DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 283
1.
  • A PSO-based energy-efficien... A PSO-based energy-efficient data collection optimization algorithm for UAV mission planning
    Lin, Lianhai; Wang, Zhigang; Tian, Liqin ... PloS one, 01/2024, Letnik: 19, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    With the development of the Internet of Things (IoT), the use of UAV-based data collection systems has become a very popular research topic. This paper focuses on the energy consumption problem of ...
Celotno besedilo
Dostopno za: UL
2.
  • Using Trust to Establish a ... Using Trust to Establish a Secure Routing Model in Cognitive Radio Network
    Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin ... PloS one, 09/2015, Letnik: 10, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of ...
Celotno besedilo
Dostopno za: UL

PDF
3.
  • Data Collection System of I... Data Collection System of IoT Based on the Coordination of Drones and Unmanned Surface Vehicle
    Wang, Zhigang; Tian, Liqin; Lin, Lianhai ... Journal of advanced transportation, 02/2023, Letnik: 2023
    Journal Article
    Recenzirano
    Odprti dostop

    With the continuous renewal and rise of various flight equipment, this article designs a method of water data collection, which is realized through the coordination of an unmanned surface vehicle ...
Celotno besedilo
Dostopno za: CEKLJ, UL
4.
  • Fault Tolerance Mechanism C... Fault Tolerance Mechanism Combining Static Backup and Dynamic Timing Monitoring for Cluster Heads
    Tong, Yinghua; Tian, Liqin; Lin, Lianhai ... IEEE access, 2020, Letnik: 8
    Journal Article
    Recenzirano
    Odprti dostop

    Internet of things (IoT) monitoring systems have been extensively applied in smart homes, underwater monitoring, volcano monitoring, and health monitoring. In IoT applications, a wireless sensor ...
Celotno besedilo
Dostopno za: UL

PDF
5.
  • Web User Trust Evaluation: ... Web User Trust Evaluation: A Novel Approach Using Fuzzy Petri Net and Behavior Analysis
    Wu, Zenan; Tian, Liqin; Zhang, Yi ... Symmetry, 08/2021, Letnik: 13, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    With the development of society and information technology, people’s dependence on the Internet has gradually increased, including online shopping, downloading files, reading books, and online ...
Celotno besedilo
Dostopno za: UL

PDF
6.
  • Trust evaluation model of c... Trust evaluation model of cloud user based on behavior data
    Chen, Zhenguo; Tian, Liqin; Lin, Chuang International journal of distributed sensor networks, 05/2018, Letnik: 14, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    In the process of using the cloud platform, how to ensure the safety of users is a matter we must concern. The user authentication can provide a certain degree of security, but when the user ...
Celotno besedilo
Dostopno za: UL

PDF
7.
  • Privacy-Preserving Model of... Privacy-Preserving Model of IoT Based Trust Evaluation
    CHEN, Zhenguo; TIAN, Liqin IEICE Transactions on Information and Systems, 01/2017, Letnik: E100.D, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    With the popularization of Internet of things (IoT), the interaction between human and IoT has become a daily life. In this interaction, the objects of IoT usually require access to personal data, ...
Celotno besedilo
Dostopno za: UL

PDF
8.
  • A Reputation Bootstrapping ... A Reputation Bootstrapping Model for E-Commerce Based on Fuzzy DEMATEL Method and Neural Network
    Wang, Yan; Tian, Liqin; Chen, Zhenguo IEEE access, 2019, Letnik: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Reputation evaluation plays an important role in determining the credibility of online entities. Especially in e-commerce systems, consumers usually give priority to this indicator when choosing ...
Celotno besedilo
Dostopno za: UL

PDF
9.
  • Game Analysis of Access Con... Game Analysis of Access Control Based on User Behavior Trust
    Wang, Yan; Tian, Liqin; Chen, Zhenguo Information, 04/2019, Letnik: 10, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Due to the dynamics and uncertainty of the current network environment, access control is one of the most important factors in guaranteeing network information security. How to construct a scientific ...
Celotno besedilo
Dostopno za: UL

PDF
10.
Celotno besedilo
Dostopno za: UL

PDF
1 2 3 4 5
zadetkov: 283

Nalaganje filtrov