Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             61 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain-based solution for enhancing the efficiency and security of healthcare knowledge management systems in the era of industry 4.0 Yuman, Yang

31 2 p. 983-1004
artikel
2 A comparison of measurement methodologies for the assessment of E-field level radiated by 5G NR base station Milanovic, Josip

31 2 p. 1975-1986
artikel
3 A comprehensive review of different antennas for IoT applications Pawar, Avinash Nanasaheb

31 2 p. 1449-1461
artikel
4 Adaptive connected hybrid beamforming for energy efficiency maximization in multi-user millimeter wave systems Chen, Guangyi

31 2 p. 1117-1127
artikel
5 A defected substrate 4-element mimo antenna with higher diversity characteristics for 5G sub 6 GHz N77/N78 band applications Addepalli, Tathababu

31 2 p. 1931-1947
artikel
6 A DV-Hop localization algorithm corrected based on multi-strategy sparrow algorithm in sea-surface wireless sensor networks Zhang, Lei

31 2 p. 1405-1420
artikel
7 A hybrid charging scheme for efficient operation in wireless sensor network Mallikarjuna, M.

31 2 p. 1301-1320
artikel
8 A joint self-information and Markovian model-driven deep channel estimation and feedback model for millimeter-wave massive MIMO systems Kadiyala, Ragodaya Deepthi

31 2 p. 1683-1703
artikel
9 Analytical design of low-profile wideband multi-layer transmitarray antenna for Ku band Ghaderi, Mahdieh

31 2 p. 1949-1957
artikel
10 An EEG signal-based music treatment system for autistic children using edge computing devices Sun, Mingxu

31 2 p. 1391-1404
artikel
11 An hybrid machine learning and improved social spider optimization based clustering and routing protocol for wireless sensor network UmaRani, C.

31 2 p. 1885-1910
artikel
12 An intelligent framework for attack detection in the internet of things using coati optimization Pandiselvi, T.

31 2 p. 1719-1733
artikel
13 An optimized task offloading strategy based on deep reinforcement learning combined with channel reliability prediction Tang, Weicheng

31 2 p. 1663-1682
artikel
14 A novel multi-objective optimized DAG task scheduling strategy for fog computing based on container migration mechanism Deng, Wenjia

31 2 p. 1005-1019
artikel
15 A systematic PAPR analysis of optical 5G waveforms using advanced and deep learning PAPR algorithms: estimation of PAPR, PSD, and BER Kumar, Arun

31 2 p. 1861-1883
artikel
16 Cloud-edge collaboration-based task offloading strategy in railway IoT for intelligent detection Guo, Qichang

31 2 p. 1361-1376
artikel
17 Coarse-to-fine label propagation with hybrid representation for deep semi-supervised bot detection Peng, Huailiang

31 2 p. 1321-1336
artikel
18 Correction: A novel design of non-bending narrow wall slotted waveguide array antenna for X-band wireless network applications Amiri, Nasrin

31 2 p. 1987
artikel
19 Crystals kyber cryptographic algorithm for efficient IoT D2d communication Selvakumar, S.

31 2 p. 1053-1070
artikel
20 Deep intrusion net: an efficient framework for network intrusion detection using hybrid deep TCN and GRU with integral features Rani, Y. Alekya

31 2 p. 1255-1278
artikel
21 Design and implementation of an integrated OWC and RF network slicing-based architecture over hybrid LiFi and 5G networks Khadmaoui-Bichouna, Mohamed

31 2 p. 1541-1559
artikel
22 Design of a novel load balanced multi-sink based hierarchical data gathering protocol for wireless sensor networks Biswal, Sanjay Kumar

31 2 p. 1497-1514
artikel
23 Effective area reduction & surface waves suppression of a novel four-element MIMO antenna exclusively designed for dual band 5G sub 6 GHz (N77/N78 & N79) applications Addepalli, Tathababu

31 2 p. 1463-1479
artikel
24 Efficient downstream data dissemination in IAB networks with DAG-based topology Cho, Chuan-Wei

31 2 p. 1735-1746
artikel
25 Efficient feature extraction of radio-frequency fingerprint using continuous wavelet transform Mohammed, Mutala

31 2 p. 1177-1185
artikel
26 Efficient load balancing strategy for cloud computing environment with African vultures algorithm Karuppan, A. Sandana

31 2 p. 1187-1203
artikel
27 Efficient resource allocation scheme for dually connected non-orthogonal multiple access based LIFI-RF networks Kassahun, Ermias

31 2 p. 1515-1528
artikel
28 Energy-efficient edge intelligence for task-dependency MEC power grid networks Yang, Chun

31 2 p. 1813-1823
artikel
29 English listening and speaking ability improvement strategy from Artificial Intelligence wireless network Hu, Nan

31 2 p. 1071-1080
artikel
30 Enhanced dual lane detection in automotive radar systems using harmonic coordinated beamforming of time-modulated arrays Ma, Yue

31 2 p. 1801-1812
artikel
31 Enhanced mobile sink path optimization using RPP-RNN algorithm for energy efficient data acquisition in WSNs K, Vignesh Saravanan

31 2 p. 1705-1717
artikel
32 Enhancing the security of edge-AI runtime environments: a fine-tuning method based on large language models Tang, Di

31 2 p. 1825-1838
artikel
33 EtherVote: a secure smart contract-based e-voting system Spanos, Achilleas

31 2 p. 1279-1299
artikel
34 Ets-ddpg: an energy-efficient and QoS-guaranteed edge task scheduling approach based on deep reinforcement learning Zhao, Jiale

31 2 p. 1241-1254
artikel
35 Exploiting data transmission for route discoveries in mobile ad hoc networks Yu, Xin

31 2 p. 1337-1359
artikel
36 Fairness-aware placement of multiple aerial base stations in wireless networks Shojaei, Mojtaba

31 2 p. 1037-1052
artikel
37 Fuzzy based trust model for cloud access control classification mechanism using ghost net architecture Kalaiyarasi, D.

31 2 p. 1959-1973
artikel
38 HBO-BiLSTM: hybrid bat optimizer-based bidirectional long short-term memory for secure web service recommendation Sivanandam, Chakaravarthi

31 2 p. 1783-1800
artikel
39 Improving cell edge user performance using cooperative cyclic interleaved non-orthogonal multiple access under rayleigh fading channel Shalini, R. Baby

31 2 p. 1561-1575
artikel
40 IoT device identification based on network traffic Gu, Dinglin

31 2 p. 1645-1661
artikel
41 Joint call admission control and load-balancing in ultra-dense cellular networks: a proactive approach Hasan, Md Mehedi

31 2 p. 1529-1540
artikel
42 Low power decentralized differentially private multi-armed bandit algorithm based performance improvement on long-range radio network More, Prajakta Amol

31 2 p. 1145-1162
artikel
43 Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm Nirmala, B. Vijaya

31 2 p. 1095-1116
artikel
44 Metaheuristic assisted hybrid deep classifiers for intrusion detection: a bigdata perspective Madhuridevi, L.

31 2 p. 1205-1225
artikel
45 Mobile computing power trading decision-making method for vehicle-mounted devices in multi-task edge federated learning Zhang, Huidan

31 2 p. 1227-1239
artikel
46 MOTO-MASSA: multi-objective task offloading based on modified sparrow search algorithm for fog-assisted IoT applications Khedr, Ahmed M.

31 2 p. 1747-1762
artikel
47 Multi-Layer Collaborative Federated Learning architecture for 6G Open RAN Zhao, Borui

31 2 p. 1377-1390
artikel
48 Multi objective constellation optimization and dynamic link utilization for sustainable information delivery using PD-NOMA deep reinforcement learning Yang, Jiuting

31 2 p. 1839-1859
artikel
49 Octave convolutional multi-head capsule nutcracker network with oppositional Kepler algorithm based spam email detection Ratmele, Ankur

31 2 p. 1625-1644
artikel
50 On-demand routing algorithm for multipath selection based on node load states in mobile ad hoc networks Deng, Yinjun

31 2 p. 1763-1782
artikel
51 Power allocation using spatio-temporal graph neural networks and reinforcement learning Jamshidiha, Saeed

31 2 p. 1163-1176
artikel
52 Remote radio frequency unit selection of self-sustaining distributed base-station system based on downlink physical layer secure transmission Zhou, Xintong

31 2 p. 1081-1093
artikel
53 Routing attacks detection in MANET using trust management enabled hybrid machine learning Arulselvan, G.

31 2 p. 1481-1495
artikel
54 RSO-MRSA: rat swarm optimization based modified Rivest–Shamir–Adleman for secure and efficient healthcare monitoring system Sethukarasi, T.

31 2 p. 1129-1143
artikel
55 Secure cluster head selection in wireless sensor networks using fuzzy based generic algorithm Dhipa, M.

31 2 p. 1435-1448
artikel
56 Soca: secure offloading considering computational acceleration for multi-access edge computing Yi, Meng

31 2 p. 1021-1035
artikel
57 Strategies for enhancing the value of the sports tourism industry supported by multi-sensor network technology Zhang, Weiyi

31 2 p. 1587-1599
artikel
58 Swarming with (visual) secret (shared) mission Dolev, Shlomi

31 2 p. 1911-1929
artikel
59 Testbed analysis of multi-fog architecture for interoperable Internet of Things Rahman, Hafizur

31 2 p. 1577-1586
artikel
60 Trusted reputation system for heterogeneous network resource sharing based on blockchain in IoT Li, Jingwen

31 2 p. 1421-1433
artikel
61 Wearable and ultra-compact mm-wave four port MIMO antenna for dual band n261 and n260 (28/38) GHz 5G applications Kaur, Parminder

31 2 p. 1601-1624
artikel
                             61 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland