nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Bayesian Mumford–Shah Model for Radiography Image Segmentation
|
Ramou, N. |
|
2017 |
43 |
12 |
p. 7167-7175 |
artikel |
2 |
A Comparative Analysis of Metaheuristic Approaches for Multidimensional Two-Way Number Partitioning Problem
|
Hacibeyoglu, Mehmet |
|
2018 |
43 |
12 |
p. 7499-7520 |
artikel |
3 |
A Computationally Efficient Weight Pruning Algorithm for Artificial Neural Network Classifiers
|
Sakshi, |
|
2017 |
43 |
12 |
p. 6787-6799 |
artikel |
4 |
Action-Selection Method for Reinforcement Learning Based on Cuckoo Search Algorithm
|
Abed-alguni, Bilal H. |
|
2017 |
43 |
12 |
p. 6771-6785 |
artikel |
5 |
Adaptive and Non-adaptive PVD Steganography Using Overlapped Pixel Blocks
|
Swain, Gandharba |
|
2018 |
43 |
12 |
p. 7549-7562 |
artikel |
6 |
Adaptive Differential Evolution-Based Lorenz Chaotic System for Image Encryption
|
Kaur, Manjit |
|
2018 |
43 |
12 |
p. 8127-8144 |
artikel |
7 |
A Discriminative Face Geometric Feature-Based Face Recognition
|
Luo, Lingkun |
|
2018 |
43 |
12 |
p. 7679-7693 |
artikel |
8 |
A Distributed Fault Tolerance Mechanism for Self-Maintenance of Clusters in Wireless Sensor Networks
|
Elsayed, Walaa M. |
|
2017 |
43 |
12 |
p. 6891-6907 |
artikel |
9 |
AES Hardware Accelerator on FPGA with Improved Throughput and Resource Efficiency
|
Baby Chellam, Manjith |
|
2017 |
43 |
12 |
p. 6873-6890 |
artikel |
10 |
A Forwarding Game Approach for Reducing Topology Control Traffic in MANETs
|
Amraoui, Hicham |
|
2017 |
43 |
12 |
p. 6945-6961 |
artikel |
11 |
A Genetic Algorithmic Method for Scheduling Optimization in Cloud Computing Services
|
Gawanmeh, Amjad |
|
2017 |
43 |
12 |
p. 6709-6718 |
artikel |
12 |
A Hybrid Intelligent System Integrating the Cascade Forward Neural Network with Elman Neural Network
|
Alkhasawneh, Mutasem Sh. |
|
2017 |
43 |
12 |
p. 6737-6749 |
artikel |
13 |
A Mobile Application Using Fuzzy Sets to Decrease Road Traffic Accidents
|
Alaybeyoglu, Aysegul |
|
2018 |
43 |
12 |
p. 7853-7868 |
artikel |
14 |
A Multi-swarm Competitive Algorithm Based on Dynamic Task Allocation Particle Swarm Optimization
|
Zhang, Lingjie |
|
2017 |
43 |
12 |
p. 8255-8274 |
artikel |
15 |
Analysis of a Hybrid Priority Scheme for Multiclass M2M Communications Over LTE-A Networks
|
AlQahtani, Salman A. |
|
2017 |
43 |
12 |
p. 6981-6993 |
artikel |
16 |
An Artificial Bee Colony Algorithm Based on Dynamic Penalty and Lévy Flight for Constrained Optimization Problems
|
Liu, Foxiang |
|
2018 |
43 |
12 |
p. 7189-7208 |
artikel |
17 |
An Asymptotically Stable Control Scheme for Space Robot System
|
Kumar, Naveen |
|
2018 |
43 |
12 |
p. 8049-8055 |
artikel |
18 |
An Efficient Lookup Search and Forwarding Mechanism for Information-Centric Networking (ICN)
|
Lal, Kumari Nidhi |
|
2017 |
43 |
12 |
p. 6849-6861 |
artikel |
19 |
An Efficient Multi-layer Ensemble Framework with BPSOGSA-Based Feature Selection for Credit Scoring Data Analysis
|
Edla, Damodar Reddy |
|
2017 |
43 |
12 |
p. 6909-6928 |
artikel |
20 |
An Enhanced Latent Semantic Analysis Approach for Arabic Document Summarization
|
Al-Sabahi, Kamal |
|
2018 |
43 |
12 |
p. 8079-8094 |
artikel |
21 |
A New Blind Medical Image Watermarking Based on Weber Descriptors and Arnold Chaotic Map
|
Soualmi, Abdallah |
|
2018 |
43 |
12 |
p. 7893-7905 |
artikel |
22 |
A New MLP–GA–Fuzzy Decision Support System for Hydro Power Plant Site Selection
|
Shimray, Benjamin A |
|
2017 |
43 |
12 |
p. 6823-6835 |
artikel |
23 |
An Extended Version of Flower Pollination Algorithm
|
Singh, Deepika |
|
2018 |
43 |
12 |
p. 7573-7603 |
artikel |
24 |
A Non-convex Economic Dispatch Problem with Valve Loading Effect Using a New Modified $$\beta $$β-Hill Climbing Local Search Algorithm
|
Al-Betar, Mohammed Azmi |
|
2018 |
43 |
12 |
p. 7439-7456 |
artikel |
25 |
A Novel Fog-Degraded Image Restoration Model of Golden Scale Extraction in Color Space
|
Wu, Hongtao |
|
2017 |
43 |
12 |
p. 6801-6821 |
artikel |
26 |
A Novel Framework for Cloud Service Evaluation and Selection Using Hybrid MCDM Methods
|
Kumar, Rakesh Ranjan |
|
2017 |
43 |
12 |
p. 7015-7030 |
artikel |
27 |
A Novel M-ACA-Based Tumor Segmentation and DAPP Feature Extraction with PPCSO-PKC-Based MRI Classification
|
Lakshmi, Adhi |
|
2017 |
43 |
12 |
p. 7095-7111 |
artikel |
28 |
A Particle Swarm Optimization-Based Heuristic for Software Module Clustering Problem
|
Prajapati, Amarjeet |
|
2017 |
43 |
12 |
p. 7083-7094 |
artikel |
29 |
Arabic Solid-Stems for an Efficient Morphological Analysis
|
Ghembaza, Moulay Ibrahim El-Khalil |
|
2018 |
43 |
12 |
p. 7373-7383 |
artikel |
30 |
A Reference-Based Multiobjective Bacteria Foraging Optimization Technique for QoS Multicast Routing
|
Sahoo, Satya Prakash |
|
2018 |
43 |
12 |
p. 7457-7472 |
artikel |
31 |
A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme
|
Alzahrani, Bander A. |
|
2018 |
43 |
12 |
p. 8239-8253 |
artikel |
32 |
A Sensor Cloud for the Provision of Secure and QoS-Aware Healthcare Services
|
Guezguez, Mohamed Jacem |
|
2017 |
43 |
12 |
p. 7059-7082 |
artikel |
33 |
A Taxonomy of Bio-Inspired Cyber Security Approaches: Existing Techniques and Future Directions
|
Rauf, Usman |
|
2018 |
43 |
12 |
p. 6693-6708 |
artikel |
34 |
A Two-Layer Computational Model for Discrimination of Enhancer and Their Types Using Hybrid Features Pace of Pseudo K-Tuple Nucleotide Composition
|
Tahir, Muhammad |
|
2017 |
43 |
12 |
p. 6719-6727 |
artikel |
35 |
Author Name Disambiguation by Exploiting Graph Structural Clustering and Hybrid Similarity
|
Hussain, Ijaz |
|
2018 |
43 |
12 |
p. 7421-7437 |
artikel |
36 |
A Vision-Based Real-Time Mobile Robot Controller Design Based on Gaussian Function for Indoor Environment
|
Dönmez, Emrah |
|
2017 |
43 |
12 |
p. 7127-7142 |
artikel |
37 |
Bat Algorithm for Multilevel Colour Image Segmentation Using Entropy-Based Thresholding
|
Mishra, Shashwati |
|
2018 |
43 |
12 |
p. 7285-7314 |
artikel |
38 |
Bi-Gram Term Collocations-based Query Expansion Approach for Improving Arabic Information Retrieval
|
Moawad, Ibrahim |
|
2018 |
43 |
12 |
p. 7705-7718 |
artikel |
39 |
Bio-inspired for Features Optimization and Malware Detection
|
Razak, Mohd Faizal Ab |
|
2017 |
43 |
12 |
p. 6963-6979 |
artikel |
40 |
CHOMK: Concurrent Higher-Order Mutants Killing Using Genetic Algorithm
|
Ghiduk, Ahmed S. |
|
2018 |
43 |
12 |
p. 7907-7922 |
artikel |
41 |
Content-Based Image Retrieval Based on Visual Words Fusion Versus Features Fusion of Local and Global Features
|
Mehmood, Zahid |
|
2018 |
43 |
12 |
p. 7265-7284 |
artikel |
42 |
Cooperative Navigation Planning of Multiple Mobile Robots Using Improved Krill Herd
|
Chandrasekhar Rao, D. |
|
2018 |
43 |
12 |
p. 7869-7891 |
artikel |
43 |
Coop-U: A Cooperative Update Scheme for Erasure-Coded Storage Systems
|
Dong, Yan |
|
2018 |
43 |
12 |
p. 7385-7396 |
artikel |
44 |
Correction to: A Two-Layer Computational Model for Discrimination of Enhancer and Their Types Using Hybrid Features Space of Pseudo K-Tuple Nucleotide Composition
|
Tahir, Muhammad |
|
2017 |
43 |
12 |
p. 8275 |
artikel |
45 |
Crowd Segmentation Method Based on Trajectory Tracking and Prior Knowledge Learning
|
Zhang, Li |
|
2017 |
43 |
12 |
p. 7143-7152 |
artikel |
46 |
Cryptanalysis and Biometric-Based Enhancement of a Remote User Authentication Scheme for E-Healthcare System
|
Ali, Rifaqat |
|
2018 |
43 |
12 |
p. 7837-7852 |
artikel |
47 |
Data Hiding in Binary Image with High Payload
|
Ding, Wenjia |
|
2018 |
43 |
12 |
p. 7737-7745 |
artikel |
48 |
Design of Fault Tolerant Adders: A Review
|
Talib, Ghashmi H. Bin |
|
2018 |
43 |
12 |
p. 6667-6692 |
artikel |
49 |
Detection of HTTP Flooding Attacks in Cloud Using Dynamic Entropy Method
|
Sree, T. Raja |
|
2017 |
43 |
12 |
p. 6995-7014 |
artikel |
50 |
Dimension Reduction and Defect Recognition of Strip Surface Defects Based on Intelligent Information Processing
|
Cui, Dongyan |
|
2017 |
43 |
12 |
p. 6729-6736 |
artikel |
51 |
Efficient and Intelligent Density and Delta-Distance Clustering Algorithm
|
Liu, Xuejuan |
|
2018 |
43 |
12 |
p. 7177-7187 |
artikel |
52 |
Efficient Workflow Scheduling Algorithm for Cloud Computing System: A Dynamic Priority-Based Approach
|
Gupta, Indrajeet |
|
2018 |
43 |
12 |
p. 7945-7960 |
artikel |
53 |
EF_Unique: An Improved Version of Unsupervised Equal Frequency Discretization Method
|
Hacibeyoglu, Mehmet |
|
2018 |
43 |
12 |
p. 7695-7704 |
artikel |
54 |
Elastic Web Crawler Service-Oriented Architecture Over Cloud Computing
|
ElAraby, M. E. |
|
2018 |
43 |
12 |
p. 8111-8126 |
artikel |
55 |
Electromyographic Signal-Driven Continuous Locomotion Mode Identification Module Design for Lower Limb Prosthesis Control
|
Gupta, Rohit |
|
2018 |
43 |
12 |
p. 7817-7835 |
artikel |
56 |
Empirical Evaluation of a System Call-Based Android Malware Detector
|
Vinod, P. |
|
2017 |
43 |
12 |
p. 6751-6770 |
artikel |
57 |
Enhanced Iterative Back-Projection Based Super-Resolution Reconstruction of Digital Images
|
Nayak, Rajashree |
|
2018 |
43 |
12 |
p. 7521-7547 |
artikel |
58 |
Feature-Based Opinion Mining Approach (FOMA) for Improved Book Recommendation
|
Sohail, Shahab Saquib |
|
2018 |
43 |
12 |
p. 8029-8048 |
artikel |
59 |
Fixed-Wing UAV Attitude and Altitude Control via Adaptive Second-Order Sliding Mode
|
Melkou, Lamia |
|
2017 |
43 |
12 |
p. 6837-6848 |
artikel |
60 |
Flow-Based IDS for ICMPv6-Based DDoS Attacks Detection
|
Elejla, Omar E. |
|
2018 |
43 |
12 |
p. 7757-7775 |
artikel |
61 |
Fragile Watermarking of Decision System Using Rough Set Theory
|
Khanduja, Vidhi |
|
2018 |
43 |
12 |
p. 7621-7633 |
artikel |
62 |
From CommonKADS to SOA Environment: An Adaptation Model
|
Said Saleh, Mohammed |
|
2018 |
43 |
12 |
p. 7605-7619 |
artikel |
63 |
Greedy algorithms for sparse signal recovery based on temporally correlated experimental data in WSNs
|
Goyal, Poonam |
|
2018 |
43 |
12 |
p. 7253-7264 |
artikel |
64 |
Guard against trust management vulnerabilities in Wireless Sensor Network
|
Sahoo, Rashmi Ranjan |
|
2018 |
43 |
12 |
p. 7229-7251 |
artikel |
65 |
Guide Me: Recognition and Servoing on Mobiles
|
Abdulhafez, Abdulhafez |
|
2018 |
43 |
12 |
p. 7359-7372 |
artikel |
66 |
Handover Authentication Scheme for Device-to-Device Outband Communication in 5G-WLAN Next Generation Heterogeneous Networks
|
Kumar, Amit |
|
2018 |
43 |
12 |
p. 7961-7977 |
artikel |
67 |
Homomorphic Encryption-Based Reversible Data Hiding for 3D Mesh Models
|
Shah, Mohsin |
|
2018 |
43 |
12 |
p. 8145-8157 |
artikel |
68 |
Hybrid Feature Vector for the Recognition of Arabic Handwritten Characters Using Feed-Forward Neural Network
|
Lamghari, N. |
|
2017 |
43 |
12 |
p. 7031-7039 |
artikel |
69 |
Improved Duplicate Record Detection Using ASCII Code Q-gram Indexing Technique
|
Elziky, Mayada A. |
|
2018 |
43 |
12 |
p. 7409-7420 |
artikel |
70 |
Incorporating Social Network and User’s Preference in Matrix Factorization for Recommendation
|
Zhou, Wang |
|
2018 |
43 |
12 |
p. 8179-8193 |
artikel |
71 |
Intelligent Navigation of Humanoids in Cluttered Environments Using Regression Analysis and Genetic Algorithm
|
Kumar, Asit |
|
2018 |
43 |
12 |
p. 7655-7678 |
artikel |
72 |
Iris Recognition Using Zernike Moments and Polar Harmonic Transforms
|
Kaur, Bineet |
|
2018 |
43 |
12 |
p. 7209-7218 |
artikel |
73 |
Leukocyte Classification using Adaptive Neuro-Fuzzy Inference System in Microscopic Blood Images
|
Rawat, Jyoti |
|
2017 |
43 |
12 |
p. 7041-7058 |
artikel |
74 |
Machine Learning-Based Energy Optimization for Parallel Program Execution on Multicore Chips
|
Otoom, Mwaffaq |
|
2018 |
43 |
12 |
p. 7343-7358 |
artikel |
75 |
Mobile Robot Navigation Using MLP-BP Approaches in Dynamic Environments
|
Singh, Ngangbam Herojit |
|
2018 |
43 |
12 |
p. 8013-8028 |
artikel |
76 |
Modeling and Analysis of Performance and Energy Consumption in Cloud Data Centers
|
El Kafhali, Said |
|
2018 |
43 |
12 |
p. 7789-7802 |
artikel |
77 |
Modelling Human Body Pose for Action Recognition Using Deep Neural Networks
|
Li, Chengyang |
|
2018 |
43 |
12 |
p. 7777-7788 |
artikel |
78 |
Multi-corpus-Based Model for Measuring the Semantic Relatedness in Short Texts (SRST)
|
El-Deeb, Reem |
|
2018 |
43 |
12 |
p. 7933-7943 |
artikel |
79 |
Multi-feature-Based Facial Age Estimation Using an Incomplete Facial Aging Database
|
Sahoo, Tapan Kumar |
|
2018 |
43 |
12 |
p. 8057-8078 |
artikel |
80 |
Multi-section-Oriented Robust Algorithm for Unconstrained Global Optimization
|
Jabeen, Syeda Darakhshan |
|
2018 |
43 |
12 |
p. 7315-7342 |
artikel |
81 |
Multi-Stream Word-Based Compression Algorithm for Compressed Text Search
|
Öztürk, Emir |
|
2018 |
43 |
12 |
p. 8209-8221 |
artikel |
82 |
Overcoming Scalability Issues in Analytic Hierarchy Process with ReDCCahp: An Empirical Investigation
|
Ibriwesh, Iyas |
|
2018 |
43 |
12 |
p. 7995-8011 |
artikel |
83 |
Personalized Search by a Multi-type and Multi-level User Profile in Folksonomy
|
Gou, Zhinan |
|
2018 |
43 |
12 |
p. 7563-7572 |
artikel |
84 |
Predicting Fault-Proneness of Reused Object-Oriented Classes in Software Post-Releases
|
Al Dallal, Jehad |
|
2017 |
43 |
12 |
p. 7153-7166 |
artikel |
85 |
Privacy-Preserving Secure Multiparty Computation on Electronic Medical Records for Star Exchange Topology
|
Tawfik, Ahmed M. |
|
2018 |
43 |
12 |
p. 7747-7756 |
artikel |
86 |
Quantum-Inspired Stacked Auto-encoder-Based Deep Neural Network Algorithm (Q-DNN)
|
Patel, Om Prakash |
|
2017 |
43 |
12 |
p. 6929-6943 |
artikel |
87 |
Reducing the Cost of Higher-Order Mutation Testing
|
Ghiduk, Ahmed S. |
|
2018 |
43 |
12 |
p. 7473-7486 |
artikel |
88 |
Reliability Assessment of Time-Critical Software: A Case Study on Stepper Motor Application
|
Verma, Anjushi |
|
2018 |
43 |
12 |
p. 7979-7994 |
artikel |
89 |
Separation of Handwritten and Machine-Printed Texts from Noisy Documents Using Contourlet Transform
|
Sahare, Parul |
|
2018 |
43 |
12 |
p. 8159-8177 |
artikel |
90 |
SSLB: Self-Similarity-Based Load Balancing for Large-Scale Fog Computing
|
Li, Changlong |
|
2018 |
43 |
12 |
p. 7487-7498 |
artikel |
91 |
Statistical-Based Data Quality Model for Mobile Crowd Sensing Systems
|
Gad-ElRab, Ahmed. A. A. |
|
2018 |
43 |
12 |
p. 8195-8207 |
artikel |
92 |
Sub-iris Technique for Non-ideal Iris Recognition
|
Jamaludin, Shahrizan |
|
2018 |
43 |
12 |
p. 7219-7228 |
artikel |
93 |
SWIM: An Effective Method to Perceive Cyberspace Situation from Honeynet
|
Wang, Yu |
|
2017 |
43 |
12 |
p. 6863-6872 |
artikel |
94 |
The Recursive and Symmetrical Optoelectronic Network Architecture: Biswapped Network Hyper Hexa-Cell
|
Gupta, Ashish |
|
2018 |
43 |
12 |
p. 7635-7653 |
artikel |
95 |
Two-Layer Approach for Mixed High-Rate and Low-Rate Distributed Denial of Service (DDoS) Attack Detection and Filtering
|
Toklu, S. |
|
2018 |
43 |
12 |
p. 7923-7931 |
artikel |
96 |
Understanding the Relationships Between Requirements Uncertainty and Nature of Conflicts: A Study of Software Development Team Effectiveness
|
Shameem, Mohammad |
|
2018 |
43 |
12 |
p. 8223-8238 |
artikel |
97 |
Using Unsupervised Deep Learning for Automatic Summarization of Arabic Documents
|
Alami, Nabil |
|
2018 |
43 |
12 |
p. 7803-7815 |
artikel |
98 |
Visually Meaningful Multi-image Encryption Scheme
|
Dolendro Singh, Laiphrakpam |
|
2018 |
43 |
12 |
p. 7397-7407 |
artikel |
99 |
Weighted Feature Space Representation with Kernel for Image Classification
|
Qin, Yongbin |
|
2017 |
43 |
12 |
p. 7113-7125 |
artikel |
100 |
What Do Software Practitioners Really Think About Software Process Improvement Project Success? An Exploratory Study
|
Niazi, Mahmood |
|
2018 |
43 |
12 |
p. 7719-7735 |
artikel |
101 |
WikiAutoCat: Information Retrieval System for Automatic Categorization of Wikipedia Articles
|
Refaei, Nesma |
|
2018 |
43 |
12 |
p. 8095-8109 |
artikel |