nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Comparative Analysis on Effort Estimation for Agile and Non-agile Software Projects Using DBN-ALO
|
Kaushik, Anupama |
|
|
45 |
4 |
p. 2605-2618 |
artikel |
2 |
A Congestion Aware Route Suggestion Protocol for Traffic Management in Internet of Vehicles
|
Ahmed, Muhammad Jamal |
|
|
45 |
4 |
p. 2501-2511 |
artikel |
3 |
A Content-Based Image Retrieval Method Using Neural Network-Based Prediction Technique
|
Alshehri, Mohammed |
|
|
45 |
4 |
p. 2957-2973 |
artikel |
4 |
Adaptive k-Anonymity Approach for Privacy Preserving in Cloud
|
Arava, Karuna |
|
|
45 |
4 |
p. 2425-2432 |
artikel |
5 |
A Highly Flexible Architecture for Morphological Gradient Processing Implemented on FPGA
|
Elloumi, Hejer |
|
|
45 |
4 |
p. 2675-2684 |
artikel |
6 |
A Hybrid-Based Verifiable Secret Sharing Scheme Using Chinese Remainder Theorem
|
Verma, Om Prakash |
|
|
45 |
4 |
p. 2395-2406 |
artikel |
7 |
A Multi-criteria Collaborative Filtering Recommender System Using Learning-to-Rank and Rank Aggregation
|
Kouadria, Abderrahmane |
|
|
45 |
4 |
p. 2835-2845 |
artikel |
8 |
A Multi-objective Hybrid Algorithm for Optimal Planning of Distributed Generation
|
Pandey, Ravi Shankar |
|
|
45 |
4 |
p. 3035-3054 |
artikel |
9 |
An Adaptive Spiking Neural P System for Solving Vehicle Routing Problems
|
RamachandranPillai, Resmi |
|
|
45 |
4 |
p. 2513-2529 |
artikel |
10 |
An Adaptive Threshold-Based Attribute Selection to Classify Requests Under DDoS Attack in Cloud-Based Systems
|
Verma, Priyanka |
|
|
45 |
4 |
p. 2813-2834 |
artikel |
11 |
An Advanced Search and Find System (ASAFS) on IoT-Based Mobile Autonomous Unmanned Vehicle Testbed (MAUVET)
|
Barnawi, Ahmed |
|
|
45 |
4 |
p. 3273-3287 |
artikel |
12 |
Analysis of Support Vector Machine-based Intrusion Detection Techniques
|
Bhati, Bhoopesh Singh |
|
|
45 |
4 |
p. 2371-2383 |
artikel |
13 |
An Efficient Filter-Based Feature Selection Model to Identify Significant Features from High-Dimensional Microarray Data
|
Raj, D. M. Deepak |
|
|
45 |
4 |
p. 2619-2630 |
artikel |
14 |
An Efficient Inverter Logic in Quantum-Dot Cellular Automata for Emerging Nanocircuits
|
Goswami, Mrinal |
|
|
45 |
4 |
p. 2663-2674 |
artikel |
15 |
An Efficient Language-Independent Acoustic Emotion Classification System
|
Singh, Rajwinder |
|
|
45 |
4 |
p. 3111-3121 |
artikel |
16 |
An Enhanced Eye-Tracking Approach Using Pipeline Computation
|
Hossain, Mohammad Alamgir |
|
|
45 |
4 |
p. 3191-3204 |
artikel |
17 |
An Integrated Word Embedding-Based Dual-Task Learning Method for Sentiment Analysis
|
Fu, Yanping |
|
|
45 |
4 |
p. 2571-2586 |
artikel |
18 |
A Novel Imperialist Competitive Algorithm for Scheme Configuration Rules Mining of Product Service System
|
Yin, Zhen |
|
|
45 |
4 |
p. 3157-3169 |
artikel |
19 |
A Novel Short Text Clustering Model Based on Grey System Theory
|
Fidan, Hüseyin |
|
|
45 |
4 |
p. 2865-2882 |
artikel |
20 |
A Passive Approach for Detecting Image Splicing Based on Deep Learning and Wavelet Transform
|
Abd El-Latif, Eman I. |
|
|
45 |
4 |
p. 3379-3386 |
artikel |
21 |
A Performance Evaluation and Two New Implementations of Evolutionary Algorithms for Land Partitioning Problem
|
Hakli, Huseyin |
|
|
45 |
4 |
p. 2545-2558 |
artikel |
22 |
Architectural Parameter-Independent Network Initialization Scheme for Sigmoidal Feedforward ANNs
|
Masood, Sarfaraz |
|
|
45 |
4 |
p. 2901-2913 |
artikel |
23 |
A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments
|
Madhusudhan, R. |
|
|
45 |
4 |
p. 2993-3014 |
artikel |
24 |
A Service Context-Aware QoS Prediction and Recommendation of Cloud Infrastructure Services
|
Nagarajan, Rajganesh |
|
|
45 |
4 |
p. 2929-2943 |
artikel |
25 |
Automated Detection of Sleep Stages Using Energy-Localized Orthogonal Wavelet Filter Banks
|
Sharma, Manish |
|
|
45 |
4 |
p. 2531-2544 |
artikel |
26 |
Bad Smell Detection Using Machine Learning Techniques: A Systematic Literature Review
|
Al-Shaaby, Ahmed |
|
|
45 |
4 |
p. 2341-2369 |
artikel |
27 |
Bengali Stop Word and Phrase Detection Mechanism
|
Haque, Rakib Ul |
|
|
45 |
4 |
p. 3355-3368 |
artikel |
28 |
Bottleneck Feature-Based Hybrid Deep Autoencoder Approach for Indian Language Identification
|
Das, Himanish Shekhar |
|
|
45 |
4 |
p. 3425-3436 |
artikel |
29 |
Content-Based Image Retrieval Using Color, Shape and Texture Descriptors and Features
|
Alsmadi, Mutasem K. |
|
|
45 |
4 |
p. 3317-3330 |
artikel |
30 |
CRSQ-KASE: Key Aggregate Searchable Encryption Supporting Conjunctive Range and Sort Query on Multi-owner Encrypted Data
|
Padhya, Mukti |
|
|
45 |
4 |
p. 3133-3155 |
artikel |
31 |
Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
|
Humayun, Mamoona |
|
|
45 |
4 |
p. 3171-3189 |
artikel |
32 |
Decentralizing Privacy Implementation at Cloud Storage Using Blockchain-Based Hybrid Algorithm
|
Darwish, Marwan Adnan |
|
|
45 |
4 |
p. 3369-3378 |
artikel |
33 |
Detection Framework for Content-Based Cybercrime in Online Social Networks Using Metaheuristic Approach
|
Singh, Amanpreet |
|
|
45 |
4 |
p. 2705-2719 |
artikel |
34 |
Diagnosis of Parkinson’s Disease at an Early Stage Using Volume Rendering SPECT Image Slices
|
Anita, S. |
|
|
45 |
4 |
p. 2799-2811 |
artikel |
35 |
Effective Removal of Privacy Breaches in Disassociated Transactional Datasets
|
Puri, Vartika |
|
|
45 |
4 |
p. 3257-3272 |
artikel |
36 |
Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons
|
Gutub, Adnan |
|
|
45 |
4 |
p. 2631-2644 |
artikel |
37 |
Empirical Evaluation of Automated Test Suite Generation and Optimization
|
Khari, Manju |
|
|
45 |
4 |
p. 2407-2423 |
artikel |
38 |
Estimation of the Smoothing Parameter in Probabilistic Neural Network Using Evolutionary Algorithms
|
Naik, Shraddha M. |
|
|
45 |
4 |
p. 2945-2955 |
artikel |
39 |
EX-MAN Component Model for Component-Based Software Construction
|
Rana, Tauseef |
|
|
45 |
4 |
p. 2915-2928 |
artikel |
40 |
Fingerprint Spoofing Detection to Improve Customer Security in Mobile Financial Applications Using Deep Learning
|
Arora, Shefali |
|
|
45 |
4 |
p. 2847-2863 |
artikel |
41 |
Genetic-Inspired Map Matching Algorithm for Real-Time GPS Trajectories
|
Singh, Saravjeet |
|
|
45 |
4 |
p. 2587-2603 |
artikel |
42 |
HCAB-SMOTE: A Hybrid Clustered Affinitive Borderline SMOTE Approach for Imbalanced Data Binary Classification
|
Al Majzoub, Hisham |
|
|
45 |
4 |
p. 3205-3222 |
artikel |
43 |
Hiding Shares of Counting-Based Secret Sharing via Arabic Text Steganography for Personal Usage
|
Gutub, Adnan |
|
|
45 |
4 |
p. 2433-2458 |
artikel |
44 |
Hybridization of Kidney-Inspired and Sine–Cosine Algorithm for Multi-robot Path Planning
|
Das, Pradipta Kumar |
|
|
45 |
4 |
p. 2883-2900 |
artikel |
45 |
Hybrid Particle Swarm Optimization with Sine Cosine Algorithm and Nelder–Mead Simplex for Solving Engineering Design Problems
|
Fakhouri, Hussam N. |
|
|
45 |
4 |
p. 3091-3109 |
artikel |
46 |
Improved Salp Swarm Algorithm with Space Transformation Search for Training Neural Network
|
Panda, Nibedan |
|
|
45 |
4 |
p. 2743-2761 |
artikel |
47 |
Information Flow Tracking and Auditing for the Internet of Things Using Software-Defined Networking
|
Alzahrani, Bander |
|
|
45 |
4 |
p. 3123-3132 |
artikel |
48 |
Infrared Image Complexity Metric for Automatic Target Recognition Based on Neural Network and Traditional Approach Fusion
|
Wang, Xiaotian |
|
|
45 |
4 |
p. 3245-3255 |
artikel |
49 |
Initial Seed Selection for Mixed Data Using Modified K-means Clustering Algorithm
|
Sajidha, S. A. |
|
|
45 |
4 |
p. 2685-2703 |
artikel |
50 |
Integrated WiFi/MEMS Indoor Navigation Based on Searching Space Limiting and Self-calibration
|
Cui, Yi |
|
|
45 |
4 |
p. 3015-3024 |
artikel |
51 |
Integrating Advanced Harmony Search with Fuzzy Logic for Solving Buffer Allocation Problems
|
Mistarihi, Mahmoud Z. |
|
|
45 |
4 |
p. 3233-3244 |
artikel |
52 |
IoT Applications and Services for Connected and Autonomous Electric Vehicles
|
Vaidya, Binod |
|
|
45 |
4 |
p. 2559-2569 |
artikel |
53 |
LSB Pseudorandom Algorithm for Image Steganography Using Skew Tent Map
|
Pichardo-Méndez, J. L. |
|
|
45 |
4 |
p. 3055-3074 |
artikel |
54 |
Nature-Inspired Optimization Algorithm-Tuned Feed-Forward and Recurrent Neural Networks Using CFD-Based Phenomenological Model-Generated Data to Model the EBW Process
|
Das, Debasish |
|
|
45 |
4 |
p. 2779-2797 |
artikel |
55 |
New Approaches in Metaheuristic to Classify Medical Data Using Artificial Neural Network
|
Das, Soumya |
|
|
45 |
4 |
p. 2459-2471 |
artikel |
56 |
Novel Grey Relational Feature Extraction Algorithm for Software Fault-Proneness Using BBO (B-GRA)
|
Aarti, |
|
|
45 |
4 |
p. 2645-2662 |
artikel |
57 |
On Stability Analysis of Particle Swarm Optimization Algorithm
|
Gopal, Anshul |
|
|
45 |
4 |
p. 2385-2394 |
artikel |
58 |
Optimal Release Time Determination in Intuitionistic Fuzzy Environment Involving Randomized Cost Budget for SDE-Based Software Reliability Growth Model
|
Chatterjee, S. |
|
|
45 |
4 |
p. 2721-2741 |
artikel |
59 |
Recovering Android Bad Smells from Android Applications
|
Rasool, Ghulam |
|
|
45 |
4 |
p. 3289-3315 |
artikel |
60 |
Reduced Reference Image Quality Assessment Technique Based on DWT and Path Integral Local Binary Patterns
|
Abbas, Naveed |
|
|
45 |
4 |
p. 3387-3401 |
artikel |
61 |
RST Invariant Blind Image Watermarking Schemes Based on Discrete Tchebichef Transform and Singular Value Decomposition
|
Senapati, Ranjan K. |
|
|
45 |
4 |
p. 3331-3353 |
artikel |
62 |
Safe and Smooth Motion Planning for Mecanum-Wheeled Robot Using Improved RRT and Cubic Spline
|
Sun, Yuxi |
|
|
45 |
4 |
p. 3075-3090 |
artikel |
63 |
Shortest Path Computation in a Network with Multiple Destinations
|
Sepehrifar, Mohammad K. |
|
|
45 |
4 |
p. 3223-3231 |
artikel |
64 |
Single and Multiple Copy–Move Forgery Detection and Localization in Digital Images Based on the Sparsely Encoded Distinctive Features and DBSCAN Clustering
|
Bilal, Muhammad |
|
|
45 |
4 |
p. 2975-2992 |
artikel |
65 |
Spark-Based Parallel Method for Prediction of Events
|
Rajita, B. S. A. S. |
|
|
45 |
4 |
p. 3437-3453 |
artikel |
66 |
Topic-Based Image Caption Generation
|
Dash, Sandeep Kumar |
|
|
45 |
4 |
p. 3025-3034 |
artikel |
67 |
TQ-Model: A New Evaluation Model for Knowledge-Based Authentication Schemes
|
Nizamani, Shah Zaman |
|
|
45 |
4 |
p. 2763-2778 |
artikel |
68 |
Trustworthy Target Key Alteration Helping Counting-Based Secret Sharing Applicability
|
AlKhodaidi, Taghreed |
|
|
45 |
4 |
p. 3403-3423 |
artikel |
69 |
Vehicular Cloud Computing Security: A Survey
|
Goumidi, Hadjer |
|
|
45 |
4 |
p. 2473-2499 |
artikel |