Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             105 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain ledger for securing isolated ambient intelligence deployments using reputation and information theory metrics Bordel, Borja

30 6 p. 5887-5903
artikel
2 A comprehensive study on physical fitness of Wushu routine athletes based on video-driven core strength training mechanism in wireless network Li, Long

30 6 p. 4643-4654
artikel
3 A fair and verifiable federated learning profit-sharing scheme Li, Xianxian

30 6 p. 4669-4684
artikel
4 A geographic routing based on local traffic density and multi-hop intersections in VANETs for intelligent traffic system in smart cities (GRBLTD-MI) Mehdi, Benaicha

30 6 p. 5867-5886
artikel
5 A geo-location and trust-based framework with community detection algorithms to filter attackers in 5G social networks Kaur, Davinder

30 6 p. 4841-4849
artikel
6 A hierarchical growth method for extracting 3D phenotypic trait of apple tree branch in edge computing Zhang, Yifan

30 6 p. 5951-5966
artikel
7 A mathematical analysis about the geo-temporal characterization of the multi-class maliciousness of an IP address DeCastro-García, Noemí

30 6 p. 5033-5048
artikel
8 A multiband hook shaped flexible microstrip array antenna with DGS for 5G communication applications Vegesna, Nagavalli

30 6 p. 5145-5155
artikel
9 Analysis of electromagnetic force on wireless charging structure Han, Gao

30 6 p. 6115-6124
artikel
10 Analysis of security and privacy issues in wearables for minors Fúster, Jaime

30 6 p. 5437-5453
artikel
11 Analysis of the application of modern mobile wireless network terminal in the tutoring design of college physical education course teaching Zhang, Zhantao

30 6 p. 5319-5331
artikel
12 An automatic unsupervised complex event processing rules generation architecture for real-time IoT attacks detection Roldán-Gómez, José

30 6 p. 5127-5144
artikel
13 Anchor-based sparse subspace incomplete multi-view clustering Li, Ao

30 6 p. 5559-5570
artikel
14 An edge server deployment approach for delay reduction and reliability enhancement in the industrial internet Wang, Zhongmin

30 6 p. 5743-5757
artikel
15 An efficient packet dropping attack detection mechanism in wireless ad-hoc networks using ECC based AODV-ACO protocol Kanthimathi, S.

30 6 p. 4851-4863
artikel
16 An efficient privacy-preserving recommender system in wireless networks Luo, Junwei

30 6 p. 4949-4960
artikel
17 An energy efficient fuzzy clustering-based congestion control algorithm for cognitive radio sensor networks Jyothi, V.

30 6 p. 4825-4840
artikel
18 An enhanced 3D-DV-hop localisation algorithm for 3D wireless sensor networks Reddy, Mandli Rami

30 6 p. 5809-5821
artikel
19 A new localization mechanism in IoT using grasshopper optimization algorithm and DVHOP algorithm Janabi, Shakir Mahmood Al

30 6 p. 5465-5485
artikel
20 An improved weighted KNN fingerprint positioning algorithm Chen, Bohang

30 6 p. 6011-6022
artikel
21 An outlier detection method based on the hidden Markov model and copula for wireless sensor networks Dogmechi, Sina

30 6 p. 4797-4810
artikel
22 A novel game theoretic approach for market-driven dynamic spectrum access in cognitive radio networks Igried, Bashar

30 6 p. 5771-5786
artikel
23 A novel technique for any-cast transmission scheduling in underwater acoustic sensor networks Ababneh, Ahmad

30 6 p. 5931-5949
artikel
24 Anti-sorting signal design for radio frequency stealth radar based on cosine-exponential nonlinear chaotic mapping Jia, Jinwei

30 6 p. 4811-4824
artikel
25 Application of image encryption based improved chaotic sequence complexity algorithm in the area of ubiquitous wireless technologies Jaber, Mustafa Musa

30 6 p. 4975-4988
artikel
26 Applying machine learning enabled myriad fragment empirical modes in 5G communications to detect profile injection attacks Alzaidi, Mohammed S.

30 6 p. 5533-5546
artikel
27 A reputation-based and privacy-preserving incentive scheme for mobile crowd sensing: a deep reinforcement learning approach Zhang, Jialin

30 6 p. 4685-4698
artikel
28 A resource pre-allocation method for cognitive analytics-based social media service in edge computing Wang, Ruizhi

30 6 p. 6135-6150
artikel
29 Artificial neural networks-based improved Levenberg–Marquardt neural network for energy efficiency and anomaly detection in WSN Revanesh, M.

30 6 p. 5613-5628
artikel
30 A secure image evidence management framework using multi-bits watermark and blockchain in IoT environments Yao, Qing

30 6 p. 5157-5169
artikel
31 A spatiotemporal and motion information extraction network for action recognition Wang, Wei

30 6 p. 5389-5405
artikel
32 BLE-based secure tracking system proposal Hernández-Goya, Candelaria

30 6 p. 5759-5770
artikel
33 Blind parameter estimation for co-channel digital communication signals Liu, Mingqian

30 6 p. 5589-5599
artikel
34 Can differential privacy practically protect collaborative deep learning inference for IoT? Ryu, Jihyeon

30 6 p. 4713-4733
artikel
35 CCSO: a dynamic collaborative scheduling scheme for wireless rechargeable sensor networks with obstacles Zeng, Gang

30 6 p. 6161-6176
artikel
36 Channel capacity limit of multi-beam satellite system Yang, Mingchuan

30 6 p. 5279-5287
artikel
37 Channel estimation of GFDM system based on pilot frequency in doubly selective channel Tian, Xinxin

30 6 p. 5049-5057
artikel
38 Cloud computing-driven resource allocation method for global tennis training: a performance optimization with game theory consideration Wang, Dong

30 6 p. 4903-4912
artikel
39 Compressed video quality enhancement algorithm based on 3D-CNNs Chen, Shanji

30 6 p. 6125-6133
artikel
40 Construction and implementation of mobile learning system for higher education based on modern wireless network mobile communication terminal technology Zhao, Weihua

30 6 p. 5669-5681
artikel
41 Controller placement in software defined FANET Wang, Xi

30 6 p. 5347-5360
artikel
42 Data anonymization evaluation against re-identification attacks in edge storage Chen, Minghui

30 6 p. 5263-5277
artikel
43 DDQN path planning for unmanned aerial underwater vehicle (UAUV) in underwater acoustic sensor network Cao, Qihang

30 6 p. 5655-5667
artikel
44 Deep convolutional neural network with Kalman filter based objected tracking and detection in underwater communications Sreekala, Keshetti

30 6 p. 5571-5588
artikel
45 Dependency-aware task offloading based on deep reinforcement learning in mobile edge computing networks Li, Junnan

30 6 p. 5519-5531
artikel
46 Design and implementation of mobile e-commerce application built on WAP mobile payment system Zhang, Pengnian

30 6 p. 6089-6104
artikel
47 Design systematic wireless inventory trackers with prolonged lifetime and low energy consumption in future 6G network Meenakshi, N.

30 6 p. 5787-5808
artikel
48 Distributed determination method of redundant nodes in wireless communication networks based on Bezier function Yu, Wei

30 6 p. 5643-5654
artikel
49 Downlink AP coordination based OFDMA and NOMA protocols for the next-generation WLANs Zhenzhen, Yan

30 6 p. 5487-5501
artikel
50 Efficient and low SAR dual functional wearable antenna in RFID ISM and GPS L1 bands for positioning applications Pal, Arghyadeep

30 6 p. 5187-5199
artikel
51 Energy efficient UAV-assisted communication with joint resource allocation and trajectory optimization in NOMA-based internet of remote things Zhou, Cong

30 6 p. 5361-5374
artikel
52 Enhancing data protection with a distributed storage system based on the redundant residue number system Gao, Zhen

30 6 p. 5601-5612
artikel
53 FAPDRP: a flooding attacks prevention and detection routing protocol in vehicular ad hoc network using behavior history and nonlinear median filter transformation Luong, Ngoc T.

30 6 p. 4875-4902
artikel
54 6G assisted federated learning for continuous monitoring in wireless sensor network using game theory Phani Praveen, S.

30 6 p. 5211-5237
artikel
55 Generation of high-order random key matrix for Hill Cipher encryption using the modular multiplicative inverse of triangular matrices Chen, Yuehong

30 6 p. 5697-5707
artikel
56 Heterogeneous load balancing improvement on an energy-aware distributed unequal clustering protocol using BBO algorithms Maleki, Maryam

30 6 p. 4913-4933
artikel
57 Improved 3D localization algorithm for large scale wireless sensor networks Mani, Rahma

30 6 p. 5503-5518
artikel
58 Improved mutimodulus blind equalization algorithm for multi-level QAM signals with impulsive noise Zhang, Xianhong

30 6 p. 6023-6028
artikel
59 Improvement and application of information communication technology in wireless routing protocol based on adaptive K-means clustering algorithm Chen, Zili

30 6 p. 5997-6009
artikel
60 Improving robustness and efficiency of edge computing models Li, Yilan

30 6 p. 4699-4711
artikel
61 Improving the efficiency of the XCS learning classifier system using evolutionary memory Yousefi, Ali

30 6 p. 5171-5186
artikel
62 Improving the lightweight implementation of SNOW-V Gil, Jezabel Molina

30 6 p. 5823-5835
artikel
63 Inception-Det: large aspect ratio rotating object detector for remote sensing images Li, Ao

30 6 p. 5333-5345
artikel
64 Intelligent based hybrid precoder for millimetre wave massive MIMO system Rajarajeswarie, B.

30 6 p. 5239-5246
artikel
65 Interference analysis of anti micro and small unmanned aerial vehicles and mobile communication systems uplink Li, Junfang

30 6 p. 6029-6039
artikel
66 Inter-satellite link scheduling and power allocation method for satellite networks Wang, Ruisong

30 6 p. 5547-5558
artikel
67 Joint activity and channel estimation for asynchronous grant-Free NOMA with chaos sequence Qiu, Mingyi

30 6 p. 6041-6053
artikel
68 Joint power allocation and deployment optimization for HAP-assisted NOMA–MEC system Zhang, Yue

30 6 p. 5007-5019
artikel
69 Joint waveform design for multi-user maritime integrated sensing and communication Zhang, Jingchun

30 6 p. 5919-5930
artikel
70 Low delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systems Etxezarreta, Xabier

30 6 p. 5077-5091
artikel
71 Low-power secure caching strategy for Internet of vehicles Song, Tao

30 6 p. 5289-5303
artikel
72 Millimeter assisted wave technologies in 6G assisted wireless communication systems: a new paradigm for 6G collaborative learning Rao, P. V. Venkateswara

30 6 p. 5723-5742
artikel
73 Mobility aware load balancing using Kho–Kho optimization algorithm for hybrid Li-Fi and Wi-Fi network Alharbi, Meshal

30 6 p. 5111-5125
artikel
74 Modulation classification with data augmentation based on a semi-supervised generative model Yin, Liyan

30 6 p. 5683-5696
artikel
75 Multi-objective fog node placement strategy based on heuristic algorithms for smart factories Xu, Fulong

30 6 p. 5407-5424
artikel
76 Network intrusion detection system for DDoS attacks in ICS using deep autoencoders Ortega-Fernandez, Ines

30 6 p. 5059-5075
artikel
77 NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble Ullah, Farhan

30 6 p. 6177-6198
artikel
78 OFDM integrated waveform design for joint radar and communication Xiao, Bo

30 6 p. 5425-5436
artikel
79 Optimal deployment of vehicular cloud computing systems with remote microclouds Bi, Chongke

30 6 p. 5305-5317
artikel
80 Optimal trajectory UAV path design based on bezier curves with multi-hop cluster selection in wireless networks Li, Likun

30 6 p. 5021-5032
artikel
81 Optimization of the operational state's routing for mobile wireless sensor networks Almuzaini, Khalid K.

30 6 p. 5247-5261
artikel
82 Outage behavior of the downlink reconfigurable intelligent surfaces-aided cooperative non-orthogonal multiple access network over Nakagami-m fading channels Chen, Hsing-Chung

30 6 p. 5093-5110
artikel
83 Privacy-enhancing data aggregation and data analytics in wireless networks for a large class of distributed queries Yang, Xuechao

30 6 p. 4749-4759
artikel
84 Q-learning based task scheduling and energy-saving MAC protocol for wireless sensor networkss Jaber, Mustafa Musa

30 6 p. 4989-5005
artikel
85 Ranked searchable encryption based on differential privacy and blockchain Xu, Chungen

30 6 p. 4735-4748
artikel
86 Research and implementation of network communication based on embedded monitoring system Wang, Caifeng

30 6 p. 5629-5641
artikel
87 Research on near field sound pressure of circular piston source based on angular spectrum method Yi-shu, Zhang

30 6 p. 4865-4873
artikel
88 Research on smart-locks cybersecurity and vulnerabilities Caballero-Gil, Cándido

30 6 p. 5905-5917
artikel
89 Research on UAV flight control and communication method based on fuzzy adaptive He, Zhenqi

30 6 p. 6105-6113
artikel
90 Resource allocation and offloading decision for secure UAV-based MEC wireless-powered System Lu, Fangwei

30 6 p. 6151-6159
artikel
91 Secure and privacy-preserving sharing of personal health records with multi-party pre-authorization verification Tan, Kheng-Leong

30 6 p. 4773-4795
artikel
92 Secured wireless sensor networks using hybrid Rivest Shamir Adleman with ant lion optimization algorithm Almuzaini, Khalid K.

30 6 p. 5977-5995
artikel
93 Securing FPGAs in IoT: a new run-time monitoring technique against hardware Trojan Cheng, Jian

30 6 p. 5455-5463
artikel
94 Security and energy efficient cyber-physical systems using predictive modeling approaches in wireless sensor network Alghamdi, Abdullah

30 6 p. 5851-5866
artikel
95 SFSN: smart frame selection network for multi-task human synthesis on mobile devices Zhang, Boqi

30 6 p. 4655-4668
artikel
96 SHFW: second-order hybrid fusion weight–median algorithm based on machining learning for advanced IoT data analytics Tu, Tianyi

30 6 p. 6055-6067
artikel
97 Similarity measure-based spectrum sensing algorithm under impulsive noise Zhang, Changqing

30 6 p. 5967-5975
artikel
98 Smart vision for quality apple classification using SURF–Harris optimizing techniques Li, GuoYan

30 6 p. 5709-5721
artikel
99 Support vector machine approach of malicious user identification in cognitive radio networks Arshid, Kaleem

30 6 p. 4761-4772
artikel
100 Survelliance monitoring based routing optimization for wireless sensor networks Almuzaini, Khalid K.

30 6 p. 6069-6087
artikel
101 Toward intelligent cooperation at the edge: improving the QoS of workflow scheduling with the competitive cooperation of edge servers Zhu, Kaige

30 6 p. 5837-5849
artikel
102 User association for EE maximization in uplink HetNets with NOMA Zhang, Shuang

30 6 p. 4961-4973
artikel
103 User grouping and power allocation in NOMA-based internet of things He, Jian

30 6 p. 5375-5387
artikel
104 Workpiece classification based on transfer component analysis Qiao, Liyong

30 6 p. 4935-4947
artikel
105 WS-ICNN algorithm for robust adaptive beamforming Liu, Fulai

30 6 p. 5201-5210
artikel
                             105 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland