default search action
Mobile Networks and Applications, Volume 28
Volume 28, Number 1, February 2023
- Jaime Lloret, Lorena Parra:
Industrial Internet of Things. 1-3 - Imanol Picallo, Peio López-Iturri, Mikel Celaya-Echarri, Leyre Azpilicueta, Francisco Falcone:
Deterministic Wireless Channel Characterization towards the Integration of Communication Capabilities to Enable Context Aware Industrial Internet of Thing Environments. 4-18 - Ming-Tuo Zhou, Tian-Feng Ren, Zhi-Ming Dai, Xin-Yu Feng:
Task Scheduling and Resource Balancing of Fog Computing in Smart Factory. 19-30 - Jose Vicente Sorribes, Lourdes Peñalver, José Miguel Jiménez, Sandra Sendra:
Energy-aware Randomized Neighbor Discovery Protocol based on Collision Detection in Wireless Ad Hoc Networks. 31-48 - Joan Bas, Alexis A. Dowhuszko:
End-To-End Performance of an Uplink NB-IoT Transmission Relayed on a Low-Altitude UAV Platform with Non-Orthogonal Single-Carrier FDMA in the Optical Wireless Backhaul Link. 49-64 - Sandra Sendra, Lorena Parra, José Miguel Jiménez, Laura García, Jaime Lloret:
LoRa-based Network for Water Quality Monitoring in Coastal Areas. 65-81 - Sérgio F. Lopes, António Duarte Costa, Henrique M. Dinis Santos:
Editorial: Wireless Networks and IoT Applications. 82-84 - Amen Debbiche, Ikbal Chammakhi Msadaa, Khaled Grayaa:
EIPSO: An Energy Efficient Indoor Positioning System based on Game Theory. 85-96 - Luis Magadán, Francisco J. Suárez, Juan C. Granda, Daniel F. García:
Low-Cost Industrial IoT System for Wireless Monitoring of Electric Motors Condition. 97-106 - Sondes Ksibi, Faouzi Jaïdi, Adel Bouhoula:
A Comprehensive Study of Security and Cyber-Security Risk Management within e-Health Systems: Synthesis, Analysis and a Novel Quantified Approach. 107-127 - Udayakumar Allimuthu, K. Mahalakshmi:
Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation. 128-159 - David Fotue, Houda Labiod:
Efficient Tree Aggregation and Processing Time for Wireless Sensor Networks. 160-167 - Aicha Guefrachi, Sarra Nighaoui, Sonia Zaibi, Ammar Bouallegue:
Performance Improvement of Kötter and Kschischang Codes and Lifted Rank Metric Codes in Random Linear Network Coding. 168-177 - Faris A. Almalki, Saeed H. Alsamhi, Radhya Sahal, Jahan Hassan, Ammar Hawbani, N. S. Rajput, Abdu Saif, Jeff Morgan, John G. Breslin:
Green IoT for Eco-Friendly and Sustainable Smart Cities: Future Directions and Opportunities. 178-202 - Milos Poliak, Adela Poliaková, Natalia Aleksandrovna Zhuravleva, Elvira Nica:
Identifying the Impact of Parking Policy on Road Transport Economics. 203-210 - Lucia Knapcíková, Annamária Behúnová, Marcel Behún:
The Strategic Impact of E-Business on Competitiveness of the Enterprise. 211-219 - Sebastian Saniuk, Dagmar Cagánová, Anna Saniuk:
Knowledge and Skills of Industrial Employees and Managerial Staff for the Industry 4.0 Implementation. 220-230 - Ivan Cvitic, Dragan Perakovic, Marko Perisa, Anca D. Jurcut:
Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic. 231-242 - Ivan Cvitic, Dragan Perakovic, Marko Perisa, Anca D. Jurcut:
Correction to: Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic. 243 - Devica Verma, Harshit Saraf, Sindhu Hak Gupta:
Prediction of user throughput from Network Parameters of LTE Network using machine learning. 244-253 - Khalid Mohiuddin, Asharul Islam, Mohammad Aminul Islam, Mohammed Abdul Khaleel, Samreen Shahwar, Sajid Ali Khan, Sadaf Yasmin, Mohammad Rashid Hussain:
Component-Centric Mobile Cloud Architecture Performance Evaluation: an Analytical Approach for Unified Models and Component Compatibility with Next Generation Evolving Technologies. 254-271 - Md. Motaharul Islam, Ibna Kowsar, Mashfiq Shahriar Zaman, Md. Fahmidur Rahman Sakib, Nazmus Saquib, Syed Md. Shamsul Alam:
A Novel Approach to Enhance Safety on Drowsy Driving in Self-Driving Car. 272-284 - Hongwei Zhao, Huanzhu Wang, Yue Yan:
SCMA Joint Coding and Decoding Algorithm Based on Code Reliability. 285-295 - Iqbal H. Sarker, Asif Irshad Khan, Yoosef B. Abushark, Fawaz Alsolami:
Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions. 296-312 - Lun-Ping Hung, Dong-Yuh Yang, Zong-Jie Wu, Chien-Liang Chen:
Constructing a Search Mechanism for Dementia Patient Based on Multi-Hop Transmission Path Planning and Clustering Method. 313-324 - Yidian Zhang, Lin Zhang, Ping Lan, Wenyong Li, Dan Yang, Zhiqiang Wu:
Statistical Feature Aided Intelligent Deep Learning Machine Translation in Internet of Things. 325-333 - Jia Xie, Zhou Zhang, Ye Yan, Hailin Zhang:
DOS by Dynamic Groups: a Coalition Formation Game Perspective. 334-345 - Yuyu Yin, Stelios Fuentes:
Editorial: AI-based Data Intelligent for IoT Computing. 346-347 - Yueshen Xu, Xinyu Zhao, Zhiping Jiang, Zhibo Qiu, Lei Hei, Rui Li:
Intelligent Semantic Annotation for Mobile Services for IoT Computing from Heterogeneous Data. 348-358 - Xiangyu Guo, Mingliang Gao, Wenzhe Zhai, Qilei Li, Kyu Hyung Kim, Gwanggil Jeon:
Dense Attention Fusion Network for Object Counting in IoT System. 359-368 - Guoqing Xu, Xiaolong Xu, Honghao Gao, Fu Xiao:
FP-RCNN: A Real-Time 3D Target Detection Model based on Multiple Foreground Point Sampling for Autonomous Driving. 369-381 - Xiaoxian Yang, Yuting Wei, Linxiang Shi, Lin Chen:
Applying Probabilistic Model Checking to Path Planning for a Smart Multimodal Transportation System Using IoT Sensor Data. 382-393 - Zhen Qin, Shuiguang Deng, Xueqiang Yan, Lu Lu, Mingyu Zhao, Yan Xi, Jianjun Wu, Tao Sun, Nanxiang Shi:
6G Data Plane: A Novel Architecture Enabling Data Collaboration with Arbitrary Topology. 394-405 - Xu Ding, Yang Wang, Hang Zheng, Juan Xu, Hua Zhai:
A Novel Variable Convolution Kernel Design According to Time-frequency Resolution Altering in Bearing Fault Diagnosis. 406-420 - Jifeng Chen, Yang Yang:
A Context-aware Approach to Task Scheduling for Time Series Data Prediction in Mobile Edge Computing. 421-431 - Retraction Note: E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption. 432
- Retraction Note: Complex IoT Control System Modeling from Perspectives of Environment Perception and Information Security. 433
- Retraction Note: Large-Scale Data Recommended Regulate Algorithm Based on Distributed Intelligent System Model under Cloud Environment. 434
- Retraction Note: Multi Information Amount Movement Aware- Routing in FANET: Flying Ad-hoc Networks. 435
Volume 28, Number 2, April 2023
- Aakash Ahmad, Asad Waqar Malik, Abdulrahman A. Alshdadi, Wilayat Khan, Maryam Sajjad:
Adaptive Security for Self-Protection of Mobile Computing Devices. 1-20 - Baoqi Huang, Long Zhao, En Wang, Bing Jia:
Editorial: sensing, Service and Security in Mobile Internet (MobilWare 2020). 437-438 - Zhilu Yuan, Shengjun Tang, Qiuyang Huang, Chijun Zhang, Zeynep Ertem, Zhanwei Du, Yuan Bai:
The Effects of Climatological Factors on Global Influenza Across Temperate and Tropical Regions. 439-451 - Dandan Peng, Le Sun, Rui Zhou, Yilin Wang:
Study QoS-aware Fog Computing for Disease Diagnosis and Prognosis. 452-459 - Baowei Wang, Peng Zhao, Mingming Huang, Yuxuan Dai, Wenjie Zhu:
An Improved Recommendation Algorithm For Polarized Population. 460-472 - Hui Qi, Peipei Li, Chunbo Wang, Jinlei Du, Xiaoqiang Di:
A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication. 473-485 - William A. Casey, Yang Cai:
Editorial: Renaissance of Biomimicry Computing. 486-489 - William Austin Casey, Yang Cai:
Correction to: Editorial: Renaissance of Biomimicry Computing. 490 - Kevin R. Pilkiewicz, Pratip Rana, Michael L. Mayo, Preetam Ghosh:
Predicting Supramolecular Structure from the Statistics of Individual Molecular Events. 491-498 - Alberto Arteta Albert, Yanjun Zhao, Luis Fernando de Mingo López, Nuria Gómez Blas:
An Encrypted Proposal Method in Membrane Computing Aggregation (MCA). 499-506 - Vincent A. Cicirello:
On Fitness Landscape Analysis of Permutation Problems: From Distance Metrics to Mutation Operator Selection. 507-517 - Sylia Mekhmoukh Taleb, Yassine Meraihi, Seyedali Mirjalili, Dalila Acheli, Amar Ramdane-Cherif, Asma Benmessaoud Gabis:
Mesh Router Nodes Placement for Wireless Mesh Networks Based on an Enhanced Moth-Flame Optimization Algorithm. 518-541 - Xujiong Ma, Jun Mou, Chenguang Ma, Jieyang Wang, Tianming Liu:
A New Meminductor Based Hyperchaotic Circuit and its Implementation. 542-550 - Xiaolin Jiang, Zhengyu Tang, Susu Qu:
Detection Algorithm of Compressed Sensing Signal in Generalized Spatial Modulation System. 551-560 - Chenguang Ma, Jun Mou, Peng Li, Feifei Yang, Tianming Liu:
Multistability Analysis and Digital Circuit Implementation of a New Conformable Fractional-Order Chaotic System. 561-570 - Xiaolin Jiang, Susu Qu, Zhengyu Tang:
Study on the Elimination of MIMO Signal Interference in Data Chain System. 571-578 - Qingjiang Yang, Xiangxiang Qu:
High-Precision Harmonic Analysis Algorithm Based on Five-Term MSD Second-Order Self-Convolution Window Four-Spectrum-Line Interpolation. 579-585 - Xueying Liu, Xueyan Zhang, Xin Liu:
Simultaneous Wireless Information and Power Transfer for OFDM-based Cooperative Communication. 586-597 - Rashid Mehmood, Aziz Sheikh, Charlie Catlett, Imrich Chlamtac:
Editorial: Smart Societies, Infrastructure, Systems, Technologies, and Applications. 598-602 - Ebtesam Ahmad Alomari, Iyad A. Katib, Rashid Mehmood:
Iktishaf: a Big Data Road-Traffic Event Detection Tool Using Twitter and Spark Machine Learning. 603-618 - José Balsa-Barreiro, Pedro M. Valero-Mora, Mónica Menéndez, Rashid Mehmood:
Extraction of Naturalistic Driving Patterns with Geographic Information Systems. 619-635 - Furqan Alam, Rashid Mehmood, Iyad A. Katib, Saleh M. Altowaijri, Aiiad Albeshri:
TAAWUN: a Decision Fusion and Feature Specific Road Detection Approach for Connected Autonomous Vehicles. 636-652 - Samina Kausar, Huahu Xu, Ata Ullah, Wenhao Zhu, Muhammad Yasir Shabir:
Fog-Assisted Secure Data Exchange for Examination and Testing in E-learning System. 673-689 - Shubhani Aggarwal, Neeraj Kumar:
Fog Computing for 5G-Enabled Tactile Internet: Research Issues, Challenges, and Future Research Directions. 690-717 - Nabil Kadjouh, Ahcène Bounceur, Madani Bezoui, Mohamed Essaid Khanouche, Reinhardt Euler, Mohammad Hammoudeh, Loïc Lagadec, Sohail Jabbar, Fadi M. Al-Turjman:
A Dominating Tree Based Leader Election Algorithm for Smart Cities IoT Infrastructure. 718-731 - Moez Krichen:
Improving Formal Verification and Testing Techniques for Internet of Things and Smart Cities. 732-743 - Sardar Usman, Rashid Mehmood, Iyad A. Katib, Aiiad Albeshri, Saleh M. Altowaijri:
ZAKI: A Smart Method and Tool for Automatic Performance Optimization of Parallel SpMV Computations on Distributed Memory Machines. 744-763 - Suyel Namasudra, Pascal Lorenz, Uttam Ghosh:
Editorial: The New Era of Computer Network by using Machine Learning. 764-766 - Sonal kumari, Karan Singh, Tayyab Ali Khan, Mazeyanti M. Ariffin, Senthilkumar Mohan, Dumitru Baleanu, Ali Ahmadian:
A Novel Approach for Continuous Authentication of Mobile Users Using Reduce Feature Elimination (RFE): A Machine Learning Approach. 767-781 - Mehul Sharma, Shrid Pant, Priety Yadav, Deepak Kumar Sharma, Nitin Gupta, Gautam Srivastava:
Advancing Security in the Industrial Internet of Things Using Deep Progressive Neural Networks. 782-794 - Omar A. Alzubi, Jafar Ahmad Abed Alzubi, Tareq Mahmod Alzubi, Ashish Singh:
Quantum Mayfly Optimization with Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification Model. 795-807 - Yuwen Pan, Yuanwang Yang, Hantao Liu, Wenzao Li:
UAVs and Mobile Sensors Trajectories Optimization with Deep Learning Trained by Genetic Algorithm Towards Data Collection Scenario. 808-823 - Hafiz Munsub Ali, Alain Bertrand Bomgni, Syed Ahmad Chan Bukhari, Tahir Hameed, Jun Liu:
Power-Aware Fog Supported IoT Network for Healthcare Infrastructure Using Swarm Intelligence-Based Algorithms. 824-838 - Hao Zhang, Yuandong Min, Sanya Liu, Hang Tong, Yaopeng Li, Zhihan Lv:
Improve the Security of Industrial Control System: A Fine-Grained Classification Method for DoS Attacks on Modbus/TCP. 839-852 - Kumar Debasis, Lakhan Dev Sharma, Vijay Kumar Bohat, Robin Singh Bhadoria:
An Energy-Efficient Clustering Algorithm for Maximizing Lifetime of Wireless Sensor Networks using Machine Learning. 853-867
Volume 28, Number 3, June 2023
- Yishu Huang, Changling Peng, Weina Fu:
Key Technologies of Quality Assessment in Network and Distance Education. 869-872 - Jiaji Wang, Suresh Chandra Satapathy, Shuihua Wang, Yudong Zhang:
LCCNN: a Lightweight Customized CNN-Based Distance Education App for COVID-19 Recognition. 873-888 - Feng Chen, Thippa Reddy Gadekallu:
Multi-dimensional Data Optimal Classification Algorithm for Quality Evaluation of Distance Teaching in Universities. 889-899 - Jing Zhou, Norbert Herencsar:
Abnormal Behavior Determination Model of Multimedia Classroom Students Based on Multi-task Deep Learning. 900-913 - Xiao Liu, Gautam Srivastava, Maazen Alsabaan:
Quantitative Evaluation of NDE Reliability Based on Back Propagation Neural Network and Fuzzy Comprehensive Evaluation. 914-923 - Lili Chen, Mohamed Baza, Hani Alshahrani:
Data Integration Method of Multi-source Feedback Evaluation for Remote Teaching Quality. 924-934 - Lili Chen, Mohamed Baza, Hani Alshahrani:
Correction: Data Integration Method of Multi-source Feedback Evaluation for Remote Teaching Quality. 935 - Feng Xue, Dawid Polap:
Detail Feature Inpainting of Art Images in Online Educational Videos based on Double Discrimination Network. 936-949 - Yuan Hu, Mahwish Kundi:
A Multi-Scale Gabor Filter-Based Method for Enhancing Video Images in Distance Education. 950-959 - Lei Ma, Hongxue Yang, Jianxing Yang:
A Multimodal Teaching Quality Evaluation for Hybrid Education Based on Stepwise Regression Analysis. 960-970 - Yang Yang, Haitao Shang, Nasir Jamal, Farhan Ullah:
Video Resources Recommendation for Online Tourism Teaching in Interactive Network. 971-982 - Wenqing Chen, Ting Yang:
A Recommendation System of Personalized Resource Reliability for Online Teaching System under Large-scale User Access. 983-994 - Can Wang, Syed Atif Moqurrab, Joon Yoo:
Face Recognition of Remote Teaching Video Image Based on Improved Frame Difference Method. 995-1006 - Hongbin Cao, Gautam Srivastava:
An Encryption Transmission System for High-speed Private Data Streams in Online Education in the Specialty of "Traffic Engineering". 1007-1018 - Meiping Peng, Bo Li, Zhongjiang Yan:
Multi-BSS Multi-User Full Duplex MAC Protocol based on AP Cooperation for the Next Generation WLAN. 1019-1030 - Yao Zhao, Jian Li, Zhenjiang Zhang, Bo Shen:
SECC Framework: Get the Best from Both the Cloud and Edge Computing in Internet of Things. 1031-1042 - Chun-Cheng Lin, Ching-Tsorng Tsai, Yu-Liang Liu, Tsai-Ting Chang, Yung-Sheng Chang:
Security and Privacy in 5G-IIoT Smart Factories: Novel Approaches, Trends, and Challenges. 1043-1058 - Zhenzhen Yan, Mao Yang, Xiaochang Zhang:
Co-NOMA: AP Coordination Based NOMA Protocol for the Next-Generation WLANs. 1059-1075 - Fang-Chang Kuo, Hwang-Cheng Wang, Chih-Cheng Tseng, Jung-Shyr Wu, Jia-Hao Xu, Jieh-Ren Chang:
D2D Resource Allocation Based on Reinforcement Learning and QoS. 1076-1095 - Chung-Ming Huang, Rung-Shiang Cheng, Yan-Jia Pan:
The Claim-based Priority-Discriminated Channel Access (CPDCA) Method using the Registered Backoff Time Mechanism for IEEE 802.11ah. 1096-1115 - Miroslav Kostadinovic, Dalibor Dobrilovic, Goran Jausevac, Gordana Jotanovic, Zeljko Stojanov, Vladimir Brtka:
Performance Investigation of WirelessHART in the Coexistence with Wi-Fi Networks. 1116-1125 - Andreia Figueiredo, Pedro Rito, Miguel Luís, Susana Sargento:
Mobility Sensing and V2X Communication for Emergency Services. 1126-1141 - Nguyen-Son Vo, Antonino Masaracchia, Zhichao Sheng, Thanh Tuan Nguyen:
Editorial: Towards 6G Networks: Technologies, Services and Applications. 1142-1144 - Huaqiong Duan, Abbas Mirzaei:
Adaptive Rate Maximization and Hierarchical Resource Management for Underlay Spectrum Sharing NOMA HetNets with Hybrid Power Supplies. 1145-1161 - Youqing Wang, Kun Zhao, Zhengqi Zheng:
An Improved 3D Indoor Positioning Study with Ray Tracing Modeling for 6G Systems. 1162-1175 - Sagar Kavaiya:
Learn with Curiosity: A Hybrid Reinforcement Learning Approach for Resource Allocation for 6G enabled Connected Cars. 1176-1186 - Van-Phuc Hoang, Ngoc-Tuan Do, Van-Sang Doan:
Performance Analysis of Deep Learning Based Non-profiled Side Channel Attacks Using Significant Hamming Weight Labeling. 1187-1196 - Cuong Pham-Quoc, Vien Nguyen-Duy-Nhat, Mai T. P. Le, Hung Nguyen-Le, Chien Tang-Tan, Tuan Tang-Anh, Nghia Nguyen-Xuan:
Robust 3D Beamforming for Secure UAV Communications by DAE. 1197-1205 - Ba Cao Nguyen, Quyet-Nguyen Van, Le The Dung, Tran Manh Hoang, Nguyen Van Vinh, Gia Thien Luu:
Secrecy Performance of Multi-RIS-Assisted Wireless Systems. 1206-1219
Volume 28, Number 4, August 2023
- Wei-Kuo Chiang, Kai-Heng Lin:
An Efficient Group-based Service Authentication and Session Key Negotiation Scheme for mMTC Devices in 5G. 1221-1245 - Goran Jausevac, Dalibor Dobrilovic, Vladimir Brtka, Gordana Jotanovic, Dragan Perakovic, Zeljko Stojanov:
Multirole UAVs Supported Parking Surveillance System. 1246-1254 - Antonio Muñoz, Carmen Fernández-Gago, Roberto López-Villa:
A Test Environment for Wireless Hacking in Domestic IoT Scenarios. 1255-1264 - Annamária Behúnová, Marcel Behún, Lucia Knapcíková:
Using Industry 4.0 Tools in the Implementation of Modern Event Marketing. 1265-1271 - Jack Long, Ivan Cvitic, Xiaolu Zhang, Dragan Perakovic, Kim-Kwang Raymond Choo:
Badoo Android and iOS Dating Application Analysis. 1272-1281 - George Grispos, Kim-Kwang Raymond Choo, William Bradley Glisson:
Sickly Apps: A Forensic Analysis of Medical Device Smartphone Applications on Android and iOS Devices. 1282-1292 - Stella Hrehová, Jozef Husár, Lucia Knapcíková:
The Fuzzy Logic Predictive Model for Remote Increasing Energy Efficiency. 1293-1305 - Ivan Cvitic, Dragan Perakovic, Marko Perisa, Dominik Sever:
Defining Cross-Site Scripting Attack Resilience Guidelines Based on BeEF Framework Simulation. 1306-1318 - Matús Marticek, Lucia Knapcíková:
Online Monitoring of the Friction Coefficient in the Conditions of Digital Enterprise. 1319-1324 - Annamária Behúnová, Lucia Zemanová, Marcel Behún:
Design of an Intelligent Application Using a Genetic Algorithm to Determine the Structure and Sales Volumes of Customized Products. 1325-1333 - Ivan Cvitic, Dragan Perakovic, Marko Perisa, Aleksandar Jevremovic, Andrii Shalaginov:
An Overview of Smart Home IoT Trends and related Cybersecurity Challenges. 1334-1348 - Kun Liu, Jianqing Li, Wenting Li, Zhigao Zheng:
Bi-Level Optimization Model for Greener Transportation by Vehicular Networks. 1349-1361 - Haitao Wu, Shi Ying:
Finding Similar Users over Multiple Attributes on the Basis of Intuitionistic Fuzzy Set. 1362-1370 - Priya Selvaraj, R. Varatharajan:
Whirlpool Algorithm with Hash Function Based Watermarking Algorithm for the Secured Transmission of Digital Medical Images. 1371-1384 - Chinnandi Arul Murugan, P. Karthigaikumar:
Survey on Image Encryption Schemes, Bio cryptography and Efficient Encryption Algorithms. 1385-1390 - Minqiang Yang, Yinru Ye, Kai Ye, Wei Zhou, Xiping Hu, Bin Hu:
Retinal Vessel Segmentation in Medical Diagnosis using Multi-scale Attention Generative Adversarial Networks. 1391-1401 - Omar Said:
A Large-Scale IoT-Based Scheme for Real-Time Prediction of Infectious Disease Symptoms. 1402-1420 - Boyu Chen, Xuanrui Xiong, Lanfang Sun, Yi Guo:
Abnormal Brain Function Network Analysis Based on EEG and Machine Learning. 1421-1442 - Shuyu Lyu, Xinfa Dai, Zhong Ma, Ying Zhou, Xing Liu, Yi Gao, Zhekun Hu:
A Heterogeneous Cloud-Edge Collaborative Computing Architecture with Affinity-Based Workflow Scheduling and Resource Allocation for Internet-of-Things Applications. 1443-1459 - Douglas J. Leith:
Contact Tracing App Privacy: What Data is Shared by Non-GAEN Contact Tracing Apps. 1460-1472 - Dania Marabissi, Andrea Abrardo, Lorenzo Mucchi:
A new framework for Physical Layer Security in HetNets based on Radio Resource Allocation and Reinforcement Learning. 1473-1481 - Quinn Burke, Patrick D. McDaniel, Thomas La Porta, Mingli Yu, Ting He:
Misreporting Attacks Against Load Balancers in Software-Defined Networking. 1482-1497 - Guoqiang Zhang, Yueyue Dai, Jian Wu, Xiaojie Zhu, Yunlong Lu:
Swarm Learning-based Secure and Fair Model Sharing for Metaverse Healthcare. 1498-1509 - Sujie Shao, Lili Su, Shaoyong Guo, Peng Yu, Xuesong Qiu:
Multi-Agent Cooperative Game Based Task Computing Mechanism for UAV-Assisted 6G NTN. 1510-1518 - Hanmin Deng, Weiqi Wang, Min Liu:
Deep Learning Enabled Task-Oriented Semantic Communication for Memory-Limited Devices. 1519-1530 - Wei Wei, Zuxiang Zheng, Yun Wang, Yi Su, Xiujie Wang, Lizhe Liu, Bin Wang, Chenhua Sun, Dongdong Wang:
Random Access Control and Beam Management Scheme for the 5G NR based Beam Hopping LEO Satellite Communication Systems. 1531-1542 - Tian Gao, Zhao Chen, Liuguo Yin:
Covert UAV Communication by Exploiting Imperfect Cancellation Under Channel Uncertainty. 1543-1552 - Dongdong Wang, Chenhua Sun, Xiujie Wang, Lizhe Liu, Bin Wang:
5G Integrated User Downlink Adaptive Transmission Scheme for Low Earth Orbit Satellite Internet Access Network. 1553-1564
Volume 28, Number 5, October 2023
- Yuyang Wang, Xianjia Meng, Ximeng Liu:
Differentially Private Recurrent Variational Autoencoder For Text Privacy Preservation. 1565-1580 - Kaiqi Zhang, Dianhui Chu, Zhiying Tu, Chunshan Li:
Service Availability Assessment Model Based on User Tolerance. 1581-1596 - Bo Ning, Xinjian Zhang, Shuai Gao, Guanyu Li:
DP-AGM: A Differential Privacy Preserving Method for Binary Relationship in Mobile Networks. 1597-1616 - Tao Feng, Fanqi Kong, Chunyan Liu, Ye Lu:
Multi-Authorization Attribute-Based Verifiable Encryption Scheme Based on Blockchain. 1617-1624 - Yan Zhou, Changgen Peng, Youliang Tian, Zuolong Li, Weijie Tan:
Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow. 1625-1635 - Jing Yang, Zhiyang Yin, Tong Tang:
Adaptive Intra Refresh for Screen Content Video Transmission in Dynamic Network. 1636-1646 - Lele Zheng, Tao Zhang, Yulong Shen, Bowen Deng, Ze Tong:
A Task-based Personalized Privacy-Preserving Participant Selection Mechanism for Mobile Crowdsensing. 1647-1657 - Wenxiang Zhang, Zhenyuan Tian, Shuai Wang, Ting Yang:
A Brief Introduction to Vision Based Mobile Information System. 1658-1661 - Yehui Su, Youcef Djenouri:
High-Precision Matching Algorithm for Multi-Image Segmentation of Micro Animation Videos in Mobile Network Environment. 1662-1672 - Yi Xiong, Syed Atif Moqurrab, Awais Ahmad:
Enhancing Human Motion Prediction through Joint-based Analysis and AVI Video Conversion. 1673-1686 - Yan Zhang, Wei Wei:
Sports Training Correction based on 3D Virtual Image Model. 1687-1698 - Botao Zhang, Yiheng Zhang, Bandar Alshawi, Ryan Alturki:
Basketball Flight Trajectory Tracking using Video Signal Filtering. 1699-1711 - Jing Ge, Kangcheng Wu, Nasir Jamal, Farhan Ullah:
Dynamic Resource Allocation Techniques for Wireless Network Data in Elastic Optical Network Applications. 1712-1723 - Yajuan Sun, Gautam Srivastava:
Digital Watermarks for Videos Based on a Locality-Sensitive Hashing Algorithm. 1724-1737 - Jing Zhang, Thippa Reddy Gadekallu:
A Remote Health Detection System with Sensor Signal Purification. 1738-1750 - Wei Li, Hui Liu:
Design of Network Medical Image Information Feature Diagnosis Method Based on Big Data. 1751-1761 - Jian-zhao Sun, Kun Yang, Marcin Wozniak:
Research on Hybrid Data Clustering Algorithm for Wireless Communication Intelligent Bracelets. 1762-1771 - Dan Zhou, Mohamed Baza, Amar Rasheed:
Highly Reliable Robust Mining of Educational Data Features in Universities Based on Dynamic Semantic Memory Networks. 1772-1782 - Minghe Hu, Jiancang He, Maazen Alsabaan:
Image Identification Method of Ice Thickness on Transmission Line Based on Visual Sensing. 1783-1792 - Yishu Huang, Changling Peng, Shuai Liu:
Empirical Research of Classroom Behavior Based on Online Education: A Systematic Review. 1793-1805 - Jinyin Peng, Li Zhao:
Shortest Path Control for Target Searching Using Robot in Complex Task with Large Range. 1806-1817 - Qisen Xi, Yizhi Ren, Liang Kou, Yongrui Cui, Zuohua Chen, Lifeng Yuan, Dong Wang:
EABERT: An Event Annotation Enhanced BERT Framework for Event Extraction. 1818-1830 - Rong Ma, Tao Feng, Youliang Tian, Jinbo Xiong:
EPMA: Edge-Assisted Hierarchical Privacy-Preserving Multidimensional Data Aggregation Mechanism. 1831-1841 - Congan Xu, Hang Su, Long Gao, Junfeng Wu, Wenjun Yan:
Rotated SAR Ship Detection based on Gaussian Wasserstein Distance Loss. 1842-1851 - Jibo Shi, Bin Ge, Qiong Wu, Ruichang Yang, Yan Sun:
Radio Frequency Fingerprint Identification of WiFi Signals Based on Federated Learning for Different Data Distribution Scenarios. 1852-1864 - Wenchen Liu, Mingran Li, Fuyu Liu, Yuan Xu:
Dual Predictive Quaternion Kalman Filter and its Application in Seamless Wireless Mobile Human Lower Limb Posture Tracking. 1865-1876 - Yudong Zhang, Vishnuvarthanan Govindaraj, Ziquan Zhu:
FECNet: a Neural Network and a Mobile App for COVID-19 Recognition. 1877-1890 - Qing Wei, Qiaoli Lin, Gautam Srivastava:
Embedded Design and Implementation of a Wireless Multimedia Platform for Digital Estimation of Agricultural Output. 1891-1900 - Doaa Aboshady, Naglaa E. Ghannam, Eman K. Elsayed, Lamiaa Diab:
APKOWL: An Automatic Approach to Enhance the Malware Detection. 1901-1912 - Wenbing Jiang, Yihuo Jiang, Gautam Srivastava:
Remote Early Warning System for Mountain Floods with Robust ZigBee Wireless Networks. 1913-1924 - Chonggao Chen, Jin Zhang, Loknath Sai Ambati:
Explosive force acquisition of sprinter lower limb in training based on WSN. 1925-1935 - Yudong Zhang, Yanrong Pei, Juan Manuel Górriz:
SCNN: A Explainable Swish-based CNN and Mobile App for COVID-19 Diagnosis. 1936-1949 - Geng Chen, Lili Cheng, Xiaoxian Kong, Qingtian Zeng, Yu-Dong Zhang:
Joint Node Selection and Power Allocation for Cooperative Positioning Based on Bidding Auction in VANET. 1950-1963 - Ying Zhou, Zhichao Zheng, Quansen Sun:
Texture Pattern-based Bi-directional Projections for Medical Image Super-resolution. 1964-1974
Volume 28, Number 6, December 2023
- Yong Gong, Vicente García-Díaz:
Medical parameter extraction method of sports injury based on sensor network. 1975-1986 - Wenkui Zheng, Wei Hou, Jerry Chun-Wei Lin:
A Deep Learning based Feature Entity Relationship Extraction Method for Telemedicine Sensing Big Data. 1987-1996 - Haiying Chen, Marcin Wozniak:
Mathematical Model Simulation of Detailed Classification of Telemedicine Sensing Data. 1997-2006 - Bin Xia, Xianzhi Zheng, Nan Xie, Liye Zhang:
Grey Wolf Cooperative Positioning Algorithm for UWB Network. 2007-2014 - Bin Sun, Renkang Geng, Tao Shen, Yuan Xu, Shuhui Bi:
Dynamic Emergency Transit Forecasting with IoT Sequential Data. 2015-2029 - Ying Song, Gautam Srivastava:
Remote Sports Injury Monitoring using Wireless Sensor Networks. 2030-2040 - Geng Chen, Xianjie Xu, Qingtian Zeng, Yu-Dong Zhang:
A Vehicle-Assisted Computation Offloading Algorithm Based on Proximal Policy Optimization in Vehicle Edge Networks. 2041-2055 - Shtwai Alsubai, Mohemmed Sha, Abdullah Alqahtani, Munish Bhatia:
Hybrid IoT-Edge-Cloud Computing-based Athlete Healthcare Framework: Digital Twin Initiative. 2056-2075 - Aripriharta, Gwo-Jiun Horng:
A New Defect Diameter Prediction using Heart Sound and Possibility to Implement as IoT Healthcare. 2076-2092 - Liu Xurui, Zhang Guobao:
Enhancing the Swimmer Movement Techniques Using Cloud Computing and Artificial Intelligence. 2093-2108 - Huanxue Liu, Fengqin Ke, Zhenzhong Zhang, Yanan Gao, Quanyu Zhang:
Fault Tolerance in Electric Vehicles Using Deep Learning for Intelligent Transportation Systems. 2109-2117 - Xiangyong Zhang:
River Ecological Protection and Restoration Using Multi-source Remote Sensing Data. 2118-2129 - Tingrong Yin:
Music Track Recommendation Using Deep-CNN and Mel Spectrograms. 2130-2137 - Cai Wangang:
Design and Implementation of an Educational Information Management System Using Deep Learning and Wireless Communication. 2138-2148 - Cai Wangang:
A Model for Digital Education Management Information System Using Wireless Communication and BP Neural Networks. 2149-2161 - Zhenxing Song, Di Zhang, Yue Wang:
Designing a Human Enterprise Management Model Using Deep Learning and Wireless Connectivity. 2162-2170 - Yizhen Sun:
Timbre-Based Portable Musical Instrument Recognition Using LVQ Learning Algorithm. 2171-2181 - Linlin Peng:
Piano Players' Intonation and Training Using Deep Learning and MobileNet Architecture. 2182-2190 - Xingzhu Wang:
Fast Localization Model of Network Intrusion Detection System for Enterprises Using Cloud Computing Environment. 2191-2203 - Lili Ren, Baiyun Deng, Zhiling Chen:
Using Wireless Network Sensors as a New Medium of Communication for Sustainable Eco-cultural Tourism. 2204-2214 - Qi Wang:
An Intelligent System of Permanent Magnet Synchronous Using Synovial Motor Control and PID Motor Control for EoT Computing: a Comparative Simulation Study. 2215-2223 - Nguyen-Son Vo, Antonino Masaracchia, Zhichao Sheng, Thanh Tuan Nguyen:
Editorial: Towards 6G Technologies, Networks, Hardware, and Architectures. 2224-2226 - Thang Nguyen Quoc, Trang Hoang, Lihong Zhang, Octavia A. Dobre, Trung Q. Duong:
A Survey on Smart Optimisation Techniques for 6G-oriented Integrated Circuits Design. 2227-2244 - Dac-Binh Ha, Van-Truong Truong, Tien-Vu Truong, Thanh-Minh Phan:
STAR-RIS-aided UAV NOMA Mobile Edge Computing Network with RF Energy Harvesting. 2245-2257 - Arun Raj, Durbadal Mandal:
Comparative analysis of fractal antennae for sub-6 GHz and 5G bands for wireless and IoT applications. 2258-2274 - Nguyen Quoc Long, Viet-Hung Dang, Nhu Gia Nguyen, Thanh Trong Nguyen, Tu Dac Ho, Hung Tran, Duc-Dung Tran, Cong Le Thanh, Van Nhan Vo:
Deep Learning for Outage Probability Minimization in Secure NOMA Energy Harvesting UAV IoT Networks. 2275-2287 - Wenjun Huang, Keran Zhang, Hangzai Luo, Sheng Zhong:
Hardware-Based Satellite Network Broadcast Storm Suppression Method. 2288-2299
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.