Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             27 results found
no title author magazine year volume issue page(s) type
1 A deep heterogeneous optimization framework for Bayesian compressive sensing Qin, Le

178 C p. 74-82
article
2 A fog assisted intelligent framework based on cyber physical system for safe evacuation in panic situations Sood, Sandeep Kumar

178 C p. 297-306
article
3 Anomaly detection method of packet loss node location in heterogeneous hash networks Wang, Jian

178 C p. 201-211
article
4 A softwarized resource allocation framework for security and location guaranteed services in B5G networks Wu, Shengchen

178 C p. 26-36
article
5 Blockchain management and machine learning adaptation for IoT environment in 5G and beyond networks: A systematic review Miglani, Arzoo

178 C p. 37-63
article
6 Channel allocation optimization algorithm for hybrid wireless mesh networks for information physical fusion system Zhao, Shasha

178 C p. 212-220
article
7 Construction of super-resolution model of remote sensing image based on deep convolutional neural network Wei, Zikang

178 C p. 191-200
article
8 Deep neural network for text anomaly detection in SIoT Mu, Jie

178 C p. 286-296
article
9 Dynamic server placement in edge computing toward Internet of Vehicles Shen, Bowen

178 C p. 114-123
article
10 Editorial Board
178 C p. ii-iii
article
11 GraphNET: Graph Neural Networks for routing optimization in Software Defined Networks Swaminathan, Avinash

178 C p. 169-182
article
12 Handoff control strategy of cyber physical systems under dynamic data attack Cui, Hongzhi

178 C p. 183-190
article
13 Maintainable stochastic communication network reliability within tolerable packet error rate Kumari, Suchi

178 C p. 161-168
article
14 MASK-GD segmentation based robotic grasp detection Dong, Mingshuai

178 C p. 124-130
article
15 Maximizing the minimum secrecy rate of two-way relay networks Sharifi, Faezeh

178 C p. 259-270
article
16 Network intrusion detection based on IE-DBN model Jia, Huaping

178 C p. 131-140
article
17 Operation and maintenance(O&M) for data center: An intelligent anomaly detection approach Xiao, Xisheng

178 C p. 141-152
article
18 Optimization algorithm of wireless surveillance data transmission task based on edge computing Liu, Peng

178 C p. 14-25
article
19 Optimization of network sensor node location based on edge coverage control Wang, Yanna

178 C p. 234-244
article
20 Path control of panoramic visual recognition for intelligent robots based-edge computing Fan, Linkun

178 C p. 64-73
article
21 Quality of perception prediction in 5G slices for e-Health services using user-perceived QoS Ben Slimen, Yosra

178 C p. 1-13
article
22 Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey Frikha, Mohamed Said

178 C p. 98-113
article
23 Subjective logic-based trust model for fog computing Al Muhtadi, Jalal

178 C p. 221-233
article
24 Survey on atrial fibrillation detection from a single-lead ECG wave for Internet of Medical Things Liu, Yu

178 C p. 245-258
article
25 The groundwater potential assessment system based on cloud computing: A case study in islands region Wang, Daqing

178 C p. 83-97
article
26 Trajectory-aware spatio-temporal range query processing for unmanned aerial vehicle networks Li, Xin

178 C p. 271-285
article
27 Transformer text recognition with deep learning algorithm Chen, Ye

178 C p. 153-160
article
                             27 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands