nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
ACBSO: a hybrid solution for load balancing using ant colony and bird swarm optimization algorithms
|
Raghav, Yogita Yashveer |
|
|
|
5 |
p. 2847-2857 |
artikel |
2 |
A common-gate cascaded with cascoded self-bias common source approach for 3.1–10.6 GHz UWB low noise amplifier
|
Singh, Vikram |
|
|
|
5 |
p. 2389-2398 |
artikel |
3 |
A comprehensive privacy and security framework for dynamic protection (CPSF)
|
Abi Sen, Adnan Ahmed |
|
|
|
5 |
p. 2477-2485 |
artikel |
4 |
A data security and integrity framework using third-party cloud auditing
|
Mishachandar, B. |
|
|
|
5 |
p. 2081-2089 |
artikel |
5 |
A deep learning-based approach for the identification of selected species of genus Euphorbia L.
|
Gautam, Neelam |
|
|
|
5 |
p. 2435-2444 |
artikel |
6 |
Adoption and sustainability of bitcoin and the blockchain technology in Nigeria
|
Onyekwere, Eucharia |
|
|
|
5 |
p. 2793-2804 |
artikel |
7 |
Adoption of machine learning algorithm for predicting the length of stay of patients (construction workers) during COVID pandemic
|
Samy, S. Selvakumara |
|
|
|
5 |
p. 2613-2621 |
artikel |
8 |
A framework for dynamic smart traffic light management system
|
Alharbi, Awad |
|
|
|
5 |
p. 1769-1776 |
artikel |
9 |
A hybrid model utilizing transfer learning for legal citation linking
|
Sheik, Reshma |
|
|
|
5 |
p. 2783-2792 |
artikel |
10 |
A hybrid optimization for threat detection in personal health crisis management using genetic algorithm
|
De, Mou |
|
|
|
5 |
p. 2603-2618 |
artikel |
11 |
A hybrid swarm optimization with trapezoidal and pentagonal fuzzy numbers using benchmark functions
|
Rath, Subhabrata |
|
|
|
5 |
p. 2747-2758 |
artikel |
12 |
Air quality monitoring for Smart eHealth system using firefly optimization and support vector machine
|
Rahi, Pankaj |
|
|
|
5 |
p. 1847-1859 |
artikel |
13 |
Algorithm for vertical handover decision using geometric mean and MADM techniques
|
Goutam, Siddharth |
|
|
|
5 |
p. 2691-2699 |
artikel |
14 |
An abstractive text summarization using deep learning in Assamese
|
Goutom, Pritom Jyoti |
|
|
|
5 |
p. 2365-2372 |
artikel |
15 |
Analysis of convexly combined recursive inverse algorithms
|
Hilal, Hasan Abu |
|
|
|
5 |
p. 2245-2253 |
artikel |
16 |
An analytical framework for centroid-based localization in wireless sensor networks
|
Abbas, Ash Mohammad |
|
|
|
5 |
p. 1777-1783 |
artikel |
17 |
An approach to analyse energy consumption of an IoT system
|
Yugank, Hanumant Kumar |
|
|
|
5 |
p. 2549-2558 |
artikel |
18 |
An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA)
|
Imam, Raza |
|
|
|
5 |
p. 2645-2656 |
artikel |
19 |
An efficient DDoS attack detection mechanism in SDN environment
|
Hnamte, Vanlalruata |
|
|
|
5 |
p. 2623-2636 |
artikel |
20 |
An efficient feature representation strategy for offline computer synthesized font characters using multivariate filter based feature selection technique
|
Dey, Raghunath |
|
|
|
5 |
p. 1733-1743 |
artikel |
21 |
An ICT architecture for Smart Local Councils: a Mauritian case study
|
Gobin-Rahimbux, Baby |
|
|
|
5 |
p. 2423-2433 |
artikel |
22 |
An improved proxy-vehicle based authentication scheme for vehicular ad-hoc networks
|
Sudhakar, T. |
|
|
|
5 |
p. 2441-2449 |
artikel |
23 |
An intelligent handoff optimization algorithm for network selection in heterogeneous networks
|
Dhand, Pooja |
|
|
|
5 |
p. 2025-2036 |
artikel |
24 |
An IoT/FOG based framework for sports talent identification in COVID-19 like situations
|
Khan, Naveed Jeelani |
|
|
|
5 |
p. 2513-2521 |
artikel |
25 |
Anomaly detection using ensemble random forest in wireless sensor network
|
Biswas, Priyajit |
|
|
|
5 |
p. 2043-2052 |
artikel |
26 |
An open source and practical approach to X2X linux workload migration
|
Kumar, Sanjeet |
|
|
|
5 |
p. 1791-1796 |
artikel |
27 |
A novel classification to categorise original hadith detection techniques
|
Fadele, Alaba Ayotunde |
|
|
|
5 |
p. 2361-2375 |
artikel |
28 |
A novel computation method for detection of Malaria in RBC using Photonic biosensor
|
Kumar, B. M. Hemanth |
|
|
|
5 |
p. 2053-2058 |
artikel |
29 |
A novel hybrid compressive encryption cryptosystem based on block quarter compression via DCT and fractional Fourier transform with chaos
|
Ahuja, Bharti |
|
|
|
5 |
p. 1837-1846 |
artikel |
30 |
A novel model for eliminating overlapping issues in 3D object recognition using dove swarm optimization based light GBM
|
Rajendran, Ramana |
|
|
|
5 |
p. 2387-2393 |
artikel |
31 |
A parametric analysis of AVA to optimise Netflix performance
|
Rastogi, Divya |
|
|
|
5 |
p. 2687-2694 |
artikel |
32 |
Application of network embedding and transcriptome data in supervised drug repositioning
|
Kart, Özge |
|
|
|
5 |
p. 2637-2643 |
artikel |
33 |
A soft computing based novel hybrid optimization algorithm H3PGAB3C and its application to routing in WMNs
|
Aneja, Rattan Deep |
|
|
|
5 |
p. 2595-2602 |
artikel |
34 |
A stacking ensemble approach for identification of informative tweets on twitter data
|
Dasari, Siva Krishna |
|
|
|
5 |
p. 2651-2662 |
artikel |
35 |
A Trie based lemmatizer for Assamese language
|
Nath, Basab |
|
|
|
5 |
p. 2355-2360 |
artikel |
36 |
Automated skull damage detection from assembled skull model using computer vision and machine learning
|
Mangrulkar, Amol |
|
|
|
5 |
p. 1785-1790 |
artikel |
37 |
Automatic feature selection using enhanced dynamic Crow Search Algorithm
|
Ranjan, Rajesh |
|
|
|
5 |
p. 2777-2782 |
artikel |
38 |
Boost customer churn prediction in the insurance industry using meta-heuristic models
|
Nagaraju, Jajam |
|
|
|
5 |
p. 2619-2631 |
artikel |
39 |
Building a reverse dictionary with specific application to the COVID-19 pandemic
|
Siddique, Bushra |
|
|
|
5 |
p. 2417-2422 |
artikel |
40 |
Cardiovascular risk assessment using data mining inferencing and feature engineering techniques
|
Sahu, Aanchal |
|
|
|
5 |
p. 2011-2023 |
artikel |
41 |
Chaotic deep neural network based physical layer key generation for massive MIMO
|
Ismayil Siyad, C. |
|
|
|
5 |
p. 1901-1912 |
artikel |
42 |
CNFET-based digitally controlled impedance multiplier
|
Tripathi, Shailendra K. |
|
|
|
5 |
p. 1937-1941 |
artikel |
43 |
Compactness measure of rail wheel rolling contact of the freight wagon
|
Mishra, Suchandana |
|
|
|
5 |
p. 2335-2342 |
artikel |
44 |
Conditional deep clustering based transformed spatio-temporal features and fused distance for efficient video retrieval
|
Banerjee, Alina |
|
|
|
5 |
p. 2349-2355 |
artikel |
45 |
Contrast-enhanced visual cryptography schemes based on block pixel patterns
|
Jisha, T E |
|
|
|
5 |
p. 2445-2455 |
artikel |
46 |
Controller node derivation for data distribution in Network-on-chip with ring connected binary tree topology
|
Uma, R. |
|
|
|
5 |
p. 2583-2591 |
artikel |
47 |
Convolutional neural network based children recognition system using contactless fingerprints
|
Rajaram, Kanchana |
|
|
|
5 |
p. 2695-2705 |
artikel |
48 |
Crop yield prediction: two-tiered machine learning model approach
|
Shidnal, Sushila |
|
|
|
5 |
p. 1983-1991 |
artikel |
49 |
Cube attack on stream cipher E0: revisited
|
Deepthi, Kakumani K. C. |
|
|
|
5 |
p. 2575-2584 |
artikel |
50 |
DDoS attack detection using MLP and Random Forest Algorithms
|
Najar, Ashfaq Ahmad |
|
|
|
5 |
p. 2317-2327 |
artikel |
51 |
Debunking multi-lingual social media posts using deep learning
|
Kotiyal, Bina |
|
|
|
5 |
p. 2569-2581 |
artikel |
52 |
Deep bidirectional LSTM for disease classification supporting hospital admission based on pre-diagnosis: a case study in Vietnam
|
Nguyen, Hai Thanh |
|
|
|
5 |
p. 2677-2685 |
artikel |
53 |
Design and implementation of an internet of things based low-cost smart weather prediction system
|
Islam, Sk. Fahmida |
|
|
|
5 |
p. 2001-2010 |
artikel |
54 |
Designing with biodiversity data: connections among design, materials, and technology
|
Xia, Guobin |
|
|
|
5 |
p. 1703-1710 |
artikel |
55 |
Design of a low-power 180 nm broadband CMOS transimpedance amplifier for bio-medical & IoT applications
|
Niranjan, Vivek |
|
|
|
5 |
p. 2741-2745 |
artikel |
56 |
Design of optimal metaheuristics based pixel selection with homomorphic encryption technique for video steganography
|
Sharath, M. N. |
|
|
|
5 |
p. 2265-2274 |
artikel |
57 |
Detecting community structures using Modified Fast Louvain Method in complex networks
|
Chaudhary, Laxmi |
|
|
|
5 |
p. 1711-1719 |
artikel |
58 |
Detecting context-based in-claim numerals in Financial Earnings Conference Calls
|
Ghosh, Sohom |
|
|
|
5 |
p. 2559-2566 |
artikel |
59 |
Developing a new heuristic algorithm for efficient reliability optimization
|
Garg, Deepika |
|
|
|
5 |
p. 2505-2511 |
artikel |
60 |
Development and performance evaluation of EQUIC protocol
|
Bhadouria, Sujeet Singh |
|
|
|
5 |
p. 2681-2689 |
artikel |
61 |
DQNANFCT: design of a deep Q-learning network for augmented network forensics via integrated contextual trust operations
|
Choudhary, Ashutosh Kumar |
|
|
|
5 |
p. 2729-2739 |
artikel |
62 |
DSC-HRNet: a lightweight teaching pose estimation model with depthwise separable convolution and deep high-resolution representation learning in computer-aided education
|
Zhao, Ziyun |
|
|
|
5 |
p. 2373-2385 |
artikel |
63 |
Editorial
|
Hoda, M. N. |
|
|
|
5 |
p. 2241-2244 |
artikel |
64 |
Editorial
|
Hoda, M. N. |
|
|
|
5 |
p. 1699-1702 |
artikel |
65 |
Editorial
|
Hoda, M. N. |
|
|
|
5 |
p. 2329-2332 |
artikel |
66 |
Employing stacked ensemble approach for time series forecasting
|
Sharma, Nonita |
|
|
|
5 |
p. 2075-2080 |
artikel |
67 |
Energy efficient emergency rescue scheme in wireless sensor networks
|
Rishiwal, Vinay |
|
|
|
5 |
p. 1951-1958 |
artikel |
68 |
Exploring a genotype based formalisation for tree adjoining grammar derivations
|
Menon, Vijay Krishna |
|
|
|
5 |
p. 2119-2128 |
artikel |
69 |
Extended group-based verification approach for secure M2M communications
|
Prabhakara Rao, T. |
|
|
|
5 |
p. 2479-2488 |
artikel |
70 |
Extracting sequential frequent itemsets from probabilistic sequences database
|
Seddiki, Imane |
|
|
|
5 |
p. 2509-2515 |
artikel |
71 |
Extractive text summarization using deep learning approach
|
Yadav, Arun Kumar |
|
|
|
5 |
p. 2407-2415 |
artikel |
72 |
“FabDepth I: A Unique Dataset for Efficient Gesture Detection”
|
Shamalik, Rameez |
|
|
|
5 |
p. 2645-2649 |
artikel |
73 |
gHPCSO: Gaussian Distribution Based Hybrid Particle Cat Swarm Optimization for Linear B-cell Epitope Prediction
|
Angaitkar, Pratik |
|
|
|
5 |
p. 2805-2818 |
artikel |
74 |
Grey wolf optimizer based IQA of mixed and multiple distorted images
|
Wasson, Vikas |
|
|
|
5 |
p. 2707-2717 |
artikel |
75 |
Handwritten Marathi numeral recognition using stacked ensemble neural network
|
Mane, Deepak T. |
|
|
|
5 |
p. 1993-1999 |
artikel |
76 |
Hierarchical autoencoder-based multi-omics subtyping and prognosis prediction framework for lung adenocarcinoma
|
Bhat, Aadil Rashid |
|
|
|
5 |
p. 2541-2549 |
artikel |
77 |
High-performance 2D photonics MOEMS pressure sensors
|
P.R., Yashaswini |
|
|
|
5 |
p. 2459-2468 |
artikel |
78 |
Hunting the pertinency of hash and bloom filter combinations on GPU for fast pattern matching
|
Bhat, Radhakrishna |
|
|
|
5 |
p. 2667-2679 |
artikel |
79 |
Hybrid PID plus LQR based frequency regulation approach for the renewable sources based standalone microgrid
|
Kumar, Rohit Ranjan |
|
|
|
5 |
p. 2567-2574 |
artikel |
80 |
Identity-based signcryption scheme for medical cyber physical system in standard model
|
Patil, Rachana Yogesh |
|
|
|
5 |
p. 2275-2283 |
artikel |
81 |
Identity verifiable ring signature scheme for privacy protection in blockchain
|
Devidas, S. |
|
|
|
5 |
p. 2559-2568 |
artikel |
82 |
Improved resilience of secret sharing scheme with augmented multifarious features
|
Patil, Sonali |
|
|
|
5 |
p. 2633-2644 |
artikel |
83 |
Improving accuracy of convolutional neural network-based skin lesion segmentation using group normalization and combined loss function
|
Kaur, Rajdeep |
|
|
|
5 |
p. 2827-2835 |
artikel |
84 |
Improving a neural network model by explanation-guided training for glioma classification based on MRI data
|
Šefčík, František |
|
|
|
5 |
p. 2593-2601 |
artikel |
85 |
Improving branch prediction by combining perceptron with learning vector quantization neural network in embedded processor
|
Sweety, |
|
|
|
5 |
p. 1815-1821 |
artikel |
86 |
Improving document classification using domain-specific vocabulary: hybridization of deep learning approach with TFIDF
|
Kalra, Vandana |
|
|
|
5 |
p. 2451-2457 |
artikel |
87 |
Improving stemming for Assamese information retrieval
|
Gogoi, Arjun |
|
|
|
5 |
p. 1763-1768 |
artikel |
88 |
Interclass boundary preservation (IBP): a data reduction algorithm
|
Fuangkhon, Piyabute |
|
|
|
5 |
p. 2333-2347 |
artikel |
89 |
Internet-of-things and mobile application based hybrid model for controlling energy system
|
Patil, Manoj A. |
|
|
|
5 |
p. 2129-2138 |
artikel |
90 |
IoT application modules placement in heterogeneous fog–cloud infrastructure
|
Arora, Upma |
|
|
|
5 |
p. 1975-1982 |
artikel |
91 |
iQMS: IoT-based QMS framework for tracking of quarantined subjects
|
Hasan, Iqbal |
|
|
|
5 |
p. 2255-2263 |
artikel |
92 |
K-way spectral graph partitioning for load balancing in parallel computing
|
Patil, S. V. |
|
|
|
5 |
p. 1893-1900 |
artikel |
93 |
Lightweight convolutional neural network architecture implementation using TensorFlow lite
|
Pandey, Jyoti |
|
|
|
5 |
p. 2489-2498 |
artikel |
94 |
LSNet: a novel CNN architecture to identify wrist fracture from a small X-ray dataset
|
Anwar, Talha |
|
|
|
5 |
p. 2469-2477 |
artikel |
95 |
Machine learning based hybrid precoder with user scheduling technique for maximizing sum rate in downlink MU-MIMO system
|
Rajarajeswarie, B. |
|
|
|
5 |
p. 2399-2405 |
artikel |
96 |
MFCC based ensemble learning method for multiple fault diagnosis of roller bearing
|
Choudakkanavar, Gangavva |
|
|
|
5 |
p. 2741-2751 |
artikel |
97 |
Mish-DCTGAN based combined image super-resolution and deblurring approach for blurry license plates
|
Pattanaik, Anmol |
|
|
|
5 |
p. 2767-2775 |
artikel |
98 |
Mitigating TCP incast in data center networks using enhanced application layer technique
|
Suryavanshi, Mahendra |
|
|
|
5 |
p. 2523-2531 |
artikel |
99 |
Model for forecasting electronic fraud threats on selected electronic payment channels using linear regression
|
Alabi, Olubunmi |
|
|
|
5 |
p. 2657-2666 |
artikel |
100 |
Modeling of software project effort estimation: a comparative performance evaluation of optimized soft computing-based methods
|
Sharma, Sudhir |
|
|
|
5 |
p. 2487-2496 |
artikel |
101 |
Modelling of pigeon inspired optimization based segment routing in QoS aware software defined networks
|
Gopal, Kumar Parop |
|
|
|
5 |
p. 2499-2508 |
artikel |
102 |
Motor velocity based multi-objective genetic algorithm controlled navigation method for two-wheeled pioneer P3-DX robot in V-REP scenario
|
Panwar, Vikas Singh |
|
|
|
5 |
p. 2101-2108 |
artikel |
103 |
Multiobjective piecewise regressive elitism spotted hyena optimized mapping for 3D NoC architecture design
|
G, Sushma |
|
|
|
5 |
p. 2719-2728 |
artikel |
104 |
MWSMO: Multi-objective Whale Slime Mold Optimization based Food Recommendation system for Diabetes patient using GAN model
|
Rachitha, M. V. |
|
|
|
5 |
p. 2357-2363 |
artikel |
105 |
Novel low quantum cost reversible logic based full adders for DSP applications
|
Parameshwara, M. C. |
|
|
|
5 |
p. 1755-1761 |
artikel |
106 |
Numerical analysis and implementation of artificial neural network algorithm for nonlinear function
|
Kumar, Pathamuthu Suresh |
|
|
|
5 |
p. 2059-2068 |
artikel |
107 |
Numerical simulation of Burger’s equation using a particle swarm optimization
|
Arora, Geeta |
|
|
|
5 |
p. 2551-2558 |
artikel |
108 |
On some new aggregation operators for T-spherical fuzzy hypersoft sets with application in renewable energy sources
|
Monika, |
|
|
|
5 |
p. 2457-2467 |
artikel |
109 |
On utilizing modified TOPSIS with R-norm q-rung picture fuzzy information measure green supplier selection
|
Dhumras, Himanshu |
|
|
|
5 |
p. 2819-2825 |
artikel |
110 |
Optimization of complex nonlinear systems using genetic algorithm
|
Mangla, Chhavi |
|
|
|
5 |
p. 1913-1925 |
artikel |
111 |
Optimizing flexural strength of fused deposition modelling using supervised machine learning algorithms
|
Jatti, Vijaykumar S. |
|
|
|
5 |
p. 2759-2766 |
artikel |
112 |
Optimizing performance of serverless application using PanOpticon
|
Kumari, Anisha |
|
|
|
5 |
p. 2529-2539 |
artikel |
113 |
ORaBaN: an optimized radial basis neuro framework for anomaly detection in large networks
|
Bhuvaneswari Amma, N. G. |
|
|
|
5 |
p. 2497-2503 |
artikel |
114 |
Pectoral muscle removal using entropy fuzzy clustering and RCM-CNN based mammography classification
|
Reddy, V. Anji |
|
|
|
5 |
p. 2663-2675 |
artikel |
115 |
Performability modeling of safety-critical systems through AADL
|
Ahamad, Shakeel |
|
|
|
5 |
p. 2709-2722 |
artikel |
116 |
Performance evaluation for RF propagation models based on data measurement for LTE networks
|
Shakir, Zaenab |
|
|
|
5 |
p. 2423-2428 |
artikel |
117 |
Performance evaluation of encryption algorithm using fruit fly optimization improved hybridized seeker and PVD algorithm
|
Roselinkiruba, R. |
|
|
|
5 |
p. 1797-1803 |
artikel |
118 |
Pose invariant non-frontal 2D, 2.5D face detection and recognition technique
|
Thavani, Shiva |
|
|
|
5 |
p. 2603-2611 |
artikel |
119 |
Predicting and classifying water quality, treatment, and usage: a comprehensive review
|
Sarang, Yash |
|
|
|
5 |
p. 2837-2845 |
artikel |
120 |
Prioritizing severity level of COVID-19 using correlation coefficient and intuitionistic fuzzy logic
|
Tarannum, Shahla |
|
|
|
5 |
p. 2469-2475 |
artikel |
121 |
Proficient job scheduling in cloud computation using an optimized machine learning strategy
|
Neelakantan, P. |
|
|
|
5 |
p. 2409-2421 |
artikel |
122 |
Project execution obstacles: a case of King Abdulaziz Airport in Saudi Arabia
|
Al Hudhaif, Abdullah |
|
|
|
5 |
p. 1943-1950 |
artikel |
123 |
Protein secondary structure prediction using data-partitioning combined with stacked convolutional neural networks and bidirectional gated recurrent units
|
Sofi, Mukhtar Ahmad |
|
|
|
5 |
p. 2285-2295 |
artikel |
124 |
Query reformulation approach using domain specific ontology for semantic information retrieval
|
Kaur, Navjot |
|
|
|
5 |
p. 1745-1753 |
artikel |
125 |
Realization of convolution layer using system verilog for achieving parallelism and improvement in performance parameters
|
Amrutha, R. K. |
|
|
|
5 |
p. 1959-1974 |
artikel |
126 |
Recency augmented hybrid collaborative movie recommendation system
|
Sujithra Alias Kanmani, R. |
|
|
|
5 |
p. 1829-1836 |
artikel |
127 |
RETRACTED ARTICLE: Generating optimal solutions for the routing space and spectrum allocation problem in space division multiplexing enabled elastic optical networks
|
Iyer, Sridhar |
|
|
|
5 |
p. 2139 |
artikel |
128 |
Robot and virtual reality-based intervention in autism: a comprehensive review
|
Abu-Amara, Fadi |
|
|
|
5 |
p. 1879-1891 |
artikel |
129 |
RVM-MR image brain tumour classification using novel statistical feature extractor
|
Dixit, Asmita |
|
|
|
5 |
p. 2395-2407 |
artikel |
130 |
SChain: towards the quest for redesigning supply-chain by augmenting Blockchain for end-to-end management
|
Quamara, Sidharth |
|
|
|
5 |
p. 2343-2354 |
artikel |
131 |
Scheduling on-demand charging request in wireless rechargeable sensor network with fruit fly optimization-based path selection
|
Susan, T. Siron Anita |
|
|
|
5 |
p. 2377-2388 |
artikel |
132 |
Securing polynomial based group key management scheme against strong active adversary model
|
Sharma, Payal |
|
|
|
5 |
p. 2329-2334 |
artikel |
133 |
Security framework to healthcare robots for secure sharing of healthcare data from cloud
|
Jain, Saurabh |
|
|
|
5 |
p. 2429-2439 |
artikel |
134 |
Self-adaptive image codec for intelligent vision sensor networks
|
Lin, Ming-Yi |
|
|
|
5 |
p. 2533-2540 |
artikel |
135 |
Semantic modeling and visualization of semantic groups of clinical text documents
|
Kenei, Jonah |
|
|
|
5 |
p. 2585-2593 |
artikel |
136 |
Sentiment analysis of Marathi news using LSTM
|
Divate, Manisha Satish |
|
|
|
5 |
p. 2069-2074 |
artikel |
137 |
Single document text summarization technique using optimal combination of cuckoo search algorithm, sentence scoring and sentiment score
|
Mandal, Shrabanti |
|
|
|
5 |
p. 1805-1813 |
artikel |
138 |
Sleep insomnia identification model using sleep quality parameters
|
Santaji, Sagar |
|
|
|
5 |
p. 1861-1865 |
artikel |
139 |
Sobel operator enhancement based on eight-directional convolution and entropy
|
Hao, Fei |
|
|
|
5 |
p. 1823-1828 |
artikel |
140 |
Solve DNA sequence assembly problem using hybrid crow search optimization and multi classification techniques
|
Raja, G. |
|
|
|
5 |
p. 2541-2547 |
artikel |
141 |
SSHM: SMOTE-stacked hybrid model for improving severity classification of code smell
|
Nanda, Jatin |
|
|
|
5 |
p. 2701-2707 |
artikel |
142 |
Stacking and voting ensemble methods fusion to evaluate instructor performance in higher education
|
Ahuja, Ravinder |
|
|
|
5 |
p. 1721-1731 |
artikel |
143 |
StockGAN: robust stock price prediction using GAN algorithm
|
Diqi, Mohammad |
|
|
|
5 |
p. 2309-2315 |
artikel |
144 |
Survey on SVM and their application in image classification
|
Chandra, Mayank Arya |
|
|
|
5 |
p. 1-11 |
artikel |
145 |
Tackling control channel saturation for load balancing in multi-channel mobile ad hoc networks
|
Kumar, Rohit |
|
|
|
5 |
p. 2109-2117 |
artikel |
146 |
Timed neural network using object-based model of neurons for shortest path problem
|
Krishnan, Ramadurai |
|
|
|
5 |
p. 2037-2042 |
artikel |
147 |
To improve scalability with Boolean matrix using efficient gossip failure detection and consensus algorithm for PeerSim simulator in IoT environment
|
Kumar, Surendra |
|
|
|
5 |
p. 2297-2307 |
artikel |
148 |
Uncertainty optimization based feature subset selection model using rough set and uncertainty theory
|
Sinha, Arvind Kumar |
|
|
|
5 |
p. 2723-2739 |
artikel |
149 |
Video summarization and captioning using dynamic mode decomposition for surveillance
|
Radarapu, Rakesh |
|
|
|
5 |
p. 1927-1936 |
artikel |
150 |
W-NLM: a proficient EMG denoising technique
|
Bhobhriya, Rinku |
|
|
|
5 |
p. 2517-2527 |
artikel |
151 |
ZeroAccess botnet investigation and analysis
|
Rawat, Ramesh Singh |
|
|
|
5 |
p. 2091-2099 |
artikel |