nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive delay-constrained resource allocation in mobile edge computing for Internet of Things communications networks
|
Zhao, Juan |
|
|
160 |
C |
p. 607-613 |
artikel |
2 |
A joint optimization scheme for task offloading and resource allocation based on edge computing in 5G communication networks
|
Yang, Shi |
|
|
160 |
C |
p. 759-768 |
artikel |
3 |
A knowledge-based Query Tree with Shortcutting and Couple-Resolution for RFID tag identification
|
Hailemariam, Zelalem Legese |
|
|
160 |
C |
p. 779-789 |
artikel |
4 |
Allocation algorithm of CPS communication resources based on cooperative game
|
Zhao, Jin |
|
|
160 |
C |
p. 63-70 |
artikel |
5 |
Analysis of network topology and deployment mode of 5G wireless access network
|
Liu, Zhiliang |
|
|
160 |
C |
p. 34-42 |
artikel |
6 |
Analysis of system outage probability in underlay cognitive two-way amplify-and-forward relay networks
|
Al-Zubi, Raed T. |
|
|
160 |
C |
p. 253-262 |
artikel |
7 |
Analytical and simulation tools for optical camera communications
|
Duque, Alexis |
|
|
160 |
C |
p. 52-62 |
artikel |
8 |
An architecture for adaptive task planning in support of IoT-based machine learning applications for disaster scenarios
|
Sacco, Alessio |
|
|
160 |
C |
p. 769-778 |
artikel |
9 |
An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture
|
R.M., Swarna Priya |
|
|
160 |
C |
p. 139-149 |
artikel |
10 |
An energy harvesting solution for computation offloading in Fog Computing networks
|
Bozorgchenani, Arash |
|
|
160 |
C |
p. 577-587 |
artikel |
11 |
An improved migration scheme to achieve the optimal service time for the active jobs in 5G cloud environment
|
Vinoth Kumar, M. |
|
|
160 |
C |
p. 807-814 |
artikel |
12 |
An intelligent routing method based on network partition
|
Rao, Zheheng |
|
|
160 |
C |
p. 25-33 |
artikel |
13 |
An optimal policy for joint compression and transmission control in delay-constrained energy harvesting IoT devices
|
Hakami, Vesal |
|
|
160 |
C |
p. 554-566 |
artikel |
14 |
A performance-aware dynamic scheduling algorithm for cloud-based IoT applications
|
Pandiyan, Sanjeevi |
|
|
160 |
C |
p. 512-520 |
artikel |
15 |
Application of wireless sensor network based improved immune gene algorithm in airport floating personnel positioning
|
Liu, Hean |
|
|
160 |
C |
p. 494-501 |
artikel |
16 |
A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN
|
Gupta, Ankur |
|
|
160 |
C |
p. 311-325 |
artikel |
17 |
Artificial intelligence driven wireless network remote monitoring based on Diffie–Hellman parameter method
|
Zhou, Junyan |
|
|
160 |
C |
p. 132-138 |
artikel |
18 |
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem
|
Shuai, Mengxia |
|
|
160 |
C |
p. 215-227 |
artikel |
19 |
A wearable blood oxygen saturation monitoring system based on bluetooth low energy technology
|
Chen, Qingguo |
|
|
160 |
C |
p. 101-110 |
artikel |
20 |
Bandwidth abstraction and instantiation under closed-loop latency constraint for tactile slice based on martingale theory
|
Yu, Baozhu |
|
|
160 |
C |
p. 274-283 |
artikel |
21 |
Cloud computing model for big data processing and performance optimization of multimedia communication
|
Zhou, Zhicheng |
|
|
160 |
C |
p. 326-332 |
artikel |
22 |
Continuous health monitoring of sportsperson using IoT devices based wearable technology
|
Huifeng, Wang |
|
|
160 |
C |
p. 588-595 |
artikel |
23 |
Corrigendum to “Performance optimization of IoT based biological systems using deep learning” [Computer Communications 155 (2020) 24–31]
|
Irshad, Omer |
|
|
160 |
C |
p. 863 |
artikel |
24 |
Deep Reinforcement Learning-based resource allocation strategy for Energy Harvesting-Powered Cognitive Machine-to-Machine Networks
|
Xu, Yi-Han |
|
|
160 |
C |
p. 706-717 |
artikel |
25 |
Design of the navigation system through the fusion of IMU and wheeled encoders
|
Yu, Shibing |
|
|
160 |
C |
p. 730-737 |
artikel |
26 |
Detection of algorithmically-generated domains: An adversarial machine learning approach
|
Alaeiyan, Mohammadhadi |
|
|
160 |
C |
p. 661-673 |
artikel |
27 |
“DRL + FL”: An intelligent resource allocation model based on deep reinforcement learning for Mobile Edge Computing
|
Shan, Nanliang |
|
|
160 |
C |
p. 14-24 |
artikel |
28 |
Edge-centric delegation of authorization for constrained devices in the Internet of Things
|
Grande, Elías |
|
|
160 |
C |
p. 464-474 |
artikel |
29 |
Editorial Board
|
|
|
|
160 |
C |
p. ii-iii |
artikel |
30 |
Emotion-controlled spectrum mobility scheme for efficient syntactic interoperability in cognitive radio-based unmanned vehicles
|
Riaz, Faisal |
|
|
160 |
C |
p. 1-13 |
artikel |
31 |
Energy-efficient and SDN-enabled routing algorithm for wireless body area networks
|
Cicioğlu, Murtaza |
|
|
160 |
C |
p. 228-239 |
artikel |
32 |
Experimental vs. simulation analysis of LoRa for vehicular communications
|
M. Ortiz, Fernando |
|
|
160 |
C |
p. 299-310 |
artikel |
33 |
Fastest adaptive estimation algorithms for topological structure errors in smart grid networks
|
Xu, Huihong |
|
|
160 |
C |
p. 197-203 |
artikel |
34 |
Fog Computing Based Hybrid Deep Learning Framework in effective inspection system for smart manufacturing
|
Lin, Shih-Yang |
|
|
160 |
C |
p. 636-642 |
artikel |
35 |
Fog-inspired smart home environment for domestic animal healthcare
|
Bhatia, Munish |
|
|
160 |
C |
p. 521-533 |
artikel |
36 |
Green resource allocation and energy management in heterogeneous small cell networks powered by hybrid energy
|
Han, Qiaoni |
|
|
160 |
C |
p. 204-214 |
artikel |
37 |
6G technology based advanced virtual multi-purpose embedding algorithm to solve far-reaching network effects
|
Saad, Aldosary |
|
|
160 |
C |
p. 749-758 |
artikel |
38 |
HD video transmission of multi-rotor Unmanned Aerial Vehicle based on 5G cellular communication network
|
Yang, Qi |
|
|
160 |
C |
p. 688-696 |
artikel |
39 |
High-performance flow classification using hybrid clusters in software defined mobile edge computing
|
Abbasi, Mahdi |
|
|
160 |
C |
p. 643-660 |
artikel |
40 |
Implementing a blockchain-based local energy market: Insights on communication and scalability
|
Meeuw, Arne |
|
|
160 |
C |
p. 158-171 |
artikel |
41 |
Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignment
|
Xu, Xiaoxiao |
|
|
160 |
C |
p. 423-430 |
artikel |
42 |
Information processing in Internet of Things using big data analytics
|
Li, Chaomin |
|
|
160 |
C |
p. 718-729 |
artikel |
43 |
IOT platform of One-Key for Help APP and environment portfolio risk identification algorithm based on MIT
|
Pang, Sulin |
|
|
160 |
C |
p. 596-606 |
artikel |
44 |
KATE: Kalman Trust Estimator for Internet of Drones
|
Bhargava, Arpita |
|
|
160 |
C |
p. 388-401 |
artikel |
45 |
Learning to upgrade internet information security and protection strategy in big data era
|
Guo, Junjun |
|
|
160 |
C |
p. 150-157 |
artikel |
46 |
MAC protocols for unmanned aerial vehicle ecosystems: Review and challenges
|
Vashisht, Sahil |
|
|
160 |
C |
p. 443-463 |
artikel |
47 |
Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL
|
Tu, Shanshan |
|
|
160 |
C |
p. 790-798 |
artikel |
48 |
NMTLAT: A New robust mobile Multi-Target Localization and Tracking Scheme in marine search and rescue wireless sensor networks under Byzantine attack
|
Xian, Jiangfeng |
|
|
160 |
C |
p. 623-635 |
artikel |
49 |
Novel control topology with obstacle detection using RDPSO–GBA in mobile AD-HOC network
|
Vinoba, R. |
|
|
160 |
C |
p. 847-857 |
artikel |
50 |
On spectrum and energy efficient survivable multipath routing in off-line Elastic Optical Network
|
Halder, Joy |
|
|
160 |
C |
p. 375-387 |
artikel |
51 |
OntoBestFit: A Best-Fit Occurrence Estimation strategy for RDF driven faceted semantic search
|
Deepak, Gerard |
|
|
160 |
C |
p. 284-298 |
artikel |
52 |
Optimal multi-part mobile computation offloading with hard deadline constraints
|
Hekmati, Arvin |
|
|
160 |
C |
p. 614-622 |
artikel |
53 |
Optimized wireless channel allocation in hybrid data center network based on IEEE 802.11ad
|
Dab, Boutheina |
|
|
160 |
C |
p. 534-546 |
artikel |
54 |
PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks
|
Alladi, Tejasvi |
|
|
160 |
C |
p. 81-90 |
artikel |
55 |
Performance evaluation of cooperative eigenvalue spectrum sensing GLRT under different impulsive noise environments in cognitive radio
|
Ghamry, Walid K. |
|
|
160 |
C |
p. 567-576 |
artikel |
56 |
Precise localization for achieving next-generation autonomous navigation: State-of-the-art, taxonomy and future prospects
|
Shit, Rathin Chandra |
|
|
160 |
C |
p. 351-374 |
artikel |
57 |
Priority-based data transmission using selective decision modes in wearable sensor based healthcare applications
|
Alsiddiky, Abdulmonem |
|
|
160 |
C |
p. 43-51 |
artikel |
58 |
Real time auxiliary data mining method for wireless communication mechanism optimization based on Internet of things system
|
Li, Lin |
|
|
160 |
C |
p. 333-341 |
artikel |
59 |
Remaining useful life prediction based on state assessment using edge computing on deep learning
|
Hsu, Hsin-Yao |
|
|
160 |
C |
p. 91-100 |
artikel |
60 |
Research on resource allocation of vocal music teaching system based on mobile edge computing
|
Sun, Jian |
|
|
160 |
C |
p. 342-350 |
artikel |
61 |
SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT)
|
Liaqat, Shahzana |
|
|
160 |
C |
p. 697-705 |
artikel |
62 |
Securing Internet of Medical Things with Friendly-jamming schemes
|
Li, Xuran |
|
|
160 |
C |
p. 431-442 |
artikel |
63 |
Security definitions, entropy measures and constructions for implicitly detecting data corruption
|
Kounavis, Michael |
|
|
160 |
C |
p. 815-846 |
artikel |
64 |
Sensors for internet of medical things: State-of-the-art, security and privacy issues, challenges and future directions
|
Ray, Partha Pratim |
|
|
160 |
C |
p. 111-131 |
artikel |
65 |
Service architecture of IoT terminal connection based on blockchain identity authentication system
|
Huang, Jui-Chan |
|
|
160 |
C |
p. 411-422 |
artikel |
66 |
Signal frequency domain analysis and sensor fault diagnosis based on artificial intelligence
|
Li, Daming |
|
|
160 |
C |
p. 71-80 |
artikel |
67 |
Smart city oriented Ecological Sensitivity Assessment and Service Value Computing based on Intelligent sensing data processing
|
Duan, Yaqiong |
|
|
160 |
C |
p. 263-273 |
artikel |
68 |
Sparse representation for network traffic recovery
|
Fan, XiaoBo |
|
|
160 |
C |
p. 547-553 |
artikel |
69 |
Special Issue on Data Distribution in Industrial and Pervasive Internet
|
Raptis, Theofanis P. |
|
|
160 |
C |
p. 860-862 |
artikel |
70 |
Special Issue on Mobile Information Centric Networking
|
Calafate, Carlos T. |
|
|
160 |
C |
p. 858-859 |
artikel |
71 |
SSGRU: A novel hybrid stacked GRU-based traffic volume prediction approach in a road network
|
Sun, Peng |
|
|
160 |
C |
p. 502-511 |
artikel |
72 |
Target detection in SAR images using Bayesian Saliency and Morphological attribute profiles
|
Banu, A. Shakin |
|
|
160 |
C |
p. 738-748 |
artikel |
73 |
Testing and fingerprinting the physical layer of wireless cards with software-defined radios
|
Becker, Johannes K. |
|
|
160 |
C |
p. 186-196 |
artikel |
74 |
The characteristics of rumor spreaders on Twitter: A quantitative analysis on real data
|
Bodaghi, Amirhosein |
|
|
160 |
C |
p. 674-687 |
artikel |
75 |
The 5G communication technology-oriented intelligent building system planning and design
|
Zhou, Yan |
|
|
160 |
C |
p. 402-410 |
artikel |
76 |
Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes
|
Sharma, Avani |
|
|
160 |
C |
p. 475-493 |
artikel |
77 |
Uncovering spatiotemporal and semantic aspects of tourists mobility using social sensing
|
Ferreira, Ana P.G. |
|
|
160 |
C |
p. 240-252 |
artikel |
78 |
Vehicle communication network in intelligent transportation system based on Internet of Things
|
Zhang, Hong |
|
|
160 |
C |
p. 799-806 |
artikel |
79 |
Wake-up radio-based data forwarding for green wireless networks
|
Koutsandria, Georgia |
|
|
160 |
C |
p. 172-185 |
artikel |