nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accurate and Fast Computation of Exponent Fourier Moment
|
Singh, Satya P |
|
2017 |
42 |
8 |
p. 3299-3306 |
artikel |
2 |
A Controlled Experiment on Comparison of Data Perspectives for Software Requirements Documentation
|
Ibriwesh, Iyas |
|
2017 |
42 |
8 |
p. 3175-3189 |
artikel |
3 |
A Generic Framework for Building Heterogeneous Simulations of Parallel and Distributed Computing Systems
|
Dursun, Taner |
|
2017 |
42 |
8 |
p. 3357-3373 |
artikel |
4 |
A Heuristic-Based Approach for Dynamic VMs Consolidation in Cloud Data Centers
|
Abdullah, Monir |
|
2017 |
42 |
8 |
p. 3535-3549 |
artikel |
5 |
An Algorithmic Approach for Predicting Unknown Information in Incomplete Fuzzy Soft Set
|
Das, Sujit |
|
2017 |
42 |
8 |
p. 3563-3571 |
artikel |
6 |
An Efficient Distributed Algorithm for Big Data Processing
|
Al-kahtani, Mohammed S. |
|
2017 |
42 |
8 |
p. 3149-3157 |
artikel |
7 |
An Enhanced Vertical Handover Based on Fuzzy Inference MADM Approach for Heterogeneous Networks
|
Zineb, Aymen Ben |
|
2017 |
42 |
8 |
p. 3263-3274 |
artikel |
8 |
A New Discrete Electromagnetism-Like Mechanism Algorithm for Identical Parallel Machine Scheduling Problem with Eligibility Constraints in Metal Nuts Manufacturing
|
Lee, Cheng-Hsiung |
|
2017 |
42 |
8 |
p. 3609-3620 |
artikel |
9 |
A Novel, Efficient, Robust, and Blind Imperceptible 3D Anaglyph Image Watermarking
|
Devi, Hidangmayum Saxena |
|
2017 |
42 |
8 |
p. 3521-3533 |
artikel |
10 |
A Novel LWCSO-PKM-Based Feature Optimization and Classification of Attack Types in SCADA Network
|
Krishnan Sadhasivan, Dhanalakshmi |
|
2017 |
42 |
8 |
p. 3435-3449 |
artikel |
11 |
A Novel Shape-Based Character Segmentation Method for Devanagari Script
|
Jindal, Khushneet |
|
2017 |
42 |
8 |
p. 3221-3228 |
artikel |
12 |
Arabic reCAPTCHA Service for Enhancing Digitization of Arabic Manuscripts
|
Abubaker, Hanin |
|
2017 |
42 |
8 |
p. 3391-3408 |
artikel |
13 |
Building Accurate and Practical Recommender System Algorithms Using Machine Learning Classifier and Collaborative Filtering
|
Sattar, Asma |
|
2017 |
42 |
8 |
p. 3229-3247 |
artikel |
14 |
Comparative Modular Exponentiation with Randomized Exponent to Resist Power Analysis Attacks
|
Mahanta, Hridoy Jyoti |
|
2017 |
42 |
8 |
p. 3423-3434 |
artikel |
15 |
DCCD: Distributed N-Body Rigid Continuous Collision Detection for Large-Scale Virtual Environments
|
Du, Peng |
|
2017 |
42 |
8 |
p. 3141-3147 |
artikel |
16 |
Diagnosis of Focal Liver Diseases Based on Deep Learning Technique for Ultrasound Images
|
Hassan, Tarek M. |
|
2017 |
42 |
8 |
p. 3127-3140 |
artikel |
17 |
Digital Quran Computing: Review, Classification, and Trend Analysis
|
Zakariah, Mohammed |
|
2017 |
42 |
8 |
p. 3077-3102 |
artikel |
18 |
EIMAKP: Heterogeneous Cross-Domain Authenticated Key Agreement Protocols in the EIM System
|
Yuan, Chao |
|
2017 |
42 |
8 |
p. 3275-3287 |
artikel |
19 |
Electronically Tunable Fractional Order Filter
|
Verma, Rakesh |
|
2017 |
42 |
8 |
p. 3409-3422 |
artikel |
20 |
Enhancing Efficiency of the Test Case Prioritization Technique by Improving the Rate of Fault Detection
|
Nayak, Soumen |
|
2017 |
42 |
8 |
p. 3307-3323 |
artikel |
21 |
Evolution Prediction and Process Support of OSS Studies: A Systematic Mapping
|
Rasool, Ghulam |
|
2017 |
42 |
8 |
p. 3465-3502 |
artikel |
22 |
Extended Absolute Fuzzy Connectedness Segmentation Algorithm Utilizing Region and Boundary-Based Information
|
Farag, T. H. |
|
2017 |
42 |
8 |
p. 3573-3583 |
artikel |
23 |
Extended Shearlet-Based Image Watermarking Algorithm Using Selective Coefficients in Horizontal Cone
|
Jian, Zhao |
|
2017 |
42 |
8 |
p. 3597-3607 |
artikel |
24 |
Forecasting Chaotic Time Series Via Anfis Supported by Vortex Optimization Algorithm: Applications on Electroencephalogram Time Series
|
Kose, Utku |
|
2016 |
42 |
8 |
p. 3103-3114 |
artikel |
25 |
Forecasting Local Mean Sea Level by Generalized Behavioral Learning Method
|
Ertuğrul, Ömer Faruk |
|
2017 |
42 |
8 |
p. 3289-3298 |
artikel |
26 |
Foreground Detection via Background Subtraction and Improved Three-Frame Differencing
|
Sengar, Sandeep Singh |
|
2017 |
42 |
8 |
p. 3621-3633 |
artikel |
27 |
FPGA-Based Parallel Implementation of Morphological Operators for 2D Gray-Level Images
|
Mukherjee, Debasish |
|
2017 |
42 |
8 |
p. 3191-3206 |
artikel |
28 |
Measuring Object-Oriented Class Cohesion Based on Complex Networks
|
Gu, Aihua |
|
2017 |
42 |
8 |
p. 3551-3561 |
artikel |
29 |
Mutual Information-Based Tracking for Multiple Cameras and Multiple Planes
|
Wen, Zhuoman |
|
2017 |
42 |
8 |
p. 3451-3463 |
artikel |
30 |
Network Moving Target Defense Technique Based on Self-Adaptive End-Point Hopping
|
Lei, Cheng |
|
2017 |
42 |
8 |
p. 3249-3262 |
artikel |
31 |
New Hybrid PCA-Based Facial Age Estimation Using Inter-Age Group Variation-Based Hierarchical Classifier
|
Sahoo, Tapan Kumar |
|
2017 |
42 |
8 |
p. 3337-3355 |
artikel |
32 |
Node Localization in Wireless Sensor Networks Using Butterfly Optimization Algorithm
|
Arora, Sankalap |
|
2017 |
42 |
8 |
p. 3325-3335 |
artikel |
33 |
Novel Selection Schemes for Cuckoo Search
|
Abed-alguni, Bilal H. |
|
2017 |
42 |
8 |
p. 3635-3654 |
artikel |
34 |
Pedestrian Detection with Minimal False Positives per Color-Thermal Image
|
Afrakhteh, Masoud |
|
2017 |
42 |
8 |
p. 3207-3219 |
artikel |
35 |
Performance Study of MANET Routing Protocols in VANET
|
Maratha, Barakat Pravin |
|
2016 |
42 |
8 |
p. 3115-3126 |
artikel |
36 |
Popularity-Aware Content Caching for Distributed Wireless Helper Nodes
|
Khan, Furqan H. |
|
2017 |
42 |
8 |
p. 3375-3389 |
artikel |
37 |
Quantification of Software Code Coverage Using Artificial Bee Colony Optimization Based on Markov Approach
|
Boopathi, Muthusamy |
|
2017 |
42 |
8 |
p. 3503-3519 |
artikel |
38 |
Study of Immune-Based Intrusion Detection Technology in Wireless Sensor Networks
|
Xiao, Xin |
|
2017 |
42 |
8 |
p. 3159-3174 |
artikel |
39 |
TDC: Typed Dependencies-Based Chunking Model
|
Nizamani, Sarwat |
|
2017 |
42 |
8 |
p. 3585-3595 |
artikel |
40 |
Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment
|
Ali, Rifaqat |
|
2017 |
42 |
8 |
p. 3655-3672 |
artikel |