nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive speckle filtering for real-time computing in low earth orbit satellite synthetic aperture radar
|
Kim, Kyeongrok |
|
|
7 |
2 |
p. 187-190 |
artikel |
2 |
A deep learning based HTTP slow DoS classification approach using flow data
|
N., Muraleedharan |
|
|
7 |
2 |
p. 210-214 |
artikel |
3 |
A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges
|
H., Sabireen |
|
|
7 |
2 |
p. 162-176 |
artikel |
4 |
Cryptanalysis of a Pairing-free Certificateless Signcryption scheme
|
Kasyoka, Philemon |
|
|
7 |
2 |
p. 200-204 |
artikel |
5 |
Development of an OADM to reduce the incoherent crosstalk in WDM system
|
Mahiuddin, Md. |
|
|
7 |
2 |
p. 205-209 |
artikel |
6 |
Driving forces for Multi-Access Edge Computing (MEC) IoT integration in 5G
|
Liyanage, Madhusanka |
|
|
7 |
2 |
p. 127-137 |
artikel |
7 |
Edge AI prospect using the NeuroEdge computing system: Introducing a novel neuromorphic technology
|
Nwakanma, Cosmas Ifeanyi |
|
|
7 |
2 |
p. 152-157 |
artikel |
8 |
Edge computing based surveillance framework for real time activity recognition
|
D., Aishwarya |
|
|
7 |
2 |
p. 182-186 |
artikel |
9 |
Enhanced whale optimization based traffic forecasting for SDMN based traffic
|
Anupriya, |
|
|
7 |
2 |
p. 143-151 |
artikel |
10 |
Evolutionary dynamics of MEC’s organization in a 6G scenario through EGT and temporal multiplex social network
|
Attanasio, Barbara |
|
|
7 |
2 |
p. 138-142 |
artikel |
11 |
Feature selection for intrusion detection system in Internet-of-Things (IoT)
|
Nimbalkar, Pushparaj |
|
|
7 |
2 |
p. 177-181 |
artikel |
12 |
GNSS jamming detection of UAV ground control station using random matrix theory
|
Sharifi-Tehrani, Omid |
|
|
7 |
2 |
p. 239-243 |
artikel |
13 |
3GPP URLLC patent analysis
|
Won, Jeong Wook |
|
|
7 |
2 |
p. 221-228 |
artikel |
14 |
Mitigation of nonlinearities in analog radio over fiber links using machine learning approach
|
Hadi, Muhammad Usman |
|
|
7 |
2 |
p. 253-258 |
artikel |
15 |
Pavan: A privacy-preserving system for DB-as-a-Service
|
Moghadam, Somayeh Sobati |
|
|
7 |
2 |
p. 259-264 |
artikel |
16 |
Performance evaluation for low complexity cascaded Sphere Decoders using K best detection algorithm
|
Mishra, Priyanka |
|
|
7 |
2 |
p. 234-238 |
artikel |
17 |
Performance evaluation of the effect of traffic decentralization with mobile edge computing
|
Kim, Young-Min |
|
|
7 |
2 |
p. 191-195 |
artikel |
18 |
Permissioned blockchain frameworks in the industry: A comparison
|
Polge, Julien |
|
|
7 |
2 |
p. 229-233 |
artikel |
19 |
Quality of experience assessment of calling services in social network
|
Laghari, Asif Ali |
|
|
7 |
2 |
p. 158-161 |
artikel |
20 |
Real-time Bhutanese Sign Language digits recognition system using Convolutional Neural Network
|
Wangchuk, Karma |
|
|
7 |
2 |
p. 215-220 |
artikel |
21 |
Study of scale-free structures in feed-forward neural networks against backdoor attacks
|
Kaviani, Sara |
|
|
7 |
2 |
p. 265-268 |
artikel |
22 |
The role of 5G for digital healthcare against COVID-19 pandemic: Opportunities and challenges
|
Siriwardhana, Yushan |
|
|
7 |
2 |
p. 244-252 |
artikel |
23 |
Truthful electric vehicle charging via neural-architectural Myerson auction
|
Lee, Haemin |
|
|
7 |
2 |
p. 196-199 |
artikel |