nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Blockchain-enabled decentralized settlement model for IoT data exchange services
|
Lin, Wenmin |
|
|
30 |
5 |
p. 3453-3467 |
artikel |
2 |
Achieving fair and accountable data trading for educational multimedia data based on blockchain
|
Li, Xianxian |
|
|
30 |
5 |
p. 4389-4401 |
artikel |
3 |
ACI: a bar chart index for non-linear visualization of data embedding and aggregation capacity in IoMT multi-source compression
|
Khosravi, Mohammad R. |
|
|
30 |
5 |
p. 3697-3705 |
artikel |
4 |
A Compact Dual-polarized Probe-fed UWB Antenna System for Breast Cancer Detection Applications
|
Nawati, Vanishree R |
|
|
30 |
5 |
p. 3039-3050 |
artikel |
5 |
Adaptable design for long range underwater communications
|
Barbeau, Michel |
|
|
30 |
5 |
p. 4459-4475 |
artikel |
6 |
A financial risk identification model based on artificial intelligence
|
Wang, Bai |
|
|
30 |
5 |
p. 4157-4165 |
artikel |
7 |
A Fountain-Coding Based Cooperative Jamming Strategy for Secure Service Migration in Edge Computing
|
Cui, Mengmeng |
|
|
30 |
5 |
p. 3643-3656 |
artikel |
8 |
A highly effective algorithm for mitigating and identifying congestion through continuous monitoring of IoT networks, improving energy consumption
|
Abujassar, Radwan S. |
|
|
30 |
5 |
p. 3161-3180 |
artikel |
9 |
A hybrid intelligent system based on particle swarm optimization and distributed genetic algorithm for WMNs: a comparison study of boulevard and stadium distributions considering different router replacement methods and load balancing
|
Barolli, Admir |
|
|
30 |
5 |
p. 4403-4412 |
artikel |
10 |
AI-based MOA fault diagnosis mechanism in wireless networks
|
He, Tao |
|
|
30 |
5 |
p. 4353-4364 |
artikel |
11 |
A low power clock generator with self-calibration for UHF RFID tags in intelligent terrestrial sensor networks
|
Xie, Liangbo |
|
|
30 |
5 |
p. 3409-3417 |
artikel |
12 |
A multi-criteria aware integrated decision making routing protocol for IoT communication toward 6G networks
|
Tilwari, Valmik |
|
|
30 |
5 |
p. 3321-3335 |
artikel |
13 |
An analytical approach for modelling unmanned aerial vehicles and base station interaction for disaster recovery scenarios
|
Casmin, Eugene |
|
|
30 |
5 |
p. 3299-3319 |
artikel |
14 |
An autonomous positioning method for fire robots with multi-source sensors
|
Liu, Yong-tao |
|
|
30 |
5 |
p. 3683-3695 |
artikel |
15 |
An edge computing oriented unified cryptographic key management service for financial context
|
Chen, Jingjing |
|
|
30 |
5 |
p. 4003-4016 |
artikel |
16 |
An efficient adaptive compressive sensing technique for underwater image compression in IoUT
|
Monika, R. |
|
|
30 |
5 |
p. 4221-4235 |
artikel |
17 |
An efficient group signature based certificate less verification scheme for vehicular ad-hoc network
|
Jayashree, S. |
|
|
30 |
5 |
p. 3269-3298 |
artikel |
18 |
An energy efficient dynamic framework for resource control in massive IoT network for smart cities
|
Taneja, Ashu |
|
|
30 |
5 |
p. 4447-4458 |
artikel |
19 |
An evolutionary game for governance of Internet audiovisual space
|
Yang, Shuo |
|
|
30 |
5 |
p. 4315-4327 |
artikel |
20 |
A new derivation of the Nakagami-m distribution as a composite of the Rayleigh distribution
|
Gómez-Déniz, Emilio |
|
|
30 |
5 |
p. 3051-3060 |
artikel |
21 |
A new type double-threshold signal detection algorithm for satellite communication systems based on stochastic resonance technology
|
Jiang, Xiaolin |
|
|
30 |
5 |
p. 3367-3374 |
artikel |
22 |
An optimized mobile similarity and link transmission quality routing protocol for urban VANETs
|
Liu, Tong |
|
|
30 |
5 |
p. 3961-3971 |
artikel |
23 |
A novel airborne greedy geographic routing protocol for flying Ad hoc networks
|
Zheng, Bo |
|
|
30 |
5 |
p. 4413-4427 |
artikel |
24 |
A novel F-RCNN based hand gesture detection approach for FMCW systems
|
Wang, Yong |
|
|
30 |
5 |
p. 3395-3408 |
artikel |
25 |
A novel fuzzy clustering-based method for human activity recognition in cloud-based industrial IoT environment
|
Mittal, Himanshu |
|
|
30 |
5 |
p. 4365-4377 |
artikel |
26 |
A periodic requests dispatcher for energy optimization of hybrid powered data centers
|
Guo, Chaopeng |
|
|
30 |
5 |
p. 4025-4042 |
artikel |
27 |
A reliable authentication scheme of personal health records in cloud computing
|
Liu, Chia-Hui |
|
|
30 |
5 |
p. 3759-3769 |
artikel |
28 |
A resource allocation scheme based on predatory search algorithm for ultra-dense D2D communications
|
Li, Xujie |
|
|
30 |
5 |
p. 3357-3365 |
artikel |
29 |
A robust method based on locality sensitive hashing for K-nearest neighbors searching
|
Cheng, Dongdong |
|
|
30 |
5 |
p. 4195-4208 |
artikel |
30 |
A safety fault diagnosis method on industrial intelligent control equipment
|
Zhang, Hanrui |
|
|
30 |
5 |
p. 4287-4299 |
artikel |
31 |
A survey of VNF forwarding graph embedding in B5G/6G networks
|
Zhang, Biao |
|
|
30 |
5 |
p. 3735-3758 |
artikel |
32 |
A survey on routing and load-balancing mechanisms in software-defined vehicular networks
|
Malakar, Madhuri |
|
|
30 |
5 |
p. 3181-3197 |
artikel |
33 |
A task unloading strategy of IoT devices using deep reinforcement learning based on mobile cloud computing environment
|
Qi, Hui |
|
|
30 |
5 |
p. 3587-3597 |
artikel |
34 |
Big data theory based spectrum sensing algorithm for the satellite cognitive radio network
|
Yang, Mingchuan |
|
|
30 |
5 |
p. 3911-3919 |
artikel |
35 |
Characteristic mode analysis of a flexible circularly polarized UWB antenna for wireless body area networks
|
Ghanbari, L. |
|
|
30 |
5 |
p. 3103-3117 |
artikel |
36 |
Cloud Computing-aided Multi-type Data Fusion with Correlation for Education
|
Tai, Baoqing |
|
|
30 |
5 |
p. 4109-4120 |
artikel |
37 |
COCOMA: a resource-optimized cooperative UAVs communication protocol for surveillance and monitoring applications
|
Cheriguene, Youssra |
|
|
30 |
5 |
p. 4429-4445 |
artikel |
38 |
Collaborative task offloading and resource scheduling framework for heterogeneous edge computing
|
Ren, Jianji |
|
|
30 |
5 |
p. 3897-3909 |
artikel |
39 |
Collusive attack that exploits biometric similarity difference and basic countermeasures
|
Lyu, Pin |
|
|
30 |
5 |
p. 4555-4567 |
artikel |
40 |
Conjunctive searchable encryption with efficient authorization for group sharing
|
Mei, Lin |
|
|
30 |
5 |
p. 4477-4494 |
artikel |
41 |
Cooperative positioning of UAV internet of things based on optimization algorithm
|
Hu, Hao |
|
|
30 |
5 |
p. 4495-4505 |
artikel |
42 |
Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids
|
Kang, Wenjie |
|
|
30 |
5 |
p. 3821-3836 |
artikel |
43 |
Correction: Transient analysis of enhanced hybrid spectrum access for QoS provisioning in multi-class cognitive radio networks
|
Kulshrestha, Rakhee |
|
|
30 |
5 |
p. 3101 |
artikel |
44 |
CR-FPN: channel relation feature pyramid network for object detection
|
Li, Ziyuan |
|
|
30 |
5 |
p. 3523-3532 |
artikel |
45 |
Dancing with the sound in edge computing environments
|
Hao, Wangli |
|
|
30 |
5 |
p. 3935-3945 |
artikel |
46 |
Decode-and-forward cooperative transmission in wireless sensor networks based on physical-layer network coding
|
Li, Bo |
|
|
30 |
5 |
p. 3387-3393 |
artikel |
47 |
Deep reinforcement learning based multi-layered traffic scheduling scheme in data center networks
|
Wu, Guihua |
|
|
30 |
5 |
p. 4133-4144 |
artikel |
48 |
Deep-sea visual dataset of the South China sea
|
Li, Jianru |
|
|
30 |
5 |
p. 3561-3570 |
artikel |
49 |
Delegatable searchable encryption with specified keywords for EHR systems
|
Xu, Lingling |
|
|
30 |
5 |
p. 3547-3559 |
artikel |
50 |
Design of a wireless monitoring system with emission analysis integration for solid-fuel based heating devices in households of SmartCity
|
Holubčík, Michal |
|
|
30 |
5 |
p. 4055-4064 |
artikel |
51 |
Discrimination of primary user emulation attack on cognitive radio networks using machine learning based spectrum sensing scheme
|
Ambhika, C. |
|
|
30 |
5 |
p. 3135-3147 |
artikel |
52 |
Distributed classification for imbalanced big data in distributed environments
|
Wang, Huihui |
|
|
30 |
5 |
p. 3657-3668 |
artikel |
53 |
Dynamic shared parking for private vehicles in central business districts
|
Hong, Weijia |
|
|
30 |
5 |
p. 4209-4220 |
artikel |
54 |
Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search
|
Xu, Lei |
|
|
30 |
5 |
p. 4629-4642 |
artikel |
55 |
End-edge-cloud collaborative computation offloading for multiple mobile users in heterogeneous edge-server environment
|
Peng, Kai |
|
|
30 |
5 |
p. 3495-3506 |
artikel |
56 |
Energy-efficiently collaborative data downloading in optical satellite networks
|
Liu, Xianfeng |
|
|
30 |
5 |
p. 3429-3441 |
artikel |
57 |
Energy-efficient UAV-enabled computation offloading for industrial internet of things: a deep reinforcement learning approach
|
Shi, Shuo |
|
|
30 |
5 |
p. 3921-3934 |
artikel |
58 |
Energy harvesting in ARQ-based cooperative broadcast and NOMA networks
|
Özgün, Emirhan |
|
|
30 |
5 |
p. 4181-4194 |
artikel |
59 |
English synchronous real-time translation method based on reinforcement learning
|
Ke, Xin |
|
|
30 |
5 |
p. 4167-4179 |
artikel |
60 |
English teaching evaluation based on reinforcement learning in content centric data center network
|
Guo, Hongyu |
|
|
30 |
5 |
p. 4145-4155 |
artikel |
61 |
Faking smart industry: exploring cyber-threat landscape deploying cloud-based honeypot
|
Rashid, S M Zia Ur |
|
|
30 |
5 |
p. 4527-4541 |
artikel |
62 |
Fast and efficient algorithm for delay-sensitive QoS provisioning in SDN networks
|
BinSahaq, Ahmed |
|
|
30 |
5 |
p. 4607-4628 |
artikel |
63 |
Feature extraction of trajectories for mobility modeling in 5G NB-IoT networks
|
Zhang, Runzhou |
|
|
30 |
5 |
p. 3781-3793 |
artikel |
64 |
GPS attitude measurement with baseline constrained optimization algorithm for unpiloted car
|
Yang, Xiaolong |
|
|
30 |
5 |
p. 3375-3386 |
artikel |
65 |
High fidelity single image blind deblur via GAN
|
Li, Xiaoli |
|
|
30 |
5 |
p. 3633-3642 |
artikel |
66 |
Imbalance difference model for prediction of unintentional radiated emission from 10-wire power cable using for power line communication
|
Matsushima, Tohlu |
|
|
30 |
5 |
p. 3599-3606 |
artikel |
67 |
Improving completeness and consistency of co-reference annotation standard
|
Xu, Yang |
|
|
30 |
5 |
p. 4581-4590 |
artikel |
68 |
Individual flexibility and workplace conflict: cloud-based data collection and fusion of neural networks
|
Farashaei, Danial |
|
|
30 |
5 |
p. 4093-4108 |
artikel |
69 |
Intelligent reflecting surface-aided computation offloading in UAV-enabled edge networks
|
Luo, Wenyu |
|
|
30 |
5 |
p. 3199-3210 |
artikel |
70 |
Intelligent routing method based on Dueling DQN reinforcement learning and network traffic state prediction in SDN
|
Huang, Linqiang |
|
|
30 |
5 |
p. 4507-4525 |
artikel |
71 |
Joint trajectory and power optimization for NOMA-based high altitude platform relaying system
|
Na, Zhenyu |
|
|
30 |
5 |
p. 3885-3896 |
artikel |
72 |
KG2Rec: LSH-CF recommendation method based on knowledge graph for cloud services
|
Huang, Weijia |
|
|
30 |
5 |
p. 3483-3494 |
artikel |
73 |
Latency-aware service migration with decision theory for Internet of Vehicles in mobile edge computing
|
Liu, Zhongjian |
|
|
30 |
5 |
p. 4261-4273 |
artikel |
74 |
Learning-aided fine grained offloading for real-time applications in edge-cloud computing
|
Huang, Qihe |
|
|
30 |
5 |
p. 3805-3820 |
artikel |
75 |
Link-based penalized trust management scheme for preemptive measures to secure the edge-based internet of things networks
|
Ahmed, Aneeqa |
|
|
30 |
5 |
p. 4237-4259 |
artikel |
76 |
ML-based delay–angle-joint path loss prediction for UAV mmWave channels
|
Mao, Kai |
|
|
30 |
5 |
p. 3947-3959 |
artikel |
77 |
Mobile healthcare data mining for sport item recommendation in edge-cloud collaboration
|
Chen, Chengxiang |
|
|
30 |
5 |
p. 4569-4579 |
artikel |
78 |
Modulation recognition with alpha-stable noise over fading channels
|
Zhang, Lingfei |
|
|
30 |
5 |
p. 3795-3804 |
artikel |
79 |
Multi-aspect detection and classification with multi-feed dynamic frame skipping in vehicle of internet things
|
Ahmed, Usman |
|
|
30 |
5 |
p. 4543-4554 |
artikel |
80 |
Multi-objective Grey Wolf Optimization based self configuring wireless sensor network
|
Navin Dhinnesh, A. D. C. |
|
|
30 |
5 |
p. 3149-3160 |
artikel |
81 |
Multi-objective resource allocation in mobile edge computing using PAES for Internet of Things
|
Liu, Qi |
|
|
30 |
5 |
p. 3533-3545 |
artikel |
82 |
Multiple channel access techniques in industrial IoT: evaluation case of time-slotted channel hopping
|
Eloudrhiri Hassani, Abdelhadi |
|
|
30 |
5 |
p. 3119-3133 |
artikel |
83 |
Multi-step attack threat recognition algorithm based on attribute association in internet of things security
|
Ding, Zhenguo |
|
|
30 |
5 |
p. 4275-4286 |
artikel |
84 |
Online computation offloading for deadline-aware tasks in edge computing
|
He, Xin |
|
|
30 |
5 |
p. 4073-4092 |
artikel |
85 |
Overcomplete pre-learned dictionary for incomplete data SAR imaging towards pervasive aerial and satellite vision
|
Farhangkhah, Naghmeh |
|
|
30 |
5 |
p. 3989-4001 |
artikel |
86 |
Performance analysis of M-ary RQAM and M-ary DPSK receivers over the channels with TWDP fading
|
Maric, Almir |
|
|
30 |
5 |
p. 3337-3347 |
artikel |
87 |
Performance analysis of UAV-assisted DF relaying network with hardware impairments and energy harvesting
|
Chen, Jielin |
|
|
30 |
5 |
p. 3061-3073 |
artikel |
88 |
PIER: cyber-resilient risk assessment model for connected and autonomous vehicles
|
Park, Seunghyun |
|
|
30 |
5 |
p. 4591-4605 |
artikel |
89 |
Power allocation for D2D aided cooperative NOMA system with imperfect CSI
|
Wang, Jingpu |
|
|
30 |
5 |
p. 3669-3682 |
artikel |
90 |
Power optimization in UAV-based wireless power transmission and collaborative MEC IoT networks
|
Li, Chenkai |
|
|
30 |
5 |
p. 3771-3779 |
artikel |
91 |
Probabilistic quantization of unbiased broadcast gossip algorithms for consensus in distributed networks
|
Wu, Shaochuan |
|
|
30 |
5 |
p. 3349-3355 |
artikel |
92 |
Queue stability and dynamic throughput maximization in multi-agent heterogeneous wireless networks
|
Yang, Ting |
|
|
30 |
5 |
p. 3229-3255 |
artikel |
93 |
Random caching design for multi-tier IoT networks with cross-tier base station cooperation
|
Feng, Tianming |
|
|
30 |
5 |
p. 3973-3988 |
artikel |
94 |
Reconfigurable intelligent surfaces with solar energy harvesting
|
Alhamad, Raed |
|
|
30 |
5 |
p. 3027-3038 |
artikel |
95 |
Refactoring business process models with process fragments substitution
|
Dai, Fei |
|
|
30 |
5 |
p. 3507-3521 |
artikel |
96 |
Renewable prediction-driven service offloading for IoT-enabled energy systems with edge computing
|
Fang, Zijie |
|
|
30 |
5 |
p. 3721-3733 |
artikel |
97 |
Representation separation adversarial networks for cross-modal retrieval
|
Deng, Jiaxin |
|
|
30 |
5 |
p. 3469-3481 |
artikel |
98 |
Research on anti-interference based on particle swarm optimization algorithm in high altitude platform stations
|
Guan, Mingxiang |
|
|
30 |
5 |
p. 4065-4072 |
artikel |
99 |
Research on intelligent scheduling algorithm of high altitude platform system for wide area internet of things
|
Wu, Zhou |
|
|
30 |
5 |
p. 4017-4023 |
artikel |
100 |
Research on multifractal dimension and improved gray relation theory for intelligent satellite signal recognition
|
Zhang, Zhen |
|
|
30 |
5 |
p. 3419-3427 |
artikel |
101 |
Research on new edge computing network architecture and task offloading strategy for Internet of Things
|
Jiang, Congshi |
|
|
30 |
5 |
p. 3619-3631 |
artikel |
102 |
SAIF-Cnet: self-attention improved faster convolutional neural network for decentralized blockchain-based key management protocol
|
Rejin Paul, N. R. |
|
|
30 |
5 |
p. 3211-3228 |
artikel |
103 |
Scheduling periodic sensors for instantaneous aggregated traffic minimization
|
Bose, Sunanda |
|
|
30 |
5 |
p. 3257-3268 |
artikel |
104 |
Smart carbon monitoring platform under IoT-Cloud architecture for small cities in B5G
|
Zhang, He |
|
|
30 |
5 |
p. 3837-3853 |
artikel |
105 |
Smart preschool education live streaming: VR-driven optimization strategy
|
Zhao, Hong |
|
|
30 |
5 |
p. 4379-4387 |
artikel |
106 |
Spectrum optimization in cognitive satellite networks with graph coloring method
|
Wang, Li |
|
|
30 |
5 |
p. 3443-3452 |
artikel |
107 |
Strategy for improving the football teaching quality by AI and metaverse-empowered in mobile internet environment
|
Li, Hongyi |
|
|
30 |
5 |
p. 4343-4352 |
artikel |
108 |
Sustainable mobility in urban conditions- multimodal approach for greener cities: insights from Slovakia
|
Holota, Tomáš |
|
|
30 |
5 |
p. 4043-4053 |
artikel |
109 |
Task allocation for unmanned aerial vehicles in mobile crowdsensing
|
Xu, Sunyue |
|
|
30 |
5 |
p. 3707-3719 |
artikel |
110 |
Temporal-aware influence maximization solution in artificial intelligent edge application
|
Chen, Shiyu |
|
|
30 |
5 |
p. 4301-4313 |
artikel |
111 |
The deployment of smart sharing stadium based on 5G and mobile edge computing
|
Fang, Lei |
|
|
30 |
5 |
p. 4121-4131 |
artikel |
112 |
Total cost ownership optimization of private clouds: a rack minimization perspective
|
Chi, Yuanfang |
|
|
30 |
5 |
p. 3855-3869 |
artikel |
113 |
Towards secure and trustworthy crowdsourcing: challenges, existing landscape, and future directions
|
Lian, Rui |
|
|
30 |
5 |
p. 4329-4341 |
artikel |
114 |
Traffic self-similarity analysis and application of industrial internet
|
Li, Qianmu |
|
|
30 |
5 |
p. 3571-3585 |
artikel |
115 |
Transient analysis of enhanced hybrid spectrum access for QoS provisioning in multi-class cognitive radio networks
|
Kulshrestha, Rakhee |
|
|
30 |
5 |
p. 3075-3099 |
artikel |
116 |
UAV deployment with grid modeling and adaptive multiple pruning search in complex forest scenarios
|
Wang, Tianyu |
|
|
30 |
5 |
p. 3871-3883 |
artikel |
117 |
Variable length deep cross-modal hashing based on Cauchy probability function
|
Li, Chen |
|
|
30 |
5 |
p. 3607-3617 |
artikel |