Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             32 results found
no title author magazine year volume issue page(s) type
1 A brief survey on 6G communications Rajoria, S.

28 7 p. 2901-2911
article
2 Access probability optimization for streaming media transmission in heterogeneous cellular networks Jia, Jie

28 7 p. 3231-3245
article
3 A cluster based charging schedule for wireless rechargeable sensor networks using gravitational search algorithm Rahaman, Sk Md Abidar

28 7 p. 3323-3336
article
4 A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments Dhanaraj, Rajesh Kumar

28 7 p. 3127-3142
article
5 Analysis of secrecy outage performance for full duplex NOMA relay systems with appearance of multiple eavesdroppers Cuong, Nguyen Le

28 7 p. 3157-3172
article
6 Analysis on functionalities and security features of Internet of Things related protocols Rizzardi, Alessandra

28 7 p. 2857-2887
article
7 An efficient and provably secure authenticated key agreement scheme for mobile edge computing Rakeei, Mohammadamin

28 7 p. 2983-2999
article
8 A new fuzzy logic approach for reliable communications in wireless underground sensor networks Wohwe Sambo, Damien

28 7 p. 3275-3292
article
9 An improved traffic flow forecasting based control logic using parametrical doped learning and truncated dual flow optimization model Jain, Rishabh

28 7 p. 3101-3110
article
10 A novel self adaptive-electric fish optimization-based multi-lane changing and merging control strategy on connected and autonomous vehicle Vaishnavi, T.

28 7 p. 3077-3099
article
11 A state-of-the-art survey on wireless rechargeable sensor networks: perspectives and challenges Qureshi, Bushra

28 7 p. 3019-3043
article
12 Beam-shaping technique for plasma magneto-electric dipole planar array based on time-modulation and particle swarm optimization Malhat, Hend Abd El-Azem

28 7 p. 3001-3018
article
13 B-GWO based multi-UAV deployment and power allocation in NOMA assisted wireless networks Gupta, Aishwarya

28 7 p. 3199-3211
article
14 Channel coding for cooperative wideband spectrum sensing under imperfect reporting channels Captain, Kamal

28 7 p. 3213-3230
article
15 DDPG-based intelligent rechargeable fog computation offloading for IoT Chen, Siguang

28 7 p. 3293-3304
article
16 Distributed multi-tenant RAN slicing in 5G networks Awada, Zeina

28 7 p. 3185-3198
article
17 Finding an appropriate radio propagation model for rate aware congestion control mechanism in wireless sensor networks Grover, Amit

28 7 p. 3045-3057
article
18 Full-duplex overlay cognitive wireless powered communication network using RF energy harvesting Rezaie, Mostafa

28 7 p. 2837-2856
article
19 Improvement of the WMSNs lifetime using multi-hop clustering routing protocol Saleem, Madyen M.

28 7 p. 3173-3183
article
20 Improve the quality of charging services for rechargeable wireless sensor networks by deploying a mobile vehicle with multiple removable chargers Chen, ZhanSheng

28 7 p. 2805-2819
article
21 Joint optimization of energy harvesting and information transmission for trapped user Wei, Xi

28 7 p. 2937-2950
article
22 Live video streaming service with pay-as-you-use model on Ethereum Blockchain and InterPlanetary file system Lopes, Elio Jordan

28 7 p. 3111-3125
article
23 Mitigating peak side-lobe levels in pulse compression radar using classical orthogonal polynomials Thakur, Ankur

28 7 p. 2889-2899
article
24 Mobile data offloading based on minority game theoretic framework Majumder, Bhaswar

28 7 p. 2967-2982
article
25 On the outage performance of decode-and-forward based relay ordering in cognitive wireless sensor networks Devipriya, S.

28 7 p. 3247-3259
article
26 Optimal-round preprocessing-MPC of polynomials over non-zero inputs via distributed random matrix Bitan, Dor

28 7 p. 3261-3274
article
27 Resource management in UAV-assisted MEC: state-of-the-art and open challenges Xiao, Zhu

28 7 p. 3305-3322
article
28 Secure and efficient cache-based authentication scheme for vehicular ad-hoc networks Kumar, Pankaj

28 7 p. 2821-2836
article
29 Secure energy aware routing protocol for trust management using enhanced Dempster Shafer evidence model in multi-hop UWAN Mahapatra, Surya Narayan

28 7 p. 3059-3076
article
30 Secure transmission in one-bit cell-free massive MIMO system with multiple non-colluding eavesdroppers Wang, Xiaoyu

28 7 p. 2951-2966
article
31 Trust-based energy-aware routing using GEOSR protocol for Ad-Hoc sensor networks Kumar, Ranjit

28 7 p. 2913-2936
article
32 UWB MIMO antenna with 4-element, compact size, high isolation and single band rejection for high-speed wireless networks Ibrahim, Ahmed A.

28 7 p. 3143-3155
article
                             32 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands