Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             79 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptive delay-constrained resource allocation in mobile edge computing for Internet of Things communications networks Zhao, Juan

160 C p. 607-613
artikel
2 A joint optimization scheme for task offloading and resource allocation based on edge computing in 5G communication networks Yang, Shi

160 C p. 759-768
artikel
3 A knowledge-based Query Tree with Shortcutting and Couple-Resolution for RFID tag identification Hailemariam, Zelalem Legese

160 C p. 779-789
artikel
4 Allocation algorithm of CPS communication resources based on cooperative game Zhao, Jin

160 C p. 63-70
artikel
5 Analysis of network topology and deployment mode of 5G wireless access network Liu, Zhiliang

160 C p. 34-42
artikel
6 Analysis of system outage probability in underlay cognitive two-way amplify-and-forward relay networks Al-Zubi, Raed T.

160 C p. 253-262
artikel
7 Analytical and simulation tools for optical camera communications Duque, Alexis

160 C p. 52-62
artikel
8 An architecture for adaptive task planning in support of IoT-based machine learning applications for disaster scenarios Sacco, Alessio

160 C p. 769-778
artikel
9 An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture R.M., Swarna Priya

160 C p. 139-149
artikel
10 An energy harvesting solution for computation offloading in Fog Computing networks Bozorgchenani, Arash

160 C p. 577-587
artikel
11 An improved migration scheme to achieve the optimal service time for the active jobs in 5G cloud environment Vinoth Kumar, M.

160 C p. 807-814
artikel
12 An intelligent routing method based on network partition Rao, Zheheng

160 C p. 25-33
artikel
13 An optimal policy for joint compression and transmission control in delay-constrained energy harvesting IoT devices Hakami, Vesal

160 C p. 554-566
artikel
14 A performance-aware dynamic scheduling algorithm for cloud-based IoT applications Pandiyan, Sanjeevi

160 C p. 512-520
artikel
15 Application of wireless sensor network based improved immune gene algorithm in airport floating personnel positioning Liu, Hean

160 C p. 494-501
artikel
16 A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN Gupta, Ankur

160 C p. 311-325
artikel
17 Artificial intelligence driven wireless network remote monitoring based on Diffie–Hellman parameter method Zhou, Junyan

160 C p. 132-138
artikel
18 A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem Shuai, Mengxia

160 C p. 215-227
artikel
19 A wearable blood oxygen saturation monitoring system based on bluetooth low energy technology Chen, Qingguo

160 C p. 101-110
artikel
20 Bandwidth abstraction and instantiation under closed-loop latency constraint for tactile slice based on martingale theory Yu, Baozhu

160 C p. 274-283
artikel
21 Cloud computing model for big data processing and performance optimization of multimedia communication Zhou, Zhicheng

160 C p. 326-332
artikel
22 Continuous health monitoring of sportsperson using IoT devices based wearable technology Huifeng, Wang

160 C p. 588-595
artikel
23 Corrigendum to “Performance optimization of IoT based biological systems using deep learning” [Computer Communications 155 (2020) 24–31] Irshad, Omer

160 C p. 863
artikel
24 Deep Reinforcement Learning-based resource allocation strategy for Energy Harvesting-Powered Cognitive Machine-to-Machine Networks Xu, Yi-Han

160 C p. 706-717
artikel
25 Design of the navigation system through the fusion of IMU and wheeled encoders Yu, Shibing

160 C p. 730-737
artikel
26 Detection of algorithmically-generated domains: An adversarial machine learning approach Alaeiyan, Mohammadhadi

160 C p. 661-673
artikel
27 “DRL + FL”: An intelligent resource allocation model based on deep reinforcement learning for Mobile Edge Computing Shan, Nanliang

160 C p. 14-24
artikel
28 Edge-centric delegation of authorization for constrained devices in the Internet of Things Grande, Elías

160 C p. 464-474
artikel
29 Editorial Board
160 C p. ii-iii
artikel
30 Emotion-controlled spectrum mobility scheme for efficient syntactic interoperability in cognitive radio-based unmanned vehicles Riaz, Faisal

160 C p. 1-13
artikel
31 Energy-efficient and SDN-enabled routing algorithm for wireless body area networks Cicioğlu, Murtaza

160 C p. 228-239
artikel
32 Experimental vs. simulation analysis of LoRa for vehicular communications M. Ortiz, Fernando

160 C p. 299-310
artikel
33 Fastest adaptive estimation algorithms for topological structure errors in smart grid networks Xu, Huihong

160 C p. 197-203
artikel
34 Fog Computing Based Hybrid Deep Learning Framework in effective inspection system for smart manufacturing Lin, Shih-Yang

160 C p. 636-642
artikel
35 Fog-inspired smart home environment for domestic animal healthcare Bhatia, Munish

160 C p. 521-533
artikel
36 Green resource allocation and energy management in heterogeneous small cell networks powered by hybrid energy Han, Qiaoni

160 C p. 204-214
artikel
37 6G technology based advanced virtual multi-purpose embedding algorithm to solve far-reaching network effects Saad, Aldosary

160 C p. 749-758
artikel
38 HD video transmission of multi-rotor Unmanned Aerial Vehicle based on 5G cellular communication network Yang, Qi

160 C p. 688-696
artikel
39 High-performance flow classification using hybrid clusters in software defined mobile edge computing Abbasi, Mahdi

160 C p. 643-660
artikel
40 Implementing a blockchain-based local energy market: Insights on communication and scalability Meeuw, Arne

160 C p. 158-171
artikel
41 Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignment Xu, Xiaoxiao

160 C p. 423-430
artikel
42 Information processing in Internet of Things using big data analytics Li, Chaomin

160 C p. 718-729
artikel
43 IOT platform of One-Key for Help APP and environment portfolio risk identification algorithm based on MIT Pang, Sulin

160 C p. 596-606
artikel
44 KATE: Kalman Trust Estimator for Internet of Drones Bhargava, Arpita

160 C p. 388-401
artikel
45 Learning to upgrade internet information security and protection strategy in big data era Guo, Junjun

160 C p. 150-157
artikel
46 MAC protocols for unmanned aerial vehicle ecosystems: Review and challenges Vashisht, Sahil

160 C p. 443-463
artikel
47 Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL Tu, Shanshan

160 C p. 790-798
artikel
48 NMTLAT: A New robust mobile Multi-Target Localization and Tracking Scheme in marine search and rescue wireless sensor networks under Byzantine attack Xian, Jiangfeng

160 C p. 623-635
artikel
49 Novel control topology with obstacle detection using RDPSO–GBA in mobile AD-HOC network Vinoba, R.

160 C p. 847-857
artikel
50 On spectrum and energy efficient survivable multipath routing in off-line Elastic Optical Network Halder, Joy

160 C p. 375-387
artikel
51 OntoBestFit: A Best-Fit Occurrence Estimation strategy for RDF driven faceted semantic search Deepak, Gerard

160 C p. 284-298
artikel
52 Optimal multi-part mobile computation offloading with hard deadline constraints Hekmati, Arvin

160 C p. 614-622
artikel
53 Optimized wireless channel allocation in hybrid data center network based on IEEE 802.11ad Dab, Boutheina

160 C p. 534-546
artikel
54 PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks Alladi, Tejasvi

160 C p. 81-90
artikel
55 Performance evaluation of cooperative eigenvalue spectrum sensing GLRT under different impulsive noise environments in cognitive radio Ghamry, Walid K.

160 C p. 567-576
artikel
56 Precise localization for achieving next-generation autonomous navigation: State-of-the-art, taxonomy and future prospects Shit, Rathin Chandra

160 C p. 351-374
artikel
57 Priority-based data transmission using selective decision modes in wearable sensor based healthcare applications Alsiddiky, Abdulmonem

160 C p. 43-51
artikel
58 Real time auxiliary data mining method for wireless communication mechanism optimization based on Internet of things system Li, Lin

160 C p. 333-341
artikel
59 Remaining useful life prediction based on state assessment using edge computing on deep learning Hsu, Hsin-Yao

160 C p. 91-100
artikel
60 Research on resource allocation of vocal music teaching system based on mobile edge computing Sun, Jian

160 C p. 342-350
artikel
61 SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT) Liaqat, Shahzana

160 C p. 697-705
artikel
62 Securing Internet of Medical Things with Friendly-jamming schemes Li, Xuran

160 C p. 431-442
artikel
63 Security definitions, entropy measures and constructions for implicitly detecting data corruption Kounavis, Michael

160 C p. 815-846
artikel
64 Sensors for internet of medical things: State-of-the-art, security and privacy issues, challenges and future directions Ray, Partha Pratim

160 C p. 111-131
artikel
65 Service architecture of IoT terminal connection based on blockchain identity authentication system Huang, Jui-Chan

160 C p. 411-422
artikel
66 Signal frequency domain analysis and sensor fault diagnosis based on artificial intelligence Li, Daming

160 C p. 71-80
artikel
67 Smart city oriented Ecological Sensitivity Assessment and Service Value Computing based on Intelligent sensing data processing Duan, Yaqiong

160 C p. 263-273
artikel
68 Sparse representation for network traffic recovery Fan, XiaoBo

160 C p. 547-553
artikel
69 Special Issue on Data Distribution in Industrial and Pervasive Internet Raptis, Theofanis P.

160 C p. 860-862
artikel
70 Special Issue on Mobile Information Centric Networking Calafate, Carlos T.

160 C p. 858-859
artikel
71 SSGRU: A novel hybrid stacked GRU-based traffic volume prediction approach in a road network Sun, Peng

160 C p. 502-511
artikel
72 Target detection in SAR images using Bayesian Saliency and Morphological attribute profiles Banu, A. Shakin

160 C p. 738-748
artikel
73 Testing and fingerprinting the physical layer of wireless cards with software-defined radios Becker, Johannes K.

160 C p. 186-196
artikel
74 The characteristics of rumor spreaders on Twitter: A quantitative analysis on real data Bodaghi, Amirhosein

160 C p. 674-687
artikel
75 The 5G communication technology-oriented intelligent building system planning and design Zhou, Yan

160 C p. 402-410
artikel
76 Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes Sharma, Avani

160 C p. 475-493
artikel
77 Uncovering spatiotemporal and semantic aspects of tourists mobility using social sensing Ferreira, Ana P.G.

160 C p. 240-252
artikel
78 Vehicle communication network in intelligent transportation system based on Internet of Things Zhang, Hong

160 C p. 799-806
artikel
79 Wake-up radio-based data forwarding for green wireless networks Koutsandria, Georgia

160 C p. 172-185
artikel
                             79 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland