nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A distributed relay selection using a fuzzy-BCM based decision making strategy for multi-hop data dissemination in VANETs
|
Debalki, Yonas Abate |
|
|
30 |
4 |
p. 2873-2894 |
artikel |
2 |
A healthcare application based on IoT devices
|
Ghoul, Yamna |
|
|
30 |
4 |
p. 2541-2556 |
artikel |
3 |
An adaptive model of optimal traffic flow prediction using adaptive wildfire optimization and spatial pattern super learning
|
Jain, Rishabh |
|
|
30 |
4 |
p. 2275-2283 |
artikel |
4 |
An adaptive trust system for misbehavior detection in wireless sensor networks
|
Saidi, Ahmed |
|
|
30 |
4 |
p. 2589-2615 |
artikel |
5 |
An anonymous mutual authentication and key agreement scheme in WMSN using physiological data
|
Rai, Shanvendra |
|
|
30 |
4 |
p. 2733-2752 |
artikel |
6 |
An efficient surrogate-assisted Taguchi salp swarm algorithm and its application for intrusion detection
|
Chu, Shu-Chuan |
|
|
30 |
4 |
p. 2675-2696 |
artikel |
7 |
An energy efficient routing algorithm in wireless underground sensor networks
|
Thi, Mai Ha |
|
|
30 |
4 |
p. 2297-2311 |
artikel |
8 |
An enhanced deep learning-based disease detection model in wireless body area network with energy efficient routing protocol
|
Liya, B. S. |
|
|
30 |
4 |
p. 2961-2986 |
artikel |
9 |
A new intrusion detection system based on SVM–GWO algorithms for Internet of Things
|
Ghasemi, Hamed |
|
|
30 |
4 |
p. 2173-2185 |
artikel |
10 |
An improved path loss model for 5G wireless networks in an enclosed hallway
|
Oladimeji, Tolulope T. |
|
|
30 |
4 |
p. 2353-2364 |
artikel |
11 |
Asymmetric CPW-fed patch antenna with slits at terahertz applications for 6G wireless communications
|
Naik, Ketavath Kumar |
|
|
30 |
4 |
p. 2343-2351 |
artikel |
12 |
A weighted cooperative spectrum sensing strategy for NGSO–GSO downlink communication
|
Zhang, Xiaoyan |
|
|
30 |
4 |
p. 2411-2422 |
artikel |
13 |
Block chain espoused adaptive multi-scale dual attention network with quaternion fractional order meixner moments encryption for cyber security in wireless communication network
|
Soundararajan, S. |
|
|
30 |
4 |
p. 2439-2455 |
artikel |
14 |
Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures
|
Tamizshelvan, C. |
|
|
30 |
4 |
p. 2099-2114 |
artikel |
15 |
Correction to: An adaptive model of optimal traffic flow prediction using adaptive wildfire optimization and spatial pattern super learning
|
Jain, Rishabh |
|
|
30 |
4 |
p. 2713 |
artikel |
16 |
Density-based anti-clustering for scheduling D2D communications
|
Elsheikh, Ahmed |
|
|
30 |
4 |
p. 2115-2125 |
artikel |
17 |
Design of miniaturized ultra-wide stopband lowpass-bandpass diplexer using hexagon-shaped resonators
|
Zarghami, Ali-Reza |
|
|
30 |
4 |
p. 2767-2779 |
artikel |
18 |
Distributed energy-efficient wireless sensing and information fusion via event-driven and state-rank activation
|
Fu, Juteng |
|
|
30 |
4 |
p. 2697-2711 |
artikel |
19 |
Dual-band RF energy harvesting for low-power IoT devices
|
Zhao, Jumin |
|
|
30 |
4 |
p. 2511-2527 |
artikel |
20 |
Employing blockchain and IPFS in WSNs for malicious node detection and efficient data storage
|
Saeed, Arooba |
|
|
30 |
4 |
p. 2313-2328 |
artikel |
21 |
Energy efficient optimal parent selection with Chameleon Swarm algorithm and non-overlapping backoff algorithm based dynamic slot allocation in wireless body area network
|
Sankara Srinivasa Rao, Illapu |
|
|
30 |
4 |
p. 2219-2234 |
artikel |
22 |
Enhanced passive optical network system-based VCSEL and PSK electrical modulator for 5th generation
|
Yousif, Raghad Zuhair |
|
|
30 |
4 |
p. 2203-2217 |
artikel |
23 |
Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: a comprehensive review
|
Priyadarshi, Rahul |
|
|
30 |
4 |
p. 2647-2673 |
artikel |
24 |
Fast monte-carlo clustering for signal separation of RFID collision tags at physical layer
|
Zeng, Yu |
|
|
30 |
4 |
p. 2529-2539 |
artikel |
25 |
Full duplex reconfigurable intelligent surfaces system relying on NOMA and wireless power transfer
|
Van Nguyen, Minh-Sang |
|
|
30 |
4 |
p. 2127-2142 |
artikel |
26 |
Generative channel estimation for intelligent reflecting surface-aided wireless communication
|
Singh, Shatakshi |
|
|
30 |
4 |
p. 2753-2765 |
artikel |
27 |
Heterogeneous Lifi–Wifi with multipath transmission protocol for effective access point selection and load balancing
|
Arunkumar, R. |
|
|
30 |
4 |
p. 2423-2437 |
artikel |
28 |
Hierarchical coded caching with heterogeneous cache sizes
|
Javadi, Elahe |
|
|
30 |
4 |
p. 2001-2016 |
artikel |
29 |
High priority space protection (HPP): countdown space-based MAC protocol with enhanced lockdown effect
|
Kedžo, Ivan |
|
|
30 |
4 |
p. 2235-2255 |
artikel |
30 |
Impactless association methods for wi-fi based time-sensitive networks
|
Avila-Campos, Pablo |
|
|
30 |
4 |
p. 2457-2475 |
artikel |
31 |
Improved DV-Hop based on parallel compact Willow Catkin Optimization algorithm for 3D nodes localization in WSN
|
Wang, Ruo-Bin |
|
|
30 |
4 |
p. 2017-2039 |
artikel |
32 |
Joint design of hybrid beamforming and reflection coefficients for reconfigurable intelligent surface aided mmWave communication systems
|
Wang, Chunyang |
|
|
30 |
4 |
p. 2041-2059 |
artikel |
33 |
Link failure handling and controller memory overhead elimination in SDN through source path routing model technique
|
Golda Jeyasheeli, P. |
|
|
30 |
4 |
p. 2395-2409 |
artikel |
34 |
Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN
|
Logeshwaran, J. |
|
|
30 |
4 |
p. 2477-2509 |
artikel |
35 |
Longitudinal tear detection method for conveyor belt based on multi-mode fusion
|
Wang, Yimin |
|
|
30 |
4 |
p. 2839-2854 |
artikel |
36 |
M-EOS: modified-equilibrium optimization-based stacked CNN for insider threat detection
|
Anju, A. |
|
|
30 |
4 |
p. 2819-2838 |
artikel |
37 |
MH-SIA: multi-objective handover using swarm intelligence algorithm for future wireless communication system
|
Wani, Atul B. |
|
|
30 |
4 |
p. 2617-2632 |
artikel |
38 |
Mobile anchor node assisted node collaborative localization based on light reflection in WSN
|
Wang, Minghua |
|
|
30 |
4 |
p. 2801-2818 |
artikel |
39 |
Modeling of a high gain two stage pHEMT LNA using ANN with Bayesian regularization algorithm
|
Thangaraj, Vignesh |
|
|
30 |
4 |
p. 2329-2342 |
artikel |
40 |
Modulation recognition network compression based on a randomly perturbation convolutional kernel activation mapping method
|
Zhao, Chengqiang |
|
|
30 |
4 |
p. 2143-2157 |
artikel |
41 |
Multi-agent based optimal UAV deployment for throughput maximization in 5 G communications
|
Baghnoi, Farjam Mohammadi |
|
|
30 |
4 |
p. 2285-2296 |
artikel |
42 |
Multi-cluster MIMO non-orthogonal multiple access for multi-cell systems
|
Shin, Changyong |
|
|
30 |
4 |
p. 2187-2201 |
artikel |
43 |
Multi-component signal separation based on ALSAE
|
Chen, Tao |
|
|
30 |
4 |
p. 2855-2862 |
artikel |
44 |
Multi-objective optimized multi-path and multi-hop routing based on hybrid optimization algorithm in wireless sensor networks
|
Singh, Madhav |
|
|
30 |
4 |
p. 2715-2731 |
artikel |
45 |
NLOS error mitigation in TOA systems
|
Chen, Yonghao |
|
|
30 |
4 |
p. 2863-2872 |
artikel |
46 |
OMIBC: optimal modified identity-based cryptography for signcryption and private key extraction using fuzzy model
|
Alagarsamy, Sumithra |
|
|
30 |
4 |
p. 2159-2172 |
artikel |
47 |
Online delay optimization for MEC and RIS-assisted wireless VR networks
|
Jia, Jie |
|
|
30 |
4 |
p. 2939-2959 |
artikel |
48 |
Optimizing resource allocation for D2D communications with incomplete CSI
|
Xu, Jun |
|
|
30 |
4 |
p. 2365-2379 |
artikel |
49 |
Optimum resource allocation for D2D-assisted wireless network in industrial internet of things: a hypergraph-based clique algorithm
|
Papachary, Biroju |
|
|
30 |
4 |
p. 1987-1999 |
artikel |
50 |
Outage analysis of downlink communications in heterogeneous networks under backhaul constraint
|
Allahyari, Reyhaneh |
|
|
30 |
4 |
p. 2257-2273 |
artikel |
51 |
Performance evaluation of multiple relay SWIPT enabled cooperative NOMA network in the presence of interference
|
Liaqat, Mahrukh |
|
|
30 |
4 |
p. 2381-2394 |
artikel |
52 |
Performance evaluation of OFDMA and aggregation downlink stateless service disciplines in Wi-Fi networks
|
Giang, Anh Tuan |
|
|
30 |
4 |
p. 2571-2587 |
artikel |
53 |
Quad element luna-shaped UWB-MIMO antenna with improved isolation and gain using novel decoupling networks
|
Tangirala, Gayatri |
|
|
30 |
4 |
p. 2557-2569 |
artikel |
54 |
Quest: instant questionnaire collection from handshake messages using WLAN
|
Zhu, Xiaojun |
|
|
30 |
4 |
p. 2081-2098 |
artikel |
55 |
Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks
|
Pandey, Shraiyash |
|
|
30 |
4 |
p. 2987-3026 |
artikel |
56 |
Reliable positioning-based human activity recognition based on indoor RSSI changes
|
Biswas, Debajyoti |
|
|
30 |
4 |
p. 2917-2937 |
artikel |
57 |
SEACDSC: secure and energy-aware clustering based on discrete sand cat swarm optimization for IoT-enabled WSN applications
|
Osamy, Walid |
|
|
30 |
4 |
p. 2781-2800 |
artikel |
58 |
Secure shortest distance queries over encrypted graph in cloud computing
|
Guo, Jingjing |
|
|
30 |
4 |
p. 2633-2646 |
artikel |
59 |
SIoV-FTFSA-CAOA: a fuzzy trust-based approach for enhancing security and energy efficiency in social internet of vehicles
|
Jegatheesan, Divya |
|
|
30 |
4 |
p. 2061-2080 |
artikel |
60 |
Symbol detection based on a novel discrete harmony search algorithm in MIMO-FBMC/OQAM system
|
Şimşir, Şakir |
|
|
30 |
4 |
p. 2895-2916 |
artikel |