nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A business intelligence based solution to support academic affairs: case of Taibah University
|
Boulila, Wadii |
|
|
29 |
3 |
p. 1051-1058 |
artikel |
2 |
A comprehensive and systematic literature review on the big data management techniques in the internet of things
|
Naghib, Arezou |
|
|
29 |
3 |
p. 1085-1144 |
artikel |
3 |
Adaptive multi-user uplink resource allocation based on access delay analysis in IEEE 802.11ax
|
Peng, Min |
|
|
29 |
3 |
p. 1223-1235 |
artikel |
4 |
A 12-element 360° azimuth plane scanning circular antenna array for THz wireless devices
|
Nella, Anveshkumar |
|
|
29 |
3 |
p. 1145-1159 |
artikel |
5 |
A framework of blockchain-based secure and privacy-preserving E-government system
|
Elisa, Noe |
|
|
29 |
3 |
p. 1005-1015 |
artikel |
6 |
A heuristic deep feature system for energy management in wireless sensor network
|
Naveena, Ambidi |
|
|
29 |
3 |
p. 1161-1174 |
artikel |
7 |
A low profile triband coupled resonator filtering antenna for wireless applications
|
Dorairajan, Nithya |
|
|
29 |
3 |
p. 1485-1503 |
artikel |
8 |
An energy efficient coverage aware algorithm in energy harvesting wireless sensor networks
|
Sah, Dipak Kumar |
|
|
29 |
3 |
p. 1175-1195 |
artikel |
9 |
A new method for privacy preserving association rule mining using homomorphic encryption with a secure communication protocol
|
Zehtabchi, S. |
|
|
29 |
3 |
p. 1197-1212 |
artikel |
10 |
An open source smart home management system based on IOT
|
Naik, Kevin |
|
|
29 |
3 |
p. 989-995 |
artikel |
11 |
Cloud-based differentially private image classification
|
Chicha, Elie |
|
|
29 |
3 |
p. 997-1004 |
artikel |
12 |
Cloud-based load balancing using double Q-learning for improved Quality of Service
|
Tennakoon, Deepal |
|
|
29 |
3 |
p. 1043-1050 |
artikel |
13 |
Cloud computing deployment: a cost-modelling case-study
|
Ellman, Jeremy |
|
|
29 |
3 |
p. 1069-1076 |
artikel |
14 |
Designing an intelligent image detection and transmission system for the Internet of Things
|
Zhang, Jingya |
|
|
29 |
3 |
p. 1213-1222 |
artikel |
15 |
Dynamically scalable privacy-preserving authentication protocol for distributed IoT based healthcare service providers
|
Trivedi, Hiral S. |
|
|
29 |
3 |
p. 1385-1409 |
artikel |
16 |
EQMS: An improved energy-aware and QoE-aware video streaming policy across multiple competitive mobile devices
|
Wheatman, Kristina |
|
|
29 |
3 |
p. 1465-1484 |
artikel |
17 |
5G-enabled V2X communications for vulnerable road users safety applications: a review
|
Zoghlami, Chaima |
|
|
29 |
3 |
p. 1237-1267 |
artikel |
18 |
Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model
|
Patonico, Simone |
|
|
29 |
3 |
p. 1017-1029 |
artikel |
19 |
Load balanced cluster formation to avoid energy hole problem in WSN using fuzzy rule-based system
|
Edla, Damodar Reddy |
|
|
29 |
3 |
p. 1299-1310 |
artikel |
20 |
New RSSI-fingerprinting-based smartphone localization system for indoor environments
|
Biswas, Debajyoti |
|
|
29 |
3 |
p. 1281-1297 |
artikel |
21 |
On self-adaptive 5G network slice QoS management system: a deep reinforcement learning approach
|
Cheng, Sheng-Tzong |
|
|
29 |
3 |
p. 1269-1279 |
artikel |
22 |
Potential effects on server power metering and modeling
|
Wang, Yewan |
|
|
29 |
3 |
p. 1077-1084 |
artikel |
23 |
Provably secure certificateless protocol for wireless body area network
|
Mandal, Susmita |
|
|
29 |
3 |
p. 1421-1438 |
artikel |
24 |
Psychological factors of sports injury caused by wireless communication of embedded microprocessor in social sports teaching and training
|
Huang, Changliang |
|
|
29 |
3 |
p. 1411-1419 |
artikel |
25 |
Restricting passive attacks in 6G vehicular networks: a physical layer security perspective
|
Kavaiya, Sagar |
|
|
29 |
3 |
p. 1355-1365 |
artikel |
26 |
Routing in cognitive radio networks using adaptive full-duplex communications over IoT environment
|
Darabkh, Khalid A. |
|
|
29 |
3 |
p. 1439-1463 |
artikel |
27 |
RSU assisted reliable relay selection for emergency message routing in intermittently connected VANETs
|
Ullah, Sami |
|
|
29 |
3 |
p. 1311-1332 |
artikel |
28 |
SDN enabled BDSP in public cloud for resource optimization
|
Al-Mansoori, Ahmed |
|
|
29 |
3 |
p. 1031-1041 |
artikel |
29 |
Secure user authentication and key agreement scheme for IoT device access control based smart home communications
|
Uppuluri, Sirisha |
|
|
29 |
3 |
p. 1333-1354 |
artikel |
30 |
Special issue on emerging trends, challenges and applications in cloud computing
|
Yang, Longzhi |
|
|
29 |
3 |
p. 985-987 |
artikel |
31 |
Supervision of a PV system with storage connected to the power line and design of a battery protection system
|
Traore, M. |
|
|
29 |
3 |
p. 1059-1067 |
artikel |
32 |
UAV-assisted data gathering from a sparse wireless sensor adaptive networks
|
Karegar, Pejman A. |
|
|
29 |
3 |
p. 1367-1384 |
artikel |