nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Bilinear Pairing-Based Anonymous Authentication Scheme for 5G-Assisted Vehicular Fog Computing
|
Almazroi, Abdulwahab Ali |
|
|
50 |
15 |
p. 11757-11778 |
artikel |
2 |
A Code-Free Interactive Task Programming Interface for Robot Skill Construction
|
Zhang, Ning |
|
|
50 |
15 |
p. 11681-11692 |
artikel |
3 |
An Adaptive Intrusion Detection System for WSN using Reinforcement Learning and Deep Classification
|
Hussain, Saqib |
|
|
50 |
15 |
p. 12463-12477 |
artikel |
4 |
An Efficient Corrosion Prediction Model Based on Genetic Feedback Propagation Neural Network
|
Zhao, Ziheng |
|
|
50 |
15 |
p. 11593-11610 |
artikel |
5 |
An Energy-Aware Resource Allocation Framework based on Reptile Search Algorithm and Gray Wolf Optimizer for Mobile Edge Computing
|
Haghighat Afshar, Mohammadreza |
|
|
50 |
15 |
p. 12257-12288 |
artikel |
6 |
An Improved Multi-Objective Harris Hawks Optimization Algorithm for Solving EDM Problems
|
Uddin, Md Piyar |
|
|
50 |
15 |
p. 12403-12448 |
artikel |
7 |
An Innovative Hybrid Deep Learning Approach for Enhanced Electrical Power Prediction Using Meteorological Data: GGWO-IEMD/SCPDAE-LSTM-SDPAM/RS Model
|
Özbay Karakuş, Mücella |
|
|
50 |
15 |
p. 11539-11562 |
artikel |
8 |
A Novel Approach for Securing Fingerprint Biometrics using Local Minutiae Structure
|
Champaneria, Vivek H. |
|
|
50 |
15 |
p. 12123-12139 |
artikel |
9 |
A Novel Crowding Clustering Algorithm for Unsupervised and Supervised Filter Feature Selection Problem
|
Ghanem, Khadoudja |
|
|
50 |
15 |
p. 11887-11925 |
artikel |
10 |
A Novel Data Reduction Method for Arabic Online Handwriting Recognition on Mobile Devices
|
Bougamouza, Fateh |
|
|
50 |
15 |
p. 11821-11836 |
artikel |
11 |
A Novel Dynamic Neighborhood Learning Enhanced Artificial Gorilla Troops Optimizer for Global Optimization
|
Zhang, Zijiao |
|
|
50 |
15 |
p. 12141-12176 |
artikel |
12 |
Assessment of Corrosion Image Rating Based on Transfer Learning
|
Zhao, Ziheng |
|
|
50 |
15 |
p. 11803-11820 |
artikel |
13 |
Bilateral Cross Hashing Image Retrieval Based on Principal Component Analysis
|
Yilmaz, Ahmet |
|
|
50 |
15 |
p. 12495-12512 |
artikel |
14 |
(α,β)-Butterfly Computation on Bipartite Graphs
|
Bai, Jing |
|
|
50 |
15 |
p. 12053-12069 |
artikel |
15 |
Continuous Sign Language Recognition Based on Cross-Resolution Knowledge Distillation
|
Zhu, Qidan |
|
|
50 |
15 |
p. 11499-11511 |
artikel |
16 |
Deep fake Video Face Recognition Using Supervised Contrastive Learning for Scalability and Interpretability
|
Alshehri, Mohammed |
|
|
50 |
15 |
p. 11779-11802 |
artikel |
17 |
Discrete Grey Wolf Optimizer for Solving Urban Traffic Light Scheduling Problem
|
Gupta, Shubham |
|
|
50 |
15 |
p. 11727-11755 |
artikel |
18 |
Efficient Design of Ternary Reversible T Flip-Flop Using Quantum Dot Cellular Automata
|
Fattahi, Arash |
|
|
50 |
15 |
p. 11927-11944 |
artikel |
19 |
EMTD: Explainable Malicious Traffic Detection Model Using Hybrid Deep Learning Techniques for Industrial IoT Networks
|
Dey, Arun Kumar |
|
|
50 |
15 |
p. 12219-12238 |
artikel |
20 |
Enhanced Sleep Stage Classification Using EEG and EOG: A Novel Approach for Feature Selection with Deep Learning and Gaussian Noise Data Augmentation
|
Sifi, Nouria |
|
|
50 |
15 |
p. 12107-12121 |
artikel |
21 |
Enhancing Anomaly Detection in Multivariate Time Series with Stacked Transformer Encoders and Adaptive Positional Embeddings
|
Sowmya, Kella |
|
|
50 |
15 |
p. 12479-12494 |
artikel |
22 |
HRL-DeepNet: A Hybrid Residual Layer Deep Neural Network for Cybersecurity Policy Modeling, Structuring, and Protecting Assets of Organizations
|
Alotaibi, Fahad M. |
|
|
50 |
15 |
p. 12387-12401 |
artikel |
23 |
HVS-Based Modified Nonlinear Unsharp Masking Framework for Mammographic Image Enhancement Using Bilateral Filter
|
Rizwana, Syed |
|
|
50 |
15 |
p. 12337-12355 |
artikel |
24 |
Hybrid 3D Medical Image Segmentation Using CNN and Frequency Transformer Fusion
|
Labbihi, Ismayl |
|
|
50 |
15 |
p. 11713-11726 |
artikel |
25 |
Improved Particle Swarm Optimization based Bidirectional-Long Short-Term Memory for Intrusion Detection System in Internet of Vehicle
|
Kishore, Ch. Ravi |
|
|
50 |
15 |
p. 12357-12386 |
artikel |
26 |
Improved Stable Election Protocol with Self-Controlled Mobile Sink for Energy Management in WSNs
|
Guedmani, Mohamed |
|
|
50 |
15 |
p. 12289-12317 |
artikel |
27 |
Improving Hate Speech Classification Through Ensemble Learning and Explainable AI Techniques
|
Garg, Priya |
|
|
50 |
15 |
p. 11631-11644 |
artikel |
28 |
Integrated Genetic Algorithm and Deep Learning Approach for Effective Cyber-Attack Detection and Classification in Industrial Internet of Things (IIoT) Environments
|
Alkhafaji, Nadia |
|
|
50 |
15 |
p. 12071-12095 |
artikel |
29 |
Isolating Centrality-Based Generalization of Traditional Centralities to Discover Vital Nodes in Complex Networks
|
Mohammad, Buran Basha |
|
|
50 |
15 |
p. 12003-12025 |
artikel |
30 |
Knowledge Base Embeddings for a Recommendation Based on Overlapping Knowledge and Graph Learning
|
Zhao, Yao |
|
|
50 |
15 |
p. 12037-12051 |
artikel |
31 |
LEAFusion: An Infrared and Visible Light Image Fusion Network Resilient to Harsh Light Environment Interference Based on Harsh Light Environment Aware
|
Yan, Aiyun |
|
|
50 |
15 |
p. 12239-12256 |
artikel |
32 |
Leveraging large language models through natural language processing to provide interpretable machine learning predictions of mental deterioration in real time
|
de Arriba-Pérez, Francisco |
|
|
50 |
15 |
p. 11577-11591 |
artikel |
33 |
Localization Scheme Using Single Anchor Node for Mobile Wireless Sensor Nodes in WSNs
|
Kumar, Sanjeev |
|
|
50 |
15 |
p. 11645-11668 |
artikel |
34 |
Multi-scale Adaptive Feature Fusion Hashing for Image Retrieval
|
Jiang, Xiangkui |
|
|
50 |
15 |
p. 12027-12036 |
artikel |
35 |
Performance and Availability Analysis of API Design Techniques for API Gateways
|
Aydemir, Fikri |
|
|
50 |
15 |
p. 11485-11498 |
artikel |
36 |
Plant Root Characterization Using Ground-Penetrating Radar with Deep Learning
|
Moutaouekkil, Mohammed A. |
|
|
50 |
15 |
p. 11563-11575 |
artikel |
37 |
Possibilistic Prediction of Collaborative Filtering Recommender System in the Confidence q-Rung Picture Linguistic Fuzzy Environment
|
Sirbiladze, Gia |
|
|
50 |
15 |
p. 11945-11973 |
artikel |
38 |
Product Screening in Live stream: An Equilibrium Strategy Analysis Considering Streamer Product Selection and Platform Inspection
|
Shi, Baoli |
|
|
50 |
15 |
p. 12199-12217 |
artikel |
39 |
Quantum ML-Based Cooperative Task Orchestration in Dew-Assisted IoT Framework
|
Mahapatra, Abhijeet |
|
|
50 |
15 |
p. 11975-12002 |
artikel |
40 |
RESIST: Randomized Encryption for Deduplicated Cloud Storage System
|
Dave, Jay |
|
|
50 |
15 |
p. 12177-12197 |
artikel |
41 |
RGPBFT: A Reputation-Based PBFT Algorithm with Node Grouping Strategy
|
Zhu, Xutong |
|
|
50 |
15 |
p. 11837-11850 |
artikel |
42 |
SA-SGA: Simulated Annealing Optimization and Stochastic Gradient Ascent Reinforcement Learning for Feature Selection
|
Zandvakili, Aboozar |
|
|
50 |
15 |
p. 11851-11886 |
artikel |
43 |
Scheduling of Big Data Workflows in the Hadoop Framework with Heterogeneous Computing Cluster
|
Rahmani, Amir Masoud |
|
|
50 |
15 |
p. 12449-12461 |
artikel |
44 |
Self-Adaptive Lightweight Attention Module-Based BiLSTM Model for Effective Intrusion Detection
|
Alhassan, Afnan M. |
|
|
50 |
15 |
p. 11513-11538 |
artikel |
45 |
Structured Defense Model Against DNP3-Based Critical Infrastructure Attacks
|
Ozdogan, Erdal |
|
|
50 |
15 |
p. 11611-11629 |
artikel |
46 |
Sustainable IRS-Aided Integrated Sensing and Communication System with SWIPT
|
Zhang, Chen |
|
|
50 |
15 |
p. 12097-12105 |
artikel |
47 |
Testing Machine Learning and Deep Learning Systems: Achievements and Challenges
|
Albelali, Salma |
|
|
50 |
15 |
p. 11433-11484 |
artikel |
48 |
Toward Robust Segmentation of Polyp via Box-supervised and Feature-Embedded
|
Long, Jianwu |
|
|
50 |
15 |
p. 12319-12335 |
artikel |
49 |
Violence Detection Using Deep Learning
|
Hsairi, Lobna |
|
|
50 |
15 |
p. 11669-11679 |
artikel |
50 |
Voice Pathology Detection Based on Canonical Correlation Analysis Method Using Hilbert–Huang Transform and LSTM Features
|
Er, Mehmet Bilal |
|
|
50 |
15 |
p. 11693-11711 |
artikel |