nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A fuzzy rule based machine intelligence model for cherry red spot disease detection of human eyes in IoMT
|
Jena, Kalyan Kumar |
|
|
29 |
1 |
p. 247-265 |
artikel |
2 |
An energy efficiency optimization jointing resource allocation for delay-aware traffic in fronthaul constrained C-RAN
|
Mai, Zhiyuan |
|
|
29 |
1 |
p. 353-368 |
artikel |
3 |
A network security algorithm using SVC and sliding window
|
Zhao, Xuemin |
|
|
29 |
1 |
p. 345-351 |
artikel |
4 |
An intelligent access algorithm for large scale multihop wireless networks based on mean field game
|
Wang, Yu |
|
|
29 |
1 |
p. 331-344 |
artikel |
5 |
An IoT-enabled energy-efficient approach for the detection of leaf curl disease in tomato crops
|
Zhang, Yinjun |
|
|
29 |
1 |
p. 321-329 |
artikel |
6 |
A node selection method for cooperative location estimation in high density wireless networks
|
Golihaghighi, Nafiseh |
|
|
29 |
1 |
p. 97-108 |
artikel |
7 |
A novel predictive localization algorithm for underwater wireless sensor networks
|
Liu, Haiming |
|
|
29 |
1 |
p. 303-319 |
artikel |
8 |
A wireless network based technical and tactical analysis of volleyball game based on data mining techniques
|
Chen, Yizhi |
|
|
29 |
1 |
p. 161-172 |
artikel |
9 |
Circularly polarized antenna array design with the potential of gain-size trade-off and omnidirectional radiation for millimeter-wave small base station applications
|
Ullah, Ubaid |
|
|
29 |
1 |
p. 413-422 |
artikel |
10 |
Content distribution in a VANET using InterPlanetary file system
|
Chaves, Ricardo |
|
|
29 |
1 |
p. 129-146 |
artikel |
11 |
Cost-efficient edge caching and Q-learning-based service selection policies in MEC
|
Wu, Menghui |
|
|
29 |
1 |
p. 285-301 |
artikel |
12 |
Doing their best: How to provide service by limited number of drones?
|
Danilchenko, Kiril |
|
|
29 |
1 |
p. 209-220 |
artikel |
13 |
Highly efficient approach for discordant BSMs detection in connected vehicles environment
|
Zamouche, Djamila |
|
|
29 |
1 |
p. 189-207 |
artikel |
14 |
Improving QoS mechanisms for IEEE 802.11ax with overlapping basic service sets
|
Tuan, Ya-Pei |
|
|
29 |
1 |
p. 387-401 |
artikel |
15 |
Integrating user experience assessment in Re-CRUD console framework development
|
Anuar, Asyraf Wahi |
|
|
29 |
1 |
p. 109-127 |
artikel |
16 |
Joint effects of non-linear energy harvesting, primary interference, and full-duplex destination-assisted jamming on spectrum sharing networks
|
Ho-Van, Khuong |
|
|
29 |
1 |
p. 221-234 |
artikel |
17 |
MAP based modeling method and performance study of a task offloading scheme with time-correlated traffic and VM repair in MEC systems
|
Wang, Yuting |
|
|
29 |
1 |
p. 47-68 |
artikel |
18 |
Multi-objective path planning algorithm for mobile charger in wireless rechargeable sensor networks
|
Wang, Xinchen |
|
|
29 |
1 |
p. 267-283 |
artikel |
19 |
Optimal scheduling strategy of AUV based on importance and age of information
|
Wu, Ting |
|
|
29 |
1 |
p. 87-95 |
artikel |
20 |
PASS: power allocation and SIC order selection of cache-aided NOMA in vehicular networks
|
Sun, Yanglong |
|
|
29 |
1 |
p. 173-187 |
artikel |
21 |
QSFDEW: a fingerprint positioning method based on quadtree search and fractal direction entropy weighting
|
Huang, Yuhao |
|
|
29 |
1 |
p. 437-448 |
artikel |
22 |
Radiation pattern reconfigurable cubical antenna array for 2.45 GHz wireless communication applications
|
Alkurt, Fatih Ozkan |
|
|
29 |
1 |
p. 235-246 |
artikel |
23 |
Reputation-based power allocation for NOMA cognitive radio networks
|
Li, Feng |
|
|
29 |
1 |
p. 449-457 |
artikel |
24 |
Research on linear frequency modulation detection technology based on fractional fourier transform
|
Tao, Huating |
|
|
29 |
1 |
p. 19-27 |
artikel |
25 |
Research on multi-service slice resource allocation over licensed and unlicensed bands
|
Chai, Yuhao |
|
|
29 |
1 |
p. 1-17 |
artikel |
26 |
Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers
|
Thai, Chan Dai Truyen |
|
|
29 |
1 |
p. 403-412 |
artikel |
27 |
Secured polar code derived from random hopped frozen-bits
|
Moussa, Karim H. |
|
|
29 |
1 |
p. 423-435 |
artikel |
28 |
Secure proxy MIPv6-based mobility solution for LPWAN
|
Jradi, Hassan |
|
|
29 |
1 |
p. 69-85 |
artikel |
29 |
Spatiotemporal characteristic aware task allocation strategy using sparse user data in mobile crowdsensing
|
Tang, Tong |
|
|
29 |
1 |
p. 459-474 |
artikel |
30 |
SSPO-DQN spark: shuffled student psychology optimization based deep Q network with spark architecture for big data classification
|
Kantapalli, Bhaskar |
|
|
29 |
1 |
p. 369-385 |
artikel |
31 |
The recognition of multi-components signals based on semantic segmentation
|
Hou, Changbo |
|
|
29 |
1 |
p. 147-160 |
artikel |
32 |
Weighted high priority packet transmission using ozmos bio-inspired mechanism for traffic load distribution (WH-DTO) in WSNs
|
Sangeetha, G. |
|
|
29 |
1 |
p. 29-45 |
artikel |