Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             61 results found
no title author magazine year volume issue page(s) type
1 A blockchain-based solution for enhancing the efficiency and security of healthcare knowledge management systems in the era of industry 4.0 Yuman, Yang

31 2 p. 983-1004
article
2 A comparison of measurement methodologies for the assessment of E-field level radiated by 5G NR base station Milanovic, Josip

31 2 p. 1975-1986
article
3 A comprehensive review of different antennas for IoT applications Pawar, Avinash Nanasaheb

31 2 p. 1449-1461
article
4 Adaptive connected hybrid beamforming for energy efficiency maximization in multi-user millimeter wave systems Chen, Guangyi

31 2 p. 1117-1127
article
5 A defected substrate 4-element mimo antenna with higher diversity characteristics for 5G sub 6 GHz N77/N78 band applications Addepalli, Tathababu

31 2 p. 1931-1947
article
6 A DV-Hop localization algorithm corrected based on multi-strategy sparrow algorithm in sea-surface wireless sensor networks Zhang, Lei

31 2 p. 1405-1420
article
7 A hybrid charging scheme for efficient operation in wireless sensor network Mallikarjuna, M.

31 2 p. 1301-1320
article
8 A joint self-information and Markovian model-driven deep channel estimation and feedback model for millimeter-wave massive MIMO systems Kadiyala, Ragodaya Deepthi

31 2 p. 1683-1703
article
9 Analytical design of low-profile wideband multi-layer transmitarray antenna for Ku band Ghaderi, Mahdieh

31 2 p. 1949-1957
article
10 An EEG signal-based music treatment system for autistic children using edge computing devices Sun, Mingxu

31 2 p. 1391-1404
article
11 An hybrid machine learning and improved social spider optimization based clustering and routing protocol for wireless sensor network UmaRani, C.

31 2 p. 1885-1910
article
12 An intelligent framework for attack detection in the internet of things using coati optimization Pandiselvi, T.

31 2 p. 1719-1733
article
13 An optimized task offloading strategy based on deep reinforcement learning combined with channel reliability prediction Tang, Weicheng

31 2 p. 1663-1682
article
14 A novel multi-objective optimized DAG task scheduling strategy for fog computing based on container migration mechanism Deng, Wenjia

31 2 p. 1005-1019
article
15 A systematic PAPR analysis of optical 5G waveforms using advanced and deep learning PAPR algorithms: estimation of PAPR, PSD, and BER Kumar, Arun

31 2 p. 1861-1883
article
16 Cloud-edge collaboration-based task offloading strategy in railway IoT for intelligent detection Guo, Qichang

31 2 p. 1361-1376
article
17 Coarse-to-fine label propagation with hybrid representation for deep semi-supervised bot detection Peng, Huailiang

31 2 p. 1321-1336
article
18 Correction: A novel design of non-bending narrow wall slotted waveguide array antenna for X-band wireless network applications Amiri, Nasrin

31 2 p. 1987
article
19 Crystals kyber cryptographic algorithm for efficient IoT D2d communication Selvakumar, S.

31 2 p. 1053-1070
article
20 Deep intrusion net: an efficient framework for network intrusion detection using hybrid deep TCN and GRU with integral features Rani, Y. Alekya

31 2 p. 1255-1278
article
21 Design and implementation of an integrated OWC and RF network slicing-based architecture over hybrid LiFi and 5G networks Khadmaoui-Bichouna, Mohamed

31 2 p. 1541-1559
article
22 Design of a novel load balanced multi-sink based hierarchical data gathering protocol for wireless sensor networks Biswal, Sanjay Kumar

31 2 p. 1497-1514
article
23 Effective area reduction & surface waves suppression of a novel four-element MIMO antenna exclusively designed for dual band 5G sub 6 GHz (N77/N78 & N79) applications Addepalli, Tathababu

31 2 p. 1463-1479
article
24 Efficient downstream data dissemination in IAB networks with DAG-based topology Cho, Chuan-Wei

31 2 p. 1735-1746
article
25 Efficient feature extraction of radio-frequency fingerprint using continuous wavelet transform Mohammed, Mutala

31 2 p. 1177-1185
article
26 Efficient load balancing strategy for cloud computing environment with African vultures algorithm Karuppan, A. Sandana

31 2 p. 1187-1203
article
27 Efficient resource allocation scheme for dually connected non-orthogonal multiple access based LIFI-RF networks Kassahun, Ermias

31 2 p. 1515-1528
article
28 Energy-efficient edge intelligence for task-dependency MEC power grid networks Yang, Chun

31 2 p. 1813-1823
article
29 English listening and speaking ability improvement strategy from Artificial Intelligence wireless network Hu, Nan

31 2 p. 1071-1080
article
30 Enhanced dual lane detection in automotive radar systems using harmonic coordinated beamforming of time-modulated arrays Ma, Yue

31 2 p. 1801-1812
article
31 Enhanced mobile sink path optimization using RPP-RNN algorithm for energy efficient data acquisition in WSNs K, Vignesh Saravanan

31 2 p. 1705-1717
article
32 Enhancing the security of edge-AI runtime environments: a fine-tuning method based on large language models Tang, Di

31 2 p. 1825-1838
article
33 EtherVote: a secure smart contract-based e-voting system Spanos, Achilleas

31 2 p. 1279-1299
article
34 Ets-ddpg: an energy-efficient and QoS-guaranteed edge task scheduling approach based on deep reinforcement learning Zhao, Jiale

31 2 p. 1241-1254
article
35 Exploiting data transmission for route discoveries in mobile ad hoc networks Yu, Xin

31 2 p. 1337-1359
article
36 Fairness-aware placement of multiple aerial base stations in wireless networks Shojaei, Mojtaba

31 2 p. 1037-1052
article
37 Fuzzy based trust model for cloud access control classification mechanism using ghost net architecture Kalaiyarasi, D.

31 2 p. 1959-1973
article
38 HBO-BiLSTM: hybrid bat optimizer-based bidirectional long short-term memory for secure web service recommendation Sivanandam, Chakaravarthi

31 2 p. 1783-1800
article
39 Improving cell edge user performance using cooperative cyclic interleaved non-orthogonal multiple access under rayleigh fading channel Shalini, R. Baby

31 2 p. 1561-1575
article
40 IoT device identification based on network traffic Gu, Dinglin

31 2 p. 1645-1661
article
41 Joint call admission control and load-balancing in ultra-dense cellular networks: a proactive approach Hasan, Md Mehedi

31 2 p. 1529-1540
article
42 Low power decentralized differentially private multi-armed bandit algorithm based performance improvement on long-range radio network More, Prajakta Amol

31 2 p. 1145-1162
article
43 Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm Nirmala, B. Vijaya

31 2 p. 1095-1116
article
44 Metaheuristic assisted hybrid deep classifiers for intrusion detection: a bigdata perspective Madhuridevi, L.

31 2 p. 1205-1225
article
45 Mobile computing power trading decision-making method for vehicle-mounted devices in multi-task edge federated learning Zhang, Huidan

31 2 p. 1227-1239
article
46 MOTO-MASSA: multi-objective task offloading based on modified sparrow search algorithm for fog-assisted IoT applications Khedr, Ahmed M.

31 2 p. 1747-1762
article
47 Multi-Layer Collaborative Federated Learning architecture for 6G Open RAN Zhao, Borui

31 2 p. 1377-1390
article
48 Multi objective constellation optimization and dynamic link utilization for sustainable information delivery using PD-NOMA deep reinforcement learning Yang, Jiuting

31 2 p. 1839-1859
article
49 Octave convolutional multi-head capsule nutcracker network with oppositional Kepler algorithm based spam email detection Ratmele, Ankur

31 2 p. 1625-1644
article
50 On-demand routing algorithm for multipath selection based on node load states in mobile ad hoc networks Deng, Yinjun

31 2 p. 1763-1782
article
51 Power allocation using spatio-temporal graph neural networks and reinforcement learning Jamshidiha, Saeed

31 2 p. 1163-1176
article
52 Remote radio frequency unit selection of self-sustaining distributed base-station system based on downlink physical layer secure transmission Zhou, Xintong

31 2 p. 1081-1093
article
53 Routing attacks detection in MANET using trust management enabled hybrid machine learning Arulselvan, G.

31 2 p. 1481-1495
article
54 RSO-MRSA: rat swarm optimization based modified Rivest–Shamir–Adleman for secure and efficient healthcare monitoring system Sethukarasi, T.

31 2 p. 1129-1143
article
55 Secure cluster head selection in wireless sensor networks using fuzzy based generic algorithm Dhipa, M.

31 2 p. 1435-1448
article
56 Soca: secure offloading considering computational acceleration for multi-access edge computing Yi, Meng

31 2 p. 1021-1035
article
57 Strategies for enhancing the value of the sports tourism industry supported by multi-sensor network technology Zhang, Weiyi

31 2 p. 1587-1599
article
58 Swarming with (visual) secret (shared) mission Dolev, Shlomi

31 2 p. 1911-1929
article
59 Testbed analysis of multi-fog architecture for interoperable Internet of Things Rahman, Hafizur

31 2 p. 1577-1586
article
60 Trusted reputation system for heterogeneous network resource sharing based on blockchain in IoT Li, Jingwen

31 2 p. 1421-1433
article
61 Wearable and ultra-compact mm-wave four port MIMO antenna for dual band n261 and n260 (28/38) GHz 5G applications Kaur, Parminder

31 2 p. 1601-1624
article
                             61 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands