takagi–Sugeno–Kang fuzzy system for epilepsy EEG detection
|
Li, Yarong |
|
|
14 |
5 |
p. 5625-5645 |
artikel |
96 |
Ontological concepts for information sharing in cloud robotics
|
Pignaton de Freitas, Edison |
|
|
14 |
5 |
p. 4921-4932 |
artikel |
97 |
Optimal bandwidth allocation for web crawler systems with time constraints
|
Zhu, Weiping |
|
|
14 |
5 |
p. 5279-5292 |
artikel |
98 |
Performance exploration of on-body WBAN using CM3A-IEEE 802.15.6 channel model
|
Gupta, Sindhu Hak |
|
|
14 |
5 |
p. 5761-5772 |
artikel |
99 |
Plane sweep algorithms for data collection for energy harvesting wireless sensor networks using mobile sink
|
Dash, Dinesh |
|
|
14 |
5 |
p. 6307-6320 |
artikel |
100 |
PPDMIT: a lightweight architecture for privacy-preserving data aggregation in the Internet of Things
|
Gheisari, Mehdi |
|
|
14 |
5 |
p. 5211-5223 |
artikel |
101 |
Rapid COVID-19 diagnosis using ensemble deep transfer learning models from chest radiographic images
|
Gianchandani, Neha |
|
|
14 |
5 |
p. 5541-5553 |
artikel |
102 |
Research on image inpainting algorithm of improved total variation minimization method
|
Chen, Yuantao |
|
|
14 |
5 |
p. 5555-5564 |
artikel |
103 |
Review paper on research direction towards cancer prediction and prognosis using machine learning and deep learning models
|
Murthy, Nimmagadda Satyanarayana |
|
|
14 |
5 |
p. 5595-5613 |
artikel |
104 |
Robust and efficient hashing framework for industrial surveillance
|
Singh, Satendra Pal |
|
|
14 |
5 |
p. 4757-4769 |
artikel |
105 |
Secure and efficient firmware update for increasing IoT-enabled smart devices
|
Lu, Ching-Hu |
|
|
14 |
5 |
p. 4987-5000 |
artikel |
106 |
Secure data authentication and access control protocol for industrial healthcare system
|
Gupta, Daya Sagar |
|
|
14 |
5 |
p. 4853-4864 |
artikel |
107 |
Semi-supervised recommender system for bone implant ratio recommendation
|
Qiu, Xihe |
|
|
14 |
5 |
p. 5615-5624 |
artikel |
108 |
Sentiment analysis and text categorization of cancer medical records with LSTM
|
Edara, Deepak Chowdary |
|
|
14 |
5 |
p. 5309-5325 |
artikel |
109 |
Single server multiple vacation queue with discouragement solve by confluent hypergeometric function
|
Kumar, Amit |
|
|
14 |
5 |
p. 6411-6422 |
artikel |
110 |
Smart innovation for IoT and mobile networks
|
Benavente-Peces, César |
|
|
14 |
5 |
p. 5731-5733 |
artikel |
111 |
Stochastic game network based model for disaster management in smart industry
|
Kaur, Avneet |
|
|
14 |
5 |
p. 5151-5169 |
artikel |
112 |
Strongly-resilient, well connected, non-interactive and gateway-free hierarchical deterministic key agreement schemes using Chinese remainder theorem
|
Sarkar, Pinaki |
|
|
14 |
5 |
p. 5817-5836 |
artikel |
113 |
Structured analysis dictionary learning based on discriminative Fisher pair
|
Li, Zhengming |
|
|
14 |
5 |
p. 5647-5664 |
artikel |
114 |
Study and implementation of K-multiple constraint shortest path for H.265 HEVC for optimal video compression
|
Kumar, Rajender |
|
|
14 |
5 |
p. 6149-6164 |
artikel |
115 |
Stylistic data-driven possibilistic fuzzy clustering and real-life application on epilepsy biomedical electronic signals detection
|
Sheng, Guanglei |
|
|
14 |
5 |
p. 5451-5462 |
artikel |
116 |
The application of wearable smart sensors for monitoring the vital signs of patients in epidemics: a systematic literature review
|
Mohammadzadeh, Niloofar |
|
|
14 |
5 |
p. 6027-6041 |
artikel |
117 |
The impact of 5G on the evolution of intelligent automation and industry digitization
|
Attaran, Mohsen |
|
|
14 |
5 |
p. 5977-5993 |
artikel |
118 |
Towards a cyber-physical system for sustainable and smart building: a use case for optimising water consumption on a SmartCampus
|
Barroso, Sergio |
|
|
14 |
5 |
p. 6379-6399 |
artikel |
119 |
Transfer discriminative dictionary learning with label consistency for classification of EEG signals of epilepsy
|
Ni, Tongguang |
|
|
14 |
5 |
p. 5529-5540 |
artikel |
120 |
Ubiquitous healthcare: a systematic mapping study
|
Saleemi, Maria |
|
|
14 |
5 |
p. 5021-5046 |
artikel |
121 |
Using model’s temporal features and hierarchical structure for similar activity recognition
|
Li, Qingjuan |
|
|
14 |
5 |
p. 5239-5248 |
artikel |
122 |
Video detection of foreign objects on the surface of belt conveyor underground coal mine based on improved SSD
|
Wang, Yuanbin |
|
|
14 |
5 |
p. 5507-5516 |
artikel |
123 |
Water contaminants detection using sensor placement approach in smart water networks
|
Shahra, Essa Q. |
|
|
14 |
5 |
p. 4971-4986 |
artikel |
124 |
Wireless modulation classification based on Radon transform and convolutional neural networks
|
Ghanem, Hanan S. |
|
|
14 |
5 |
p. 6263-6272 |
artikel |