Your selections:
- Hewawasam, Hasitha, Ibrahim, Yousef, Kahandawa, Gayan, Choudhury, Tanveer
- Zhu, Xiao, Zhao, Xing, Li, Yong, Liu, Shunpan, Yang, Huanyu, Tian, Jihao, Hu, Jiefeng, Mai, Ruikun, He, Zhengyou
Sizing HESS as inertial and primary frequency reserve in low inertia power system
- Akram, Umer, Mithulananthan, N., Shah, Rakibuzzaman, Pourmousavi, S. Ali
Agoraphilic navigation algorithm under dynamic environment
- Hewawasam, Hasitha, Ibrahim, Yousef, Appuhamillage, Gayan, Choudhury, Tanveer
- Ahmed, Ejaz, Yaqoob, Ibrar, Gani, Abdullah, Imran, Muhammad, Guizani, Mohsen
- Afsana, Fariha, Paul, Manoranjan, Murshed, Manzur, Taubman, David
Overview of power converter control in microgrids - challenges, advances, and future trends
- Hu, Jiefeng, Shan, Yinghao, Cheng, Ka, Islam, Syed
Spectral and energy efficiency maximization for content-centric c-rans with edge caching
- Vu, Tung Thanh, Ngo, Duy Trong, Dao, Minh Ngoc, Durrani, Salman, Middleton, Richard
Social-aware resource allocation and optimization for D2D communication
- Ahmed, Ejaz, Yaqoob, Ibrar, Gani, Abdullah, Imran, Muhammad, Guizani, Mohsen
Deep learning and big data technologies for IoT security
- Amanullah, Mohamed, Habeeb, Riyaz, Nasaruddin, Fariza, Gani, Abdullah, Ahmed, Ejaz, Nainar, Abdul, Akim, Nazihah, Imran, Muhammad
Value-based caching in information-centric wireless body area networks
- Al-Turjman, Fadi, Imran, Muhammad, Vasilakos, Athanasios
On connectivity of wireless sensor networks with directional antennas
- Wang, Qiu, Dai, Hong-Ning, Zheng, Zibin, Imran, Muhammad, Vasilakos, Athanasios
An extreme learning machine based adaptive VISMA for stability enhancement of renewable rich power systems
- Setiadi, Herlambang, Shah, , Rakibuzzaman, Islam, Md Rabiul, Asfani, Dimas, Nasution, Tigor, Abdillah, Muhammad, Megantoro, Prisma, Krismanto, Awan
Sensitivity analysis for vulnerability mitigation in hybrid networks
- Ur‐rehman, Attiq, Gondal, Iqbal, Kamruzzaman, Joarder, Jolfaei, Alireza
Artificial noise aided scheme to secure UAV-assisted internet of things with wireless power transfer
- Wang, Qubeijian, Dai, Hong-Ning, Li, Xuran, Shukla, Mahendra, Imran, Muhammad
A quantitative risk assessment model involving frequency and threat degree under line-of-business services for infrastructure of emerging sensor networks
- Jing, Xu, Hu, Hanwen, Yang, Huijun, Au, Man, Li, Shuqin, Xiong, Naixue, Imran, Muhammad, Vasilakos, Athanasios
Unmanned aerial vehicle for internet of everything : opportunities and challenges
- Liu, Yalin, Dai, Hong-Ning, Wang, Qubeijian, Shukla, Mahendra, Imran, Muhammad
Secure authentication for remote patient monitoring withwireless medical sensor networks
- Hayajneh, Taier, Mohd, Bassam, Imran, Muhammad, Almashaqbeh, Ghada, Vasilakos, Athanasios
Internet of things architecture : recent advances, taxonomy, requirements, and open challenges
- Yaqoob, Ibrar, Ahmed, Ejaz, Hashem, Ibrahim, Ahmed, Abdelmuttlib, Gani, Abdullah, Imran, Muhammad, Guizani, Mohsen
Mobile crowd sensing for traffic prediction in internet of vehicles
- Wan, Jiafu, Liu, Jianqi, Shao, Zehui, Vasilakos, Athanasios, Imran, Muhammad, Zhou, Keliang
Are you sure you would like to clear your session, including search history and login status?