The Model to Determine the Location and the Date by the Length of Shadow of Objects for Communication Networks
Publisher
Springer Singapore
Reference22 articles.
1. H. Tao, M.Z.A. Bhuiyan, M.A. Rahman, T. Wang, J. Wu, S.Q. Salih, Y. Li, T. Hayajneh, TrustData: trustworthy and secured data collection for event detection in industrial cyber-physical system. IEEE Trans. Ind. Inform. (2019) 2. M.A. Rahman, A.T. Asyhari, S. Azad, M.M. Hasan, C.P. Munaiseche, M. Krisnanda, A cyber-enabled mission-critical system for post-flood response: exploiting TV White Space as network backhaul links. IEEE Access 7, 100318–100331 (2019) 3. H. Tao, I. Ebtehaj, H. Bonakdari, S. Heddam, C. Voyant, N. Al-Ansari, R. Deo, Z.M. Yaseen, Designing a new data intelligence model for global solar radiation prediction: application of multivariate modeling scheme. Energies 12(7), 1365 (2019) 4. M.A. Rahman, Q.M. Salih, A.T. Asyhari, S. Azad, Traveling distance estimation to mitigate unnecessary handoff in mobile wireless networks. Ann. Telecommun. 1–10 (2019) 5. H. Tao, M.Z.A. Bhuiyan, M.A. Rahman, G. Wang, T. Wang, M.M. Ahmed, J. Li, Economic perspective analysis of protecting big data security and privacy. Future Gener. Comput. Syst. 98, 660–671 (2019)
|
|