nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A deep neural networks based model for uninterrupted marine environment monitoring
|
G., Thippa Reddy |
|
|
157 |
C |
p. 64-75 |
artikel |
2 |
A driving intention prediction method based on hidden Markov model for autonomous driving
|
Liu, Shiwen |
|
|
157 |
C |
p. 143-149 |
artikel |
3 |
A method for determining parameter weight early warning model based on reinforcement learning
|
Sun, Meiyu |
|
|
157 |
C |
p. 417-422 |
artikel |
4 |
An exploratory study of congestion control techniques in Wireless Sensor Networks
|
Pandey, Divya |
|
|
157 |
C |
p. 257-283 |
artikel |
5 |
A novel class based searching algorithm in small world internet of drone network
|
Rehman, Abdul |
|
|
157 |
C |
p. 329-335 |
artikel |
6 |
Applications and theoretical challenges in environmental emergency issues alerting system on IoT intelligence
|
Wu, Qi |
|
|
157 |
C |
p. 361-368 |
artikel |
7 |
A privacy-preserving scheme with identity traceable property for smart grid
|
Wu, Fan |
|
|
157 |
C |
p. 38-44 |
artikel |
8 |
A review of wireless communication using high-altitude platforms for extended coverage and capacity
|
Arum, Steve Chukwuebuka |
|
|
157 |
C |
p. 232-256 |
artikel |
9 |
A scalable fingerprint-based angle-of-arrival machine learning approach for cellular mobile radio localization
|
Timoteo, Robson D.A. |
|
|
157 |
C |
p. 92-101 |
artikel |
10 |
A scalable hybrid MAC strategy for traffic-differentiated IoT-enabled intra-vehicular networks
|
Rahman, Md. Arafatur |
|
|
157 |
C |
p. 320-328 |
artikel |
11 |
Automatic underground space security monitoring based on BIM
|
Zhang, Xuesong |
|
|
157 |
C |
p. 85-91 |
artikel |
12 |
Behavioral feature recognition of multi-task compressed sensing with fusion relevance in the Internet of Things environment
|
Sun, Zhiyong |
|
|
157 |
C |
p. 381-393 |
artikel |
13 |
bleRPC: A plug-and-play RPC framework over BLE
|
Cha, Shi-Cho |
|
|
157 |
C |
p. 298-307 |
artikel |
14 |
Condition monitoring of power transmission and transformation equipment based on industrial internet of things technology
|
Zhao, Jindong |
|
|
157 |
C |
p. 204-212 |
artikel |
15 |
Cross-layer energy optimization in cooperative MISO wireless sensor networks
|
Lin, Zhihua |
|
|
157 |
C |
p. 351-360 |
artikel |
16 |
Editorial Board
|
|
|
|
157 |
C |
p. ii |
artikel |
17 |
Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure
|
Adhikari, Sharmistha |
|
|
157 |
C |
p. 187-203 |
artikel |
18 |
GROSE: Optimal group size estimation for broadcast proxy re-encryption
|
Maiti, Sumana |
|
|
157 |
C |
p. 369-380 |
artikel |
19 |
High concurrency massive data collection algorithm for IoMT applications
|
Peng, Jianhua |
|
|
157 |
C |
p. 402-409 |
artikel |
20 |
Intelligent early structural health prognosis with nonlinear system identification for RFID signal analysis
|
Chen, Hanxin |
|
|
157 |
C |
p. 150-161 |
artikel |
21 |
Intelligent power monitoring of building equipment based on Internet of Things technology
|
Yu, Lei |
|
|
157 |
C |
p. 76-84 |
artikel |
22 |
Latency and energy-aware provisioning of network slices in cloud networks
|
Borylo, Piotr |
|
|
157 |
C |
p. 1-19 |
artikel |
23 |
Mathematical modeling of security impact analysis of communication network based on Monte Carlo algorithm
|
Tian, Chong |
|
|
157 |
C |
p. 20-27 |
artikel |
24 |
Monitoring of human body running training with wireless sensor based wearable devices
|
Ren, Jie |
|
|
157 |
C |
p. 343-350 |
artikel |
25 |
Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment
|
Zhong, Weiyi |
|
|
157 |
C |
p. 116-123 |
artikel |
26 |
Multi-source social media data sentiment analysis using bidirectional recurrent convolutional neural networks
|
Abid, Fazeel |
|
|
157 |
C |
p. 102-115 |
artikel |
27 |
Optimising message broadcasting in opportunistic networks
|
Chancay-García, Leonardo |
|
|
157 |
C |
p. 162-178 |
artikel |
28 |
Optimization strategies for the selection of mobile edges in hybrid crowdsensing architectures
|
Belli, Dimitri |
|
|
157 |
C |
p. 132-142 |
artikel |
29 |
Optimized data storage algorithm of IoT based on cloud computing in distributed system
|
Wang, Mingzhe |
|
|
157 |
C |
p. 124-131 |
artikel |
30 |
Precise localization of RFID tags using hyperbolic and hologram composite localization algorithm
|
Xue, Fangfang |
|
|
157 |
C |
p. 451-460 |
artikel |
31 |
Presentation and interaction of Internet of Things data based on augmented reality
|
Li, Kai |
|
|
157 |
C |
p. 213-220 |
artikel |
32 |
Probabilistic Stone’s Blind Source Separation with application to channel estimation and multi-node identification in MIMO IoT green communication and multimedia systems
|
Khosravy, Mahdi |
|
|
157 |
C |
p. 423-433 |
artikel |
33 |
Quality estimation of CPS network link based on non-uniformly sampling period
|
Liu, Ranran |
|
|
157 |
C |
p. 179-186 |
artikel |
34 |
Research on CLPKC-IDPKC cross-domain identity authentication for IoT environment
|
Liu, Quan |
|
|
157 |
C |
p. 410-416 |
artikel |
35 |
Research on real-time reliability evaluation of CPS system based on machine learning
|
Wang, Hechuang |
|
|
157 |
C |
p. 336-342 |
artikel |
36 |
Robust control algorithm and simulation of networked control systems
|
Yin, Zhouping |
|
|
157 |
C |
p. 394-401 |
artikel |
37 |
Sensitivity analysis of censoring data from component failure analysis and reliability evaluation for the aviation internet of things
|
Wang, Chao |
|
|
157 |
C |
p. 28-37 |
artikel |
38 |
Service modeling for opportunistic edge computing systems with feature engineering
|
Leppänen, Teemu |
|
|
157 |
C |
p. 308-319 |
artikel |
39 |
Smart city oriented remote sensing image fusion methods based on convolution sampling and spatial transformation
|
Wu, Shulei |
|
|
157 |
C |
p. 444-450 |
artikel |
40 |
Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs)
|
Khan, Navid Ali |
|
|
157 |
C |
p. 434-443 |
artikel |
41 |
TMSE: A topology modification strategy to enhance the robustness of scale-free wireless sensor networks
|
Hu, Shihong |
|
|
157 |
C |
p. 53-63 |
artikel |
42 |
TWPalo: Through-the-wall passive localization of moving human with Wi-Fi
|
Wang, Jiacheng |
|
|
157 |
C |
p. 284-297 |
artikel |
43 |
User recommendation method based on joint probability matrix decomposition in CPS networks
|
Yao, Zhe |
|
|
157 |
C |
p. 221-231 |
artikel |
44 |
Wireless network signal monitoring based on LAN packet capture and protocol analysis on grid programming
|
Chen, Qunying |
|
|
157 |
C |
p. 45-52 |
artikel |