skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 19 of 1,760  for All Library Resources

Results 1 2 3 4 5 next page
Refined by: subject: Algorithms remove subject: Networks remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
A Review of Indoor Localization Techniques and Wireless Technologies
Material Type:
Article
Add to My Research

A Review of Indoor Localization Techniques and Wireless Technologies

Wireless personal communications, 2021-07, Vol.119 (1), p.289-327 [Peer Reviewed Journal]

The Author(s) 2021 ;ISSN: 0929-6212 ;EISSN: 1572-834X ;DOI: 10.1007/s11277-021-08209-5

Digital Resources/Online E-Resources

2
A new clustering routing method based on PECE for WSN
Material Type:
Article
Add to My Research

A new clustering routing method based on PECE for WSN

EURASIP journal on wireless communications and networking, 2015-06, Vol.2015 (1), p.1-13, Article 162 [Peer Reviewed Journal]

Zhang et al. 2015. This is an Open Access article distributed under the terms of the Creative Commons Attribution License ( ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. ;The Author(s) 2015 ;ISSN: 1687-1499 ;ISSN: 1687-1472 ;EISSN: 1687-1499 ;DOI: 10.1186/s13638-015-0399-x

Full text available

3
Obstacle avoidance of mobile robots using modified artificial potential field algorithm
Material Type:
Article
Add to My Research

Obstacle avoidance of mobile robots using modified artificial potential field algorithm

EURASIP journal on wireless communications and networking, 2019-03, Vol.2019 (1), p.1-19, Article 70 [Peer Reviewed Journal]

The Author(s). 2019 ;EURASIP Journal on Wireless Communications and Networking is a copyright of Springer, (2019). All Rights Reserved. © 2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1687-1499 ;ISSN: 1687-1472 ;EISSN: 1687-1499 ;DOI: 10.1186/s13638-019-1396-2

Full text available

4
A quantitative discriminant method of elbow point for the optimal number of clusters in clustering algorithm
Material Type:
Article
Add to My Research

A quantitative discriminant method of elbow point for the optimal number of clusters in clustering algorithm

EURASIP journal on wireless communications and networking, 2021-02, Vol.2021 (1), p.1-16, Article 31 [Peer Reviewed Journal]

The Author(s) 2021 ;The Author(s) 2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1687-1499 ;ISSN: 1687-1472 ;EISSN: 1687-1499 ;DOI: 10.1186/s13638-021-01910-w

Full text available

5
An Optimized Byzantine Fault Tolerance Algorithm for Consortium Blockchain
Material Type:
Article
Add to My Research

An Optimized Byzantine Fault Tolerance Algorithm for Consortium Blockchain

Peer-to-peer networking and applications, 2021-09, Vol.14 (5), p.2826-2839 [Peer Reviewed Journal]

The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021 ;The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021. ;ISSN: 1936-6442 ;EISSN: 1936-6450 ;DOI: 10.1007/s12083-021-01103-8

Full text available

6
Optimal station placement based on grey wolf optimizer for regional target localization
Material Type:
Article
Add to My Research

Optimal station placement based on grey wolf optimizer for regional target localization

EURASIP journal on wireless communications and networking, 2024-12, Vol.2024 (1), p.35 [Peer Reviewed Journal]

The Author(s) 2024 ;The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1687-1472 ;EISSN: 1687-1499 ;DOI: 10.1186/s13638-024-02349-5

Full text available

7
Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks
Material Type:
Article
Add to My Research

Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks

Peer-to-peer networking and applications, 2021-09, Vol.14 (5), p.2858-2873 [Peer Reviewed Journal]

The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 ;The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. ;ISSN: 1936-6442 ;EISSN: 1936-6450 ;DOI: 10.1007/s12083-021-01115-4

Full text available

8
An IoT-based task scheduling optimization scheme considering the deadline and cost-aware scientific workflow for cloud computing
Material Type:
Article
Add to My Research

An IoT-based task scheduling optimization scheme considering the deadline and cost-aware scientific workflow for cloud computing

EURASIP journal on wireless communications and networking, 2019-12, Vol.2019 (1), p.1-19, Article 249 [Peer Reviewed Journal]

The Author(s). 2019 ;EURASIP Journal on Wireless Communications and Networking is a copyright of Springer, (2019). All Rights Reserved. © 2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1687-1499 ;ISSN: 1687-1472 ;EISSN: 1687-1499 ;DOI: 10.1186/s13638-019-1557-3

Full text available

9
Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks
Material Type:
Article
Add to My Research

Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks

Wireless personal communications, 2014-09, Vol.78 (1), p.231-246 [Peer Reviewed Journal]

Springer Science+Business Media New York 2014 ;2015 INIST-CNRS ;ISSN: 0929-6212 ;EISSN: 1572-834X ;DOI: 10.1007/s11277-014-1748-5

Full text available

10
Retraction Note: Network security threat detection technology based on EPSO-BP algorithm
Material Type:
Article
Add to My Research

Retraction Note: Network security threat detection technology based on EPSO-BP algorithm

EURASIP Journal on Information Security, 2024-12, Vol.2024 (1), p.1-1 [Peer Reviewed Journal]

The Author(s) 2024 ;EISSN: 2510-523X ;DOI: 10.1186/s13635-024-00161-8

Full text available

11
Retraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment
Material Type:
Article
Add to My Research

Retraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

EURASIP Journal on Information Security, 2024-12, Vol.2024 (1), p.1-1 [Peer Reviewed Journal]

The Author(s) 2024 ;EISSN: 2510-523X ;DOI: 10.1186/s13635-024-00162-7

Full text available

12
Research on routing optimization of WSNs based on improved LEACH protocol
Material Type:
Article
Add to My Research

Research on routing optimization of WSNs based on improved LEACH protocol

EURASIP journal on wireless communications and networking, 2019-08, Vol.2019 (1), p.1-12, Article 194 [Peer Reviewed Journal]

The Author(s). 2019 ;EURASIP Journal on Wireless Communications and Networking is a copyright of Springer, (2019). All Rights Reserved. © 2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1687-1499 ;ISSN: 1687-1472 ;EISSN: 1687-1499 ;DOI: 10.1186/s13638-019-1509-y

Full text available

13
Double JPEG compression forensics based on a convolutional neural network
Material Type:
Article
Add to My Research

Double JPEG compression forensics based on a convolutional neural network

EURASIP Journal on Information Security, 2016-10, Vol.2016 (1) [Peer Reviewed Journal]

The Author(s). 2016 ;EISSN: 1687-417X ;DOI: 10.1186/s13635-016-0047-y

Digital Resources/Online E-Resources

14
A parallel WOA with two communication strategies applied in DV-Hop localization method
Material Type:
Article
Add to My Research

A parallel WOA with two communication strategies applied in DV-Hop localization method

EURASIP journal on wireless communications and networking, 2020-02, Vol.2020 (1), p.1-10, Article 50 [Peer Reviewed Journal]

The Author(s) 2020 ;EURASIP Journal on Wireless Communications and Networking is a copyright of Springer, (2020). All Rights Reserved. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1687-1499 ;ISSN: 1687-1472 ;EISSN: 1687-1499 ;DOI: 10.1186/s13638-020-01663-y

Full text available

15
A low redundancy data collection scheme to maximize lifetime using matrix completion technique
Material Type:
Article
Add to My Research

A low redundancy data collection scheme to maximize lifetime using matrix completion technique

EURASIP journal on wireless communications and networking, 2019-01, Vol.2019 (1), p.1-29, Article 5 [Peer Reviewed Journal]

The Author(s). 2019 ;EURASIP Journal on Wireless Communications and Networking is a copyright of Springer, (2019). All Rights Reserved. © 2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1687-1499 ;ISSN: 1687-1472 ;EISSN: 1687-1499 ;DOI: 10.1186/s13638-018-1313-0

Full text available

16
A novel algorithm to form stable clusters in vehicular ad hoc networks on highways
Material Type:
Article
Add to My Research

A novel algorithm to form stable clusters in vehicular ad hoc networks on highways

EURASIP journal on wireless communications and networking, 2012-01, Vol.2012 (1), p.1-13, Article 15 [Peer Reviewed Journal]

Rawashdeh and Mahmud; licensee Springer. 2012. This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License ( ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. ;Springer International Publishing AG 2012 ;ISSN: 1687-1499 ;ISSN: 1687-1472 ;EISSN: 1687-1499 ;DOI: 10.1186/1687-1499-2012-15

Full text available

17
RETRACTED ARTICLE: Support attack detection algorithm for recommendation system based on deep learning
Material Type:
Article
Add to My Research

RETRACTED ARTICLE: Support attack detection algorithm for recommendation system based on deep learning

EURASIP journal on wireless communications and networking, 2023-12, Vol.2023 (1), p.63 [Peer Reviewed Journal]

The Author(s) 2023 ;The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1687-1472 ;EISSN: 1687-1499 ;DOI: 10.1186/s13638-023-02269-w

Full text available

18
Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set
Material Type:
Article
Add to My Research

Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set

EURASIP journal on wireless communications and networking, 2021-01, Vol.2021 (1), p.1-23, Article 10 [Peer Reviewed Journal]

The Author(s) 2021 ;The Author(s) 2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1687-1499 ;ISSN: 1687-1472 ;EISSN: 1687-1499 ;DOI: 10.1186/s13638-021-01893-8

Full text available

19
Robust watermarking algorithm for medical images based on log-polar transform
Material Type:
Article
Add to My Research

Robust watermarking algorithm for medical images based on log-polar transform

EURASIP journal on wireless communications and networking, 2022-03, Vol.2022 (1), p.1-11, Article 24 [Peer Reviewed Journal]

The Author(s) 2022 ;The Author(s) 2022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1687-1499 ;ISSN: 1687-1472 ;EISSN: 1687-1499 ;DOI: 10.1186/s13638-022-02106-6

Full text available

Results 1 - 19 of 1,760  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Refine My Results

Creation Date 

From To
  1. Before 2007  (4)
  2. 2007 To 2010  (65)
  3. 2011 To 2014  (528)
  4. 2015 To 2019  (547)
  5. After 2019  (619)
  6. More options open sub menu

Resource Type 

  1. Articles  (1,759)
  2. Reports  (1)
  3. Books  (1)
  4. More options open sub menu

Searching Remote Databases, Please Wait