nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Binary Chaotic Transient Search Optimization Algorithm for Enhancing Feature Selection
|
Sharafaddini, Amir Mohammad |
|
|
50 |
2 |
p. 679-702 |
artikel |
2 |
Active Learning for Detecting Hardware Sensors-Based Side-Channel Attack on Smartphone
|
Abbas, Sidra |
|
|
50 |
2 |
p. 877-889 |
artikel |
3 |
A Hybrid Principal Label Space Transformation-Based Binary Relevance Support Vector Machine and Q-Learning Algorithm for Multi-label Classification
|
Ebrahimi, Seyed Hossein Seyed |
|
|
50 |
2 |
p. 851-875 |
artikel |
4 |
An Adaptive Query Approach for Extracting Medical Images for Disease Detection Applications
|
Migdady, Aya |
|
|
50 |
2 |
p. 1127-1142 |
artikel |
5 |
A New Trajectory Reduction Method for Mobile Devices Operating Both Online and Offline
|
Diri, Samet |
|
|
50 |
2 |
p. 911-922 |
artikel |
6 |
A Novel Secure S-box Design Methodology Based on FPGA and SHA-256 Hash Algorithm for Block Cipher Algorithms
|
Aydin, Yilmaz |
|
|
50 |
2 |
p. 1247-1260 |
artikel |
7 |
Approximating M-matrix in Learning Directed Acyclic Graphs Using Methods Involve Semidefinite Matrix Constraints
|
Al-Homidan, Suliman |
|
|
50 |
2 |
p. 1329-1337 |
artikel |
8 |
Arabic Fake News Detection in Social Media Context Using Word Embeddings and Pre-trained Transformers
|
Azzeh, Mohammad |
|
|
50 |
2 |
p. 923-936 |
artikel |
9 |
A Secure and Efficient Multi-Step Multi-Index Image Encryption Scheme Using Hybrid Combination of Substitution, Permutation and Hyperchaotic Structure
|
Arshad, Razi |
|
|
50 |
2 |
p. 1001-1024 |
artikel |
10 |
A Systematic Literature Review on Vulnerabilities, Mitigation Techniques, and Attacks in Field-Programmable Gate Arrays
|
Alsuwaiyan, Ali |
|
|
50 |
2 |
p. 611-641 |
artikel |
11 |
CCLHF-Net: Constrained Convolution Layer and Hybrid Features-Based Skip Connection Network for Image Forgery Detection
|
Yadav, Koyya Deepthi Krishna |
|
|
50 |
2 |
p. 825-834 |
artikel |
12 |
Chaotic Artificial Algae Algorithm for Solving Global Optimization With Real-World Space Trajectory Design Problems
|
Turkoglu, Bahaeddin |
|
|
50 |
2 |
p. 1279-1306 |
artikel |
13 |
Control of Discrete Event Systems by Using Symbolic Transition Model: An Application to Power Grids
|
Özbaltan, Mete |
|
|
50 |
2 |
p. 937-949 |
artikel |
14 |
Correction: Uncertainty Modelling in Performability Prediction for Safety-Critical Systems
|
Ahamad, Shakeel |
|
|
50 |
2 |
p. 1353 |
artikel |
15 |
Design of Nonlinear Component of Block Cipher Over Non-Chain Semi-Local Ring with its Application to Color Image Encryption
|
Safdar, Muhammad Umair |
|
|
50 |
2 |
p. 785-806 |
artikel |
16 |
Detection and Elimination of Dynamic Feature Points Based on YOLO and Geometric Constraints
|
Lu, Jiajia |
|
|
50 |
2 |
p. 759-773 |
artikel |
17 |
Diabetic Retinopathy Detection Using Deep Learning Multistage Training Method
|
Guefrachi, Sarra |
|
|
50 |
2 |
p. 1079-1096 |
artikel |
18 |
Disrupting the Status Quo: Blockchain’s Potential for Overhauling Conventional Academic Systems
|
Alshahrani, Saeed M. |
|
|
50 |
2 |
p. 951-971 |
artikel |
19 |
Distributed Ensemble Method Using Deep Learning to Detect DDoS Attacks in IoT Networks
|
Shukla, Praveen |
|
|
50 |
2 |
p. 1143-1168 |
artikel |
20 |
DSBAV-Net: Depthwise Separable Bottleneck Attention V-Shaped Network with Hybrid Convolution for Left Atrium Segmentation
|
Ocal, Hakan |
|
|
50 |
2 |
p. 1097-1108 |
artikel |
21 |
Efficient and Fast Algorithm for Attribute Reduction of Large Dimensional Data Using Rough Set Theory on Graphics Processing Unit
|
Turaga, V. K. Hanuman |
|
|
50 |
2 |
p. 1209-1231 |
artikel |
22 |
Elite Opposition-Based Bare Bones Mayfly Algorithm for Optimization Wireless Sensor Networks Coverage Problem
|
Zhou, Guo |
|
|
50 |
2 |
p. 719-739 |
artikel |
23 |
Enhancing Power Lines Detection Using Deep Learning and Feature-Level Fusion of Infrared and Visible Light Images
|
Aboalia, Hossam |
|
|
50 |
2 |
p. 987-999 |
artikel |
24 |
Extracting Urgent Questions from MOOC Discussions: A BERT-Based Multi-output Classification Approach
|
Sultani, Mujtaba |
|
|
50 |
2 |
p. 1169-1190 |
artikel |
25 |
Fast and Memory-Efficient Approximate Minimum Spanning Tree Generation for Large Datasets
|
Almansoori, Mahmood K. M. |
|
|
50 |
2 |
p. 1233-1246 |
artikel |
26 |
HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT
|
Saurabh, Kumar |
|
|
50 |
2 |
p. 1307-1327 |
artikel |
27 |
Hybrid-Driven Car-Following Model Based on Improved Composite Network and IDM
|
Wu, Fengmin |
|
|
50 |
2 |
p. 741-757 |
artikel |
28 |
Innovative Clustering-Driven Techniques for Enhancing Initial Solutions in Euclidean Traveling Salesman Problems with Machine Learning Integration
|
Selmi, Aymen Takie Eddine |
|
|
50 |
2 |
p. 1057-1078 |
artikel |
29 |
Less is More: Dimensionality Analysis of Pure Random Orthogonal Search Through the Lens of Degrees of Freedom
|
Hameed, A. S. Syed Shahul |
|
|
50 |
2 |
p. 1109-1126 |
artikel |
30 |
Lightweight ASIP Design for Lattice-Based Post-quantum Cryptography Algorithms
|
Akçay, Latif |
|
|
50 |
2 |
p. 835-849 |
artikel |
31 |
Multi-omics-based Machine Learning for the Subtype Classification of Breast Cancer
|
Hassan, Asmaa M. |
|
|
50 |
2 |
p. 1339-1352 |
artikel |
32 |
Persian Traffic Sign Classification Using Convolutional Neural Network and Transfer Learning
|
Safavi, Seyed Mahdi |
|
|
50 |
2 |
p. 775-784 |
artikel |
33 |
Quantized Orthogonal Experimentation SSA (QOX-SSA): A Hybrid Technique for Feature Selection (FS) and Neural Network Training
|
Mahapatra, Ajit Kumar |
|
|
50 |
2 |
p. 1025-1056 |
artikel |
34 |
Recurrence Dynamic Modeling of Metropolitan Cellular Network Traffic
|
Li, Yingqi |
|
|
50 |
2 |
p. 973-986 |
artikel |
35 |
Stacked LSTM Deep Neural Networks for Accurate Recognition of Prayer Activities with Smartphone Sensors
|
Syed, Liyakathunisa |
|
|
50 |
2 |
p. 643-659 |
artikel |
36 |
Swift Detection of XSS Attacks: Enhancing XSS Attack Detection by Leveraging Hybrid Semantic Embeddings and AI Techniques
|
Bakır, Rezan |
|
|
50 |
2 |
p. 1191-1207 |
artikel |
37 |
Toward Detecting Rumor Initiator in Online Social Networks Using Ontology-Driven Model
|
Bajpai, Shruti |
|
|
50 |
2 |
p. 661-677 |
artikel |
38 |
Triple-ATFME: Triple-Branch Attention Fusion Network for Micro-Expression Recognition
|
Li, Fei |
|
|
50 |
2 |
p. 807-823 |
artikel |
39 |
TrustChain: Trusted Blockchain-Based System for Supply Chain Traceability
|
Mohammed, Muhannad |
|
|
50 |
2 |
p. 891-909 |
artikel |
40 |
Uncertainty Modelling in Performability Prediction for Safety-Critical Systems
|
Ahamad, Shakeel |
|
|
50 |
2 |
p. 703-717 |
artikel |
41 |
YOLO-HLFE: A UAV Perspective Target Detector With Hybrid Loss and Feature Enhancement Based on YOLOv7
|
Sun, Hao |
|
|
50 |
2 |
p. 1261-1278 |
artikel |