Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             32 results found
no title author magazine year volume issue page(s) type
1 Adaptive computation offloading for latency-sensitive tasks in heterogeneous edge-cloud-enabled smart warehouses using Gau-Angle FIS and AGE-MOEA-II Zhao, Bohai

30 7 p. 6493-6506
article
2 Adaptive mobile cloud computing on college physical training education based on virtual reality Hong, Fuxin

30 7 p. 6427-6450
article
3 Advancing database security: a comprehensive systematic mapping study of potential challenges Iqbal, Asif

30 7 p. 6399-6426
article
4 A modified energy efficient relay selection for cognitive radio sensor networks Prasad, L. V. R. Chaitanya

30 7 p. 6537-6554
article
5 A new scheme of vulnerability analysis in smart contract with machine learning Xing, Cipai

30 7 p. 6325-6334
article
6 A novel digital contents privacy scheme based on quantum harmonic oscillator and schrodinger paradox Alghafis, Abdullah

30 7 p. 6217-6236
article
7 App-based detection of vulnerable implementations of OTP SMS APIs in the banking sector Aparicio, Amador

30 7 p. 6451-6464
article
8 Applying AIoT image recognition for prognosis of wound healing in long-term care residential facility Chen, Chien-Liang

30 7 p. 6523-6536
article
9 A privacy-preserving group decision making expert system for medical diagnosis based on dynamic knowledge base Li, Wuyungerile

30 7 p. 6237-6247
article
10 Circuit implementation of 3D chaotic self-exciting single-disk homopolar dynamo and its application in digital image confidentiality Munir, Noor

30 7 p. 6199-6216
article
11 Comprehensive early warning of power quality in distribution network based on deep learning Hua, Liang

30 7 p. 6371-6384
article
12 Constructing a personalized travel itinerary recommender system with the Internet of Things Ho, Chia-Ling

30 7 p. 6555-6567
article
13 Deep network expression recognition with transfer learning in UAV-enabled B5G/6G networks Lu, Jin

30 7 p. 6675-6685
article
14 Efficient and secure message authentication algorithm at the physical layer Noura, Hassan N.

30 7 p. 6291-6305
article
15 Efficient trajectory optimization and resource allocation in UAV 5G networks using dueling-Deep-Q-Networks Xu, Jinyong

30 7 p. 6687-6697
article
16 Evaluating test quality of Python libraries for IoT applications at the network edge Chen, Zhifei

30 7 p. 6603-6618
article
17 Fuzzy enhanced location aware secure multicast routing protocol for balancing energy and security in wireless sensor network Bhanu, D.

30 7 p. 6569-6588
article
18 Lightweight and secure cipher scheme for multi-homed systems Noura, Hassan N.

30 7 p. 6273-6290
article
19 Linear digital precoding technology in massive multiple input multiple output wireless communication system Han, Lijun

30 7 p. 6633-6639
article
20 Machine learning-based centralized link coding attack detection in software-defined network Wang, Hongyuan

30 7 p. 6641-6655
article
21 Optimization of sensor node location utilizing artificial intelligence for mobile wireless sensor network Alrizq, Mesfer

30 7 p. 6619-6631
article
22 Optimizing dag scheduling and deployment for Iot data analysis services in the multi-UAV mobile edge computing system Li, Jie

30 7 p. 6465-6479
article
23 Patent competition and value for wireless technologies: in case of intelligent media Jiang, Zhifeng

30 7 p. 6589-6602
article
24 Phonendo: a platform for publishing wearable data on distributed ledger technologies Moya, Francisco

30 7 p. 6507-6521
article
25 Planning city-wide delivery paths for periodical logistics tasks in smart supply chains Peng, Gaoxian

30 7 p. 6657-6674
article
26 Public auditing of log integrity for shared cloud storage systems via blockchain Tian, Hui

30 7 p. 6249-6264
article
27 Radial basis function networks-based resource-aware offloading video analytics in mobile edge computing Appadurai, Jothi Prabha

30 7 p. 6335-6353
article
28 Research on congestion rate of classified storage narrow channel picking system for IoT security Zhou, Li

30 7 p. 6307-6323
article
29 Route optimization to improve QoS in multi-hop wireless sensor networks Alghamdi, Turki Ali

30 7 p. 6265-6271
article
30 Spatial refinement based method for small-sized target detection Yu, Wei

30 7 p. 6481-6492
article
31 Time allocation and power control in multi-UAV energy harvesting network Li, Yuchen

30 7 p. 6355-6369
article
32 Towards unifying pre-trained language models for semantic text exchange Miao, Jingyuan

30 7 p. 6385-6398
article
                             32 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands