nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accuracy and availability modeling of social networks for Internet of Things event detection applications
|
Aynehband, Meghdad |
|
2019 |
25 |
7 |
p. 4299-4317 |
artikel |
2 |
A deep learning method based on convolutional neural network for automatic modulation classification of wireless signals
|
Xu, Yu |
|
2018 |
25 |
7 |
p. 3735-3746 |
artikel |
3 |
A markov model for investigating the impact of IEEE802.15.4 MAC layer parameters and number of clusters on the performance of wireless sensor networks
|
Hadaidian Nejad Yousefi, Hossein |
|
2019 |
25 |
7 |
p. 4415-4430 |
artikel |
4 |
Analysis of optimal threshold selection for spectrum sensing in a cognitive radio network: an energy detection approach
|
Kumar, Alok |
|
2019 |
25 |
7 |
p. 3917-3931 |
artikel |
5 |
An efficient data collection and load balance algorithm in wireless sensor networks
|
Qin, Danyang |
|
2018 |
25 |
7 |
p. 3703-3714 |
artikel |
6 |
An enhanced distributed power control algorithm for mobile femtocells under limited dynamic range and its convergence
|
Alizadeh, Sajjad |
|
2018 |
25 |
7 |
p. 4147-4160 |
artikel |
7 |
Application research of game theory in cognitive radio spectrum allocation
|
Teng, Zhi-jun |
|
2019 |
25 |
7 |
p. 4275-4286 |
artikel |
8 |
A probabilistic home-based routing scheme for delay tolerant networks
|
Alhasanat, Abdullah |
|
2019 |
25 |
7 |
p. 4037-4048 |
artikel |
9 |
A QoS-aware congestion control mechanism for wireless multimedia sensor networks
|
Alaei, Mohammad |
|
2018 |
25 |
7 |
p. 4173-4192 |
artikel |
10 |
A secure routing protocol with regional partitioned clustering and Beta trust management in smart home
|
Hong, Zhen |
|
2018 |
25 |
7 |
p. 3805-3823 |
artikel |
11 |
Auto-organization approach with adaptive frame periods for IEEE 802.15.4/zigbee forest fire detection system
|
Ouni, Sofiane |
|
2019 |
25 |
7 |
p. 4059-4076 |
artikel |
12 |
Bit error probability of the M-QAM scheme subject to multilevel (double) gated additive white Gaussian noise and Nakagami-m fading
|
Silva, Hugerles S. |
|
2019 |
25 |
7 |
p. 4359-4369 |
artikel |
13 |
Computation offloading balance in small cell networks with mobile edge computing
|
Chen, Lei |
|
2018 |
25 |
7 |
p. 4133-4145 |
artikel |
14 |
Cooperative Q-learning based channel selection for cognitive radio networks
|
Slimeni, Feten |
|
2018 |
25 |
7 |
p. 4161-4171 |
artikel |
15 |
Correction to: A new algorithm for optimization of quality of service in peer to peer wireless mesh networks
|
Gheisari, Mehdi |
|
2019 |
25 |
7 |
p. 4445 |
artikel |
16 |
Correction to: User interest community detection on social media using collaborative filtering
|
Jiang, Liang |
|
2019 |
25 |
7 |
p. 4443 |
artikel |
17 |
Correction to: User interest community detection on social media using collaborative filtering
|
Jiang, Liang |
|
|
25 |
7 |
p. 4443 |
artikel |
18 |
Design of routing protocol for multi-sink based wireless sensor networks
|
Mukherjee, Sankar |
|
2019 |
25 |
7 |
p. 4331-4347 |
artikel |
19 |
DNF-SC-PNC: a new physical-layer network coding scheme for two-way relay channels with asymmetric data length
|
Yang, Hongjuan |
|
2018 |
25 |
7 |
p. 3727-3734 |
artikel |
20 |
3D UAV placement and user association in software-defined cellular networks
|
Pan, Chunyu |
|
2019 |
25 |
7 |
p. 3883-3897 |
artikel |
21 |
Energy efficient reputation mechanism for defending different types of flooding attack
|
Aneja, Sandhya |
|
2019 |
25 |
7 |
p. 3933-3951 |
artikel |
22 |
Enhancing throughput in multi-radio cognitive radio networks
|
Khan, Tanvir Ahmed |
|
2019 |
25 |
7 |
p. 4383-4402 |
artikel |
23 |
ESCBV: energy-efficient and secure communication using batch verification scheme for vehicle users
|
Limbasiya, Trupil |
|
2019 |
25 |
7 |
p. 4403-4414 |
artikel |
24 |
Friendship-based cooperative jamming for secure communication in Poisson networks
|
Zhang, Yuanyu |
|
2018 |
25 |
7 |
p. 4077-4095 |
artikel |
25 |
Graphene based tunable and wideband terahertz antenna for wireless network communication
|
Tripathi, Subodh Kumar |
|
2019 |
25 |
7 |
p. 4371-4381 |
artikel |
26 |
Group mobility by cooperative communication for high speed railway
|
Munjal, Meenakshi |
|
2019 |
25 |
7 |
p. 3857-3866 |
artikel |
27 |
Hyper-power zero forcing detector for massive MIMO systems
|
Minango, Juan |
|
2019 |
25 |
7 |
p. 4349-4357 |
artikel |
28 |
Implementing IoT/WSN based smart Saskatchewan Healthcare System
|
Onasanya, Adeniyi |
|
2019 |
25 |
7 |
p. 3999-4020 |
artikel |
29 |
Improvement of ID-based proxy re-signature scheme with pairing-free
|
Zhang, Jianhong |
|
2019 |
25 |
7 |
p. 4319-4329 |
artikel |
30 |
Incorporating diversity in cloud-computing: a novel paradigm and architecture for enhancing the performance of future cloud radio access networks
|
Periola, Ayodele |
|
2018 |
25 |
7 |
p. 3783-3803 |
artikel |
31 |
Intelligent communication systems and networks (MLICOM 2017)
|
Gu, Xuemai |
|
2019 |
25 |
7 |
p. 3701-3702 |
artikel |
32 |
Interference management in dense inband D2D network using spectral clustering & dynamic resource allocation
|
Kasi, Shahrukh Khan |
|
2019 |
25 |
7 |
p. 4431-4441 |
artikel |
33 |
Licklider Transmission Protocol for GEO-Relayed Space Internetworking
|
Zhang, Wenrui |
|
2018 |
25 |
7 |
p. 3747-3757 |
artikel |
34 |
Link state opportunistic routing for multihop wireless networks
|
Gueguen, Cédric |
|
2019 |
25 |
7 |
p. 3983-3998 |
artikel |
35 |
Machine learning based optimal renewable energy allocation in sustained wireless sensor networks
|
Sharma, Amandeep |
|
2019 |
25 |
7 |
p. 3953-3981 |
artikel |
36 |
Minimum cost event driven WSN with spatial differentiated QoS requirements
|
Sadhukhan, Debanjan |
|
2019 |
25 |
7 |
p. 3899-3915 |
artikel |
37 |
MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network
|
Vo, Tu T. |
|
2018 |
25 |
7 |
p. 4115-4132 |
artikel |
38 |
On outage minimization in RF energy harvesting relay assisted bidirectional communication
|
Ghosh, Sutanu |
|
2019 |
25 |
7 |
p. 3867-3881 |
artikel |
39 |
On the performance of wireless ad hoc networks using bandwidth partitioning
|
Kaynia, Mariam |
|
2019 |
25 |
7 |
p. 4215-4229 |
artikel |
40 |
Parameters estimation of precession cone target based on micro-Doppler spectrum
|
Liu, Aijun |
|
2018 |
25 |
7 |
p. 3759-3765 |
artikel |
41 |
Passive neighbor discovery with social recognition for mobile ad hoc social networking applications
|
Ling, Hao |
|
2019 |
25 |
7 |
p. 4247-4258 |
artikel |
42 |
R-DRA: a replication-based distributed randomized algorithm for data dissemination in connected vehicular networks
|
Fan, Xiying |
|
2018 |
25 |
7 |
p. 3767-3782 |
artikel |
43 |
RECOD: reliable detection protocol for large-scale and dynamic continuous objects in wireless sensor networks
|
Yim, Yongbin |
|
2019 |
25 |
7 |
p. 4193-4213 |
artikel |
44 |
Reducing computation time of a wireless resource scheduler by exploiting temporal channel characteristics
|
Tekinay, Mustafa |
|
2019 |
25 |
7 |
p. 4259-4274 |
artikel |
45 |
Remaining bandwidth based multipath routing in 5G millimeter wave self-backhauling network
|
Ma, Zhongyu |
|
2019 |
25 |
7 |
p. 3839-3855 |
artikel |
46 |
Resource and power allocation for achieving rate fairness in D2D communications overlaying cellular networks
|
Elsherief, Mohamed |
|
2019 |
25 |
7 |
p. 4049-4058 |
artikel |
47 |
RFSMPF: Rank based forwarder selection in MCAST with fuzzy optimized path formation in wireless mesh network
|
Seetha, S. |
|
2019 |
25 |
7 |
p. 4287-4298 |
artikel |
48 |
Scale adaptive correlation tracking based on convolutional features
|
Kang, Wenjing |
|
2018 |
25 |
7 |
p. 3715-3725 |
artikel |
49 |
Supporting QoS requirements provisions on 5G network slices using an efficient priority-based polling technique
|
AlQahtani, Salman Ali |
|
2018 |
25 |
7 |
p. 3825-3838 |
artikel |
50 |
To overhear or not to overhear: a dilemma between network coding gain and energy consumption in multi-hop wireless networks
|
Taheri Javan, Nastooh |
|
2018 |
25 |
7 |
p. 4097-4113 |
artikel |
51 |
Traffic-aware auto-configuration protocol for service oriented low-power and lossy networks in IoT
|
Mahmoud, Ashraf |
|
2019 |
25 |
7 |
p. 4231-4246 |
artikel |
52 |
Trust-aware FuzzyClus-Fuzzy NB: intrusion detection scheme based on fuzzy clustering and Bayesian rule
|
Veeraiah, Neenavath |
|
2019 |
25 |
7 |
p. 4021-4035 |
artikel |