Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             69 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Comparative Analysis on Effort Estimation for Agile and Non-agile Software Projects Using DBN-ALO Kaushik, Anupama

45 4 p. 2605-2618
artikel
2 A Congestion Aware Route Suggestion Protocol for Traffic Management in Internet of Vehicles Ahmed, Muhammad Jamal

45 4 p. 2501-2511
artikel
3 A Content-Based Image Retrieval Method Using Neural Network-Based Prediction Technique Alshehri, Mohammed

45 4 p. 2957-2973
artikel
4 Adaptive k-Anonymity Approach for Privacy Preserving in Cloud Arava, Karuna

45 4 p. 2425-2432
artikel
5 A Highly Flexible Architecture for Morphological Gradient Processing Implemented on FPGA Elloumi, Hejer

45 4 p. 2675-2684
artikel
6 A Hybrid-Based Verifiable Secret Sharing Scheme Using Chinese Remainder Theorem Verma, Om Prakash

45 4 p. 2395-2406
artikel
7 A Multi-criteria Collaborative Filtering Recommender System Using Learning-to-Rank and Rank Aggregation Kouadria, Abderrahmane

45 4 p. 2835-2845
artikel
8 A Multi-objective Hybrid Algorithm for Optimal Planning of Distributed Generation Pandey, Ravi Shankar

45 4 p. 3035-3054
artikel
9 An Adaptive Spiking Neural P System for Solving Vehicle Routing Problems RamachandranPillai, Resmi

45 4 p. 2513-2529
artikel
10 An Adaptive Threshold-Based Attribute Selection to Classify Requests Under DDoS Attack in Cloud-Based Systems Verma, Priyanka

45 4 p. 2813-2834
artikel
11 An Advanced Search and Find System (ASAFS) on IoT-Based Mobile Autonomous Unmanned Vehicle Testbed (MAUVET) Barnawi, Ahmed

45 4 p. 3273-3287
artikel
12 Analysis of Support Vector Machine-based Intrusion Detection Techniques Bhati, Bhoopesh Singh

45 4 p. 2371-2383
artikel
13 An Efficient Filter-Based Feature Selection Model to Identify Significant Features from High-Dimensional Microarray Data Raj, D. M. Deepak

45 4 p. 2619-2630
artikel
14 An Efficient Inverter Logic in Quantum-Dot Cellular Automata for Emerging Nanocircuits Goswami, Mrinal

45 4 p. 2663-2674
artikel
15 An Efficient Language-Independent Acoustic Emotion Classification System Singh, Rajwinder

45 4 p. 3111-3121
artikel
16 An Enhanced Eye-Tracking Approach Using Pipeline Computation Hossain, Mohammad Alamgir

45 4 p. 3191-3204
artikel
17 An Integrated Word Embedding-Based Dual-Task Learning Method for Sentiment Analysis Fu, Yanping

45 4 p. 2571-2586
artikel
18 A Novel Imperialist Competitive Algorithm for Scheme Configuration Rules Mining of Product Service System Yin, Zhen

45 4 p. 3157-3169
artikel
19 A Novel Short Text Clustering Model Based on Grey System Theory Fidan, Hüseyin

45 4 p. 2865-2882
artikel
20 A Passive Approach for Detecting Image Splicing Based on Deep Learning and Wavelet Transform Abd El-Latif, Eman I.

45 4 p. 3379-3386
artikel
21 A Performance Evaluation and Two New Implementations of Evolutionary Algorithms for Land Partitioning Problem Hakli, Huseyin

45 4 p. 2545-2558
artikel
22 Architectural Parameter-Independent Network Initialization Scheme for Sigmoidal Feedforward ANNs Masood, Sarfaraz

45 4 p. 2901-2913
artikel
23 A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments Madhusudhan, R.

45 4 p. 2993-3014
artikel
24 A Service Context-Aware QoS Prediction and Recommendation of Cloud Infrastructure Services Nagarajan, Rajganesh

45 4 p. 2929-2943
artikel
25 Automated Detection of Sleep Stages Using Energy-Localized Orthogonal Wavelet Filter Banks Sharma, Manish

45 4 p. 2531-2544
artikel
26 Bad Smell Detection Using Machine Learning Techniques: A Systematic Literature Review Al-Shaaby, Ahmed

45 4 p. 2341-2369
artikel
27 Bengali Stop Word and Phrase Detection Mechanism Haque, Rakib Ul

45 4 p. 3355-3368
artikel
28 Bottleneck Feature-Based Hybrid Deep Autoencoder Approach for Indian Language Identification Das, Himanish Shekhar

45 4 p. 3425-3436
artikel
29 Content-Based Image Retrieval Using Color, Shape and Texture Descriptors and Features Alsmadi, Mutasem K.

45 4 p. 3317-3330
artikel
30 CRSQ-KASE: Key Aggregate Searchable Encryption Supporting Conjunctive Range and Sort Query on Multi-owner Encrypted Data Padhya, Mukti

45 4 p. 3133-3155
artikel
31 Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study Humayun, Mamoona

45 4 p. 3171-3189
artikel
32 Decentralizing Privacy Implementation at Cloud Storage Using Blockchain-Based Hybrid Algorithm Darwish, Marwan Adnan

45 4 p. 3369-3378
artikel
33 Detection Framework for Content-Based Cybercrime in Online Social Networks Using Metaheuristic Approach Singh, Amanpreet

45 4 p. 2705-2719
artikel
34 Diagnosis of Parkinson’s Disease at an Early Stage Using Volume Rendering SPECT Image Slices Anita, S.

45 4 p. 2799-2811
artikel
35 Effective Removal of Privacy Breaches in Disassociated Transactional Datasets Puri, Vartika

45 4 p. 3257-3272
artikel
36 Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons Gutub, Adnan

45 4 p. 2631-2644
artikel
37 Empirical Evaluation of Automated Test Suite Generation and Optimization Khari, Manju

45 4 p. 2407-2423
artikel
38 Estimation of the Smoothing Parameter in Probabilistic Neural Network Using Evolutionary Algorithms Naik, Shraddha M.

45 4 p. 2945-2955
artikel
39 EX-MAN Component Model for Component-Based Software Construction Rana, Tauseef

45 4 p. 2915-2928
artikel
40 Fingerprint Spoofing Detection to Improve Customer Security in Mobile Financial Applications Using Deep Learning Arora, Shefali

45 4 p. 2847-2863
artikel
41 Genetic-Inspired Map Matching Algorithm for Real-Time GPS Trajectories Singh, Saravjeet

45 4 p. 2587-2603
artikel
42 HCAB-SMOTE: A Hybrid Clustered Affinitive Borderline SMOTE Approach for Imbalanced Data Binary Classification Al Majzoub, Hisham

45 4 p. 3205-3222
artikel
43 Hiding Shares of Counting-Based Secret Sharing via Arabic Text Steganography for Personal Usage Gutub, Adnan

45 4 p. 2433-2458
artikel
44 Hybridization of Kidney-Inspired and Sine–Cosine Algorithm for Multi-robot Path Planning Das, Pradipta Kumar

45 4 p. 2883-2900
artikel
45 Hybrid Particle Swarm Optimization with Sine Cosine Algorithm and Nelder–Mead Simplex for Solving Engineering Design Problems Fakhouri, Hussam N.

45 4 p. 3091-3109
artikel
46 Improved Salp Swarm Algorithm with Space Transformation Search for Training Neural Network Panda, Nibedan

45 4 p. 2743-2761
artikel
47 Information Flow Tracking and Auditing for the Internet of Things Using Software-Defined Networking Alzahrani, Bander

45 4 p. 3123-3132
artikel
48 Infrared Image Complexity Metric for Automatic Target Recognition Based on Neural Network and Traditional Approach Fusion Wang, Xiaotian

45 4 p. 3245-3255
artikel
49 Initial Seed Selection for Mixed Data Using Modified K-means Clustering Algorithm Sajidha, S. A.

45 4 p. 2685-2703
artikel
50 Integrated WiFi/MEMS Indoor Navigation Based on Searching Space Limiting and Self-calibration Cui, Yi

45 4 p. 3015-3024
artikel
51 Integrating Advanced Harmony Search with Fuzzy Logic for Solving Buffer Allocation Problems Mistarihi, Mahmoud Z.

45 4 p. 3233-3244
artikel
52 IoT Applications and Services for Connected and Autonomous Electric Vehicles Vaidya, Binod

45 4 p. 2559-2569
artikel
53 LSB Pseudorandom Algorithm for Image Steganography Using Skew Tent Map Pichardo-Méndez, J. L.

45 4 p. 3055-3074
artikel
54 Nature-Inspired Optimization Algorithm-Tuned Feed-Forward and Recurrent Neural Networks Using CFD-Based Phenomenological Model-Generated Data to Model the EBW Process Das, Debasish

45 4 p. 2779-2797
artikel
55 New Approaches in Metaheuristic to Classify Medical Data Using Artificial Neural Network Das, Soumya

45 4 p. 2459-2471
artikel
56 Novel Grey Relational Feature Extraction Algorithm for Software Fault-Proneness Using BBO (B-GRA) Aarti,

45 4 p. 2645-2662
artikel
57 On Stability Analysis of Particle Swarm Optimization Algorithm Gopal, Anshul

45 4 p. 2385-2394
artikel
58 Optimal Release Time Determination in Intuitionistic Fuzzy Environment Involving Randomized Cost Budget for SDE-Based Software Reliability Growth Model Chatterjee, S.

45 4 p. 2721-2741
artikel
59 Recovering Android Bad Smells from Android Applications Rasool, Ghulam

45 4 p. 3289-3315
artikel
60 Reduced Reference Image Quality Assessment Technique Based on DWT and Path Integral Local Binary Patterns Abbas, Naveed

45 4 p. 3387-3401
artikel
61 RST Invariant Blind Image Watermarking Schemes Based on Discrete Tchebichef Transform and Singular Value Decomposition Senapati, Ranjan K.

45 4 p. 3331-3353
artikel
62 Safe and Smooth Motion Planning for Mecanum-Wheeled Robot Using Improved RRT and Cubic Spline Sun, Yuxi

45 4 p. 3075-3090
artikel
63 Shortest Path Computation in a Network with Multiple Destinations Sepehrifar, Mohammad K.

45 4 p. 3223-3231
artikel
64 Single and Multiple Copy–Move Forgery Detection and Localization in Digital Images Based on the Sparsely Encoded Distinctive Features and DBSCAN Clustering Bilal, Muhammad

45 4 p. 2975-2992
artikel
65 Spark-Based Parallel Method for Prediction of Events Rajita, B. S. A. S.

45 4 p. 3437-3453
artikel
66 Topic-Based Image Caption Generation Dash, Sandeep Kumar

45 4 p. 3025-3034
artikel
67 TQ-Model: A New Evaluation Model for Knowledge-Based Authentication Schemes Nizamani, Shah Zaman

45 4 p. 2763-2778
artikel
68 Trustworthy Target Key Alteration Helping Counting-Based Secret Sharing Applicability AlKhodaidi, Taghreed

45 4 p. 3403-3423
artikel
69 Vehicular Cloud Computing Security: A Survey Goumidi, Hadjer

45 4 p. 2473-2499
artikel
                             69 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland