Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             26 results found
no title author magazine year volume issue page(s) type
1 A comprehensive review on variants of SARS-CoVs-2: Challenges, solutions and open issues Deepanshi,

197 C p. 34-51
article
2 A comprehensive survey on age of information in massive IoT networks Abbas, Qamar

197 C p. 199-213
article
3 A hybrid caching strategy for information-centric satellite networks based on node classification and popular content awareness Xu, Rui

197 C p. 186-198
article
4 A Location-Aware RF-Assisted MAC Protocol for Sectorized Vehicular Visible Light Communications Memedi, Agon

197 C p. 151-158
article
5 An area autonomous routing protocol based on multi-objective optimization methods for field observation instrument network Huo, Jiuyuan

197 C p. 71-86
article
6 An efficient computation offloading and resource allocation algorithm in RIS empowered MEC Zhang, Xiangjun

197 C p. 113-123
article
7 An Energy-optimized Embedded load balancing using DVFS computing in Cloud Data centers Javadpour, Amir

197 C p. 255-266
article
8 A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions Chaganti, Rajasekhar

197 C p. 96-112
article
9 Cellular traffic prediction via deep state space models with attention mechanism Ma, Hui

197 C p. 276-283
article
10 Classification And Regression Tree (CART) based resource allocation scheme for Wireless Sensor Networks Kori, Gururaj S.

197 C p. 242-254
article
11 CO-CAC: A new approach to Call Admission Control for VoIP in 5G/WiFi UAV-based relay networks Mayor, Vicente

197 C p. 284-293
article
12 CSI-based location-independent Human Activity Recognition with parallel convolutional networks Zhang, Yong

197 C p. 87-95
article
13 Design of secured blockchain based decentralized authentication protocol for sensor networks with auditing and accountability Dwivedi, Sanjeev Kumar

197 C p. 124-140
article
14 Editorial Board
197 C p. ii-iii
article
15 Energy-efficient resource allocation in NOMA-integrated V2X networks Shan, Liqing

197 C p. 23-33
article
16 Experimental comparison of migration strategies for MEC-assisted 5G-V2X applications Hathibelagal, Mohammed A.

197 C p. 1-11
article
17 Femtocell deployment for scalable video transmission in 5G networks Abiri, Majid

197 C p. 61-70
article
18 Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment Mitra, Ankush

197 C p. 173-185
article
19 LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication Yang, Yuanyuan

197 C p. 214-229
article
20 Network load prediction and anomaly detection using ensemble learning in 5G cellular networks Haider, Usman

197 C p. 141-150
article
21 On performance of multi-RIS assisted multi-user nonorthogonal multiple access system over Nakagami- m fading channels Nguyen, Ba Cao

197 C p. 294-305
article
22 Performance evaluation of mobile RPL-based IoT networks under version number attack Sharma, Girish

197 C p. 12-22
article
23 Privacy-preserving spam filtering using homomorphic and functional encryption Nguyen, Tham

197 C p. 230-241
article
24 ReTREM: A responsibility based trust revision model for determining trustworthiness of fog nodes Yadav, Ravi

197 C p. 159-172
article
25 Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network Cheng, Yuan

197 C p. 267-275
article
26 Swin-T-NFC CRFs: An encoder–decoder neural model for high-precision UAV positioning via point cloud super resolution and image semantic segmentation Wang, Suhong

197 C p. 52-60
article
                             26 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands