nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Active cross-query learning: A reliable labeling mechanism via crowdsourcing for smart surveillance
|
Li, Bohan |
|
|
152 |
C |
p. 149-154 |
artikel |
2 |
Adaptive service function chaining mappings in 5G using deep Q-learning
|
Li, Guanglei |
|
|
152 |
C |
p. 305-315 |
artikel |
3 |
An aggregated statistical approach for network flood detection using Gamma-Normal mixture modeling
|
Hosseinzadeh, Sajjad |
|
|
152 |
C |
p. 137-148 |
artikel |
4 |
Analysis of efficient unmanned aerial vehicles to handle medical emergency data transmission surveillance system by using wireless body area network
|
Manickavasagam, B. |
|
|
152 |
C |
p. 19-33 |
artikel |
5 |
An improved DWT-SVD domain watermarking for medical information security
|
Anand, Ashima |
|
|
152 |
C |
p. 72-80 |
artikel |
6 |
An intelligent resource dynamic allocation method for UAV wireless mobile network which supports QoS
|
Wu, Chunqiong |
|
|
152 |
C |
p. 46-53 |
artikel |
7 |
A novel mission planning method for UAVs’ course of action
|
Zhou, Yaoming |
|
|
152 |
C |
p. 345-356 |
artikel |
8 |
A streaming approach to reveal crowded events from cellular data
|
Garroppo, Rosario G. |
|
|
152 |
C |
p. 232-242 |
artikel |
9 |
Blockchain moderated by empty blocks to reduce the energetic impact of crypto-moneys
|
Jacquet, Philippe |
|
|
152 |
C |
p. 126-136 |
artikel |
10 |
Decentralized authorization in constrained IoT environments exploiting interledger mechanisms
|
Siris, Vasilios A. |
|
|
152 |
C |
p. 243-251 |
artikel |
11 |
Deep learning-based intelligent face recognition in IoT-cloud environment
|
Masud, Mehedi |
|
|
152 |
C |
p. 215-222 |
artikel |
12 |
Distributed robust time-efficient broadcasting algorithms for multi-channel wireless multi-hop networks with channel disruption
|
Tian, Xiang |
|
|
152 |
C |
p. 252-265 |
artikel |
13 |
Dynamic clustering method based on power demand and information volume for intelligent and green IoT
|
Mukherjee, Amrit |
|
|
152 |
C |
p. 119-125 |
artikel |
14 |
EdgeDrone: QoS aware MQTT middleware for mobile edge computing in opportunistic Internet of Drone Things
|
Mukherjee, Amartya |
|
|
152 |
C |
p. 93-108 |
artikel |
15 |
Editorial Board
|
|
|
|
152 |
C |
p. ii |
artikel |
16 |
Efficient scheduling and resource allocation in 802.11ax multi-user transmissions
|
Wang, Kaidong |
|
|
152 |
C |
p. 171-186 |
artikel |
17 |
Energy analysis of Internet of things data mining algorithm for smart green communication networks
|
Du, Ziping |
|
|
152 |
C |
p. 223-231 |
artikel |
18 |
Fog assisted task allocation and secure deduplication using 2FBO 2 and MoWo in cluster-based industrial IoT (IIoT)
|
Sharma, Shivi |
|
|
152 |
C |
p. 187-199 |
artikel |
19 |
Improved energy efficient design in software defined wireless electroencephalography sensor networks (WESN) using distributed architecture to remove artifact
|
Manojprabu, M. |
|
|
152 |
C |
p. 266-271 |
artikel |
20 |
Joint-learning segmentation in Internet of drones (IoD)-based monitor systems
|
Wang, Eric Ke |
|
|
152 |
C |
p. 54-62 |
artikel |
21 |
LSTM-based ACB scheme for machine type communications in LTE-A networks
|
Lee, Chu-Heng |
|
|
152 |
C |
p. 296-304 |
artikel |
22 |
Machine learning based code dissemination by selection of reliability mobile vehicles in 5G networks
|
Li, Ting |
|
|
152 |
C |
p. 109-118 |
artikel |
23 |
Multi-node topology location model of smart city based on Internet of Things
|
Huang, Xianming |
|
|
152 |
C |
p. 282-295 |
artikel |
24 |
Performance evaluation of hybrid disaster recovery framework with D2D communications
|
Ever, Enver |
|
|
152 |
C |
p. 81-92 |
artikel |
25 |
PMAKE: Privacy-aware multi-factor authenticated key establishment scheme for Advance Metering Infrastructure in smart grid
|
Gope, Prosanta |
|
|
152 |
C |
p. 338-344 |
artikel |
26 |
Protection on Wireless Sensor Network from Clone Attack using the SDN-Enabled Hybrid Clone Node Detection Mechanisms
|
Devi, P.P. |
|
|
152 |
C |
p. 316-322 |
artikel |
27 |
Resource allocation and admission control algorithm based on non-cooperation game in wireless mesh networks
|
Shang, Fengjun |
|
|
152 |
C |
p. 63-71 |
artikel |
28 |
Security monitoring of heterogeneous networks for big data based on distributed association algorithm
|
Hu, Wei |
|
|
152 |
C |
p. 206-214 |
artikel |
29 |
Smart city as a distributed platform: Toward a system for citizen-oriented management
|
Chamoso, Pablo |
|
|
152 |
C |
p. 323-332 |
artikel |
30 |
Software defined network based self-diagnosing faulty node detection scheme for surveillance applications
|
Palanikumar, R. |
|
|
152 |
C |
p. 333-337 |
artikel |
31 |
SPARR: Spintronics-based private aggregatable randomized response for crowdsourced data collection and analysis
|
Tsou, Yao-Tung |
|
|
152 |
C |
p. 8-18 |
artikel |
32 |
Spatiotemporal charging scheduling in wireless rechargeable sensor networks
|
Zhao, Chuanxin |
|
|
152 |
C |
p. 155-170 |
artikel |
33 |
Spectrum energy detection in cognitive radio networks based on a novel adaptive threshold energy detection method
|
Sarala, B. |
|
|
152 |
C |
p. 1-7 |
artikel |
34 |
Survivable services oriented protection level-aware virtual network embedding
|
Li, Shuopeng |
|
|
152 |
C |
p. 34-45 |
artikel |
35 |
The enhancement of catenary image with low visibility based on multi-feature fusion network in railway industry
|
Chen, Yuwen |
|
|
152 |
C |
p. 200-205 |
artikel |
36 |
Using cognition to resolve duplicacy issues in socially connected healthcare for smart cities
|
Kumar, Akshi |
|
|
152 |
C |
p. 272-281 |
artikel |