Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             60 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A distributed relay selection using a fuzzy-BCM based decision making strategy for multi-hop data dissemination in VANETs Debalki, Yonas Abate

30 4 p. 2873-2894
artikel
2 A healthcare application based on IoT devices Ghoul, Yamna

30 4 p. 2541-2556
artikel
3 An adaptive model of optimal traffic flow prediction using adaptive wildfire optimization and spatial pattern super learning Jain, Rishabh

30 4 p. 2275-2283
artikel
4 An adaptive trust system for misbehavior detection in wireless sensor networks Saidi, Ahmed

30 4 p. 2589-2615
artikel
5 An anonymous mutual authentication and key agreement scheme in WMSN using physiological data Rai, Shanvendra

30 4 p. 2733-2752
artikel
6 An efficient surrogate-assisted Taguchi salp swarm algorithm and its application for intrusion detection Chu, Shu-Chuan

30 4 p. 2675-2696
artikel
7 An energy efficient routing algorithm in wireless underground sensor networks Thi, Mai Ha

30 4 p. 2297-2311
artikel
8 An enhanced deep learning-based disease detection model in wireless body area network with energy efficient routing protocol Liya, B. S.

30 4 p. 2961-2986
artikel
9 A new intrusion detection system based on SVM–GWO algorithms for Internet of Things Ghasemi, Hamed

30 4 p. 2173-2185
artikel
10 An improved path loss model for 5G wireless networks in an enclosed hallway Oladimeji, Tolulope T.

30 4 p. 2353-2364
artikel
11 Asymmetric CPW-fed patch antenna with slits at terahertz applications for 6G wireless communications Naik, Ketavath Kumar

30 4 p. 2343-2351
artikel
12 A weighted cooperative spectrum sensing strategy for NGSO–GSO downlink communication Zhang, Xiaoyan

30 4 p. 2411-2422
artikel
13 Block chain espoused adaptive multi-scale dual attention network with quaternion fractional order meixner moments encryption for cyber security in wireless communication network Soundararajan, S.

30 4 p. 2439-2455
artikel
14 Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures Tamizshelvan, C.

30 4 p. 2099-2114
artikel
15 Correction to: An adaptive model of optimal traffic flow prediction using adaptive wildfire optimization and spatial pattern super learning Jain, Rishabh

30 4 p. 2713
artikel
16 Density-based anti-clustering for scheduling D2D communications Elsheikh, Ahmed

30 4 p. 2115-2125
artikel
17 Design of miniaturized ultra-wide stopband lowpass-bandpass diplexer using hexagon-shaped resonators Zarghami, Ali-Reza

30 4 p. 2767-2779
artikel
18 Distributed energy-efficient wireless sensing and information fusion via event-driven and state-rank activation Fu, Juteng

30 4 p. 2697-2711
artikel
19 Dual-band RF energy harvesting for low-power IoT devices Zhao, Jumin

30 4 p. 2511-2527
artikel
20 Employing blockchain and IPFS in WSNs for malicious node detection and efficient data storage Saeed, Arooba

30 4 p. 2313-2328
artikel
21 Energy efficient optimal parent selection with Chameleon Swarm algorithm and non-overlapping backoff algorithm based dynamic slot allocation in wireless body area network Sankara Srinivasa Rao, Illapu

30 4 p. 2219-2234
artikel
22 Enhanced passive optical network system-based VCSEL and PSK electrical modulator for 5th generation Yousif, Raghad Zuhair

30 4 p. 2203-2217
artikel
23 Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: a comprehensive review Priyadarshi, Rahul

30 4 p. 2647-2673
artikel
24 Fast monte-carlo clustering for signal separation of RFID collision tags at physical layer Zeng, Yu

30 4 p. 2529-2539
artikel
25 Full duplex reconfigurable intelligent surfaces system relying on NOMA and wireless power transfer Van Nguyen, Minh-Sang

30 4 p. 2127-2142
artikel
26 Generative channel estimation for intelligent reflecting surface-aided wireless communication Singh, Shatakshi

30 4 p. 2753-2765
artikel
27 Heterogeneous Lifi–Wifi with multipath transmission protocol for effective access point selection and load balancing Arunkumar, R.

30 4 p. 2423-2437
artikel
28 Hierarchical coded caching with heterogeneous cache sizes Javadi, Elahe

30 4 p. 2001-2016
artikel
29 High priority space protection (HPP): countdown space-based MAC protocol with enhanced lockdown effect Kedžo, Ivan

30 4 p. 2235-2255
artikel
30 Impactless association methods for wi-fi based time-sensitive networks Avila-Campos, Pablo

30 4 p. 2457-2475
artikel
31 Improved DV-Hop based on parallel compact Willow Catkin Optimization algorithm for 3D nodes localization in WSN Wang, Ruo-Bin

30 4 p. 2017-2039
artikel
32 Joint design of hybrid beamforming and reflection coefficients for reconfigurable intelligent surface aided mmWave communication systems Wang, Chunyang

30 4 p. 2041-2059
artikel
33 Link failure handling and controller memory overhead elimination in SDN through source path routing model technique Golda Jeyasheeli, P.

30 4 p. 2395-2409
artikel
34 Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN Logeshwaran, J.

30 4 p. 2477-2509
artikel
35 Longitudinal tear detection method for conveyor belt based on multi-mode fusion Wang, Yimin

30 4 p. 2839-2854
artikel
36 M-EOS: modified-equilibrium optimization-based stacked CNN for insider threat detection Anju, A.

30 4 p. 2819-2838
artikel
37 MH-SIA: multi-objective handover using swarm intelligence algorithm for future wireless communication system Wani, Atul B.

30 4 p. 2617-2632
artikel
38 Mobile anchor node assisted node collaborative localization based on light reflection in WSN Wang, Minghua

30 4 p. 2801-2818
artikel
39 Modeling of a high gain two stage pHEMT LNA using ANN with Bayesian regularization algorithm Thangaraj, Vignesh

30 4 p. 2329-2342
artikel
40 Modulation recognition network compression based on a randomly perturbation convolutional kernel activation mapping method Zhao, Chengqiang

30 4 p. 2143-2157
artikel
41 Multi-agent based optimal UAV deployment for throughput maximization in 5 G communications Baghnoi, Farjam Mohammadi

30 4 p. 2285-2296
artikel
42 Multi-cluster MIMO non-orthogonal multiple access for multi-cell systems Shin, Changyong

30 4 p. 2187-2201
artikel
43 Multi-component signal separation based on ALSAE Chen, Tao

30 4 p. 2855-2862
artikel
44 Multi-objective optimized multi-path and multi-hop routing based on hybrid optimization algorithm in wireless sensor networks Singh, Madhav

30 4 p. 2715-2731
artikel
45 NLOS error mitigation in TOA systems Chen, Yonghao

30 4 p. 2863-2872
artikel
46 OMIBC: optimal modified identity-based cryptography for signcryption and private key extraction using fuzzy model Alagarsamy, Sumithra

30 4 p. 2159-2172
artikel
47 Online delay optimization for MEC and RIS-assisted wireless VR networks Jia, Jie

30 4 p. 2939-2959
artikel
48 Optimizing resource allocation for D2D communications with incomplete CSI Xu, Jun

30 4 p. 2365-2379
artikel
49 Optimum resource allocation for D2D-assisted wireless network in industrial internet of things: a hypergraph-based clique algorithm Papachary, Biroju

30 4 p. 1987-1999
artikel
50 Outage analysis of downlink communications in heterogeneous networks under backhaul constraint Allahyari, Reyhaneh

30 4 p. 2257-2273
artikel
51 Performance evaluation of multiple relay SWIPT enabled cooperative NOMA network in the presence of interference Liaqat, Mahrukh

30 4 p. 2381-2394
artikel
52 Performance evaluation of OFDMA and aggregation downlink stateless service disciplines in Wi-Fi networks Giang, Anh Tuan

30 4 p. 2571-2587
artikel
53 Quad element luna-shaped UWB-MIMO antenna with improved isolation and gain using novel decoupling networks Tangirala, Gayatri

30 4 p. 2557-2569
artikel
54 Quest: instant questionnaire collection from handshake messages using WLAN Zhu, Xiaojun

30 4 p. 2081-2098
artikel
55 Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks Pandey, Shraiyash

30 4 p. 2987-3026
artikel
56 Reliable positioning-based human activity recognition based on indoor RSSI changes Biswas, Debajyoti

30 4 p. 2917-2937
artikel
57 SEACDSC: secure and energy-aware clustering based on discrete sand cat swarm optimization for IoT-enabled WSN applications Osamy, Walid

30 4 p. 2781-2800
artikel
58 Secure shortest distance queries over encrypted graph in cloud computing Guo, Jingjing

30 4 p. 2633-2646
artikel
59 SIoV-FTFSA-CAOA: a fuzzy trust-based approach for enhancing security and energy efficiency in social internet of vehicles Jegatheesan, Divya

30 4 p. 2061-2080
artikel
60 Symbol detection based on a novel discrete harmony search algorithm in MIMO-FBMC/OQAM system Şimşir, Şakir

30 4 p. 2895-2916
artikel
                             60 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland