nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A branch-and-price algorithm for two-echelon electric vehicle routing problem
|
Wu, Zhiguo |
|
|
9 |
3 |
p. 2475-2490 |
artikel |
2 |
Adaptive encoding-based evolutionary approach for Chinese document clustering
|
Chen, Jun-Xian |
|
|
9 |
3 |
p. 3385-3398 |
artikel |
3 |
A genre trust model for defending shilling attacks in recommender systems
|
Yang, Li |
|
|
9 |
3 |
p. 2929-2942 |
artikel |
4 |
A hybrid ant colony algorithm based on multiple strategies for the vehicle routing problem with time windows
|
Wu, Hongguang |
|
|
9 |
3 |
p. 2491-2508 |
artikel |
5 |
A hybrid deep learning-based fruit classification using attention model and convolution autoencoder
|
Xue, Gang |
|
|
9 |
3 |
p. 2209-2219 |
artikel |
6 |
A modified NK algorithm based on BP neural network and DEMATEL for evolution path optimization of urban innovation ecosystem
|
Liu, Ruijian |
|
|
9 |
3 |
p. 2333-2349 |
artikel |
7 |
An efficient privacy-preserving point-of-interest recommendation model based on local differential privacy
|
Xu, Chonghuan |
|
|
9 |
3 |
p. 3277-3300 |
artikel |
8 |
Angle of attack prediction using recurrent neural networks in flight conditions with faulty sensors in the case of F-16 fighter jet
|
Mersha, Bemnet Wondimagegnehu |
|
|
9 |
3 |
p. 2599-2611 |
artikel |
9 |
An instance-based deep transfer learning method for quality identification of Longjing tea from multiple geographical origins
|
Zhang, Cheng |
|
|
9 |
3 |
p. 3409-3428 |
artikel |
10 |
A node selection algorithm with a genetic method based on PBFT in consortium blockchains
|
Zhang, Jinyu |
|
|
9 |
3 |
p. 3085-3105 |
artikel |
11 |
A novel lightweight authentication and privacy-preserving protocol for vehicular ad hoc networks
|
Theodore, Shaji K. A. |
|
|
9 |
3 |
p. 2981-2991 |
artikel |
12 |
A novel non-linear neuron model based on multiplicative aggregation in quaternionic domain
|
Kumar, Sushil |
|
|
9 |
3 |
p. 3161-3183 |
artikel |
13 |
Applying catastrophe progression method to evaluate the service quality of cold chain logistics
|
Zhang, Hao |
|
|
9 |
3 |
p. 2221-2235 |
artikel |
14 |
A review on Deep Learning approaches for low-dose Computed Tomography restoration
|
Kulathilake, K. A. Saneera Hemantha |
|
|
9 |
3 |
p. 2713-2745 |
artikel |
15 |
Big data-driven public transportation network: a simulation approach
|
Wang, Zhaohua |
|
|
9 |
3 |
p. 2541-2553 |
artikel |
16 |
CEEMDAN-IMFx-PCA-CICA: an improved single-channel blind source separation in multimedia environment for motion artifact reduction in ambulatory ECG
|
Xiong, Fan |
|
|
9 |
3 |
p. 2555-2569 |
artikel |
17 |
Charging station planning based on the accumulation prospect theory and dynamic user equilibrium
|
Heting, Qiu |
|
|
9 |
3 |
p. 2521-2539 |
artikel |
18 |
Cloud-based email phishing attack using machine and deep learning algorithm
|
Butt, Umer Ahmed |
|
|
9 |
3 |
p. 3043-3070 |
artikel |
19 |
Code-based encryption techniques with distributed cluster head and energy consumption routing protocol
|
Jalasri, M. |
|
|
9 |
3 |
p. 2943-2955 |
artikel |
20 |
Combating the infodemic: COVID-19 induced fake news recognition in social media networks
|
Biradar, Shankar |
|
|
9 |
3 |
p. 2879-2891 |
artikel |
21 |
Correction to: A metaheuristic-based framework for index tracking with practical constraints
|
Yuen, Man-Chung |
|
|
9 |
3 |
p. 3469 |
artikel |
22 |
Data-driven optimization for last-mile delivery
|
Chu, Hongrui |
|
|
9 |
3 |
p. 2271-2284 |
artikel |
23 |
Data hiding in encryption–compression domain
|
Singh, O. P. |
|
|
9 |
3 |
p. 2759-2772 |
artikel |
24 |
DCGNN: a single-stage 3D object detection network based on density clustering and graph neural network
|
Xiong, Shimin |
|
|
9 |
3 |
p. 3399-3408 |
artikel |
25 |
Deep learning model construction for a semi-supervised classification with feature learning
|
Mandapati, Sridhar |
|
|
9 |
3 |
p. 3011-3021 |
artikel |
26 |
Diabetic retinopathy detection and classification using capsule networks
|
Kalyani, G. |
|
|
9 |
3 |
p. 2651-2664 |
artikel |
27 |
Dynamic modeling and infinite-dimensional observer-based control for manipulation of flexible beam by a multi-link robot
|
Liu, Shuyang |
|
|
9 |
3 |
p. 3249-3260 |
artikel |
28 |
Efficient combination graph model based on conditional random field for online multi-object tracking
|
Zhang, Junwen |
|
|
9 |
3 |
p. 3261-3276 |
artikel |
29 |
Establishment of the model on the expression and guidance of contemporary college students’ demands in the cyberspace environment
|
Cheng, Zhichao |
|
|
9 |
3 |
p. 2993-3010 |
artikel |
30 |
Evaluate the priority of product design factors in the process of complex product innovation
|
Yu, Yinyun |
|
|
9 |
3 |
p. 2257-2270 |
artikel |
31 |
Evaluating feature combination strategies for hate-speech detection in Spanish using linguistic features and transformers
|
García-Díaz, José Antonio |
|
|
9 |
3 |
p. 2893-2914 |
artikel |
32 |
Evolutionary convolutional neural network for image classification based on multi-objective genetic programming with leader–follower mechanism
|
Liu, Qingqing |
|
|
9 |
3 |
p. 3211-3228 |
artikel |
33 |
Express delivery logistics with high-speed railway: a perspective of payment scheme and forecast information sharing
|
Duan, Huawei |
|
|
9 |
3 |
p. 2379-2391 |
artikel |
34 |
Forecasting emergency medicine reserve demand with a novel decomposition-ensemble methodology
|
Jiang-ning, Li |
|
|
9 |
3 |
p. 2285-2295 |
artikel |
35 |
GAN-based deep learning framework of network reconstruction
|
Xu, Xiang |
|
|
9 |
3 |
p. 3131-3146 |
artikel |
36 |
General type industrial temperature system control based on fuzzy fractional-order PID controller
|
Liu, Lu |
|
|
9 |
3 |
p. 2585-2597 |
artikel |
37 |
Hate speech operationalization: a preliminary examination of hate speech indicators and their structure
|
Papcunová, Jana |
|
|
9 |
3 |
p. 2827-2842 |
artikel |
38 |
Hatred and trolling detection transliteration framework using hierarchical LSTM in code-mixed social media text
|
Shekhar, Shashi |
|
|
9 |
3 |
p. 2813-2826 |
artikel |
39 |
Human gait analysis for osteoarthritis prediction: a framework of deep learning and kernel extreme learning machine
|
Khan, Muhammad Attique |
|
|
9 |
3 |
p. 2665-2683 |
artikel |
40 |
Hybrid design for sports data visualization using AI and big data analytics
|
Liu, Aijun |
|
|
9 |
3 |
p. 2969-2980 |
artikel |
41 |
IFND: a benchmark dataset for fake news detection
|
Sharma, Dilip Kumar |
|
|
9 |
3 |
p. 2843-2863 |
artikel |
42 |
Integration of manufacturing and pricing for downward substitution products decision-making
|
He, Hua |
|
|
9 |
3 |
p. 2351-2359 |
artikel |
43 |
Intelligent IoT-based large-scale inverse planning system considering postmodulation factors
|
Lan, Yihua |
|
|
9 |
3 |
p. 2613-2627 |
artikel |
44 |
Intelligent power management based on multi-objective cost function for plug-in biogas hybrid vehicles under uncertain driving conditions
|
Abd-Elhaleem, Sameh |
|
|
9 |
3 |
p. 3115-3130 |
artikel |
45 |
Knowledge organization of node enterprises’ technological innovation under supply chain environment
|
Zhang, Qianqian |
|
|
9 |
3 |
p. 2459-2473 |
artikel |
46 |
Low-power AES S-box design using dual-basis tower field extension method for cyber security applications
|
Nandan, V. |
|
|
9 |
3 |
p. 2959-2967 |
artikel |
47 |
Microblog sentiment analysis based on deep memory network with structural attention
|
Zhou, Lixin |
|
|
9 |
3 |
p. 3071-3083 |
artikel |
48 |
Neural network fusion with fine-grained adaptation learning for turnover prediction
|
Xue, Xia |
|
|
9 |
3 |
p. 3355-3366 |
artikel |
49 |
O2O selection mode portrait and optimization for railway service enterprises based on K-means
|
Sun, Changsuo |
|
|
9 |
3 |
p. 2447-2458 |
artikel |
50 |
Optimal coordination and service level of the supply chain in the sharing economy: the perspective of social responsibility
|
Guo, Jie |
|
|
9 |
3 |
p. 2429-2445 |
artikel |
51 |
Optimization-driven distribution of relief materials in emergency disasters
|
Yan, Yan |
|
|
9 |
3 |
p. 2249-2256 |
artikel |
52 |
O-WCNN: an optimized integration of spatial and spectral feature map for arrhythmia classification
|
Jangra, Manisha |
|
|
9 |
3 |
p. 2685-2698 |
artikel |
53 |
POI recommendation method using LSTM-attention in LBSN considering privacy protection
|
Wang, Kun |
|
|
9 |
3 |
p. 2801-2812 |
artikel |
54 |
Policy decision of curling in real competition scenes
|
Xiao, Qian |
|
|
9 |
3 |
p. 3301-3312 |
artikel |
55 |
PRISED tangle: a privacy-aware framework for smart healthcare data sharing using IOTA tangle
|
Abdullah, Sidrah |
|
|
9 |
3 |
p. 3023-3041 |
artikel |
56 |
Private-label sustainable supplier selection using a fuzzy entropy-VIKOR-based approach
|
Zhang, Jun |
|
|
9 |
3 |
p. 2361-2378 |
artikel |
57 |
Product-harm crisis intelligent warning system design based on fine-grained sentiment analysis of automobile complaints
|
Hu, Haiju |
|
|
9 |
3 |
p. 2313-2320 |
artikel |
58 |
Production decision-making system for manufacturing enterprises constrained by carbon reduction policies
|
Changsong, Ma |
|
|
9 |
3 |
p. 2393-2411 |
artikel |
59 |
Quantity decisions of two-stage competitive location model based on different location modes
|
Li, Yadong |
|
|
9 |
3 |
p. 2509-2520 |
artikel |
60 |
Regional logistics demand forecasting: a BP neural network approach
|
Huang, Lijuan |
|
|
9 |
3 |
p. 2297-2312 |
artikel |
61 |
RETRACTED ARTICLE: Optimized intelligent data management framework for a cyber-physical system for computational applications
|
Alsufyani, Abdulmajeed |
|
|
9 |
3 |
p. 2957 |
artikel |
62 |
Retraction Note: Towards secure deep learning architecture for smart farming-based applications
|
Udendhran, R. |
|
|
9 |
3 |
p. 3471 |
artikel |
63 |
Scene text recognition via context modeling for low-quality image in logistics industry
|
Heng, Herui |
|
|
9 |
3 |
p. 3229-3248 |
artikel |
64 |
Secure-user sign-in authentication for IoT-based eHealth systems
|
Deebak, B. D. |
|
|
9 |
3 |
p. 2629-2649 |
artikel |
65 |
Security for eHealth system: data hiding in AMBTC compressed images via gradient-based coding
|
Chen, Yung-Yao |
|
|
9 |
3 |
p. 2699-2711 |
artikel |
66 |
Social media intention mining for sustainable information systems: categories, taxonomy, datasets and challenges
|
Rashid, Ayesha |
|
|
9 |
3 |
p. 2773-2799 |
artikel |
67 |
Solving the location problem of front distribution center for omni-channel retailing
|
Huang, Jikai |
|
|
9 |
3 |
p. 2237-2248 |
artikel |
68 |
ST-V-Net: incorporating shape prior into convolutional neural networks for proximal femur segmentation
|
Zhao, Chen |
|
|
9 |
3 |
p. 2747-2758 |
artikel |
69 |
Subsidy strategy of sharing logistics platform
|
Cai, Yingzhen |
|
|
9 |
3 |
p. 2413-2428 |
artikel |
70 |
Surrogate-assisted evolutionary neural architecture search with network embedding
|
Fan, Liang |
|
|
9 |
3 |
p. 3313-3331 |
artikel |
71 |
System dynamics mechanism of cross-regional collaborative dispatch of emergency supplies based on multi-agent game
|
Qiu, Ying |
|
|
9 |
3 |
p. 2321-2332 |
artikel |
72 |
The differential measure for Pythagorean fuzzy multiple criteria group decision-making
|
Sharaf, Iman Mohamad |
|
|
9 |
3 |
p. 3333-3354 |
artikel |
73 |
Threat analysis for space information network based on network security attributes: a review
|
Wu, Xuesong |
|
|
9 |
3 |
p. 3429-3468 |
artikel |
74 |
Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment
|
Vengala, Dilip Venkata Kumar |
|
|
9 |
3 |
p. 2915-2928 |
artikel |
75 |
Truncated variable algorithm using DUS-neutrosophic Weibull distribution
|
Aslam, Muhammad |
|
|
9 |
3 |
p. 3107-3114 |
artikel |
76 |
TVS: a trusted verification scheme for office documents based on blockchain
|
Zhai, Xue |
|
|
9 |
3 |
p. 2865-2877 |
artikel |
77 |
Two-stage hybrid algorithm for recognition of industrial slab numbers with data quality improvement
|
Liu, Qingqing |
|
|
9 |
3 |
p. 3367-3384 |
artikel |
78 |
Two-stream temporal enhanced Fisher vector encoding for skeleton-based action recognition
|
Tang, Jun |
|
|
9 |
3 |
p. 3147-3159 |
artikel |
79 |
Voice of urban park visitors: exploring destination attributes influencing behavioural intentions through online review mining
|
Ma, Ke |
|
|
9 |
3 |
p. 2571-2583 |
artikel |
80 |
Yager aggregation operators based on complex interval-valued q-rung orthopair fuzzy information and their application in decision making
|
Dong, Xin |
|
|
9 |
3 |
p. 3185-3210 |
artikel |