Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             112 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A BCH code assisted modified NCO based LSPF-DPLL topology for Nakagami-m, Rayleigh and Rician fading channels Bhattacharyya, Sabyasachi
2019
2 p. 102-110
artikel
2 A comparative study of name resolution and routing mechanisms in information-centric networks Liu, Hang
2019
2 p. 69-75
artikel
3 AdaptNF: Adaptive service chain scheduling with stateless migration and NF consolidation Li, Qing

2 p. 462-472
artikel
4 A data complementary method for thunderstorm point charge localization based on atmospheric electric field apparatus array group Yang, Xu

2 p. 170-177
artikel
5 A mobility compensation method for drones in SG-eIoT Weng, Liguo

2 p. 196-200
artikel
6 A multi-point collaborative DDoS defense mechanism for IIoT environment Huang, Hongcheng

2 p. 590-601
artikel
7 Analytical model of IoT CoAP traffic Herrero, Rolando
2019
2 p. 63-68
artikel
8 An architecture for digital hate content reduction with mobile edge computing Chetty, Naganna

2 p. 217-222
artikel
9 An enhanced scheme for mutual authentication for healthcare services Shamshad, Salman

2 p. 150-161
artikel
10 A new type of blockchain for secure message exchange in VANET Shrestha, Rakesh

2 p. 177-186
artikel
11 An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system Deng, Linbo

2 p. 174-185
artikel
12 Anonymous data collection scheme for cloud-aided mobile edge networks Wang, Anxi

2 p. 223-228
artikel
13 A novel approach to gait synchronization and transition for reconfigurable walking platforms Nansai, Shunsuke
2015
2 p. 141-151
11 p.
artikel
14 Anti-jamming channel access in 5G ultra-dense networks: a game-theoretic learning approach Zhang, Yunpeng

2 p. 523-533
artikel
15 Application of cognitive radio and interference cancellation in the L-Band based on future air-to-ground communication systems Raja, Muthalagu
2019
2 p. 111-120
artikel
16 A review of optimization methods for computation offloading in edge computing networks Sadatdiynov, Kuanishbay

2 p. 450-461
artikel
17 A roadmap for security challenges in the Internet of Things Riahi Sfar, Arbia

2 p. 118-137
artikel
18 A secure spectrum auction scheme without the trusted party based on the smart contract Wang, Jiaqi

2 p. 223-234
artikel
19 A secure visual framework for multi-index protection evaluation in networks Wu, Xiang

2 p. 327-336
artikel
20 A super base station based centralized network architecture for 5G mobile communication systems Qian, Manli
2015
2 p. 152-159
8 p.
artikel
21 A survey and measurement study of GPU DVFS on energy conservation Mei, Xinxin
2017
2 p. 89-100
12 p.
artikel
22 A survey of edge computing-based designs for IoT security Sha, Kewei

2 p. 195-202
artikel
23 A survey of free space optical networks Son, In Keun
2017
2 p. 67-77
11 p.
artikel
24 A survey of 5G technologies: regulatory, standardization and industrial perspectives Morgado, António

2 p. 87-97
artikel
25 A systematic literature review of blockchain cyber security Taylor, Paul J.

2 p. 147-156
artikel
26 A time-domain estimation method of rapidly time-varying channels for OFDM-based LTE-R systems Choi, Jin-Kyu
2019
2 p. 94-101
artikel
27 Auction-based profit maximization offloading in mobile edge computing Wang, Ruyan

2 p. 545-556
artikel
28 A vision-based terrain morphology estimation model inspired by the avian hippocampus Oyekan, John
2015
2 p. 134-140
7 p.
artikel
29 Basis expansion model for channel estimation in LTE-R communication system Deng, Ling
2016
2 p. 92-96
5 p.
artikel
30 Bio-signal based control in assistive robots: a survey Rechy-Ramirez, Ericka Janet
2015
2 p. 85-101
17 p.
artikel
31 Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home Yakubu, Bello Musa

2 p. 383-392
artikel
32 Building technology platform aimed to develop service robot with embedded personality and enhanced communication with social environment Rodić, Aleksandar
2015
2 p. 112-124
13 p.
artikel
33 Challenge-based collaborative intrusion detection in software-defined networking: an evaluation Li, Wenjuan

2 p. 257-263
artikel
34 Channel estimation and channel tracking for correlated block-fading channels in massive MIMO systems Dahiya, Suresh

2 p. 138-147
artikel
35 Cloud computing-enabled IIOT system for neurosurgical simulation using augmented reality data access Liu, Jun

2 p. 347-357
artikel
36 Cloud service performance evaluation: status, challenges, and opportunities – a survey from the system modeling perspective Duan, Qiang
2017
2 p. 101-111
11 p.
artikel
37 Combined spatial-temporal energy harvesting and relay selection for cognitive wireless powered networks Gao, Yuan

2 p. 201-213
artikel
38 Comparing the efficiency of artificial neural networks in sEMG-based simultaneous and continuous estimation of hand kinematics Batayneh, Wafa

2 p. 162-173
artikel
39 Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks Xu, Lingwei

2 p. 400-410
artikel
40 Design and implementation of Ad-Hoc collaborative proxying scheme for reducing network energy waste Khan, Rafiullah
2017
2 p. 118-128
11 p.
artikel
41 Development of a hospital mobile platform for logistics tasks Acosta Calderon, Carlos Antonio
2015
2 p. 102-111
10 p.
artikel
42 Distributed privacy protection strategy for MEC enhanced wireless body area networks Zhen, Yan

2 p. 229-237
artikel
43 3D placement of unmanned aerial vehicles and partially overlapped channel assignment for throughput maximization Zou, Chengming

2 p. 214-222
artikel
44 Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications Salih, Qusay M.

2 p. 367-382
artikel
45 EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element Patel, Chintan

2 p. 358-366
artikel
46 Edge computing technologies for Internet of Things: a primer Ai, Yuan

2 p. 77-86
artikel
47 Editorial Board
2 p. ii-iii
artikel
48 Editorial Board 2019
2 p. ii
artikel
49 Editorial Board
2 p. ii
artikel
50 Editorial Board
2 p. ii
artikel
51 Editorial Board
2 p. ii-iii
artikel
52 Editorial for special issue on ”security and privacy protection in the era of IoT devices” Meng, Weizhi

2 p. 245-246
artikel
53 Editorial: Special issue on blockchain and communication networks Wu, Yulei

2 p. 145-146
artikel
54 Editorial: Special issue on “Internet of things and edge computing in the new 5G era”
2 p. 167-169
artikel
55 Editorial: Special issue on “mobile edge computing”
2 p. 187-188
artikel
56 Energy-based control for a biologically inspired hexapod robot with rolling locomotion Nemoto, Takuma
2015
2 p. 125-133
9 p.
artikel
57 Energy-efficient task allocation for reliable parallel computation of cluster-based wireless sensor network in edge computing Wen, Jiabao

2 p. 473-482
artikel
58 Erratum to “A robust beam tracking scheme for millimeter wave HetNets” [Digit. Commun. Network. 8 (6) (2022) 1115–1121] Xue, Qing

2 p. 602
artikel
59 Extended Kalman Filter-based localization algorithm by edge computing in Wireless Sensor Networks Ullah, Inam

2 p. 187-195
artikel
60 Federated learning based QoS-aware caching decisions in fog-enabled internet of things networks Huang, Xiaoge

2 p. 580-589
artikel
61 Field test of multi-hop image sensing network prototype on a city-wide scale Che, Xianhui
2019
2 p. 131-137
artikel
62 Fractional delay compensated discrete-time SMC for networked control system Shah, D.H.
2017
2 p. 112-117
6 p.
artikel
63 Generative adversarial network-based atmospheric scattering model for image dehazing Zhu, Jinxiu

2 p. 178-186
artikel
64 GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G Jadav, Nilesh Kumar

2 p. 422-435
artikel
65 Guest editorial: AI and edge computing driven technologies and applications Lv, Jianhui

2 p. 448-449
artikel
66 Guest editorial: Network architectures and communication protocols for smart industrial IoT applications Khan, Fazlullah

2 p. 293-295
artikel
67 Help from space: grant-free massive access for satellite-based IoT in the 6G era Ye, Neng

2 p. 215-224
artikel
68 High mobility channel estimation method based on improved basis expansion model Huang, Jinjin
2019
2 p. 76-83
artikel
69 ICS-SVM: A user retweet prediction method for hot topics based on improved SVM Dai, Tianji

2 p. 186-193
artikel
70 IFC_EB 2015
2 p. IFC-
1 p.
artikel
71 Image analysis and machine learning-based malaria assessment system Manning, Kyle

2 p. 132-142
artikel
72 Impact of antenna and beam-selection-based sectored relay planning for performance evaluation of 4G LTE-A tri-sectored cell Sheikh, Javaid A.
2019
2 p. 121-130
artikel
73 Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology Minahil,

2 p. 235-244
artikel
74 Low-complexity soft-output signal detector based on adaptive pre-conditioned gradient descent method for uplink multiuser massive MIMO systems Berthe, Souleymane

2 p. 557-566
artikel
75 Machine learning-based zero-touch network and service management: a survey Gallego-Madrid, Jorge

2 p. 105-123
artikel
76 Machine learning-enabled MIMO-FBMC communication channel parameter estimation in IIoT: A distributed CS approach Wang, Han

2 p. 306-312
artikel
77 Mitigating adjacent channel interference in vehicular communication systems Almeida, João
2016
2 p. 57-64
8 p.
artikel
78 Mitigation of spectral leakage for single carrier, block-processing cognitive radio receivers Polak, Adam C.

2 p. 106-110
artikel
79 Mobility-driven user-centric AP clustering in mobile edge computing-based ultra-dense networks He, Shuxin

2 p. 210-216
artikel
80 Monitoring the security of audio biomedical signals communications in wearable IoT healthcare Yazdanpanah, Saeid

2 p. 393-399
artikel
81 Multipath multihop mmWave backhaul in ultra-dense small-cell network Saadat, Salman

2 p. 111-117
artikel
82 3-Multi ranked encryption with enhanced security in cloud computing Kim, YeEun

2 p. 313-326
artikel
83 On selecting transmission mode for D2D transmitter in underlay cellular network with a multi-antenna base station Santipach, Wiroonsak

2 p. 194-207
artikel
84 Optimal deployment of swarm positions in cooperative interception of multiple UAV swarms Wang, Chengcai

2 p. 567-579
artikel
85 Optimal resource allocation solutions for heterogeneous cognitive radio networks Awoyemi, Babatunde
2017
2 p. 129-139
11 p.
artikel
86 Percolation analysis of large-scale wireless balloon networks Anjum, M.D. Nashid
2019
2 p. 84-93
artikel
87 Piecewise linear detection for direct superposition modulation Damrath, Martin

2 p. 98-105
artikel
88 Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects Wang, Chen

2 p. 225-234
artikel
89 Promoting Creative Computing: origin, scope, research and applications Yang, Hongji
2016
2 p. 84-91
8 p.
artikel
90 Recent advances in mobile edge computing and content caching Safavat, Sunitha

2 p. 189-194
artikel
91 Recent progress on high-speed optical transmission Yu, Jianjun
2016
2 p. 65-76
12 p.
artikel
92 Reconfigurable intelligent surface: design the channel – a new opportunity for future wireless networks Dajer, Miguel

2 p. 87-104
artikel
93 Research on data load balancing technology of massive storage systems for wearable devices Liang, Shujun

2 p. 143-149
artikel
94 Research on high-performance English translation based on topic model Shen, Yumin

2 p. 505-511
artikel
95 Robust resource allocation for NOMA-assisted heterogeneous networks Xie, Hao

2 p. 208-214
artikel
96 SCIM: Incorporating secure communication and interference management in one operation Li, Zhao

2 p. 512-522
artikel
97 Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks Fan, Lihong

2 p. 247-256
artikel
98 Similar physical entity matching strategy for mobile edge search Zhang, Puning

2 p. 203-209
artikel
99 Smart and collaborative industrial IoT: A federated learning and data space approach Farahani, Bahar

2 p. 436-447
artikel
100 Smart contract token-based privacy-preserving access control system for industrial Internet of Things Wang, Weizheng

2 p. 337-346
artikel
101 Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine Zhang, Jing

2 p. 296-305
artikel
102 Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT Lee, Kyungroul

2 p. 124-131
artikel
103 Substring-searchable attribute-based encryption and its application for IoT devices Sun, Xi

2 p. 277-283
artikel
104 Survivability evaluation for networks carrying complex traffic flows Jamali, Amin

2 p. 534-544
artikel
105 Task offloading mechanism based on federated reinforcement learning in mobile edge computing Li, Jie

2 p. 492-504
artikel
106 Teaching mechanism empowered by virtual simulation: Edge computing–driven approach Wang, Ziqiao

2 p. 483-491
artikel
107 The effect of propagation delay on the dynamic evolution of the Bitcoin blockchain BA, Moustapha

2 p. 157-166
artikel
108 Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT Rahman, Anichur

2 p. 411-421
artikel
109 Tracing manufacturing processes using blockchain-based token compositions Westerkamp, Martin

2 p. 167-176
artikel
110 User location privacy protection mechanism for location-based services He, Yan

2 p. 264-276
artikel
111 Visible light communication: Applications, architecture, standardization and research challenges Khan, Latif Ullah
2017
2 p. 78-88
11 p.
artikel
112 Wavelet networks for reducing the envelope fluctuations in WirelessMan–OFDM systems Iqdour, Radouane
2016
2 p. 77-83
7 p.
artikel
                             112 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland