nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive RL-driven spectrum allocation in multi-cell cognitive B5G networks
|
Bany Salameh, Haythem |
|
|
31 |
4 |
p. 3239-3254 |
artikel |
2 |
Advanced chunk-based data deduplication framework for secure data storage in cloud using hybrid heuristic assisted optimal key-based encryption
|
Ruba, S. |
|
|
31 |
4 |
p. 3467-3489 |
artikel |
3 |
An integrated independent antenna system for multiradio wireless communication applications
|
Prabhu, P. |
|
|
31 |
4 |
p. 3205-3222 |
artikel |
4 |
A novel multi-objective-derived heuristic-assisted reliable routing path selection scheme in vehicular ad hoc networks
|
Devi, S. Kalpana |
|
|
31 |
4 |
p. 3059-3077 |
artikel |
5 |
A secure authentication and optimization based device-to-device communication for 5G enabled IoT applications of smart cities
|
Rani, Therkkumthala Prakash |
|
|
31 |
4 |
p. 3167-3186 |
artikel |
6 |
Empowering RIS-assisted NOMA networks with deep learning for user clustering and phase shifter optimization
|
Banday, Yusra |
|
|
31 |
4 |
p. 3149-3166 |
artikel |
7 |
Enhanced autoencoder and deep neural network (AE&DNN) method for ddos attack recognition
|
Pajila, P. J. Beslin |
|
|
31 |
4 |
p. 3277-3295 |
artikel |
8 |
Enhancing the spectral efficiency of full duplex massive MIMO system using EHBM3SED Detection model
|
Soni, Chanchal |
|
|
31 |
4 |
p. 3111-3126 |
artikel |
9 |
Forensics and security issues in the Internet of Things
|
Ahmed, Shams Forruque |
|
|
31 |
4 |
p. 3431-3466 |
artikel |
10 |
Friendly jammer selection improves physical layer security in energy harvesting communications over Nakagami-m channels
|
Jiang, Xiao |
|
|
31 |
4 |
p. 3503-3516 |
artikel |
11 |
Hybrid artificial humming bird and coati optimization algorithm fostered power aware application mapping in 3D-NoC system
|
Madhini, M. |
|
|
31 |
4 |
p. 3517-3531 |
artikel |
12 |
Improved PSO based channel estimation algorithm for mmWave massive MIMO systems: hybridization technology and extreme perturbation
|
Jing, Xiaoli |
|
|
31 |
4 |
p. 3491-3502 |
artikel |
13 |
Machine learning meets IoT: developing an energy-efficient WSN routing protocol for enhanced network longevity
|
Tan, Nguyen Duy |
|
|
31 |
4 |
p. 3127-3147 |
artikel |
14 |
Micromachined octa-port high self isolation asymmetric tapered feed MIMO antenna with flexible capabilities and SAR analysis integrating 5G-sub 6 GHz, microwave, and millimeter-wave applications
|
Judice, Antony |
|
|
31 |
4 |
p. 3365-3394 |
artikel |
15 |
Multi-objective optimal 4-phase RPl routing technique using chimp sine cosine algorithm for IoT system
|
Gurav, Shashidhar |
|
|
31 |
4 |
p. 3297-3313 |
artikel |
16 |
Outage analysis of a two users NOMA with partial selection of an energy harvesting relay
|
Ghosh, Priyanka |
|
|
31 |
4 |
p. 3223-3237 |
artikel |
17 |
Performance analysis for IRS-enabled full-duplex energy harvesting NOMA under practical imperfections
|
Le-Thanh, Toi |
|
|
31 |
4 |
p. 3043-3058 |
artikel |
18 |
Performance study on task offloading strategy with cloud-edge-device collaboration based on hybrid access networks
|
Du, Haoran |
|
|
31 |
4 |
p. 3079-3093 |
artikel |
19 |
Q-learning based heterogeneous network selection decision algorithm for ultra reliable and low latency communication services
|
Verma, Abhishek Kumar |
|
|
31 |
4 |
p. 3095-3110 |
artikel |
20 |
Secured VANET: an improved COOT-algorithm-based optimal routing protocol with multiple authentication and fake message detection for secure data transmission
|
Patil, Mayur Jagdish |
|
|
31 |
4 |
p. 3315-3342 |
artikel |
21 |
Securing and optimizing IoT offloading with blockchain and deep reinforcement learning in multi-user environments
|
Heidari, Arash |
|
|
31 |
4 |
p. 3255-3276 |
artikel |
22 |
System utility maximization scheme for wireless cellular networks
|
Xie, Shaoguo |
|
|
31 |
4 |
p. 3343-3363 |
artikel |
23 |
TCC: Time constrained classification of VPN and non-VPN traffic using machine learning algorithms
|
Gudla, Raju |
|
|
31 |
4 |
p. 3415-3429 |
artikel |
24 |
π-tree based knowledge representation and recommendation system in cognitive IoT
|
Jha, Vidyapati |
|
|
31 |
4 |
p. 3395-3413 |
artikel |
25 |
ZTA: a novel zero trust framework for detection and prevention of malicious android applications
|
Nazir, Aleena |
|
|
31 |
4 |
p. 3187-3203 |
artikel |