Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             117 results found
no title author magazine year volume issue page(s) type
1 A Blockchain-enabled decentralized settlement model for IoT data exchange services Lin, Wenmin

30 5 p. 3453-3467
article
2 Achieving fair and accountable data trading for educational multimedia data based on blockchain Li, Xianxian

30 5 p. 4389-4401
article
3 ACI: a bar chart index for non-linear visualization of data embedding and aggregation capacity in IoMT multi-source compression Khosravi, Mohammad R.

30 5 p. 3697-3705
article
4 A Compact Dual-polarized Probe-fed UWB Antenna System for Breast Cancer Detection Applications Nawati, Vanishree R

30 5 p. 3039-3050
article
5 Adaptable design for long range underwater communications Barbeau, Michel

30 5 p. 4459-4475
article
6 A financial risk identification model based on artificial intelligence Wang, Bai

30 5 p. 4157-4165
article
7 A Fountain-Coding Based Cooperative Jamming Strategy for Secure Service Migration in Edge Computing Cui, Mengmeng

30 5 p. 3643-3656
article
8 A highly effective algorithm for mitigating and identifying congestion through continuous monitoring of IoT networks, improving energy consumption Abujassar, Radwan S.

30 5 p. 3161-3180
article
9 A hybrid intelligent system based on particle swarm optimization and distributed genetic algorithm for WMNs: a comparison study of boulevard and stadium distributions considering different router replacement methods and load balancing Barolli, Admir

30 5 p. 4403-4412
article
10 AI-based MOA fault diagnosis mechanism in wireless networks He, Tao

30 5 p. 4353-4364
article
11 A low power clock generator with self-calibration for UHF RFID tags in intelligent terrestrial sensor networks Xie, Liangbo

30 5 p. 3409-3417
article
12 A multi-criteria aware integrated decision making routing protocol for IoT communication toward 6G networks Tilwari, Valmik

30 5 p. 3321-3335
article
13 An analytical approach for modelling unmanned aerial vehicles and base station interaction for disaster recovery scenarios Casmin, Eugene

30 5 p. 3299-3319
article
14 An autonomous positioning method for fire robots with multi-source sensors Liu, Yong-tao

30 5 p. 3683-3695
article
15 An edge computing oriented unified cryptographic key management service for financial context Chen, Jingjing

30 5 p. 4003-4016
article
16 An efficient adaptive compressive sensing technique for underwater image compression in IoUT Monika, R.

30 5 p. 4221-4235
article
17 An efficient group signature based certificate less verification scheme for vehicular ad-hoc network Jayashree, S.

30 5 p. 3269-3298
article
18 An energy efficient dynamic framework for resource control in massive IoT network for smart cities Taneja, Ashu

30 5 p. 4447-4458
article
19 An evolutionary game for governance of Internet audiovisual space Yang, Shuo

30 5 p. 4315-4327
article
20 A new derivation of the Nakagami-m distribution as a composite of the Rayleigh distribution Gómez-Déniz, Emilio

30 5 p. 3051-3060
article
21 A new type double-threshold signal detection algorithm for satellite communication systems based on stochastic resonance technology Jiang, Xiaolin

30 5 p. 3367-3374
article
22 An optimized mobile similarity and link transmission quality routing protocol for urban VANETs Liu, Tong

30 5 p. 3961-3971
article
23 A novel airborne greedy geographic routing protocol for flying Ad hoc networks Zheng, Bo

30 5 p. 4413-4427
article
24 A novel F-RCNN based hand gesture detection approach for FMCW systems Wang, Yong

30 5 p. 3395-3408
article
25 A novel fuzzy clustering-based method for human activity recognition in cloud-based industrial IoT environment Mittal, Himanshu

30 5 p. 4365-4377
article
26 A periodic requests dispatcher for energy optimization of hybrid powered data centers Guo, Chaopeng

30 5 p. 4025-4042
article
27 A reliable authentication scheme of personal health records in cloud computing Liu, Chia-Hui

30 5 p. 3759-3769
article
28 A resource allocation scheme based on predatory search algorithm for ultra-dense D2D communications Li, Xujie

30 5 p. 3357-3365
article
29 A robust method based on locality sensitive hashing for K-nearest neighbors searching Cheng, Dongdong

30 5 p. 4195-4208
article
30 A safety fault diagnosis method on industrial intelligent control equipment Zhang, Hanrui

30 5 p. 4287-4299
article
31 A survey of VNF forwarding graph embedding in B5G/6G networks Zhang, Biao

30 5 p. 3735-3758
article
32 A survey on routing and load-balancing mechanisms in software-defined vehicular networks Malakar, Madhuri

30 5 p. 3181-3197
article
33 A task unloading strategy of IoT devices using deep reinforcement learning based on mobile cloud computing environment Qi, Hui

30 5 p. 3587-3597
article
34 Big data theory based spectrum sensing algorithm for the satellite cognitive radio network Yang, Mingchuan

30 5 p. 3911-3919
article
35 Characteristic mode analysis of a flexible circularly polarized UWB antenna for wireless body area networks Ghanbari, L.

30 5 p. 3103-3117
article
36 Cloud Computing-aided Multi-type Data Fusion with Correlation for Education Tai, Baoqing

30 5 p. 4109-4120
article
37 COCOMA: a resource-optimized cooperative UAVs communication protocol for surveillance and monitoring applications Cheriguene, Youssra

30 5 p. 4429-4445
article
38 Collaborative task offloading and resource scheduling framework for heterogeneous edge computing Ren, Jianji

30 5 p. 3897-3909
article
39 Collusive attack that exploits biometric similarity difference and basic countermeasures Lyu, Pin

30 5 p. 4555-4567
article
40 Conjunctive searchable encryption with efficient authorization for group sharing Mei, Lin

30 5 p. 4477-4494
article
41 Cooperative positioning of UAV internet of things based on optimization algorithm Hu, Hao

30 5 p. 4495-4505
article
42 Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids Kang, Wenjie

30 5 p. 3821-3836
article
43 Correction: Transient analysis of enhanced hybrid spectrum access for QoS provisioning in multi-class cognitive radio networks Kulshrestha, Rakhee

30 5 p. 3101
article
44 CR-FPN: channel relation feature pyramid network for object detection Li, Ziyuan

30 5 p. 3523-3532
article
45 Dancing with the sound in edge computing environments Hao, Wangli

30 5 p. 3935-3945
article
46 Decode-and-forward cooperative transmission in wireless sensor networks based on physical-layer network coding Li, Bo

30 5 p. 3387-3393
article
47 Deep reinforcement learning based multi-layered traffic scheduling scheme in data center networks Wu, Guihua

30 5 p. 4133-4144
article
48 Deep-sea visual dataset of the South China sea Li, Jianru

30 5 p. 3561-3570
article
49 Delegatable searchable encryption with specified keywords for EHR systems Xu, Lingling

30 5 p. 3547-3559
article
50 Design of a wireless monitoring system with emission analysis integration for solid-fuel based heating devices in households of SmartCity Holubčík, Michal

30 5 p. 4055-4064
article
51 Discrimination of primary user emulation attack on cognitive radio networks using machine learning based spectrum sensing scheme Ambhika, C.

30 5 p. 3135-3147
article
52 Distributed classification for imbalanced big data in distributed environments Wang, Huihui

30 5 p. 3657-3668
article
53 Dynamic shared parking for private vehicles in central business districts Hong, Weijia

30 5 p. 4209-4220
article
54 Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search Xu, Lei

30 5 p. 4629-4642
article
55 End-edge-cloud collaborative computation offloading for multiple mobile users in heterogeneous edge-server environment Peng, Kai

30 5 p. 3495-3506
article
56 Energy-efficiently collaborative data downloading in optical satellite networks Liu, Xianfeng

30 5 p. 3429-3441
article
57 Energy-efficient UAV-enabled computation offloading for industrial internet of things: a deep reinforcement learning approach Shi, Shuo

30 5 p. 3921-3934
article
58 Energy harvesting in ARQ-based cooperative broadcast and NOMA networks Özgün, Emirhan

30 5 p. 4181-4194
article
59 English synchronous real-time translation method based on reinforcement learning Ke, Xin

30 5 p. 4167-4179
article
60 English teaching evaluation based on reinforcement learning in content centric data center network Guo, Hongyu

30 5 p. 4145-4155
article
61 Faking smart industry: exploring cyber-threat landscape deploying cloud-based honeypot Rashid, S M Zia Ur

30 5 p. 4527-4541
article
62 Fast and efficient algorithm for delay-sensitive QoS provisioning in SDN networks BinSahaq, Ahmed

30 5 p. 4607-4628
article
63 Feature extraction of trajectories for mobility modeling in 5G NB-IoT networks Zhang, Runzhou

30 5 p. 3781-3793
article
64 GPS attitude measurement with baseline constrained optimization algorithm for unpiloted car Yang, Xiaolong

30 5 p. 3375-3386
article
65 High fidelity single image blind deblur via GAN Li, Xiaoli

30 5 p. 3633-3642
article
66 Imbalance difference model for prediction of unintentional radiated emission from 10-wire power cable using for power line communication Matsushima, Tohlu

30 5 p. 3599-3606
article
67 Improving completeness and consistency of co-reference annotation standard Xu, Yang

30 5 p. 4581-4590
article
68 Individual flexibility and workplace conflict: cloud-based data collection and fusion of neural networks Farashaei, Danial

30 5 p. 4093-4108
article
69 Intelligent reflecting surface-aided computation offloading in UAV-enabled edge networks Luo, Wenyu

30 5 p. 3199-3210
article
70 Intelligent routing method based on Dueling DQN reinforcement learning and network traffic state prediction in SDN Huang, Linqiang

30 5 p. 4507-4525
article
71 Joint trajectory and power optimization for NOMA-based high altitude platform relaying system Na, Zhenyu

30 5 p. 3885-3896
article
72 KG2Rec: LSH-CF recommendation method based on knowledge graph for cloud services Huang, Weijia

30 5 p. 3483-3494
article
73 Latency-aware service migration with decision theory for Internet of Vehicles in mobile edge computing Liu, Zhongjian

30 5 p. 4261-4273
article
74 Learning-aided fine grained offloading for real-time applications in edge-cloud computing Huang, Qihe

30 5 p. 3805-3820
article
75 Link-based penalized trust management scheme for preemptive measures to secure the edge-based internet of things networks Ahmed, Aneeqa

30 5 p. 4237-4259
article
76 ML-based delay–angle-joint path loss prediction for UAV mmWave channels Mao, Kai

30 5 p. 3947-3959
article
77 Mobile healthcare data mining for sport item recommendation in edge-cloud collaboration Chen, Chengxiang

30 5 p. 4569-4579
article
78 Modulation recognition with alpha-stable noise over fading channels Zhang, Lingfei

30 5 p. 3795-3804
article
79 Multi-aspect detection and classification with multi-feed dynamic frame skipping in vehicle of internet things Ahmed, Usman

30 5 p. 4543-4554
article
80 Multi-objective Grey Wolf Optimization based self configuring wireless sensor network Navin Dhinnesh, A. D. C.

30 5 p. 3149-3160
article
81 Multi-objective resource allocation in mobile edge computing using PAES for Internet of Things Liu, Qi

30 5 p. 3533-3545
article
82 Multiple channel access techniques in industrial IoT: evaluation case of time-slotted channel hopping Eloudrhiri Hassani, Abdelhadi

30 5 p. 3119-3133
article
83 Multi-step attack threat recognition algorithm based on attribute association in internet of things security Ding, Zhenguo

30 5 p. 4275-4286
article
84 Online computation offloading for deadline-aware tasks in edge computing He, Xin

30 5 p. 4073-4092
article
85 Overcomplete pre-learned dictionary for incomplete data SAR imaging towards pervasive aerial and satellite vision Farhangkhah, Naghmeh

30 5 p. 3989-4001
article
86 Performance analysis of M-ary RQAM and M-ary DPSK receivers over the channels with TWDP fading Maric, Almir

30 5 p. 3337-3347
article
87 Performance analysis of UAV-assisted DF relaying network with hardware impairments and energy harvesting Chen, Jielin

30 5 p. 3061-3073
article
88 PIER: cyber-resilient risk assessment model for connected and autonomous vehicles Park, Seunghyun

30 5 p. 4591-4605
article
89 Power allocation for D2D aided cooperative NOMA system with imperfect CSI Wang, Jingpu

30 5 p. 3669-3682
article
90 Power optimization in UAV-based wireless power transmission and collaborative MEC IoT networks Li, Chenkai

30 5 p. 3771-3779
article
91 Probabilistic quantization of unbiased broadcast gossip algorithms for consensus in distributed networks Wu, Shaochuan

30 5 p. 3349-3355
article
92 Queue stability and dynamic throughput maximization in multi-agent heterogeneous wireless networks Yang, Ting

30 5 p. 3229-3255
article
93 Random caching design for multi-tier IoT networks with cross-tier base station cooperation Feng, Tianming

30 5 p. 3973-3988
article
94 Reconfigurable intelligent surfaces with solar energy harvesting Alhamad, Raed

30 5 p. 3027-3038
article
95 Refactoring business process models with process fragments substitution Dai, Fei

30 5 p. 3507-3521
article
96 Renewable prediction-driven service offloading for IoT-enabled energy systems with edge computing Fang, Zijie

30 5 p. 3721-3733
article
97 Representation separation adversarial networks for cross-modal retrieval Deng, Jiaxin

30 5 p. 3469-3481
article
98 Research on anti-interference based on particle swarm optimization algorithm in high altitude platform stations Guan, Mingxiang

30 5 p. 4065-4072
article
99 Research on intelligent scheduling algorithm of high altitude platform system for wide area internet of things Wu, Zhou

30 5 p. 4017-4023
article
100 Research on multifractal dimension and improved gray relation theory for intelligent satellite signal recognition Zhang, Zhen

30 5 p. 3419-3427
article
101 Research on new edge computing network architecture and task offloading strategy for Internet of Things Jiang, Congshi

30 5 p. 3619-3631
article
102 SAIF-Cnet: self-attention improved faster convolutional neural network for decentralized blockchain-based key management protocol Rejin Paul, N. R.

30 5 p. 3211-3228
article
103 Scheduling periodic sensors for instantaneous aggregated traffic minimization Bose, Sunanda

30 5 p. 3257-3268
article
104 Smart carbon monitoring platform under IoT-Cloud architecture for small cities in B5G Zhang, He

30 5 p. 3837-3853
article
105 Smart preschool education live streaming: VR-driven optimization strategy Zhao, Hong

30 5 p. 4379-4387
article
106 Spectrum optimization in cognitive satellite networks with graph coloring method Wang, Li

30 5 p. 3443-3452
article
107 Strategy for improving the football teaching quality by AI and metaverse-empowered in mobile internet environment Li, Hongyi

30 5 p. 4343-4352
article
108 Sustainable mobility in urban conditions- multimodal approach for greener cities: insights from Slovakia Holota, Tomáš

30 5 p. 4043-4053
article
109 Task allocation for unmanned aerial vehicles in mobile crowdsensing Xu, Sunyue

30 5 p. 3707-3719
article
110 Temporal-aware influence maximization solution in artificial intelligent edge application Chen, Shiyu

30 5 p. 4301-4313
article
111 The deployment of smart sharing stadium based on 5G and mobile edge computing Fang, Lei

30 5 p. 4121-4131
article
112 Total cost ownership optimization of private clouds: a rack minimization perspective Chi, Yuanfang

30 5 p. 3855-3869
article
113 Towards secure and trustworthy crowdsourcing: challenges, existing landscape, and future directions Lian, Rui

30 5 p. 4329-4341
article
114 Traffic self-similarity analysis and application of industrial internet Li, Qianmu

30 5 p. 3571-3585
article
115 Transient analysis of enhanced hybrid spectrum access for QoS provisioning in multi-class cognitive radio networks Kulshrestha, Rakhee

30 5 p. 3075-3099
article
116 UAV deployment with grid modeling and adaptive multiple pruning search in complex forest scenarios Wang, Tianyu

30 5 p. 3871-3883
article
117 Variable length deep cross-modal hashing based on Cauchy probability function Li, Chen

30 5 p. 3607-3617
article
                             117 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands