nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A deep heterogeneous optimization framework for Bayesian compressive sensing
|
Qin, Le |
|
|
178 |
C |
p. 74-82 |
artikel |
2 |
A fog assisted intelligent framework based on cyber physical system for safe evacuation in panic situations
|
Sood, Sandeep Kumar |
|
|
178 |
C |
p. 297-306 |
artikel |
3 |
Anomaly detection method of packet loss node location in heterogeneous hash networks
|
Wang, Jian |
|
|
178 |
C |
p. 201-211 |
artikel |
4 |
A softwarized resource allocation framework for security and location guaranteed services in B5G networks
|
Wu, Shengchen |
|
|
178 |
C |
p. 26-36 |
artikel |
5 |
Blockchain management and machine learning adaptation for IoT environment in 5G and beyond networks: A systematic review
|
Miglani, Arzoo |
|
|
178 |
C |
p. 37-63 |
artikel |
6 |
Channel allocation optimization algorithm for hybrid wireless mesh networks for information physical fusion system
|
Zhao, Shasha |
|
|
178 |
C |
p. 212-220 |
artikel |
7 |
Construction of super-resolution model of remote sensing image based on deep convolutional neural network
|
Wei, Zikang |
|
|
178 |
C |
p. 191-200 |
artikel |
8 |
Deep neural network for text anomaly detection in SIoT
|
Mu, Jie |
|
|
178 |
C |
p. 286-296 |
artikel |
9 |
Dynamic server placement in edge computing toward Internet of Vehicles
|
Shen, Bowen |
|
|
178 |
C |
p. 114-123 |
artikel |
10 |
Editorial Board
|
|
|
|
178 |
C |
p. ii-iii |
artikel |
11 |
GraphNET: Graph Neural Networks for routing optimization in Software Defined Networks
|
Swaminathan, Avinash |
|
|
178 |
C |
p. 169-182 |
artikel |
12 |
Handoff control strategy of cyber physical systems under dynamic data attack
|
Cui, Hongzhi |
|
|
178 |
C |
p. 183-190 |
artikel |
13 |
Maintainable stochastic communication network reliability within tolerable packet error rate
|
Kumari, Suchi |
|
|
178 |
C |
p. 161-168 |
artikel |
14 |
MASK-GD segmentation based robotic grasp detection
|
Dong, Mingshuai |
|
|
178 |
C |
p. 124-130 |
artikel |
15 |
Maximizing the minimum secrecy rate of two-way relay networks
|
Sharifi, Faezeh |
|
|
178 |
C |
p. 259-270 |
artikel |
16 |
Network intrusion detection based on IE-DBN model
|
Jia, Huaping |
|
|
178 |
C |
p. 131-140 |
artikel |
17 |
Operation and maintenance(O&M) for data center: An intelligent anomaly detection approach
|
Xiao, Xisheng |
|
|
178 |
C |
p. 141-152 |
artikel |
18 |
Optimization algorithm of wireless surveillance data transmission task based on edge computing
|
Liu, Peng |
|
|
178 |
C |
p. 14-25 |
artikel |
19 |
Optimization of network sensor node location based on edge coverage control
|
Wang, Yanna |
|
|
178 |
C |
p. 234-244 |
artikel |
20 |
Path control of panoramic visual recognition for intelligent robots based-edge computing
|
Fan, Linkun |
|
|
178 |
C |
p. 64-73 |
artikel |
21 |
Quality of perception prediction in 5G slices for e-Health services using user-perceived QoS
|
Ben Slimen, Yosra |
|
|
178 |
C |
p. 1-13 |
artikel |
22 |
Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey
|
Frikha, Mohamed Said |
|
|
178 |
C |
p. 98-113 |
artikel |
23 |
Subjective logic-based trust model for fog computing
|
Al Muhtadi, Jalal |
|
|
178 |
C |
p. 221-233 |
artikel |
24 |
Survey on atrial fibrillation detection from a single-lead ECG wave for Internet of Medical Things
|
Liu, Yu |
|
|
178 |
C |
p. 245-258 |
artikel |
25 |
The groundwater potential assessment system based on cloud computing: A case study in islands region
|
Wang, Daqing |
|
|
178 |
C |
p. 83-97 |
artikel |
26 |
Trajectory-aware spatio-temporal range query processing for unmanned aerial vehicle networks
|
Li, Xin |
|
|
178 |
C |
p. 271-285 |
artikel |
27 |
Transformer text recognition with deep learning algorithm
|
Chen, Ye |
|
|
178 |
C |
p. 153-160 |
artikel |