Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             54 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptive repair algorithm for TORA routing protocol based on flood control strategy Liu, Si

151 C p. 437-448
artikel
2 A detection mechanism on malicious nodes in IoT Li, Bohan

151 C p. 51-59
artikel
3 An Intelligent Swarm Based Prediction Approach For Predicting Cloud Computing User Resource Needs Kholidy, Hisham A.

151 C p. 133-144
artikel
4 Anomaly detection in wireless sensor network using machine learning algorithm Poornima, I. Gethzi Ahila

151 C p. 331-337
artikel
5 Application of SDN for secure communication in IoT environment N.V., Rajeesh Kumar

151 C p. 60-65
artikel
6 A trust management scheme to secure mobile information centric networks Rathee, Geetanjali

151 C p. 66-75
artikel
7 Blockchain envisioned UAV networks: Challenges, solutions, and comparisons Mehta, Parimal

151 C p. 518-538
artikel
8 Blockchain for Internet of Energy management: Review, solutions, and challenges Miglani, Arzoo

151 C p. 395-418
artikel
9 Cloud assisted big data information retrieval system for critical data supervision in disaster regions Wang, Chunmei

151 C p. 548-555
artikel
10 Corrigendum to “Generic cost optimized and secured sensitive attribute storage model for template based text document on cloud” [Comput. Commun. 150 (2020) 569–580] M., Sumathi

151 C p. 227
artikel
11 Data consistency matrix based data processing model for efficient data storage in wireless sensor networks J., Gokulraj

151 C p. 172-182
artikel
12 Decoupling NDN caches via CCndnS: Design, analysis, and application Rezazad, Mostafa

151 C p. 338-354
artikel
13 Deep learning and big data technologies for IoT security Amanullah, Mohamed Ahzam

151 C p. 495-517
artikel
14 Distributed and scalable computing framework for improving request processing of wearable IoT assisted medical sensors on pervasive computing system Fouad, H.

151 C p. 257-265
artikel
15 Dual-load Bloom filter: Application for name lookup Lee, Jungwon

151 C p. 1-9
artikel
16 Edge intelligence based Economic Dispatch for Virtual Power Plant in 5G Internet of Energy Fang, Dawei

151 C p. 42-50
artikel
17 Editorial Board
151 C p. ii
artikel
18 Efficient pattern matching algorithm for security and Binary Search Tree (BST) based memory system in Wireless Intrusion Detection System (WIDS) Suresh, P.

151 C p. 111-118
artikel
19 Energy aware edge computing: A survey Jiang, Congfeng

151 C p. 556-580
artikel
20 Energy efficient network service deployment across multiple SDN domains Zhang, Chuangchuang

151 C p. 449-462
artikel
21 Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT Vimal, S.

151 C p. 355-364
artikel
22 Evaluating and improving the scalability of RPL security in the Internet of Things Arena, Antonio

151 C p. 119-132
artikel
23 Experimental research on real-time acquisition and monitoring of wearable EEG based on TGAM module Yin, Liyong

151 C p. 76-85
artikel
24 Fair and efficient resource allocation in IEEE 802.11ah WLAN with heterogeneous data rates Sangeetha, U.

151 C p. 154-164
artikel
25 GeoBroker: Leveraging geo-contexts for IoT data distribution Hasenburg, Jonathan

151 C p. 473-484
artikel
26 GrowingNet: An end-to-end growing network for semi-supervised learning Zhang, Qifei

151 C p. 208-215
artikel
27 Hazard recognition and reliability analysis of CTCS-3 on-board subsystem Shi, Lijuan

151 C p. 145-153
artikel
28 Hybridized interference bounded intuitive splitting for smart wearable system using cognitive assisted Internet of Things Altameem, Torki

151 C p. 428-436
artikel
29 Improved 1D-CNNs for behavior recognition using wearable sensor network Xu, Zhiou

151 C p. 165-171
artikel
30 Improvement and implementation of Wireless Network Topology System based on SNMP protocol for router equipment Wang, Hao

151 C p. 10-18
artikel
31 Infective flooding in low-duty-cycle networks, properties and bounds Baldesi, Luca

151 C p. 216-226
artikel
32 Intelligent manufacturing production line data monitoring system for industrial internet of things Chen, Wei

151 C p. 31-41
artikel
33 Intelligent resource allocation management for vehicles network: An A3C learning approach Chen, Miaojiang

151 C p. 485-494
artikel
34 Intelligent software defined network based digital video stabilization system using frame transparency threshold pattern stabilization method S., Kokila

151 C p. 419-427
artikel
35 MPLS-based reduction of flow table entries in SDN switches supporting multipath transmission Duliński, Zbigniew

151 C p. 365-385
artikel
36 Multi objective task scheduling algorithm based on SLA and processing time suitable for cloud environment Lavanya, M.

151 C p. 183-195
artikel
37 Network resource planning for evolvability in software-defined infrastructure Inoue, Koki

151 C p. 247-256
artikel
38 Optimization of monitoring network system for Eco safety on Internet of Things platform and environmental food supply chain Xu, Wei

151 C p. 320-330
artikel
39 Predicting drug responsiveness with deep learning from the effects on gene expression of Obsessive–Compulsive Disorder affected cases Sekaran, Karthik

151 C p. 386-394
artikel
40 Prediction of thermal energy inside smart homes using IoT and classifier ensemble techniques Xu, Hong

151 C p. 581-589
artikel
41 Probabilistic routing in wireless networks with privacy guarantees Koh, Jing Yang

151 C p. 228-237
artikel
42 Real time energy efficient data aggregation and scheduling scheme for WSN using ATL N., KhadirKumar

151 C p. 202-207
artikel
43 Research on intelligent visual image feature region acquisition algorithm in Internet of Things framework Liu, Xin

151 C p. 299-305
artikel
44 Research on the optimization of IIoT data processing latency Liu, Weimin

151 C p. 290-298
artikel
45 RETRACTED:An assessment of software defined networking approach in surveillance using sparse optimization algorithm Rathish Babu, T.K.S

151 C p. 98-110
artikel
46 RRAC: Role based reputed access control method for mitigating malicious impact in intelligent IoT platforms Amoon, Mohammed

151 C p. 238-246
artikel
47 Software defined network using enhanced workflow scheduling in surveillance Vuppala, Balaji

151 C p. 196-201
artikel
48 Task number maximization offloading strategy seamlessly adapted to UAV scenario Tang, Qiang

151 C p. 19-30
artikel
49 Techniques Tanimoto correlated feature selection system and hybridization of clustering and boosting ensemble classification of remote sensed big data for weather forecasting S.B., Pooja

151 C p. 266-274
artikel
50 Towards a distributed and infrastructure-less vehicular traffic management system Akabane, Ademar T.

151 C p. 306-319
artikel
51 Towards DNA based data security in the cloud computing environment Namasudra, Suyel

151 C p. 539-547
artikel
52 Unmanned Aerial vehicle’s runway landing system with efficient target detection by using morphological fusion for military surveillance system Nagarani, N.

151 C p. 463-472
artikel
53 VANETomo: A congestion identification and control scheme in connected vehicles using network tomography Paranjothi, Anirudh

151 C p. 275-289
artikel
54 Wearable exercise electrocardiograph signal quality assessment based on fuzzy comprehensive evaluation algorithm He, Jiajie

151 C p. 86-97
artikel
                             54 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland