no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
An adaptive backoff selection scheme based on Q-learning for CSMA/CA
|
Zheng, Zhichao |
|
|
29 |
4 |
p. 1899-1909 |
article |
2 |
Analysis of aerobic training posture using machine vision for body area networks
|
Cao, Tiantian |
|
|
29 |
4 |
p. 1611-1620 |
article |
3 |
An optimized spectrum sharing scheme for cognitive radio
|
Askari, Mehdi |
|
|
29 |
4 |
p. 1621-1627 |
article |
4 |
A novel edge computing architecture for intelligent coal mining system
|
Bing, Zhe |
|
|
29 |
4 |
p. 1545-1554 |
article |
5 |
An ultra-wide band IIP3 of 38.2 dBm and conversion gain of 17.95 dB down conversion Gilbert mixer for 5G internet of things applications
|
Shukla, Devarshi |
|
|
29 |
4 |
p. 1657-1669 |
article |
6 |
A QoS-aware scheduling with node grouping for IEEE 802.11ah
|
Ahmed, Nurzaman |
|
|
29 |
4 |
p. 1799-1814 |
article |
7 |
Boosting and rectifying few-shot learning prototype network for skin lesion classification based on the internet of medical things
|
Xiao, Junsheng |
|
|
29 |
4 |
p. 1507-1521 |
article |
8 |
CCP-federated deep learning based on user trust chain in social IoV
|
Zhao, Peng-Cheng |
|
|
29 |
4 |
p. 1555-1566 |
article |
9 |
Correction to: NOMA for 5G and beyond: literature review and novel trends
|
Abd-Elnaby, Mohammed |
|
|
29 |
4 |
p. 1655 |
article |
10 |
Correction to: Optimizing computation offloading under heterogeneous delay requirements for wireless powered mobile edge computing
|
Wan, Zheng |
|
|
29 |
4 |
p. 1609-1610 |
article |
11 |
Correction to: Trust-based energy-aware routing using GEOSR protocol for Ad-Hoc sensor networks
|
Kumar, Ranjit |
|
|
29 |
4 |
p. 1935 |
article |
12 |
Deep learning to mobile hypermedia and multimedia
|
Yang, Xiaoxian |
|
|
29 |
4 |
p. 1505-1506 |
article |
13 |
Deep residual network-based data streaming approach for soil type application under IoT-based big data environment
|
Babu, D. Kishore |
|
|
29 |
4 |
p. 1751-1769 |
article |
14 |
Implementation of iterative error detection and correction for BAN transceiver systems
|
Lin, Kuang-Hao |
|
|
29 |
4 |
p. 1771-1786 |
article |
15 |
Intelligent energy efficient vehicle automation system with sensible edge processing protocol in Internet of Vehicles using hybrid optimization strategy
|
Deepa, J. |
|
|
29 |
4 |
p. 1685-1701 |
article |
16 |
Mobile edge computing offloading scheme based on improved multi-objective immune cloning algorithm
|
Zhu, Si-feng |
|
|
29 |
4 |
p. 1737-1750 |
article |
17 |
Multiple agent based reinforcement learning for energy efficient routing in WSN
|
Prabhu, D. |
|
|
29 |
4 |
p. 1787-1797 |
article |
18 |
NOMA for 5G and beyond: literature review and novel trends
|
Abd-Elnaby, Mohammed |
|
|
29 |
4 |
p. 1629-1653 |
article |
19 |
Obstacle-aware connectivity restoration for the partitioned wireless sensor networks using mobile data carriers
|
Rajeswari, G. |
|
|
29 |
4 |
p. 1703-1720 |
article |
20 |
Optimizing computation offloading under heterogeneous delay requirements for wireless powered mobile edge computing
|
Wan, Zheng |
|
|
29 |
4 |
p. 1577-1607 |
article |
21 |
Performance analysis of high speed hybrid PON-VLC for long-reach land-to-underwater applications
|
Kumari, Meet |
|
|
29 |
4 |
p. 1721-1735 |
article |
22 |
Performance analysis of UAV multiple antenna-assisted small cell network with clustered users
|
Ouamri, Mohamed Amine |
|
|
29 |
4 |
p. 1859-1872 |
article |
23 |
Privacy-preserving federated learning framework in multimedia courses recommendation
|
Qin, YangJie |
|
|
29 |
4 |
p. 1535-1544 |
article |
24 |
Reinforcement learning based distributed resource allocation technique in device-to-device (D2D) communication
|
Jayakumar, Steffi |
|
|
29 |
4 |
p. 1843-1858 |
article |
25 |
Secure and novel authentication model for protecting data centers in fog environment
|
Senthil Mahesh, P. C. |
|
|
29 |
4 |
p. 1671-1683 |
article |
26 |
Sensor node localization with improved hop-size using PSODESA optimization
|
Niranjan, Maheshwari |
|
|
29 |
4 |
p. 1911-1934 |
article |
27 |
Source location privacy in wireless sensor networks: What is the right choice of privacy metric?
|
Koduru, Tejodbhav |
|
|
29 |
4 |
p. 1891-1898 |
article |
28 |
Target-aware distributed coverage and connectivity algorithm for wireless sensor networks
|
Banoth, Sanjai Prasada Rao |
|
|
29 |
4 |
p. 1815-1830 |
article |
29 |
TkTC: A framework for top-k text classification of multimedia computing in wireless networks
|
Wang, Kai |
|
|
29 |
4 |
p. 1523-1534 |
article |
30 |
Using publish/subscribe for message routing in mobile environments
|
Amozarrain, Ugaitz |
|
|
29 |
4 |
p. 1831-1842 |
article |
31 |
Vehicular delay tolerant network routing algorithm based on trajectory clustering and dynamic Bayesian network
|
Wu, Jiagao |
|
|
29 |
4 |
p. 1873-1889 |
article |
32 |
Web APIs recommendation with neural content embedding for mobile multimedia computing
|
Xu, Yueshen |
|
|
29 |
4 |
p. 1567-1576 |
article |