nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A BCH code assisted modified NCO based LSPF-DPLL topology for Nakagami-m, Rayleigh and Rician fading channels
|
Bhattacharyya, Sabyasachi |
|
2019 |
|
2 |
p. 102-110 |
artikel |
2 |
A comparative study of name resolution and routing mechanisms in information-centric networks
|
Liu, Hang |
|
2019 |
|
2 |
p. 69-75 |
artikel |
3 |
AdaptNF: Adaptive service chain scheduling with stateless migration and NF consolidation
|
Li, Qing |
|
|
|
2 |
p. 462-472 |
artikel |
4 |
A data complementary method for thunderstorm point charge localization based on atmospheric electric field apparatus array group
|
Yang, Xu |
|
|
|
2 |
p. 170-177 |
artikel |
5 |
A mobility compensation method for drones in SG-eIoT
|
Weng, Liguo |
|
|
|
2 |
p. 196-200 |
artikel |
6 |
A multi-point collaborative DDoS defense mechanism for IIoT environment
|
Huang, Hongcheng |
|
|
|
2 |
p. 590-601 |
artikel |
7 |
Analytical model of IoT CoAP traffic
|
Herrero, Rolando |
|
2019 |
|
2 |
p. 63-68 |
artikel |
8 |
An architecture for digital hate content reduction with mobile edge computing
|
Chetty, Naganna |
|
|
|
2 |
p. 217-222 |
artikel |
9 |
An enhanced scheme for mutual authentication for healthcare services
|
Shamshad, Salman |
|
|
|
2 |
p. 150-161 |
artikel |
10 |
A new type of blockchain for secure message exchange in VANET
|
Shrestha, Rakesh |
|
|
|
2 |
p. 177-186 |
artikel |
11 |
An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system
|
Deng, Linbo |
|
|
|
2 |
p. 174-185 |
artikel |
12 |
Anonymous data collection scheme for cloud-aided mobile edge networks
|
Wang, Anxi |
|
|
|
2 |
p. 223-228 |
artikel |
13 |
A novel approach to gait synchronization and transition for reconfigurable walking platforms
|
Nansai, Shunsuke |
|
2015 |
|
2 |
p. 141-151 11 p. |
artikel |
14 |
Anti-jamming channel access in 5G ultra-dense networks: a game-theoretic learning approach
|
Zhang, Yunpeng |
|
|
|
2 |
p. 523-533 |
artikel |
15 |
Application of cognitive radio and interference cancellation in the L-Band based on future air-to-ground communication systems
|
Raja, Muthalagu |
|
2019 |
|
2 |
p. 111-120 |
artikel |
16 |
A review of optimization methods for computation offloading in edge computing networks
|
Sadatdiynov, Kuanishbay |
|
|
|
2 |
p. 450-461 |
artikel |
17 |
A roadmap for security challenges in the Internet of Things
|
Riahi Sfar, Arbia |
|
|
|
2 |
p. 118-137 |
artikel |
18 |
A secure spectrum auction scheme without the trusted party based on the smart contract
|
Wang, Jiaqi |
|
|
|
2 |
p. 223-234 |
artikel |
19 |
A secure visual framework for multi-index protection evaluation in networks
|
Wu, Xiang |
|
|
|
2 |
p. 327-336 |
artikel |
20 |
A super base station based centralized network architecture for 5G mobile communication systems
|
Qian, Manli |
|
2015 |
|
2 |
p. 152-159 8 p. |
artikel |
21 |
A survey and measurement study of GPU DVFS on energy conservation
|
Mei, Xinxin |
|
2017 |
|
2 |
p. 89-100 12 p. |
artikel |
22 |
A survey of edge computing-based designs for IoT security
|
Sha, Kewei |
|
|
|
2 |
p. 195-202 |
artikel |
23 |
A survey of free space optical networks
|
Son, In Keun |
|
2017 |
|
2 |
p. 67-77 11 p. |
artikel |
24 |
A survey of 5G technologies: regulatory, standardization and industrial perspectives
|
Morgado, António |
|
|
|
2 |
p. 87-97 |
artikel |
25 |
A systematic literature review of blockchain cyber security
|
Taylor, Paul J. |
|
|
|
2 |
p. 147-156 |
artikel |
26 |
A time-domain estimation method of rapidly time-varying channels for OFDM-based LTE-R systems
|
Choi, Jin-Kyu |
|
2019 |
|
2 |
p. 94-101 |
artikel |
27 |
Auction-based profit maximization offloading in mobile edge computing
|
Wang, Ruyan |
|
|
|
2 |
p. 545-556 |
artikel |
28 |
A vision-based terrain morphology estimation model inspired by the avian hippocampus
|
Oyekan, John |
|
2015 |
|
2 |
p. 134-140 7 p. |
artikel |
29 |
Basis expansion model for channel estimation in LTE-R communication system
|
Deng, Ling |
|
2016 |
|
2 |
p. 92-96 5 p. |
artikel |
30 |
Bio-signal based control in assistive robots: a survey
|
Rechy-Ramirez, Ericka Janet |
|
2015 |
|
2 |
p. 85-101 17 p. |
artikel |
31 |
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home
|
Yakubu, Bello Musa |
|
|
|
2 |
p. 383-392 |
artikel |
32 |
Building technology platform aimed to develop service robot with embedded personality and enhanced communication with social environment
|
Rodić, Aleksandar |
|
2015 |
|
2 |
p. 112-124 13 p. |
artikel |
33 |
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation
|
Li, Wenjuan |
|
|
|
2 |
p. 257-263 |
artikel |
34 |
Channel estimation and channel tracking for correlated block-fading channels in massive MIMO systems
|
Dahiya, Suresh |
|
|
|
2 |
p. 138-147 |
artikel |
35 |
Cloud computing-enabled IIOT system for neurosurgical simulation using augmented reality data access
|
Liu, Jun |
|
|
|
2 |
p. 347-357 |
artikel |
36 |
Cloud service performance evaluation: status, challenges, and opportunities – a survey from the system modeling perspective
|
Duan, Qiang |
|
2017 |
|
2 |
p. 101-111 11 p. |
artikel |
37 |
Combined spatial-temporal energy harvesting and relay selection for cognitive wireless powered networks
|
Gao, Yuan |
|
|
|
2 |
p. 201-213 |
artikel |
38 |
Comparing the efficiency of artificial neural networks in sEMG-based simultaneous and continuous estimation of hand kinematics
|
Batayneh, Wafa |
|
|
|
2 |
p. 162-173 |
artikel |
39 |
Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks
|
Xu, Lingwei |
|
|
|
2 |
p. 400-410 |
artikel |
40 |
Design and implementation of Ad-Hoc collaborative proxying scheme for reducing network energy waste
|
Khan, Rafiullah |
|
2017 |
|
2 |
p. 118-128 11 p. |
artikel |
41 |
Development of a hospital mobile platform for logistics tasks
|
Acosta Calderon, Carlos Antonio |
|
2015 |
|
2 |
p. 102-111 10 p. |
artikel |
42 |
Distributed privacy protection strategy for MEC enhanced wireless body area networks
|
Zhen, Yan |
|
|
|
2 |
p. 229-237 |
artikel |
43 |
3D placement of unmanned aerial vehicles and partially overlapped channel assignment for throughput maximization
|
Zou, Chengming |
|
|
|
2 |
p. 214-222 |
artikel |
44 |
Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications
|
Salih, Qusay M. |
|
|
|
2 |
p. 367-382 |
artikel |
45 |
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element
|
Patel, Chintan |
|
|
|
2 |
p. 358-366 |
artikel |
46 |
Edge computing technologies for Internet of Things: a primer
|
Ai, Yuan |
|
|
|
2 |
p. 77-86 |
artikel |
47 |
Editorial Board
|
|
|
|
|
2 |
p. ii-iii |
artikel |
48 |
Editorial Board
|
|
|
2019 |
|
2 |
p. ii |
artikel |
49 |
Editorial Board
|
|
|
|
|
2 |
p. ii |
artikel |
50 |
Editorial Board
|
|
|
|
|
2 |
p. ii |
artikel |
51 |
Editorial Board
|
|
|
|
|
2 |
p. ii-iii |
artikel |
52 |
Editorial for special issue on ”security and privacy protection in the era of IoT devices”
|
Meng, Weizhi |
|
|
|
2 |
p. 245-246 |
artikel |
53 |
Editorial: Special issue on blockchain and communication networks
|
Wu, Yulei |
|
|
|
2 |
p. 145-146 |
artikel |
54 |
Editorial: Special issue on “Internet of things and edge computing in the new 5G era”
|
|
|
|
|
2 |
p. 167-169 |
artikel |
55 |
Editorial: Special issue on “mobile edge computing”
|
|
|
|
|
2 |
p. 187-188 |
artikel |
56 |
Energy-based control for a biologically inspired hexapod robot with rolling locomotion
|
Nemoto, Takuma |
|
2015 |
|
2 |
p. 125-133 9 p. |
artikel |
57 |
Energy-efficient task allocation for reliable parallel computation of cluster-based wireless sensor network in edge computing
|
Wen, Jiabao |
|
|
|
2 |
p. 473-482 |
artikel |
58 |
Erratum to “A robust beam tracking scheme for millimeter wave HetNets” [Digit. Commun. Network. 8 (6) (2022) 1115–1121]
|
Xue, Qing |
|
|
|
2 |
p. 602 |
artikel |
59 |
Extended Kalman Filter-based localization algorithm by edge computing in Wireless Sensor Networks
|
Ullah, Inam |
|
|
|
2 |
p. 187-195 |
artikel |
60 |
Federated learning based QoS-aware caching decisions in fog-enabled internet of things networks
|
Huang, Xiaoge |
|
|
|
2 |
p. 580-589 |
artikel |
61 |
Field test of multi-hop image sensing network prototype on a city-wide scale
|
Che, Xianhui |
|
2019 |
|
2 |
p. 131-137 |
artikel |
62 |
Fractional delay compensated discrete-time SMC for networked control system
|
Shah, D.H. |
|
2017 |
|
2 |
p. 112-117 6 p. |
artikel |
63 |
Generative adversarial network-based atmospheric scattering model for image dehazing
|
Zhu, Jinxiu |
|
|
|
2 |
p. 178-186 |
artikel |
64 |
GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G
|
Jadav, Nilesh Kumar |
|
|
|
2 |
p. 422-435 |
artikel |
65 |
Guest editorial: AI and edge computing driven technologies and applications
|
Lv, Jianhui |
|
|
|
2 |
p. 448-449 |
artikel |
66 |
Guest editorial: Network architectures and communication protocols for smart industrial IoT applications
|
Khan, Fazlullah |
|
|
|
2 |
p. 293-295 |
artikel |
67 |
Help from space: grant-free massive access for satellite-based IoT in the 6G era
|
Ye, Neng |
|
|
|
2 |
p. 215-224 |
artikel |
68 |
High mobility channel estimation method based on improved basis expansion model
|
Huang, Jinjin |
|
2019 |
|
2 |
p. 76-83 |
artikel |
69 |
ICS-SVM: A user retweet prediction method for hot topics based on improved SVM
|
Dai, Tianji |
|
|
|
2 |
p. 186-193 |
artikel |
70 |
IFC_EB
|
|
|
2015 |
|
2 |
p. IFC- 1 p. |
artikel |
71 |
Image analysis and machine learning-based malaria assessment system
|
Manning, Kyle |
|
|
|
2 |
p. 132-142 |
artikel |
72 |
Impact of antenna and beam-selection-based sectored relay planning for performance evaluation of 4G LTE-A tri-sectored cell
|
Sheikh, Javaid A. |
|
2019 |
|
2 |
p. 121-130 |
artikel |
73 |
Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology
|
Minahil, |
|
|
|
2 |
p. 235-244 |
artikel |
74 |
Low-complexity soft-output signal detector based on adaptive pre-conditioned gradient descent method for uplink multiuser massive MIMO systems
|
Berthe, Souleymane |
|
|
|
2 |
p. 557-566 |
artikel |
75 |
Machine learning-based zero-touch network and service management: a survey
|
Gallego-Madrid, Jorge |
|
|
|
2 |
p. 105-123 |
artikel |
76 |
Machine learning-enabled MIMO-FBMC communication channel parameter estimation in IIoT: A distributed CS approach
|
Wang, Han |
|
|
|
2 |
p. 306-312 |
artikel |
77 |
Mitigating adjacent channel interference in vehicular communication systems
|
Almeida, João |
|
2016 |
|
2 |
p. 57-64 8 p. |
artikel |
78 |
Mitigation of spectral leakage for single carrier, block-processing cognitive radio receivers
|
Polak, Adam C. |
|
|
|
2 |
p. 106-110 |
artikel |
79 |
Mobility-driven user-centric AP clustering in mobile edge computing-based ultra-dense networks
|
He, Shuxin |
|
|
|
2 |
p. 210-216 |
artikel |
80 |
Monitoring the security of audio biomedical signals communications in wearable IoT healthcare
|
Yazdanpanah, Saeid |
|
|
|
2 |
p. 393-399 |
artikel |
81 |
Multipath multihop mmWave backhaul in ultra-dense small-cell network
|
Saadat, Salman |
|
|
|
2 |
p. 111-117 |
artikel |
82 |
3-Multi ranked encryption with enhanced security in cloud computing
|
Kim, YeEun |
|
|
|
2 |
p. 313-326 |
artikel |
83 |
On selecting transmission mode for D2D transmitter in underlay cellular network with a multi-antenna base station
|
Santipach, Wiroonsak |
|
|
|
2 |
p. 194-207 |
artikel |
84 |
Optimal deployment of swarm positions in cooperative interception of multiple UAV swarms
|
Wang, Chengcai |
|
|
|
2 |
p. 567-579 |
artikel |
85 |
Optimal resource allocation solutions for heterogeneous cognitive radio networks
|
Awoyemi, Babatunde |
|
2017 |
|
2 |
p. 129-139 11 p. |
artikel |
86 |
Percolation analysis of large-scale wireless balloon networks
|
Anjum, M.D. Nashid |
|
2019 |
|
2 |
p. 84-93 |
artikel |
87 |
Piecewise linear detection for direct superposition modulation
|
Damrath, Martin |
|
|
|
2 |
p. 98-105 |
artikel |
88 |
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects
|
Wang, Chen |
|
|
|
2 |
p. 225-234 |
artikel |
89 |
Promoting Creative Computing: origin, scope, research and applications
|
Yang, Hongji |
|
2016 |
|
2 |
p. 84-91 8 p. |
artikel |
90 |
Recent advances in mobile edge computing and content caching
|
Safavat, Sunitha |
|
|
|
2 |
p. 189-194 |
artikel |
91 |
Recent progress on high-speed optical transmission
|
Yu, Jianjun |
|
2016 |
|
2 |
p. 65-76 12 p. |
artikel |
92 |
Reconfigurable intelligent surface: design the channel – a new opportunity for future wireless networks
|
Dajer, Miguel |
|
|
|
2 |
p. 87-104 |
artikel |
93 |
Research on data load balancing technology of massive storage systems for wearable devices
|
Liang, Shujun |
|
|
|
2 |
p. 143-149 |
artikel |
94 |
Research on high-performance English translation based on topic model
|
Shen, Yumin |
|
|
|
2 |
p. 505-511 |
artikel |
95 |
Robust resource allocation for NOMA-assisted heterogeneous networks
|
Xie, Hao |
|
|
|
2 |
p. 208-214 |
artikel |
96 |
SCIM: Incorporating secure communication and interference management in one operation
|
Li, Zhao |
|
|
|
2 |
p. 512-522 |
artikel |
97 |
Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks
|
Fan, Lihong |
|
|
|
2 |
p. 247-256 |
artikel |
98 |
Similar physical entity matching strategy for mobile edge search
|
Zhang, Puning |
|
|
|
2 |
p. 203-209 |
artikel |
99 |
Smart and collaborative industrial IoT: A federated learning and data space approach
|
Farahani, Bahar |
|
|
|
2 |
p. 436-447 |
artikel |
100 |
Smart contract token-based privacy-preserving access control system for industrial Internet of Things
|
Wang, Weizheng |
|
|
|
2 |
p. 337-346 |
artikel |
101 |
Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine
|
Zhang, Jing |
|
|
|
2 |
p. 296-305 |
artikel |
102 |
Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT
|
Lee, Kyungroul |
|
|
|
2 |
p. 124-131 |
artikel |
103 |
Substring-searchable attribute-based encryption and its application for IoT devices
|
Sun, Xi |
|
|
|
2 |
p. 277-283 |
artikel |
104 |
Survivability evaluation for networks carrying complex traffic flows
|
Jamali, Amin |
|
|
|
2 |
p. 534-544 |
artikel |
105 |
Task offloading mechanism based on federated reinforcement learning in mobile edge computing
|
Li, Jie |
|
|
|
2 |
p. 492-504 |
artikel |
106 |
Teaching mechanism empowered by virtual simulation: Edge computing–driven approach
|
Wang, Ziqiao |
|
|
|
2 |
p. 483-491 |
artikel |
107 |
The effect of propagation delay on the dynamic evolution of the Bitcoin blockchain
|
BA, Moustapha |
|
|
|
2 |
p. 157-166 |
artikel |
108 |
Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT
|
Rahman, Anichur |
|
|
|
2 |
p. 411-421 |
artikel |
109 |
Tracing manufacturing processes using blockchain-based token compositions
|
Westerkamp, Martin |
|
|
|
2 |
p. 167-176 |
artikel |
110 |
User location privacy protection mechanism for location-based services
|
He, Yan |
|
|
|
2 |
p. 264-276 |
artikel |
111 |
Visible light communication: Applications, architecture, standardization and research challenges
|
Khan, Latif Ullah |
|
2017 |
|
2 |
p. 78-88 11 p. |
artikel |
112 |
Wavelet networks for reducing the envelope fluctuations in WirelessMan–OFDM systems
|
Iqdour, Radouane |
|
2016 |
|
2 |
p. 77-83 7 p. |
artikel |