Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             28 results found
no title author magazine year volume issue page(s) type
1 A data-driven intelligent planning model for UAVs routing networks in mobile Internet of Things Meng, Dian

179 C p. 231-241
article
2 A fast calibration algorithm for Non-Dispersive Infrared single channel carbon dioxide sensor based on deep learning Mao, Keji

179 C p. 175-182
article
3 A hierarchical caching strategy in content delivery network Shi, Fang

179 C p. 92-101
article
4 Amelia—A new security protocol for protection against false links Szymoniak, Sabina

179 C p. 73-81
article
5 An on demand load balancing multi-path routing protocol for differentiated services in MWSN Chen, Zheng

179 C p. 296-306
article
6 A novel visibility semantic feature-aided pedestrian detection scheme for autonomous vehicles Sha, Mingzhi

179 C p. 50-61
article
7 A randomized algorithm for joint power and channel allocation in 5G D2D communication Ghosal, Subhankar

179 C p. 22-34
article
8 A renewable energy-aware power allocation for cloud data centers: A game theory approach Benblidia, Mohammed Anis

179 C p. 102-111
article
9 Classification of flower image based on attention mechanism and multi-loss attention network Zhang, Mei

179 C p. 307-317
article
10 Construction of a smart management system for physical health based on IoT and cloud computing with big data Zhang, Ning

179 C p. 183-194
article
11 CROWD-CDN: A cryptocurrency incentivized crowdsourced peer-to-peer content delivery framework Yousafzai, Abdullah

179 C p. 260-271
article
12 Design of countermeasure to packet falsification in vehicle platooning by explainable artificial intelligence Mongelli, M.

179 C p. 166-174
article
13 Editorial Board
179 C p. ii-iii
article
14 Fast speech adversarial example generation for keyword spotting system with conditional GAN Wang, Donghua

179 C p. 145-156
article
15 Genetically optimized massively parallel binary neural networks for intrusion detection systems Murovič, Tadej

179 C p. 1-10
article
16 IoTD: An approach to identify E-mails sent by IoT devices Hsu, Fu-Hau

179 C p. 62-72
article
17 Mobile computing and communications-driven fog-assisted disaster evacuation techniques for context-aware guidance support: A survey Kurniawan, Ibnu Febry

179 C p. 195-216
article
18 NASOR: A network slicing approach for multiple Autonomous Systems Moreira, Rodrigo

179 C p. 131-144
article
19 On the efficient design of network resilient to electro-magnetic pulse attack—elastic optical network case study Goścień, Róża

179 C p. 272-284
article
20 Resource design in federated sensor networks using RELOAD/CoAP overlay architectures Rodrigues, L.

179 C p. 11-21
article
21 Resources optimization for secure transmission in wireless powered communication networks Sun, Juan

179 C p. 82-91
article
22 Spectrum assignment for connected vehicles: Local licensing versus coopetition Basaure, A.

179 C p. 157-165
article
23 Transceiver design for high altitude pseudo satellite aided dual satellite systems Sirigina, Rajendra Prasad

179 C p. 251-259
article
24 Traveling salesman problem with drone under recharging policy Es Yurek, Emine

179 C p. 35-49
article
25 UAV path planning for backscatter communication with phase cancellation Wu, Chunyue

179 C p. 242-250
article
26 Unbalanced abnormal traffic detection based on improved Res-BIGRU and integrated dynamic ELM optimization Ma, Wengang

179 C p. 112-130
article
27 Unearthing malicious campaigns and actors from the blockchain DNS ecosystem Casino, Fran

179 C p. 217-230
article
28 Using data mining techniques to explore security issues in smart living environments in Twitter Saura, Jose Ramon

179 C p. 285-295
article
                             28 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands