Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             69 results found
no title author magazine year volume issue page(s) type
1 A Comparative Analysis on Effort Estimation for Agile and Non-agile Software Projects Using DBN-ALO Kaushik, Anupama

45 4 p. 2605-2618
article
2 A Congestion Aware Route Suggestion Protocol for Traffic Management in Internet of Vehicles Ahmed, Muhammad Jamal

45 4 p. 2501-2511
article
3 A Content-Based Image Retrieval Method Using Neural Network-Based Prediction Technique Alshehri, Mohammed

45 4 p. 2957-2973
article
4 Adaptive k-Anonymity Approach for Privacy Preserving in Cloud Arava, Karuna

45 4 p. 2425-2432
article
5 A Highly Flexible Architecture for Morphological Gradient Processing Implemented on FPGA Elloumi, Hejer

45 4 p. 2675-2684
article
6 A Hybrid-Based Verifiable Secret Sharing Scheme Using Chinese Remainder Theorem Verma, Om Prakash

45 4 p. 2395-2406
article
7 A Multi-criteria Collaborative Filtering Recommender System Using Learning-to-Rank and Rank Aggregation Kouadria, Abderrahmane

45 4 p. 2835-2845
article
8 A Multi-objective Hybrid Algorithm for Optimal Planning of Distributed Generation Pandey, Ravi Shankar

45 4 p. 3035-3054
article
9 An Adaptive Spiking Neural P System for Solving Vehicle Routing Problems RamachandranPillai, Resmi

45 4 p. 2513-2529
article
10 An Adaptive Threshold-Based Attribute Selection to Classify Requests Under DDoS Attack in Cloud-Based Systems Verma, Priyanka

45 4 p. 2813-2834
article
11 An Advanced Search and Find System (ASAFS) on IoT-Based Mobile Autonomous Unmanned Vehicle Testbed (MAUVET) Barnawi, Ahmed

45 4 p. 3273-3287
article
12 Analysis of Support Vector Machine-based Intrusion Detection Techniques Bhati, Bhoopesh Singh

45 4 p. 2371-2383
article
13 An Efficient Filter-Based Feature Selection Model to Identify Significant Features from High-Dimensional Microarray Data Raj, D. M. Deepak

45 4 p. 2619-2630
article
14 An Efficient Inverter Logic in Quantum-Dot Cellular Automata for Emerging Nanocircuits Goswami, Mrinal

45 4 p. 2663-2674
article
15 An Efficient Language-Independent Acoustic Emotion Classification System Singh, Rajwinder

45 4 p. 3111-3121
article
16 An Enhanced Eye-Tracking Approach Using Pipeline Computation Hossain, Mohammad Alamgir

45 4 p. 3191-3204
article
17 An Integrated Word Embedding-Based Dual-Task Learning Method for Sentiment Analysis Fu, Yanping

45 4 p. 2571-2586
article
18 A Novel Imperialist Competitive Algorithm for Scheme Configuration Rules Mining of Product Service System Yin, Zhen

45 4 p. 3157-3169
article
19 A Novel Short Text Clustering Model Based on Grey System Theory Fidan, Hüseyin

45 4 p. 2865-2882
article
20 A Passive Approach for Detecting Image Splicing Based on Deep Learning and Wavelet Transform Abd El-Latif, Eman I.

45 4 p. 3379-3386
article
21 A Performance Evaluation and Two New Implementations of Evolutionary Algorithms for Land Partitioning Problem Hakli, Huseyin

45 4 p. 2545-2558
article
22 Architectural Parameter-Independent Network Initialization Scheme for Sigmoidal Feedforward ANNs Masood, Sarfaraz

45 4 p. 2901-2913
article
23 A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments Madhusudhan, R.

45 4 p. 2993-3014
article
24 A Service Context-Aware QoS Prediction and Recommendation of Cloud Infrastructure Services Nagarajan, Rajganesh

45 4 p. 2929-2943
article
25 Automated Detection of Sleep Stages Using Energy-Localized Orthogonal Wavelet Filter Banks Sharma, Manish

45 4 p. 2531-2544
article
26 Bad Smell Detection Using Machine Learning Techniques: A Systematic Literature Review Al-Shaaby, Ahmed

45 4 p. 2341-2369
article
27 Bengali Stop Word and Phrase Detection Mechanism Haque, Rakib Ul

45 4 p. 3355-3368
article
28 Bottleneck Feature-Based Hybrid Deep Autoencoder Approach for Indian Language Identification Das, Himanish Shekhar

45 4 p. 3425-3436
article
29 Content-Based Image Retrieval Using Color, Shape and Texture Descriptors and Features Alsmadi, Mutasem K.

45 4 p. 3317-3330
article
30 CRSQ-KASE: Key Aggregate Searchable Encryption Supporting Conjunctive Range and Sort Query on Multi-owner Encrypted Data Padhya, Mukti

45 4 p. 3133-3155
article
31 Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study Humayun, Mamoona

45 4 p. 3171-3189
article
32 Decentralizing Privacy Implementation at Cloud Storage Using Blockchain-Based Hybrid Algorithm Darwish, Marwan Adnan

45 4 p. 3369-3378
article
33 Detection Framework for Content-Based Cybercrime in Online Social Networks Using Metaheuristic Approach Singh, Amanpreet

45 4 p. 2705-2719
article
34 Diagnosis of Parkinson’s Disease at an Early Stage Using Volume Rendering SPECT Image Slices Anita, S.

45 4 p. 2799-2811
article
35 Effective Removal of Privacy Breaches in Disassociated Transactional Datasets Puri, Vartika

45 4 p. 3257-3272
article
36 Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons Gutub, Adnan

45 4 p. 2631-2644
article
37 Empirical Evaluation of Automated Test Suite Generation and Optimization Khari, Manju

45 4 p. 2407-2423
article
38 Estimation of the Smoothing Parameter in Probabilistic Neural Network Using Evolutionary Algorithms Naik, Shraddha M.

45 4 p. 2945-2955
article
39 EX-MAN Component Model for Component-Based Software Construction Rana, Tauseef

45 4 p. 2915-2928
article
40 Fingerprint Spoofing Detection to Improve Customer Security in Mobile Financial Applications Using Deep Learning Arora, Shefali

45 4 p. 2847-2863
article
41 Genetic-Inspired Map Matching Algorithm for Real-Time GPS Trajectories Singh, Saravjeet

45 4 p. 2587-2603
article
42 HCAB-SMOTE: A Hybrid Clustered Affinitive Borderline SMOTE Approach for Imbalanced Data Binary Classification Al Majzoub, Hisham

45 4 p. 3205-3222
article
43 Hiding Shares of Counting-Based Secret Sharing via Arabic Text Steganography for Personal Usage Gutub, Adnan

45 4 p. 2433-2458
article
44 Hybridization of Kidney-Inspired and Sine–Cosine Algorithm for Multi-robot Path Planning Das, Pradipta Kumar

45 4 p. 2883-2900
article
45 Hybrid Particle Swarm Optimization with Sine Cosine Algorithm and Nelder–Mead Simplex for Solving Engineering Design Problems Fakhouri, Hussam N.

45 4 p. 3091-3109
article
46 Improved Salp Swarm Algorithm with Space Transformation Search for Training Neural Network Panda, Nibedan

45 4 p. 2743-2761
article
47 Information Flow Tracking and Auditing for the Internet of Things Using Software-Defined Networking Alzahrani, Bander

45 4 p. 3123-3132
article
48 Infrared Image Complexity Metric for Automatic Target Recognition Based on Neural Network and Traditional Approach Fusion Wang, Xiaotian

45 4 p. 3245-3255
article
49 Initial Seed Selection for Mixed Data Using Modified K-means Clustering Algorithm Sajidha, S. A.

45 4 p. 2685-2703
article
50 Integrated WiFi/MEMS Indoor Navigation Based on Searching Space Limiting and Self-calibration Cui, Yi

45 4 p. 3015-3024
article
51 Integrating Advanced Harmony Search with Fuzzy Logic for Solving Buffer Allocation Problems Mistarihi, Mahmoud Z.

45 4 p. 3233-3244
article
52 IoT Applications and Services for Connected and Autonomous Electric Vehicles Vaidya, Binod

45 4 p. 2559-2569
article
53 LSB Pseudorandom Algorithm for Image Steganography Using Skew Tent Map Pichardo-Méndez, J. L.

45 4 p. 3055-3074
article
54 Nature-Inspired Optimization Algorithm-Tuned Feed-Forward and Recurrent Neural Networks Using CFD-Based Phenomenological Model-Generated Data to Model the EBW Process Das, Debasish

45 4 p. 2779-2797
article
55 New Approaches in Metaheuristic to Classify Medical Data Using Artificial Neural Network Das, Soumya

45 4 p. 2459-2471
article
56 Novel Grey Relational Feature Extraction Algorithm for Software Fault-Proneness Using BBO (B-GRA) Aarti,

45 4 p. 2645-2662
article
57 On Stability Analysis of Particle Swarm Optimization Algorithm Gopal, Anshul

45 4 p. 2385-2394
article
58 Optimal Release Time Determination in Intuitionistic Fuzzy Environment Involving Randomized Cost Budget for SDE-Based Software Reliability Growth Model Chatterjee, S.

45 4 p. 2721-2741
article
59 Recovering Android Bad Smells from Android Applications Rasool, Ghulam

45 4 p. 3289-3315
article
60 Reduced Reference Image Quality Assessment Technique Based on DWT and Path Integral Local Binary Patterns Abbas, Naveed

45 4 p. 3387-3401
article
61 RST Invariant Blind Image Watermarking Schemes Based on Discrete Tchebichef Transform and Singular Value Decomposition Senapati, Ranjan K.

45 4 p. 3331-3353
article
62 Safe and Smooth Motion Planning for Mecanum-Wheeled Robot Using Improved RRT and Cubic Spline Sun, Yuxi

45 4 p. 3075-3090
article
63 Shortest Path Computation in a Network with Multiple Destinations Sepehrifar, Mohammad K.

45 4 p. 3223-3231
article
64 Single and Multiple Copy–Move Forgery Detection and Localization in Digital Images Based on the Sparsely Encoded Distinctive Features and DBSCAN Clustering Bilal, Muhammad

45 4 p. 2975-2992
article
65 Spark-Based Parallel Method for Prediction of Events Rajita, B. S. A. S.

45 4 p. 3437-3453
article
66 Topic-Based Image Caption Generation Dash, Sandeep Kumar

45 4 p. 3025-3034
article
67 TQ-Model: A New Evaluation Model for Knowledge-Based Authentication Schemes Nizamani, Shah Zaman

45 4 p. 2763-2778
article
68 Trustworthy Target Key Alteration Helping Counting-Based Secret Sharing Applicability AlKhodaidi, Taghreed

45 4 p. 3403-3423
article
69 Vehicular Cloud Computing Security: A Survey Goumidi, Hadjer

45 4 p. 2473-2499
article
                             69 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands