Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             54 results found
no title author magazine year volume issue page(s) type
1 Adaptive repair algorithm for TORA routing protocol based on flood control strategy Liu, Si

151 C p. 437-448
article
2 A detection mechanism on malicious nodes in IoT Li, Bohan

151 C p. 51-59
article
3 An Intelligent Swarm Based Prediction Approach For Predicting Cloud Computing User Resource Needs Kholidy, Hisham A.

151 C p. 133-144
article
4 Anomaly detection in wireless sensor network using machine learning algorithm Poornima, I. Gethzi Ahila

151 C p. 331-337
article
5 Application of SDN for secure communication in IoT environment N.V., Rajeesh Kumar

151 C p. 60-65
article
6 A trust management scheme to secure mobile information centric networks Rathee, Geetanjali

151 C p. 66-75
article
7 Blockchain envisioned UAV networks: Challenges, solutions, and comparisons Mehta, Parimal

151 C p. 518-538
article
8 Blockchain for Internet of Energy management: Review, solutions, and challenges Miglani, Arzoo

151 C p. 395-418
article
9 Cloud assisted big data information retrieval system for critical data supervision in disaster regions Wang, Chunmei

151 C p. 548-555
article
10 Corrigendum to “Generic cost optimized and secured sensitive attribute storage model for template based text document on cloud” [Comput. Commun. 150 (2020) 569–580] M., Sumathi

151 C p. 227
article
11 Data consistency matrix based data processing model for efficient data storage in wireless sensor networks J., Gokulraj

151 C p. 172-182
article
12 Decoupling NDN caches via CCndnS: Design, analysis, and application Rezazad, Mostafa

151 C p. 338-354
article
13 Deep learning and big data technologies for IoT security Amanullah, Mohamed Ahzam

151 C p. 495-517
article
14 Distributed and scalable computing framework for improving request processing of wearable IoT assisted medical sensors on pervasive computing system Fouad, H.

151 C p. 257-265
article
15 Dual-load Bloom filter: Application for name lookup Lee, Jungwon

151 C p. 1-9
article
16 Edge intelligence based Economic Dispatch for Virtual Power Plant in 5G Internet of Energy Fang, Dawei

151 C p. 42-50
article
17 Editorial Board
151 C p. ii
article
18 Efficient pattern matching algorithm for security and Binary Search Tree (BST) based memory system in Wireless Intrusion Detection System (WIDS) Suresh, P.

151 C p. 111-118
article
19 Energy aware edge computing: A survey Jiang, Congfeng

151 C p. 556-580
article
20 Energy efficient network service deployment across multiple SDN domains Zhang, Chuangchuang

151 C p. 449-462
article
21 Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT Vimal, S.

151 C p. 355-364
article
22 Evaluating and improving the scalability of RPL security in the Internet of Things Arena, Antonio

151 C p. 119-132
article
23 Experimental research on real-time acquisition and monitoring of wearable EEG based on TGAM module Yin, Liyong

151 C p. 76-85
article
24 Fair and efficient resource allocation in IEEE 802.11ah WLAN with heterogeneous data rates Sangeetha, U.

151 C p. 154-164
article
25 GeoBroker: Leveraging geo-contexts for IoT data distribution Hasenburg, Jonathan

151 C p. 473-484
article
26 GrowingNet: An end-to-end growing network for semi-supervised learning Zhang, Qifei

151 C p. 208-215
article
27 Hazard recognition and reliability analysis of CTCS-3 on-board subsystem Shi, Lijuan

151 C p. 145-153
article
28 Hybridized interference bounded intuitive splitting for smart wearable system using cognitive assisted Internet of Things Altameem, Torki

151 C p. 428-436
article
29 Improved 1D-CNNs for behavior recognition using wearable sensor network Xu, Zhiou

151 C p. 165-171
article
30 Improvement and implementation of Wireless Network Topology System based on SNMP protocol for router equipment Wang, Hao

151 C p. 10-18
article
31 Infective flooding in low-duty-cycle networks, properties and bounds Baldesi, Luca

151 C p. 216-226
article
32 Intelligent manufacturing production line data monitoring system for industrial internet of things Chen, Wei

151 C p. 31-41
article
33 Intelligent resource allocation management for vehicles network: An A3C learning approach Chen, Miaojiang

151 C p. 485-494
article
34 Intelligent software defined network based digital video stabilization system using frame transparency threshold pattern stabilization method S., Kokila

151 C p. 419-427
article
35 MPLS-based reduction of flow table entries in SDN switches supporting multipath transmission Duliński, Zbigniew

151 C p. 365-385
article
36 Multi objective task scheduling algorithm based on SLA and processing time suitable for cloud environment Lavanya, M.

151 C p. 183-195
article
37 Network resource planning for evolvability in software-defined infrastructure Inoue, Koki

151 C p. 247-256
article
38 Optimization of monitoring network system for Eco safety on Internet of Things platform and environmental food supply chain Xu, Wei

151 C p. 320-330
article
39 Predicting drug responsiveness with deep learning from the effects on gene expression of Obsessive–Compulsive Disorder affected cases Sekaran, Karthik

151 C p. 386-394
article
40 Prediction of thermal energy inside smart homes using IoT and classifier ensemble techniques Xu, Hong

151 C p. 581-589
article
41 Probabilistic routing in wireless networks with privacy guarantees Koh, Jing Yang

151 C p. 228-237
article
42 Real time energy efficient data aggregation and scheduling scheme for WSN using ATL N., KhadirKumar

151 C p. 202-207
article
43 Research on intelligent visual image feature region acquisition algorithm in Internet of Things framework Liu, Xin

151 C p. 299-305
article
44 Research on the optimization of IIoT data processing latency Liu, Weimin

151 C p. 290-298
article
45 RETRACTED:An assessment of software defined networking approach in surveillance using sparse optimization algorithm Rathish Babu, T.K.S

151 C p. 98-110
article
46 RRAC: Role based reputed access control method for mitigating malicious impact in intelligent IoT platforms Amoon, Mohammed

151 C p. 238-246
article
47 Software defined network using enhanced workflow scheduling in surveillance Vuppala, Balaji

151 C p. 196-201
article
48 Task number maximization offloading strategy seamlessly adapted to UAV scenario Tang, Qiang

151 C p. 19-30
article
49 Techniques Tanimoto correlated feature selection system and hybridization of clustering and boosting ensemble classification of remote sensed big data for weather forecasting S.B., Pooja

151 C p. 266-274
article
50 Towards a distributed and infrastructure-less vehicular traffic management system Akabane, Ademar T.

151 C p. 306-319
article
51 Towards DNA based data security in the cloud computing environment Namasudra, Suyel

151 C p. 539-547
article
52 Unmanned Aerial vehicle’s runway landing system with efficient target detection by using morphological fusion for military surveillance system Nagarani, N.

151 C p. 463-472
article
53 VANETomo: A congestion identification and control scheme in connected vehicles using network tomography Paranjothi, Anirudh

151 C p. 275-289
article
54 Wearable exercise electrocardiograph signal quality assessment based on fuzzy comprehensive evaluation algorithm He, Jiajie

151 C p. 86-97
article
                             54 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands