Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             32 results found
no title author magazine year volume issue page(s) type
1 A business intelligence based solution to support academic affairs: case of Taibah University Boulila, Wadii

29 3 p. 1051-1058
article
2 A comprehensive and systematic literature review on the big data management techniques in the internet of things Naghib, Arezou

29 3 p. 1085-1144
article
3 Adaptive multi-user uplink resource allocation based on access delay analysis in IEEE 802.11ax Peng, Min

29 3 p. 1223-1235
article
4 A 12-element 360° azimuth plane scanning circular antenna array for THz wireless devices Nella, Anveshkumar

29 3 p. 1145-1159
article
5 A framework of blockchain-based secure and privacy-preserving E-government system Elisa, Noe

29 3 p. 1005-1015
article
6 A heuristic deep feature system for energy management in wireless sensor network Naveena, Ambidi

29 3 p. 1161-1174
article
7 A low profile triband coupled resonator filtering antenna for wireless applications Dorairajan, Nithya

29 3 p. 1485-1503
article
8 An energy efficient coverage aware algorithm in energy harvesting wireless sensor networks Sah, Dipak Kumar

29 3 p. 1175-1195
article
9 A new method for privacy preserving association rule mining using homomorphic encryption with a secure communication protocol Zehtabchi, S.

29 3 p. 1197-1212
article
10 An open source smart home management system based on IOT Naik, Kevin

29 3 p. 989-995
article
11 Cloud-based differentially private image classification Chicha, Elie

29 3 p. 997-1004
article
12 Cloud-based load balancing using double Q-learning for improved Quality of Service Tennakoon, Deepal

29 3 p. 1043-1050
article
13 Cloud computing deployment: a cost-modelling case-study Ellman, Jeremy

29 3 p. 1069-1076
article
14 Designing an intelligent image detection and transmission system for the Internet of Things Zhang, Jingya

29 3 p. 1213-1222
article
15 Dynamically scalable privacy-preserving authentication protocol for distributed IoT based healthcare service providers Trivedi, Hiral S.

29 3 p. 1385-1409
article
16 EQMS: An improved energy-aware and QoE-aware video streaming policy across multiple competitive mobile devices Wheatman, Kristina

29 3 p. 1465-1484
article
17 5G-enabled V2X communications for vulnerable road users safety applications: a review Zoghlami, Chaima

29 3 p. 1237-1267
article
18 Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model Patonico, Simone

29 3 p. 1017-1029
article
19 Load balanced cluster formation to avoid energy hole problem in WSN using fuzzy rule-based system Edla, Damodar Reddy

29 3 p. 1299-1310
article
20 New RSSI-fingerprinting-based smartphone localization system for indoor environments Biswas, Debajyoti

29 3 p. 1281-1297
article
21 On self-adaptive 5G network slice QoS management system: a deep reinforcement learning approach Cheng, Sheng-Tzong

29 3 p. 1269-1279
article
22 Potential effects on server power metering and modeling Wang, Yewan

29 3 p. 1077-1084
article
23 Provably secure certificateless protocol for wireless body area network Mandal, Susmita

29 3 p. 1421-1438
article
24 Psychological factors of sports injury caused by wireless communication of embedded microprocessor in social sports teaching and training Huang, Changliang

29 3 p. 1411-1419
article
25 Restricting passive attacks in 6G vehicular networks: a physical layer security perspective Kavaiya, Sagar

29 3 p. 1355-1365
article
26 Routing in cognitive radio networks using adaptive full-duplex communications over IoT environment Darabkh, Khalid A.

29 3 p. 1439-1463
article
27 RSU assisted reliable relay selection for emergency message routing in intermittently connected VANETs Ullah, Sami

29 3 p. 1311-1332
article
28 SDN enabled BDSP in public cloud for resource optimization Al-Mansoori, Ahmed

29 3 p. 1031-1041
article
29 Secure user authentication and key agreement scheme for IoT device access control based smart home communications Uppuluri, Sirisha

29 3 p. 1333-1354
article
30 Special issue on emerging trends, challenges and applications in cloud computing Yang, Longzhi

29 3 p. 985-987
article
31 Supervision of a PV system with storage connected to the power line and design of a battery protection system Traore, M.

29 3 p. 1059-1067
article
32 UAV-assisted data gathering from a sparse wireless sensor adaptive networks Karegar, Pejman A.

29 3 p. 1367-1384
article
                             32 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands