nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A clustering detector with graph theory for blind detection of spatial modulation systems
|
Zhang, Lijuan |
|
|
27 |
2 |
p. 1193-1201 |
artikel |
2 |
A comprehensive review of cooperative MIMO WSN: its challenges and the emerging technologies
|
Asheer, Sarah |
|
|
27 |
2 |
p. 1129-1152 |
artikel |
3 |
Adjacent channel compatibility between IMT and ubiquitous FSS Earth Stations in the 3.4–3.8 GHz frequency band
|
Parker, John R. |
|
|
27 |
2 |
p. 1103-1110 |
artikel |
4 |
Advanced SLM scheme based on discrete forest optimization algorithm for PAPR minimization in UFMC waveform
|
Taşpınar, Necmi |
|
|
27 |
2 |
p. 1353-1368 |
artikel |
5 |
A MECS redistribution algorithm for SDN-enable MEC using response time and transmission overhead
|
Wu, Runze |
|
|
27 |
2 |
p. 1445-1457 |
artikel |
6 |
Analysis and modelling the effects of mobility, Churn rate, node’s life span, intermittent bandwidth and stabilization cost of finger table in structured mobile P2P networks
|
Singh, Sanjeev Kumar |
|
|
27 |
2 |
p. 1049-1062 |
artikel |
7 |
Analysis of wireless sensor networks with sleep mode and threshold activation
|
Ma, Zhanyou |
|
|
27 |
2 |
p. 1431-1443 |
artikel |
8 |
An improved cluster formation process in wireless sensor network to decrease energy consumption
|
Farahzadi, Hamid Reza |
|
|
27 |
2 |
p. 1077-1087 |
artikel |
9 |
Anonymising group data sharing in opportunistic mobile social networks
|
Adu-Gyamfi, Daniel |
|
|
27 |
2 |
p. 1477-1490 |
artikel |
10 |
A novel multi functional multi parameter concealed cluster based data aggregation scheme for wireless sensor networks (NMFMP-CDA)
|
Vinodha, D. |
|
|
27 |
2 |
p. 1111-1128 |
artikel |
11 |
An SDN-based true end-to-end TCP for wireless LAN
|
Singh, Krishna Vijay Kumar |
|
|
27 |
2 |
p. 1413-1430 |
artikel |
12 |
Application of TSVR algorithm in 5G mmWave indoor networks
|
Charrada, Anis |
|
|
27 |
2 |
p. 1491-1502 |
artikel |
13 |
BER and channel capacity analysis of wireless system over κ-μ/inverse gamma and η-μ/inverse gamma composite fading model
|
Pant, Diwaker |
|
|
27 |
2 |
p. 1251-1267 |
artikel |
14 |
Compact microstrip lowpass filter with very sharp roll-off using meandered line resonators
|
Hayati, Mohsen |
|
|
27 |
2 |
p. 1203-1213 |
artikel |
15 |
Cooperative link scheduling for RSU-assisted dissemination of basic safety messages
|
Xiao, Guangbing |
|
|
27 |
2 |
p. 1335-1351 |
artikel |
16 |
Deployment optimization of wireless mesh networks in wind turbine condition monitoring system
|
Yang, Yanjun |
|
|
27 |
2 |
p. 1459-1476 |
artikel |
17 |
Design and development of planar antenna array for mimo application
|
Prabhu, T. |
|
|
27 |
2 |
p. 939-946 |
artikel |
18 |
Efficient pre-authentication scheme for inter-ASN handover in high mobility MANET
|
Deva Priya, M. |
|
|
27 |
2 |
p. 893-907 |
artikel |
19 |
Efficient traffic control and lifetime maximization in mobile ad hoc network by using PSO–BAT optimization
|
Sridevi, N. |
|
|
27 |
2 |
p. 861-870 |
artikel |
20 |
Efficient user pairing algorithm for enhancement of spectral efficiency and interference cancelation in downlink NOMA system
|
Abd-Elnaby, Mohammed |
|
|
27 |
2 |
p. 1035-1047 |
artikel |
21 |
Enhancing multicast security of cognitive radio networks with antenna correlations over Nakagami-m fading channels
|
Sultana, Rezwana |
|
|
27 |
2 |
p. 1173-1192 |
artikel |
22 |
Equality test with an anonymous authorization in cloud computing
|
Abdalla, Hisham |
|
|
27 |
2 |
p. 1063-1076 |
artikel |
23 |
False alarm detection using dynamic threshold in medical wireless sensor networks
|
Saraswathi, S. |
|
|
27 |
2 |
p. 925-937 |
artikel |
24 |
Intelligent energy-aware and secured QoS routing protocol with dynamic mobility estimation for wireless sensor networks
|
Dhanalakshmi, B. |
|
|
27 |
2 |
p. 1503-1514 |
artikel |
25 |
Intrusion detection techniques in network environment: a systematic review
|
Ayyagari, Maruthi Rohit |
|
|
27 |
2 |
p. 1269-1285 |
artikel |
26 |
Joint resource allocation over licensed and unlicensed spectrum in U-LTE networks
|
Zhen, Xiaojian |
|
|
27 |
2 |
p. 1089-1102 |
artikel |
27 |
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
|
Abdi Nasib Far, Hossein |
|
|
27 |
2 |
p. 1389-1412 |
artikel |
28 |
Lightweight Feistel structure based hybrid-crypto model for multimedia data security over uncertain cloud environment
|
Rayappan, Denis |
|
|
27 |
2 |
p. 981-999 |
artikel |
29 |
Lightweight PUF based authentication scheme for fog architecture
|
De Smet, Ruben |
|
|
27 |
2 |
p. 947-959 |
artikel |
30 |
Multi-attribute profile-cast in mobile opportunistic networks
|
Zhang, Di |
|
|
27 |
2 |
p. 1153-1171 |
artikel |
31 |
Multistage fuzzy logic congestion-aware routing using dual-stage notification and the relative barring distance in wireless sensor networks
|
Aimtongkham, Phet |
|
|
27 |
2 |
p. 1287-1308 |
artikel |
32 |
Providing interoperability in Bluetooth mesh with an improved provisioning protocol
|
Hortelano, Diego |
|
|
27 |
2 |
p. 1011-1033 |
artikel |
33 |
Reliable service availability and access control method for cloud assisted IOT communications
|
Kousalya, A. |
|
|
27 |
2 |
p. 881-892 |
artikel |
34 |
Road network layout based multi-hop broadcast protocols for Urban Vehicular Ad-hoc Networks
|
Khamer, Lazhar |
|
|
27 |
2 |
p. 1369-1388 |
artikel |
35 |
Salp swarm algorithm and phasor measurement unit based hybrid robust neural network model for online monitoring of voltage stability
|
Nageswara Rao, A. |
|
|
27 |
2 |
p. 843-860 |
artikel |
36 |
Secure multiple target tracking based on clustering intersection points of measurement circles in wireless sensor networks
|
Adhami, Mohammad Hossein |
|
|
27 |
2 |
p. 1233-1249 |
artikel |
37 |
Security of internet of things based on cryptographic algorithms: a survey
|
Mousavi, Seyyed Keyvan |
|
|
27 |
2 |
p. 1515-1555 |
artikel |
38 |
Signal processing techniques for sustainable cognitive radio communications
|
Ramu, Arulmurugan |
|
|
27 |
2 |
p. 839-841 |
artikel |
39 |
Spectral efficiency (SE) enhancement of NOMA system through iterative power assignment
|
Al-Abbasi, Ziad Qais |
|
|
27 |
2 |
p. 1309-1317 |
artikel |
40 |
The performance analysis of dual-inverter three phase fed induction motor with open-end winding using various PWM schemes
|
Wiryajati, I. Ketut |
|
|
27 |
2 |
p. 871-880 |
artikel |
41 |
Threshold selection analysis of spectrum sensing for cognitive radio network with censoring based imperfect reporting channels
|
Kumar, Alok |
|
|
27 |
2 |
p. 961-980 |
artikel |
42 |
Unified power quality conditioner with reduced switch topology for distributed networks
|
Thamizh Thentral, T. M. |
|
|
27 |
2 |
p. 909-923 |
artikel |
43 |
Uniform thresholding based transmission policy for energy harvesting wireless sensor nodes in fading channel
|
Jaitawat, Arpita |
|
|
27 |
2 |
p. 1001-1010 |
artikel |
44 |
Uplink NOMA-based long-term throughput maximization scheme for cognitive radio networks: an actor–critic reinforcement learning approach
|
Giang, Hoang Thi Huong |
|
|
27 |
2 |
p. 1319-1334 |
artikel |
45 |
User cooperation to mitigate the jamming in OFDMA networks
|
Noori, Hossein |
|
|
27 |
2 |
p. 1215-1231 |
artikel |