Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             80 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A branch-and-price algorithm for two-echelon electric vehicle routing problem Wu, Zhiguo

9 3 p. 2475-2490
artikel
2 Adaptive encoding-based evolutionary approach for Chinese document clustering Chen, Jun-Xian

9 3 p. 3385-3398
artikel
3 A genre trust model for defending shilling attacks in recommender systems Yang, Li

9 3 p. 2929-2942
artikel
4 A hybrid ant colony algorithm based on multiple strategies for the vehicle routing problem with time windows Wu, Hongguang

9 3 p. 2491-2508
artikel
5 A hybrid deep learning-based fruit classification using attention model and convolution autoencoder Xue, Gang

9 3 p. 2209-2219
artikel
6 A modified NK algorithm based on BP neural network and DEMATEL for evolution path optimization of urban innovation ecosystem Liu, Ruijian

9 3 p. 2333-2349
artikel
7 An efficient privacy-preserving point-of-interest recommendation model based on local differential privacy Xu, Chonghuan

9 3 p. 3277-3300
artikel
8 Angle of attack prediction using recurrent neural networks in flight conditions with faulty sensors in the case of F-16 fighter jet Mersha, Bemnet Wondimagegnehu

9 3 p. 2599-2611
artikel
9 An instance-based deep transfer learning method for quality identification of Longjing tea from multiple geographical origins Zhang, Cheng

9 3 p. 3409-3428
artikel
10 A node selection algorithm with a genetic method based on PBFT in consortium blockchains Zhang, Jinyu

9 3 p. 3085-3105
artikel
11 A novel lightweight authentication and privacy-preserving protocol for vehicular ad hoc networks Theodore, Shaji K. A.

9 3 p. 2981-2991
artikel
12 A novel non-linear neuron model based on multiplicative aggregation in quaternionic domain Kumar, Sushil

9 3 p. 3161-3183
artikel
13 Applying catastrophe progression method to evaluate the service quality of cold chain logistics Zhang, Hao

9 3 p. 2221-2235
artikel
14 A review on Deep Learning approaches for low-dose Computed Tomography restoration Kulathilake, K. A. Saneera Hemantha

9 3 p. 2713-2745
artikel
15 Big data-driven public transportation network: a simulation approach Wang, Zhaohua

9 3 p. 2541-2553
artikel
16 CEEMDAN-IMFx-PCA-CICA: an improved single-channel blind source separation in multimedia environment for motion artifact reduction in ambulatory ECG Xiong, Fan

9 3 p. 2555-2569
artikel
17 Charging station planning based on the accumulation prospect theory and dynamic user equilibrium Heting, Qiu

9 3 p. 2521-2539
artikel
18 Cloud-based email phishing attack using machine and deep learning algorithm Butt, Umer Ahmed

9 3 p. 3043-3070
artikel
19 Code-based encryption techniques with distributed cluster head and energy consumption routing protocol Jalasri, M.

9 3 p. 2943-2955
artikel
20 Combating the infodemic: COVID-19 induced fake news recognition in social media networks Biradar, Shankar

9 3 p. 2879-2891
artikel
21 Correction to: A metaheuristic-based framework for index tracking with practical constraints Yuen, Man-Chung

9 3 p. 3469
artikel
22 Data-driven optimization for last-mile delivery Chu, Hongrui

9 3 p. 2271-2284
artikel
23 Data hiding in encryption–compression domain Singh, O. P.

9 3 p. 2759-2772
artikel
24 DCGNN: a single-stage 3D object detection network based on density clustering and graph neural network Xiong, Shimin

9 3 p. 3399-3408
artikel
25 Deep learning model construction for a semi-supervised classification with feature learning Mandapati, Sridhar

9 3 p. 3011-3021
artikel
26 Diabetic retinopathy detection and classification using capsule networks Kalyani, G.

9 3 p. 2651-2664
artikel
27 Dynamic modeling and infinite-dimensional observer-based control for manipulation of flexible beam by a multi-link robot Liu, Shuyang

9 3 p. 3249-3260
artikel
28 Efficient combination graph model based on conditional random field for online multi-object tracking Zhang, Junwen

9 3 p. 3261-3276
artikel
29 Establishment of the model on the expression and guidance of contemporary college students’ demands in the cyberspace environment Cheng, Zhichao

9 3 p. 2993-3010
artikel
30 Evaluate the priority of product design factors in the process of complex product innovation Yu, Yinyun

9 3 p. 2257-2270
artikel
31 Evaluating feature combination strategies for hate-speech detection in Spanish using linguistic features and transformers García-Díaz, José Antonio

9 3 p. 2893-2914
artikel
32 Evolutionary convolutional neural network for image classification based on multi-objective genetic programming with leader–follower mechanism Liu, Qingqing

9 3 p. 3211-3228
artikel
33 Express delivery logistics with high-speed railway: a perspective of payment scheme and forecast information sharing Duan, Huawei

9 3 p. 2379-2391
artikel
34 Forecasting emergency medicine reserve demand with a novel decomposition-ensemble methodology Jiang-ning, Li

9 3 p. 2285-2295
artikel
35 GAN-based deep learning framework of network reconstruction Xu, Xiang

9 3 p. 3131-3146
artikel
36 General type industrial temperature system control based on fuzzy fractional-order PID controller Liu, Lu

9 3 p. 2585-2597
artikel
37 Hate speech operationalization: a preliminary examination of hate speech indicators and their structure Papcunová, Jana

9 3 p. 2827-2842
artikel
38 Hatred and trolling detection transliteration framework using hierarchical LSTM in code-mixed social media text Shekhar, Shashi

9 3 p. 2813-2826
artikel
39 Human gait analysis for osteoarthritis prediction: a framework of deep learning and kernel extreme learning machine Khan, Muhammad Attique

9 3 p. 2665-2683
artikel
40 Hybrid design for sports data visualization using AI and big data analytics Liu, Aijun

9 3 p. 2969-2980
artikel
41 IFND: a benchmark dataset for fake news detection Sharma, Dilip Kumar

9 3 p. 2843-2863
artikel
42 Integration of manufacturing and pricing for downward substitution products decision-making He, Hua

9 3 p. 2351-2359
artikel
43 Intelligent IoT-based large-scale inverse planning system considering postmodulation factors Lan, Yihua

9 3 p. 2613-2627
artikel
44 Intelligent power management based on multi-objective cost function for plug-in biogas hybrid vehicles under uncertain driving conditions Abd-Elhaleem, Sameh

9 3 p. 3115-3130
artikel
45 Knowledge organization of node enterprises’ technological innovation under supply chain environment Zhang, Qianqian

9 3 p. 2459-2473
artikel
46 Low-power AES S-box design using dual-basis tower field extension method for cyber security applications Nandan, V.

9 3 p. 2959-2967
artikel
47 Microblog sentiment analysis based on deep memory network with structural attention Zhou, Lixin

9 3 p. 3071-3083
artikel
48 Neural network fusion with fine-grained adaptation learning for turnover prediction Xue, Xia

9 3 p. 3355-3366
artikel
49 O2O selection mode portrait and optimization for railway service enterprises based on K-means Sun, Changsuo

9 3 p. 2447-2458
artikel
50 Optimal coordination and service level of the supply chain in the sharing economy: the perspective of social responsibility Guo, Jie

9 3 p. 2429-2445
artikel
51 Optimization-driven distribution of relief materials in emergency disasters Yan, Yan

9 3 p. 2249-2256
artikel
52 O-WCNN: an optimized integration of spatial and spectral feature map for arrhythmia classification Jangra, Manisha

9 3 p. 2685-2698
artikel
53 POI recommendation method using LSTM-attention in LBSN considering privacy protection Wang, Kun

9 3 p. 2801-2812
artikel
54 Policy decision of curling in real competition scenes Xiao, Qian

9 3 p. 3301-3312
artikel
55 PRISED tangle: a privacy-aware framework for smart healthcare data sharing using IOTA tangle Abdullah, Sidrah

9 3 p. 3023-3041
artikel
56 Private-label sustainable supplier selection using a fuzzy entropy-VIKOR-based approach Zhang, Jun

9 3 p. 2361-2378
artikel
57 Product-harm crisis intelligent warning system design based on fine-grained sentiment analysis of automobile complaints Hu, Haiju

9 3 p. 2313-2320
artikel
58 Production decision-making system for manufacturing enterprises constrained by carbon reduction policies Changsong, Ma

9 3 p. 2393-2411
artikel
59 Quantity decisions of two-stage competitive location model based on different location modes Li, Yadong

9 3 p. 2509-2520
artikel
60 Regional logistics demand forecasting: a BP neural network approach Huang, Lijuan

9 3 p. 2297-2312
artikel
61 RETRACTED ARTICLE: Optimized intelligent data management framework for a cyber-physical system for computational applications Alsufyani, Abdulmajeed

9 3 p. 2957
artikel
62 Retraction Note: Towards secure deep learning architecture for smart farming-based applications Udendhran, R.

9 3 p. 3471
artikel
63 Scene text recognition via context modeling for low-quality image in logistics industry Heng, Herui

9 3 p. 3229-3248
artikel
64 Secure-user sign-in authentication for IoT-based eHealth systems Deebak, B. D.

9 3 p. 2629-2649
artikel
65 Security for eHealth system: data hiding in AMBTC compressed images via gradient-based coding Chen, Yung-Yao

9 3 p. 2699-2711
artikel
66 Social media intention mining for sustainable information systems: categories, taxonomy, datasets and challenges Rashid, Ayesha

9 3 p. 2773-2799
artikel
67 Solving the location problem of front distribution center for omni-channel retailing Huang, Jikai

9 3 p. 2237-2248
artikel
68 ST-V-Net: incorporating shape prior into convolutional neural networks for proximal femur segmentation Zhao, Chen

9 3 p. 2747-2758
artikel
69 Subsidy strategy of sharing logistics platform Cai, Yingzhen

9 3 p. 2413-2428
artikel
70 Surrogate-assisted evolutionary neural architecture search with network embedding Fan, Liang

9 3 p. 3313-3331
artikel
71 System dynamics mechanism of cross-regional collaborative dispatch of emergency supplies based on multi-agent game Qiu, Ying

9 3 p. 2321-2332
artikel
72 The differential measure for Pythagorean fuzzy multiple criteria group decision-making Sharaf, Iman Mohamad

9 3 p. 3333-3354
artikel
73 Threat analysis for space information network based on network security attributes: a review Wu, Xuesong

9 3 p. 3429-3468
artikel
74 Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment Vengala, Dilip Venkata Kumar

9 3 p. 2915-2928
artikel
75 Truncated variable algorithm using DUS-neutrosophic Weibull distribution Aslam, Muhammad

9 3 p. 3107-3114
artikel
76 TVS: a trusted verification scheme for office documents based on blockchain Zhai, Xue

9 3 p. 2865-2877
artikel
77 Two-stage hybrid algorithm for recognition of industrial slab numbers with data quality improvement Liu, Qingqing

9 3 p. 3367-3384
artikel
78 Two-stream temporal enhanced Fisher vector encoding for skeleton-based action recognition Tang, Jun

9 3 p. 3147-3159
artikel
79 Voice of urban park visitors: exploring destination attributes influencing behavioural intentions through online review mining Ma, Ke

9 3 p. 2571-2583
artikel
80 Yager aggregation operators based on complex interval-valued q-rung orthopair fuzzy information and their application in decision making Dong, Xin

9 3 p. 3185-3210
artikel
                             80 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland
Toegankelijkheidsverklaring