nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive ensemble classification techniques detecting and managing concept drift in dynamic imbalanced data streams
|
Junaid, K. A. Mohamed |
|
|
31 |
1 |
p. 19-30 |
artikel |
2 |
A credibility scoring algorithm to match surveillance video targets and UWB tags
|
Yan, Jiachen |
|
|
31 |
1 |
p. 529-544 |
artikel |
3 |
Active and passive beamforming in RIS-assisted cell-free massive MIMO systems: an edge computing perspective
|
Zhu, Xiaozhen |
|
|
31 |
1 |
p. 695-707 |
artikel |
4 |
Adaptive transmission for two-way relaying optical wireless communications
|
Ahmadi, Hossein |
|
|
31 |
1 |
p. 517-528 |
artikel |
5 |
A deep reinforcement learning-based D2D spectrum allocation underlaying a cellular network
|
Liang, Yao-Jen |
|
|
31 |
1 |
p. 435-441 |
artikel |
6 |
A learning-based uplink massive-MIMO decoder
|
Kumar, Satish |
|
|
31 |
1 |
p. 669-678 |
artikel |
7 |
An adaptive secure internet of things and cloud based disease classification strategy for smart healthcare industry
|
Verma, Ankit |
|
|
31 |
1 |
p. 879-897 |
artikel |
8 |
An age of information based scheduling algorithm in a shared channel with energy and link capacity constraints
|
Hao, Wei |
|
|
31 |
1 |
p. 51-67 |
artikel |
9 |
Analysis performance of full duplex two-way systems using assistance of UAV with hardware impairments
|
Bao, Bo Quoc |
|
|
31 |
1 |
p. 641-657 |
artikel |
10 |
An efficient secure cryptosystem using improved identity based encryption with multimodal biometric authentication and authorization in cloud environments
|
Jasmine, R. Megiba |
|
|
31 |
1 |
p. 545-565 |
artikel |
11 |
An energy efficient grid-based clustering algorithm using type-3 fuzzy system in wireless sensor networks
|
Mozaffari, Morteza |
|
|
31 |
1 |
p. 109-125 |
artikel |
12 |
An INS/UWB joint indoor positioning algorithm based on hypothesis testing and yaw angle
|
Cheng, Long |
|
|
31 |
1 |
p. 457-469 |
artikel |
13 |
An online approach for cooperative cache updating and forwarding in mobile edge network
|
Somesula, Manoj Kumar |
|
|
31 |
1 |
p. 149-163 |
artikel |
14 |
A novel design of non-bending narrow wall slotted waveguide array antenna for X-band wireless network applications
|
Amiri, Nasrin |
|
|
31 |
1 |
p. 443-455 |
artikel |
15 |
A novel model for optimal selection of relay bus with maximum link reliability in VANET using hybrid fuzzy niching grey wolf optimization
|
Vinnarasi, F. Sangeetha Francelin |
|
|
31 |
1 |
p. 219-234 |
artikel |
16 |
APOLLO: a proximity-oriented, low-layer orchestration algorithm for resources optimization in mist computing
|
Babaghayou, Messaoud |
|
|
31 |
1 |
p. 679-694 |
artikel |
17 |
Authentication of multiple transaction using enhanced Elman spike neural network optimized with glowworm swarm optimization
|
Joans, S. Mary |
|
|
31 |
1 |
p. 809-824 |
artikel |
18 |
Automated micro aneurysm classification using deep convolutional spike neural networks
|
Vidhyalakshmi, M. K. |
|
|
31 |
1 |
p. 505-515 |
artikel |
19 |
Byzantine detection for federated learning under highly non-IID data and majority corruptions
|
Wang, Zhonglin |
|
|
31 |
1 |
p. 865-877 |
artikel |
20 |
Clustering and power allocation for secured access to simultaneous transmissions and sensing Internet of Things networks
|
Zhao, Juan |
|
|
31 |
1 |
p. 345-359 |
artikel |
21 |
D2D communication assisted edge computing based resource pricing and scheduling research in blockchain
|
Zhang, Ludan |
|
|
31 |
1 |
p. 899-913 |
artikel |
22 |
Detection of vulnerabilities in blockchain smart contracts using deep learning
|
Gupta, Namya Aankur |
|
|
31 |
1 |
p. 201-217 |
artikel |
23 |
Distributed file systembased optimization algorithm
|
Soundharya, Uppuluri Lakshmi |
|
|
31 |
1 |
p. 391-404 |
artikel |
24 |
D2PG: deep deterministic policy gradient based for maximizing network throughput in clustered EH-WSN
|
Farmani, Mojtaba |
|
|
31 |
1 |
p. 377-390 |
artikel |
25 |
EALSO: joint energy-aware and latency-sensitive task offloading for artificial Intelligence of Things in vehicular fog computing
|
Liang, Chenyi |
|
|
31 |
1 |
p. 583-599 |
artikel |
26 |
Enabling sustainable green communication in three-tier 5G ultra dense HetNet with sleep cycle modulated energy harvesting
|
Ghosh, Arijeet |
|
|
31 |
1 |
p. 841-864 |
artikel |
27 |
Energy aware forwarder selection in wireless body area networks to enhance stability and lifetime
|
Pradhan, Prajna Paramita |
|
|
31 |
1 |
p. 491-503 |
artikel |
28 |
Enhanced conditional self-attention generative adversarial network for detecting cotton plant disease in IoT-enabled crop management
|
Paul Joshua, K. |
|
|
31 |
1 |
p. 299-313 |
artikel |
29 |
Enhancing UAV-assisted vehicle edge computing networks through a digital twin-driven task offloading framework
|
Zhang, Zhiyang |
|
|
31 |
1 |
p. 965-981 |
artikel |
30 |
Enriched energy optimized LEACH protocol for efficient data transmission in wireless sensor network
|
Rajaram, V. |
|
|
31 |
1 |
p. 825-840 |
artikel |
31 |
EWRPL: entropy-based weighted RPL
|
Kamble, Sneha |
|
|
31 |
1 |
p. 613-622 |
artikel |
32 |
Experimental testing and analysis of regression algorithms for spectrum sensing in cognitive radio networks
|
Begum, A. Rijuvana |
|
|
31 |
1 |
p. 247-260 |
artikel |
33 |
6G-DeFLI: enhanced quality-of-services using distributed hash table and blockchain-enabled federated learning approach in 6G IoT networks
|
Priya, J. Chandra |
|
|
31 |
1 |
p. 361-375 |
artikel |
34 |
6GIoDT: 6G-assisted intelligent resource utilization framework for the Internet of Drone Things
|
Mukherjee, Amartya |
|
|
31 |
1 |
p. 471-490 |
artikel |
35 |
Intelligent reflecting surface aided secure MIMO wireless communication
|
Gao, Hongyuan |
|
|
31 |
1 |
p. 623-639 |
artikel |
36 |
Investigating cooperative strategies for security-reliability trade-off in full-duplex relay wireless networks
|
Poursajadi, Sajad |
|
|
31 |
1 |
p. 929-944 |
artikel |
37 |
IRS assisted UAV communications for 6G networks: a systematic literature review
|
Hamid, Humairah |
|
|
31 |
1 |
p. 779-807 |
artikel |
38 |
Joint multi-server cache sharing and delay-aware task scheduling for edge-cloud collaborative computing in intelligent manufacturing
|
Jin, Xiaomin |
|
|
31 |
1 |
p. 261-280 |
artikel |
39 |
Learning to allocate: a delay and temperature-aware slot allocation framework for WBAN with TDMA-MAC
|
Mystica, K. Jasmine |
|
|
31 |
1 |
p. 165-183 |
artikel |
40 |
Machine learning-inspired hybrid precoding with low-resolution phase shifters for intelligent reflecting surface (IRS) massive MIMO systems with limited RF chains
|
Hassan, Shabih ul |
|
|
31 |
1 |
p. 235-245 |
artikel |
41 |
Mc-music algorithm for fast DOA estimation
|
Liu, Fulai |
|
|
31 |
1 |
p. 659-667 |
artikel |
42 |
Multicultural data assistance mining analysis for ideological and political education in smart education platforms using artificial intelligence
|
Li, Hanjia |
|
|
31 |
1 |
p. 567-581 |
artikel |
43 |
Multiple parameter decision for backoff counter optimization of medical body area network
|
Dadhich, Khushboo |
|
|
31 |
1 |
p. 91-107 |
artikel |
44 |
OR2M: a novel optimized resource rendering methodology for wireless networks based on virtual reality (VR) applications
|
Kiruthika, V. |
|
|
31 |
1 |
p. 417-434 |
artikel |
45 |
Outage probability constrained resource allocation scheme in two-tier cooperative NOMA network with SWIPT
|
Gao, Lei |
|
|
31 |
1 |
p. 315-325 |
artikel |
46 |
Prediction and evaluation of wireless network data transmission security risk based on machine learning
|
Huang, Bo |
|
|
31 |
1 |
p. 405-416 |
artikel |
47 |
Profit optimized task scheduling for vehicular fog computing
|
Saleem, Umber |
|
|
31 |
1 |
p. 759-777 |
artikel |
48 |
Pursuit learning algorithm to minimize delay and energy consumption in vehicular-edge computing networks
|
Alagha, Nejad |
|
|
31 |
1 |
p. 601-612 |
artikel |
49 |
Research on anti-interference performance of 5G multi band communication antenna supported by NFC technology
|
Lu, Zhixiang |
|
|
31 |
1 |
p. 915-927 |
artikel |
50 |
Scalable energy optimization of resources for mobile cloud computing using sensor enabled cluster based system
|
Yadav, Santosh Kumar |
|
|
31 |
1 |
p. 709-734 |
artikel |
51 |
Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor network
|
Iqbal, Siddiq |
|
|
31 |
1 |
p. 127-147 |
artikel |
52 |
Sum-rate maximization for a distributed space-time block code-aided cooperative NOMA with energy harvesting
|
Alamu, Olumide |
|
|
31 |
1 |
p. 281-298 |
artikel |
53 |
The Internet of Medical Things (IoMT): opportunities and challenges
|
El-Saleh, Ayman A. |
|
|
31 |
1 |
p. 327-344 |
artikel |
54 |
Transmit antenna selection for millimeter-wave communications using multi-RIS with imperfect transceiver hardware
|
Van Vinh, Nguyen |
|
|
31 |
1 |
p. 185-199 |
artikel |
55 |
Type classification and identification of IoT devices by using traffic characteristics
|
Du, Ruizhong |
|
|
31 |
1 |
p. 1-17 |
artikel |
56 |
UAV-enabled software defined data collection from an adaptive WSN
|
Karegar, Pejman A. |
|
|
31 |
1 |
p. 69-90 |
artikel |
57 |
Unequal Clustering Energy Hole Avoidance (UCEHA) algorithm in Cognitive Radio Wireless Sensor Networks (CRWSNs)
|
Joon, Ranjita |
|
|
31 |
1 |
p. 735-757 |
artikel |
58 |
Video forgery detection using competitive swarm sun flower optimization algorithm based deep learning
|
Nirmala Priya, G. |
|
|
31 |
1 |
p. 31-49 |
artikel |
59 |
Workload prioritization and optimal task scheduling in cloud: introduction to hybrid optimization algorithm
|
Pachipala, Yellamma |
|
|
31 |
1 |
p. 945-964 |
artikel |