Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             151 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 ACBSO: a hybrid solution for load balancing using ant colony and bird swarm optimization algorithms Raghav, Yogita Yashveer

5 p. 2847-2857
artikel
2 A common-gate cascaded with cascoded self-bias common source approach for 3.1–10.6 GHz UWB low noise amplifier Singh, Vikram

5 p. 2389-2398
artikel
3 A comprehensive privacy and security framework for dynamic protection (CPSF) Abi Sen, Adnan Ahmed

5 p. 2477-2485
artikel
4 A data security and integrity framework using third-party cloud auditing Mishachandar, B.

5 p. 2081-2089
artikel
5 A deep learning-based approach for the identification of selected species of genus Euphorbia L. Gautam, Neelam

5 p. 2435-2444
artikel
6 Adoption and sustainability of bitcoin and the blockchain technology in Nigeria Onyekwere, Eucharia

5 p. 2793-2804
artikel
7 Adoption of machine learning algorithm for predicting the length of stay of patients (construction workers) during COVID pandemic Samy, S. Selvakumara

5 p. 2613-2621
artikel
8 A framework for dynamic smart traffic light management system Alharbi, Awad

5 p. 1769-1776
artikel
9 A hybrid model utilizing transfer learning for legal citation linking Sheik, Reshma

5 p. 2783-2792
artikel
10 A hybrid optimization for threat detection in personal health crisis management using genetic algorithm De, Mou

5 p. 2603-2618
artikel
11 A hybrid swarm optimization with trapezoidal and pentagonal fuzzy numbers using benchmark functions Rath, Subhabrata

5 p. 2747-2758
artikel
12 Air quality monitoring for Smart eHealth system using firefly optimization and support vector machine Rahi, Pankaj

5 p. 1847-1859
artikel
13 Algorithm for vertical handover decision using geometric mean and MADM techniques Goutam, Siddharth

5 p. 2691-2699
artikel
14 An abstractive text summarization using deep learning in Assamese Goutom, Pritom Jyoti

5 p. 2365-2372
artikel
15 Analysis of convexly combined recursive inverse algorithms Hilal, Hasan Abu

5 p. 2245-2253
artikel
16 An analytical framework for centroid-based localization in wireless sensor networks Abbas, Ash Mohammad

5 p. 1777-1783
artikel
17 An approach to analyse energy consumption of an IoT system Yugank, Hanumant Kumar

5 p. 2549-2558
artikel
18 An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA) Imam, Raza

5 p. 2645-2656
artikel
19 An efficient DDoS attack detection mechanism in SDN environment Hnamte, Vanlalruata

5 p. 2623-2636
artikel
20 An efficient feature representation strategy for offline computer synthesized font characters using multivariate filter based feature selection technique Dey, Raghunath

5 p. 1733-1743
artikel
21 An ICT architecture for Smart Local Councils: a Mauritian case study Gobin-Rahimbux, Baby

5 p. 2423-2433
artikel
22 An improved proxy-vehicle based authentication scheme for vehicular ad-hoc networks Sudhakar, T.

5 p. 2441-2449
artikel
23 An intelligent handoff optimization algorithm for network selection in heterogeneous networks Dhand, Pooja

5 p. 2025-2036
artikel
24 An IoT/FOG based framework for sports talent identification in COVID-19 like situations Khan, Naveed Jeelani

5 p. 2513-2521
artikel
25 Anomaly detection using ensemble random forest in wireless sensor network Biswas, Priyajit

5 p. 2043-2052
artikel
26 An open source and practical approach to X2X linux workload migration Kumar, Sanjeet

5 p. 1791-1796
artikel
27 A novel classification to categorise original hadith detection techniques Fadele, Alaba Ayotunde

5 p. 2361-2375
artikel
28 A novel computation method for detection of Malaria in RBC using Photonic biosensor Kumar, B. M. Hemanth

5 p. 2053-2058
artikel
29 A novel hybrid compressive encryption cryptosystem based on block quarter compression via DCT and fractional Fourier transform with chaos Ahuja, Bharti

5 p. 1837-1846
artikel
30 A novel model for eliminating overlapping issues in 3D object recognition using dove swarm optimization based light GBM Rajendran, Ramana

5 p. 2387-2393
artikel
31 A parametric analysis of AVA to optimise Netflix performance Rastogi, Divya

5 p. 2687-2694
artikel
32 Application of network embedding and transcriptome data in supervised drug repositioning Kart, Özge

5 p. 2637-2643
artikel
33 A soft computing based novel hybrid optimization algorithm H3PGAB3C and its application to routing in WMNs Aneja, Rattan Deep

5 p. 2595-2602
artikel
34 A stacking ensemble approach for identification of informative tweets on twitter data Dasari, Siva Krishna

5 p. 2651-2662
artikel
35 A Trie based lemmatizer for Assamese language Nath, Basab

5 p. 2355-2360
artikel
36 Automated skull damage detection from assembled skull model using computer vision and machine learning Mangrulkar, Amol

5 p. 1785-1790
artikel
37 Automatic feature selection using enhanced dynamic Crow Search Algorithm Ranjan, Rajesh

5 p. 2777-2782
artikel
38 Boost customer churn prediction in the insurance industry using meta-heuristic models Nagaraju, Jajam

5 p. 2619-2631
artikel
39 Building a reverse dictionary with specific application to the COVID-19 pandemic Siddique, Bushra

5 p. 2417-2422
artikel
40 Cardiovascular risk assessment using data mining inferencing and feature engineering techniques Sahu, Aanchal

5 p. 2011-2023
artikel
41 Chaotic deep neural network based physical layer key generation for massive MIMO Ismayil Siyad, C.

5 p. 1901-1912
artikel
42 CNFET-based digitally controlled impedance multiplier Tripathi, Shailendra K.

5 p. 1937-1941
artikel
43 Compactness measure of rail wheel rolling contact of the freight wagon Mishra, Suchandana

5 p. 2335-2342
artikel
44 Conditional deep clustering based transformed spatio-temporal features and fused distance for efficient video retrieval Banerjee, Alina

5 p. 2349-2355
artikel
45 Contrast-enhanced visual cryptography schemes based on block pixel patterns Jisha, T E

5 p. 2445-2455
artikel
46 Controller node derivation for data distribution in Network-on-chip with ring connected binary tree topology Uma, R.

5 p. 2583-2591
artikel
47 Convolutional neural network based children recognition system using contactless fingerprints Rajaram, Kanchana

5 p. 2695-2705
artikel
48 Crop yield prediction: two-tiered machine learning model approach Shidnal, Sushila

5 p. 1983-1991
artikel
49 Cube attack on stream cipher E0: revisited Deepthi, Kakumani K. C.

5 p. 2575-2584
artikel
50 DDoS attack detection using MLP and Random Forest Algorithms Najar, Ashfaq Ahmad

5 p. 2317-2327
artikel
51 Debunking multi-lingual social media posts using deep learning Kotiyal, Bina

5 p. 2569-2581
artikel
52 Deep bidirectional LSTM for disease classification supporting hospital admission based on pre-diagnosis: a case study in Vietnam Nguyen, Hai Thanh

5 p. 2677-2685
artikel
53 Design and implementation of an internet of things based low-cost smart weather prediction system Islam, Sk. Fahmida

5 p. 2001-2010
artikel
54 Designing with biodiversity data: connections among design, materials, and technology Xia, Guobin

5 p. 1703-1710
artikel
55 Design of a low-power 180 nm broadband CMOS transimpedance amplifier for bio-medical & IoT applications Niranjan, Vivek

5 p. 2741-2745
artikel
56 Design of optimal metaheuristics based pixel selection with homomorphic encryption technique for video steganography Sharath, M. N.

5 p. 2265-2274
artikel
57 Detecting community structures using Modified Fast Louvain Method in complex networks Chaudhary, Laxmi

5 p. 1711-1719
artikel
58 Detecting context-based in-claim numerals in Financial Earnings Conference Calls Ghosh, Sohom

5 p. 2559-2566
artikel
59 Developing a new heuristic algorithm for efficient reliability optimization Garg, Deepika

5 p. 2505-2511
artikel
60 Development and performance evaluation of EQUIC protocol Bhadouria, Sujeet Singh

5 p. 2681-2689
artikel
61 DQNANFCT: design of a deep Q-learning network for augmented network forensics via integrated contextual trust operations Choudhary, Ashutosh Kumar

5 p. 2729-2739
artikel
62 DSC-HRNet: a lightweight teaching pose estimation model with depthwise separable convolution and deep high-resolution representation learning in computer-aided education Zhao, Ziyun

5 p. 2373-2385
artikel
63 Editorial Hoda, M. N.

5 p. 2241-2244
artikel
64 Editorial Hoda, M. N.

5 p. 1699-1702
artikel
65 Editorial Hoda, M. N.

5 p. 2329-2332
artikel
66 Employing stacked ensemble approach for time series forecasting Sharma, Nonita

5 p. 2075-2080
artikel
67 Energy efficient emergency rescue scheme in wireless sensor networks Rishiwal, Vinay

5 p. 1951-1958
artikel
68 Exploring a genotype based formalisation for tree adjoining grammar derivations Menon, Vijay Krishna

5 p. 2119-2128
artikel
69 Extended group-based verification approach for secure M2M communications Prabhakara Rao, T.

5 p. 2479-2488
artikel
70 Extracting sequential frequent itemsets from probabilistic sequences database Seddiki, Imane

5 p. 2509-2515
artikel
71 Extractive text summarization using deep learning approach Yadav, Arun Kumar

5 p. 2407-2415
artikel
72 “FabDepth I: A Unique Dataset for Efficient Gesture Detection” Shamalik, Rameez

5 p. 2645-2649
artikel
73 gHPCSO: Gaussian Distribution Based Hybrid Particle Cat Swarm Optimization for Linear B-cell Epitope Prediction Angaitkar, Pratik

5 p. 2805-2818
artikel
74 Grey wolf optimizer based IQA of mixed and multiple distorted images Wasson, Vikas

5 p. 2707-2717
artikel
75 Handwritten Marathi numeral recognition using stacked ensemble neural network Mane, Deepak T.

5 p. 1993-1999
artikel
76 Hierarchical autoencoder-based multi-omics subtyping and prognosis prediction framework for lung adenocarcinoma Bhat, Aadil Rashid

5 p. 2541-2549
artikel
77 High-performance 2D photonics MOEMS pressure sensors P.R., Yashaswini

5 p. 2459-2468
artikel
78 Hunting the pertinency of hash and bloom filter combinations on GPU for fast pattern matching Bhat, Radhakrishna

5 p. 2667-2679
artikel
79 Hybrid PID plus LQR based frequency regulation approach for the renewable sources based standalone microgrid Kumar, Rohit Ranjan

5 p. 2567-2574
artikel
80 Identity-based signcryption scheme for medical cyber physical system in standard model Patil, Rachana Yogesh

5 p. 2275-2283
artikel
81 Identity verifiable ring signature scheme for privacy protection in blockchain Devidas, S.

5 p. 2559-2568
artikel
82 Improved resilience of secret sharing scheme with augmented multifarious features Patil, Sonali

5 p. 2633-2644
artikel
83 Improving accuracy of convolutional neural network-based skin lesion segmentation using group normalization and combined loss function Kaur, Rajdeep

5 p. 2827-2835
artikel
84 Improving a neural network model by explanation-guided training for glioma classification based on MRI data Šefčík, František

5 p. 2593-2601
artikel
85 Improving branch prediction by combining perceptron with learning vector quantization neural network in embedded processor Sweety,

5 p. 1815-1821
artikel
86 Improving document classification using domain-specific vocabulary: hybridization of deep learning approach with TFIDF Kalra, Vandana

5 p. 2451-2457
artikel
87 Improving stemming for Assamese information retrieval Gogoi, Arjun

5 p. 1763-1768
artikel
88 Interclass boundary preservation (IBP): a data reduction algorithm Fuangkhon, Piyabute

5 p. 2333-2347
artikel
89 Internet-of-things and mobile application based hybrid model for controlling energy system Patil, Manoj A.

5 p. 2129-2138
artikel
90 IoT application modules placement in heterogeneous fog–cloud infrastructure Arora, Upma

5 p. 1975-1982
artikel
91 iQMS: IoT-based QMS framework for tracking of quarantined subjects Hasan, Iqbal

5 p. 2255-2263
artikel
92 K-way spectral graph partitioning for load balancing in parallel computing Patil, S. V.

5 p. 1893-1900
artikel
93 Lightweight convolutional neural network architecture implementation using TensorFlow lite Pandey, Jyoti

5 p. 2489-2498
artikel
94 LSNet: a novel CNN architecture to identify wrist fracture from a small X-ray dataset Anwar, Talha

5 p. 2469-2477
artikel
95 Machine learning based hybrid precoder with user scheduling technique for maximizing sum rate in downlink MU-MIMO system Rajarajeswarie, B.

5 p. 2399-2405
artikel
96 MFCC based ensemble learning method for multiple fault diagnosis of roller bearing Choudakkanavar, Gangavva

5 p. 2741-2751
artikel
97 Mish-DCTGAN based combined image super-resolution and deblurring approach for blurry license plates Pattanaik, Anmol

5 p. 2767-2775
artikel
98 Mitigating TCP incast in data center networks using enhanced application layer technique Suryavanshi, Mahendra

5 p. 2523-2531
artikel
99 Model for forecasting electronic fraud threats on selected electronic payment channels using linear regression Alabi, Olubunmi

5 p. 2657-2666
artikel
100 Modeling of software project effort estimation: a comparative performance evaluation of optimized soft computing-based methods Sharma, Sudhir

5 p. 2487-2496
artikel
101 Modelling of pigeon inspired optimization based segment routing in QoS aware software defined networks Gopal, Kumar Parop

5 p. 2499-2508
artikel
102 Motor velocity based multi-objective genetic algorithm controlled navigation method for two-wheeled pioneer P3-DX robot in V-REP scenario Panwar, Vikas Singh

5 p. 2101-2108
artikel
103 Multiobjective piecewise regressive elitism spotted hyena optimized mapping for 3D NoC architecture design G, Sushma

5 p. 2719-2728
artikel
104 MWSMO: Multi-objective Whale Slime Mold Optimization based Food Recommendation system for Diabetes patient using GAN model Rachitha, M. V.

5 p. 2357-2363
artikel
105 Novel low quantum cost reversible logic based full adders for DSP applications Parameshwara, M. C.

5 p. 1755-1761
artikel
106 Numerical analysis and implementation of artificial neural network algorithm for nonlinear function Kumar, Pathamuthu Suresh

5 p. 2059-2068
artikel
107 Numerical simulation of Burger’s equation using a particle swarm optimization Arora, Geeta

5 p. 2551-2558
artikel
108 On some new aggregation operators for T-spherical fuzzy hypersoft sets with application in renewable energy sources Monika,

5 p. 2457-2467
artikel
109 On utilizing modified TOPSIS with R-norm q-rung picture fuzzy information measure green supplier selection Dhumras, Himanshu

5 p. 2819-2825
artikel
110 Optimization of complex nonlinear systems using genetic algorithm Mangla, Chhavi

5 p. 1913-1925
artikel
111 Optimizing flexural strength of fused deposition modelling using supervised machine learning algorithms Jatti, Vijaykumar S.

5 p. 2759-2766
artikel
112 Optimizing performance of serverless application using PanOpticon Kumari, Anisha

5 p. 2529-2539
artikel
113 ORaBaN: an optimized radial basis neuro framework for anomaly detection in large networks Bhuvaneswari Amma, N. G.

5 p. 2497-2503
artikel
114 Pectoral muscle removal using entropy fuzzy clustering and RCM-CNN based mammography classification Reddy, V. Anji

5 p. 2663-2675
artikel
115 Performability modeling of safety-critical systems through AADL Ahamad, Shakeel

5 p. 2709-2722
artikel
116 Performance evaluation for RF propagation models based on data measurement for LTE networks Shakir, Zaenab

5 p. 2423-2428
artikel
117 Performance evaluation of encryption algorithm using fruit fly optimization improved hybridized seeker and PVD algorithm Roselinkiruba, R.

5 p. 1797-1803
artikel
118 Pose invariant non-frontal 2D, 2.5D face detection and recognition technique Thavani, Shiva

5 p. 2603-2611
artikel
119 Predicting and classifying water quality, treatment, and usage: a comprehensive review Sarang, Yash

5 p. 2837-2845
artikel
120 Prioritizing severity level of COVID-19 using correlation coefficient and intuitionistic fuzzy logic Tarannum, Shahla

5 p. 2469-2475
artikel
121 Proficient job scheduling in cloud computation using an optimized machine learning strategy Neelakantan, P.

5 p. 2409-2421
artikel
122 Project execution obstacles: a case of King Abdulaziz Airport in Saudi Arabia Al Hudhaif, Abdullah

5 p. 1943-1950
artikel
123 Protein secondary structure prediction using data-partitioning combined with stacked convolutional neural networks and bidirectional gated recurrent units Sofi, Mukhtar Ahmad

5 p. 2285-2295
artikel
124 Query reformulation approach using domain specific ontology for semantic information retrieval Kaur, Navjot

5 p. 1745-1753
artikel
125 Realization of convolution layer using system verilog for achieving parallelism and improvement in performance parameters Amrutha, R. K.

5 p. 1959-1974
artikel
126 Recency augmented hybrid collaborative movie recommendation system Sujithra Alias Kanmani, R.

5 p. 1829-1836
artikel
127 RETRACTED ARTICLE: Generating optimal solutions for the routing space and spectrum allocation problem in space division multiplexing enabled elastic optical networks Iyer, Sridhar

5 p. 2139
artikel
128 Robot and virtual reality-based intervention in autism: a comprehensive review Abu-Amara, Fadi

5 p. 1879-1891
artikel
129 RVM-MR image brain tumour classification using novel statistical feature extractor Dixit, Asmita

5 p. 2395-2407
artikel
130 SChain: towards the quest for redesigning supply-chain by augmenting Blockchain for end-to-end management Quamara, Sidharth

5 p. 2343-2354
artikel
131 Scheduling on-demand charging request in wireless rechargeable sensor network with fruit fly optimization-based path selection Susan, T. Siron Anita

5 p. 2377-2388
artikel
132 Securing polynomial based group key management scheme against strong active adversary model Sharma, Payal

5 p. 2329-2334
artikel
133 Security framework to healthcare robots for secure sharing of healthcare data from cloud Jain, Saurabh

5 p. 2429-2439
artikel
134 Self-adaptive image codec for intelligent vision sensor networks Lin, Ming-Yi

5 p. 2533-2540
artikel
135 Semantic modeling and visualization of semantic groups of clinical text documents Kenei, Jonah

5 p. 2585-2593
artikel
136 Sentiment analysis of Marathi news using LSTM Divate, Manisha Satish

5 p. 2069-2074
artikel
137 Single document text summarization technique using optimal combination of cuckoo search algorithm, sentence scoring and sentiment score Mandal, Shrabanti

5 p. 1805-1813
artikel
138 Sleep insomnia identification model using sleep quality parameters Santaji, Sagar

5 p. 1861-1865
artikel
139 Sobel operator enhancement based on eight-directional convolution and entropy Hao, Fei

5 p. 1823-1828
artikel
140 Solve DNA sequence assembly problem using hybrid crow search optimization and multi classification techniques Raja, G.

5 p. 2541-2547
artikel
141 SSHM: SMOTE-stacked hybrid model for improving severity classification of code smell Nanda, Jatin

5 p. 2701-2707
artikel
142 Stacking and voting ensemble methods fusion to evaluate instructor performance in higher education Ahuja, Ravinder

5 p. 1721-1731
artikel
143 StockGAN: robust stock price prediction using GAN algorithm Diqi, Mohammad

5 p. 2309-2315
artikel
144 Survey on SVM and their application in image classification Chandra, Mayank Arya

5 p. 1-11
artikel
145 Tackling control channel saturation for load balancing in multi-channel mobile ad hoc networks Kumar, Rohit

5 p. 2109-2117
artikel
146 Timed neural network using object-based model of neurons for shortest path problem Krishnan, Ramadurai

5 p. 2037-2042
artikel
147 To improve scalability with Boolean matrix using efficient gossip failure detection and consensus algorithm for PeerSim simulator in IoT environment Kumar, Surendra

5 p. 2297-2307
artikel
148 Uncertainty optimization based feature subset selection model using rough set and uncertainty theory Sinha, Arvind Kumar

5 p. 2723-2739
artikel
149 Video summarization and captioning using dynamic mode decomposition for surveillance Radarapu, Rakesh

5 p. 1927-1936
artikel
150 W-NLM: a proficient EMG denoising technique Bhobhriya, Rinku

5 p. 2517-2527
artikel
151 ZeroAccess botnet investigation and analysis Rawat, Ramesh Singh

5 p. 2091-2099
artikel
                             151 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland