


Остановите войну!
for scientists:
Mobile Networks and Applications, Volume 25
Volume 25, Number 1, February 2020
- Lei Wang, Jenhui Chen, Yang Peng, Lei Zhang:
Editorial: Physical Layer Security and Wireless Access Control (QSHINE 2017). 1-3 - Khuong Ho-Van, Thiem Do-Dac:
Security Performance Analysis of Underlay Cognitive Networks with Helpful Jammer Under Interference from Primary Transmitter. 4-15 - Fei Wu
, Chenxing Li
, Jiafan Wang, Xiangyin Zhang:
An Auxiliary Antenna Based Inter-User Interference Mitigation Approach in Full-Duplex Wireless Networks. 16-22 - Van Nhan Vo, Tri Gia Nguyen
, Chakchai So-In
, Hung Tran:
Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions. 23-41 - Mamoun F. Al-Mistarihi, Islam M. Tanash, Fedaa S. Yaseen, Khalid A. Darabkh
:
Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers. 42-54 - Anjana P. Das, Sabu M. Thampi
, Jaime Lloret:
Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic. 55-67 - Zhenquan Qin, Yingxiao Sun
, Junyu Hu, Wei Zhou, Jialin Liu:
Enhancing Efficient Link Performance in ZigBee Under Cross-Technology Interference. 68-81 - Bin Feng, Xiangli Li, Yingmo Jie, Cheng Guo
, Huijuan Fu:
A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration. 82-94 - Yueyan Zhi, Zhangjie Fu, Xingming Sun, Jingnan Yu:
Security and Privacy Issues of UAV: A Survey. 95-101 - Xu Zhang
, Weigang Hou, Lei Guo, Qihan Zhang, Pengxing Guo
, Ruijia Li:
Joint Optimization of Latency Monitoring and Traffic Scheduling in Software Defined Heterogeneous Networks. 102-113 - Haisheng Yu
, Heng Qi, Keqiu Li:
WECAN: an Efficient West-East Control Associated Network for Large-Scale SDN Systems. 114-124 - Zhangjie Fu, Yangen Liu, Xingming Sun, Yuling Liu, Zuwei Tian:
Confusing-Keyword Based Secure Search over Encrypted Cloud Data. 125-132 - Zhentao Hu, Lin Zhou, Bing Jin, Hai-jiang Liu:
Applying Improved Convolutional Neural Network in Image Classification. 133-141 - Qing Hu
, Xiaoyue Jing, Jianlin Huang, Linlin Xu:
Performance Specifications for the Roll-Off Factor and Filter Order for Filtered Multitone Modulation in the Maritime VHF Data Exchange System. 142-150 - Victor Sucasas, Georgios Mantas, Saud Althunibat, José-Fernán Martínez-Ortega:
Editorial: Security and Privacy Protection for Mobile Applications and Platforms. 151-152 - Saqib Rasool, Muddesar Iqbal
, Tasos Dagiuklas, Zia Ul-Qayyum, Shancang Li:
Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud. 153-163 - José Carlos Ribeiro
, Firooz B. Saghezchi
, Georgios Mantas, Jonathan Rodriguez, Simon J. Shepherd, Raed A. Abd-Alhameed:
An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices. 164-172 - Mohanad Al-Hasanat, Saud Althunibat, Khalid A. Darabkh
, Abdullah Al-Hasanat
, Moath Alsafasfeh:
A Physical-Layer Key Distribution Mechanism for IoT Networks. 173-178 - Mohanad Al-Hasanat, Saud Althunibat, Khalid A. Darabkh
, Abdullah Al-Hasanat
, Moath Alsafasfeh:
Correction to: A Physical-Layer Key Distribution Mechanism for IoT Networks. 179 - Anam Mehtab, Waleed Bin Shahid, Tahreem Yaqoob, Muhammad Faisal Amjad, Haider Abbas
, Hammad Afzal, Malik Najmus Saqib:
AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis. 180-192 - Van Nhan Vo, Tri Gia Nguyen
, Chakchai So-In
, Hung Tran, Surasak Sanguanpong:
Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers. 193-210 - Kantour Nedjmeddine, Bouroubi Sadek:
Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm. 211-222 - Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou, Hisham Abdalla:
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks. 223-233 - Andrea Lanzi:
Editorial: Advanced Techniques for Memory Forensics Analysis. 234-235 - Mauro Andreolini, Vincenzo Giuseppe Colacino, Michele Colajanni
, Mirco Marchetti
:
A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises. 236-247 - Martin Karresand, Stefan Axelsson, Geir Olav Dyrkolbotn:
Disk Cluster Allocation Behavior in Windows and NTFS. 248-258 - Gengqian Zhou, Jianwei Zhuge, Yunqian Fan, Kun Du, Shuqiang Lu:
A Market in Dream: the Rapid Development of Anonymous Cybercrime. 259-270 - Trung Q. Duong, Chinmoy Kundu, Antonino Masaracchia
, Van-Dinh Nguyen:
Editorial: Reliable Communication for Emerging Wireless Networks. 271-273 - Huy T. Nguyen
, Homare Murakami, Kien Nguyen
, Kentaro Ishizu, Fumihide Kojima, Jong-Deok Kim, Sang-Hwa Chung, Won-Joo Hwang:
Joint User Association and Power Allocation for Millimeter-Wave Ultra-Dense Networks. 274-284 - Fatma A. Al Emam, Mohamed E. Nasr, Sherif E. Kishk:
Coordinated Handover Signaling and Cross-Layer Adaptation in Heterogeneous Wireless Networking. 285-299 - Basem M. ElHalawany
, Omnia Hashad, Kaishun Wu
, Adly S. Tag Eldien:
Uplink Resource Allocation for Multi-Cluster Internet-of-Things Deployment Underlaying Cellular Networks. 300-313 - Ning Zhao, Hao Wu
, Xiaonan Zhao:
Consortium Blockchain-Based Secure Software Defined Vehicular Network. 314-327 - Tanmoy Maitra
, Sarbani Roy
:
PBDT: an Energy-Efficient Posture based Data Transmission for Repeated Activities in BAN. 328-340 - Zeeshan Kaleem
, Ajmal Khan, Syed Ali Hassan
, Nguyen-Son Vo
, Long Dinh Nguyen, Hien M. Nguyen:
Full-Duplex Enabled Time-Efficient Device Discovery for Public Safety Communications. 341-349 - Zhiqun Gu, Jiawei Zhang, Yuefeng Ji
:
Topology Optimizing in FSO-based UAVs Relay Networks for Resilience Enhancement. 350-362 - Ba Cao Nguyen
, Xuan Nam Tran
, Tran Manh Hoang, Le The Dung
:
Performance Analysis of Full-Duplex Vehicle-to-Vehicle Relay System over Double-Rayleigh Fading Channels. 363-372
Volume 25, Number 2, April 2020
- Honghao Gao, Jianwei Yin, Gongzhu Hu:
Editorial: ACM/Springer Mobile Networks & Applications - Special Issue on Mobile Service Computing and Applications. 373-375 - Xiaoxian Yang, Sijing Zhou
, Min Cao:
An Approach to Alleviate the Sparsity Problem of Hybrid Collaborative Filtering Based Recommendations: The Product-Attribute Perspective from User Reviews. 376-390 - Yuyu Yin, Lu Chen, Yueshen Xu, Jian Wan, He Zhang, Zhida Mai:
QoS Prediction for Service Recommendation with Deep Feature Learning in Edge Computing Environment. 391-401 - Yu Weng, Chunlei Xia:
A New Deep Learning-Based Handwritten Character Recognition System on Mobile Computing Devices. 402-411 - Dikai Fang
, Huahu Xu, Xiaoxian Yang, Minjie Bian:
An Augmented Reality-Based Method for Remote Collaborative Real-Time Assistance: from a System Perspective. 412-425 - Yishan Chen, Shuiguang Deng
, Hongtao Ma, Jianwei Yin:
Deploying Data-intensive Applications with Multiple Services Components on Edge. 426-441 - Xiaolong Xu
, Xihua Liu, Lianyong Qi, Yuhao Chen, Zihao Ding, Jiangang Shi:
Energy-Efficient Virtual Machine Scheduling across Cloudlets in Wireless Metropolitan Area Networks. 442-456 - Cristian Borcea, Shiwen Mao, Jian Tang:
Editorial: Mobile and Ubiquitous Systems: Computing, Networking and Services. 457-458 - Jing Lian
, Yang Li, Weixi Gu, Shao-Lun Huang, Lin Zhang
:
Mining Regional Mobility Patterns for Urban Dynamic Analytics. 459-473 - Uday Kamal
, Shamir Ahmed, Tarik Reza Toha
, Nafisa Islam
, A. B. M. Alim Al Islam:
Intelligent Human Counting through Environmental Sensing in Closed Indoor Settings. 474-490 - Wei Gong, Xiaoyao Huang, Baoxian Zhang
, Yawei Zhao:
Task Allocation in Eco-friendly Mobile Crowdsensing: Problems and Algorithms. 491-504 - Suiming Guo
, Chao Chen, Jingyuan Wang, Yaxiao Liu, Ke Xu, Dah Ming Chiu:
Fine-grained Dynamic Price Prediction in Ride-on-demand Services: Models and Evaluations. 505-520 - Hui Liu, Huan Liu, Xin Wang, Wei Shao, Xiao Wang, Junzhao Du, Jonathan Liono, Flora D. Salim:
SmartMeeting: An Novel Mobile Voice Meeting Minutes Generation and Analysis System. 521-536 - Long Wang
, Till Riedel
, Markus Scholz, Michael Beigl, Panlong Yang:
Phascope: Fine-Grained, Fast, Flexible Motion Profiling based on Phase Offset in Acoustic OFDM Signal. 537-550 - V. Bindhu, Joy Iong-Zong Chen, Subarna Shakya, Z. Faizal Khan:
Editorial: Mobile Edge Computing and Personal Networks. 551-552 - Subbarayan Anitha
, Theagarajan Padma
:
Adaptive Proximate Computing Framework for Mobile Resource Augmentation. 553-564 - Murugan Krishnamoorthy, Varalakshmi Perumal:
Fixing Target Access Point with low load during Handoff in WLAN. 565-575 - K. Sindhanaiselvan, J. Mannar Mannan, S. K. Aruna:
Designing a Dynamic Topology (DHT) for Cluster Head Selection in Mobile Adhoc Network. 576-584 - R. Logesh Babu, P. Balasubramanie
:
Fuzzy Rule Selection Using Hybrid Artificial Bee Colony with 2-Opt Algorithm for MANET. 585-595 - Sheryl Radley, Cynthia J. Sybi, K. Premkumar:
Multi Information Amount Movement Aware- Routing in FANET: Flying Ad-hoc Networks. 596-608 - J. Raja
, Balamurugan N, R. Pitchai:
Annealed Glowworm Optimization Graph Theory - Virtual Network Mapping for Home Healthcare in Cloud. 609-619 - Qing Yang, Tigang Jiang, Wenjia Li, Guangchi Liu, Danda B. Rawat
, Jun Wu:
Editorial: Multimedia and Social Data Processing in Vehicular Networks. 620-622 - Hongluan Zhao, Guoyong Han, Xiaofei Niu:
The Signal Control Optimization of Road Intersections with Slow Traffic Based on Improved PSO. 623-631 - Weina Zhang, Ruijuan Zheng
, Mingchuan Zhang, Junlong Zhu, Qingtao Wu:
ECRA: An Encounter-aware and Clustering-based Routing Algorithm for Information-centric VANETs. 632-642 - Lingwei Xu, Xu Yu, Han Wang, Xinli Dong, Yun Liu, Wenzhong Lin, Xinjie Wang, Jingjing Wang:
Physical Layer Security Performance of Mobile Vehicular Networks. 643-649 - Meiling Li, Jin Ran, Xiaofei Niu, Baiying Shi:
Estimating the Floor Area Ratio of the Vehicular Infrastructure Network Based on Road Grid Cell. 650-659 - Peng Yang, Lingli Deng, Jing Yang, Junjie Yan:
SASMF: Socially Aware Security Message Forwarding Mechanism in VANETs. 660-671 - Honghao Gao, Yuyu Yin:
Editorial: ACM/Springer Mobile Networks & Applications - Special Issue on Mobile Computing and Software Engineering. 672-673 - Zhengzhe Xiang, Shuiguang Deng
, Javid Taheri, Albert Y. Zomaya:
Dynamical Service Deployment and Replacement in Resource-Constrained Edges. 674-689 - Yi Pan, Shu Wang, Lei Wu
, Yunni Xia, Wanbo Zheng, Shanchen Pang, Ziyang Zeng, Peng Chen, Yawen Li:
A Novel Approach to Scheduling Workflows Upon Cloud Resources with Fluctuating Performance. 690-700 - Bin Cao, Jiawei Wu, Longchun Cao, Yueshen Xu, Jing Fan:
Long-Term and Multi-Step Ahead Call Traffic Forecasting with Temporal Features Mining. 701-712 - Xiaolong Xu
, Xihua Liu, Zhanyang Xu, Chuanjian Wang, Shaohua Wan
, Xiaoxian Yang:
Joint Optimization of Resource Utilization and Load Balance with Privacy Preservation for Edge Services in 5G Networks. 713-724 - Shuo Wang, Qianmu Li
, Jun Hou, Shunmei Meng, Bo Zhang, Cangqi Zhou:
Active Defense by Mimic Association Transmission in Edge Computing. 725-742 - Shaohua Wan
, Lianyong Qi, Xiaolong Xu, Chao Tong, Zonghua Gu:
Deep Learning Models for Real-time Human Activity Recognition with Smartphones. 743-755 - Jun Zheng, Wei Xiang
, Pascal Lorenz, Shiwen Mao:
MONET Special Issue on Towards Future Ad Hoc Networks: Technologies and Applications (I). 756-759 - Yao Zhang, Changle Li, Tom H. Luan, Yuchuan Fu, Hui Wang:
Prediction Based Vehicular Caching: Where and What to Cache? 760-771 - Wei Gong, Baoxian Zhang
, Cheng Li, Zheng Yao:
Task Allocation in Semi-Opportunistic Mobile Crowdsensing: Paradigm and Algorithms. 772-782 - Feng Yan
, Wenyu Ma, Fei Shen, Weiwei Xia, Lianfeng Shen:
Connectivity Based k-Coverage Hole Detection in Wireless Sensor Networks. 783-793 - Sara Kassan, Jaafar Gaber
, Pascal Lorenz
:
Autonomous Energy Management System Achieving Piezoelectric Energy Harvesting in Wireless Sensors. 794-805 - Deyue Zou, Shuyi Chen
, Shuai Han
, Weixiao Meng, Di An, Jinqiang Li, Wanlong Zhao:
Design of a Practical WSN Based Fingerprint Localization System. 806-818 - Xuyu Wang, Zhitao Yu, Shiwen Mao
:
Indoor Localization Using Smartphone Magnetic and Light Sensors: a Deep LSTM Approach. 819-832
Volume 25, Number 3, June 2020
- Dagmar Cagánová
, Natália Hornáková
, Jana Stofková
:
Editorial: Smart Solutions with Focus on Innovations from Various Perspectives. 833-835 - Jozef Ristvej
, Maros Lacinák
, Roman Ondrejka
:
On Smart City and Safe City Concepts. 836-845 - Predrag K. Nikolic
, Hua Yang:
Designing Playful Cities: Audio-Visual Metaphors for New Urban Environment Experience. 846-852 - Zdenko Stacho
, Katarína Stachová
, Dagmar Cagánová
:
Participation of all Employee Categories in Innovation Processes in Slovak Organisations. 853-859 - Ondrej Krocil
, Richard Pospísil:
The Influence of GDPR on Activities of Social Enterprises. 860-867 - Mária Holiencinová, Zdenka Kádeková, Tomás Holota
, Ludmila Nagyová:
Smart Solution of Traffic Congestion through Bike Sharing System in a Small City. 868-875 - Gabriela Pavlendová
, Jana Sujanová
, Dagmar Cagánová
, Renata Nováková
:
Smart Cities Concept for Historical Buildings. 876-881 - Maryam Shafiq, Humaira Ashraf, Ata Ullah
, Shireen Tahira:
Systematic Literature Review on Energy Efficient Routing Schemes in WSN - A Survey. 882-895 - Peter Pistek
, Martin Hudec:
Using SMS for Communication with IoT Devices. 896-903 - Jozef Jandacka
, Michal Holubcik
:
Emissions Production from Small Heat Sources Depending on Various Aspects. 904-912 - Ruhiyati Idayu Abu Talib, Predrag K. Nikolic
, Mohd Shahrizal Sunar
, Rui Prada:
In-Visible Island: Inclusive Storytelling Platform for Visually Impaired Children. 913-924 - Vladimír Svac, Dagmar Cagánová
:
Managerial Skills for Innovation Support. 925-931 - Arpita Ray, Chandreyee Chowdhury, Sakil Mallick, Sukanta Mondal, Soumik Paul, Sarbani Roy:
Designing Energy Efficient Strategies Using Markov Decision Process for Crowd-Sensing Applications. 932-942 - Marco Furini, Silvia Mirri, Kevin Bouchard, Armir Bujari
:
Editorial: Smart Objects and Technologies. 943-944 - Catia Prandi
, Lorenzo Monti
, Chiara Ceccarini
, Paola Salomoni:
Smart Campus: Fostering the Community Awareness Through an Intelligent Environment. 945-952 - Charles Cousyn
, Kévin Bouchard, Sébastien Gaboury, Bruno Bouchard:
Towards Using Scientific Publications to Automatically Extract Information on Rare Diseases. 953-960 - Angelica Moreno Cardenas, Miguel Kiyoshy Nakamura Pinto, Ermanno Pietrosemoli
, Marco Zennaro, Marco Rainone, Pietro Manzoni
:
A Low-Cost and Low-Power Messaging System Based on the LoRa Wireless Technology. 961-968 - Marco Furini
, Giovanna Galli, Maria Cristiana Martini:
An Online Education System to Produce and Distribute Video Lectures. 969-976 - Giovanni Delnevo
, Marco Roccetti
, Silvia Mirri:
Intelligent and Good Machines? The Role of Domain and Context Codification. 977-985 - Ombretta Gaggi, Agnieszka Kolasinska, Claudio E. Palazzi
, Giacomo Quadrio
:
Safety First? Users' Perception of Wearable Sensor Networks for Aging. 986-994 - Huimin Lu
, Yujie Li:
Editorial: Cognitive Science and Artificial Intelligence for Human Cognition and Communication. 995-996 - Yin Zhang
, Haoyu Wen, Sheng Zhou, Zie Wang, Ranran Wang, Jianmin Lu:
EEDVMI: Energy-Efficient Dynamic Virtual Machines Integration. 997-1007 - Huimin Lu
, Tomoki Uemura, Dong Wang, Jihua Zhu, Zi Huang
, Hyoungseop Kim:
Deep-Sea Organisms Tracking Using Dehazing and Deep Learning. 1008-1015 - Yixue Hao, Yinging Jiang, M. Shamim Hossain, Mohammed F. Alhamid, Syed Umar Amin
:
Learning for Smart Edge: Cognitive Learning-Based Computation Offloading. 1016-1022 - Huimin Lu
, Mei Wang, Arun Kumar Sangaiah
:
Human Emotion Recognition Using an EEG Cloud Computing Platform. 1023-1032 - Zheng Fu, Chi-Man Pun
, Hao Gao, Huimin Lu
:
Endmember Extraction of Hyperspectral Remote Sensing Images Based on an Improved Discrete Artificial Bee Colony Algorithm and Genetic Algorithm. 1033-1041 - Kouki Tsuji, Huimin Lu
, Joo Kooi Tan, Hyoungseop Kim, Kazue Yoneda
, Fumihiro Tanaka:
Detection of Circulating Tumor Cells in Fluorescence Microscopy Images Based on ANN Classifier. 1042-1051 - Armir Bujari, Catia Prandi
, Pietro Manzoni:
Editorial: Smart Objects and Technologies. 1052-1054 - Marco Furini
, Silvia Mirri, Manuela Montangero, Catia Prandi
:
Privacy Perception when Using Smartphone Applications. 1055-1061 - Barbara Guidi
, Kristina Kapanova, Kevin Koidl, Andrea Michienzi
, Laura Ricci:
The Contextual Ego Network P2P Overlay for the Next Generation Social Networks. 1062-1074 - Marco Roccetti
, Giovanni Delnevo
, Luca Casini, Paola Salomoni:
A Cautionary Tale for Machine Learning Design: why we Still Need Human-Assisted Big Data Analysis. 1075-1083 - Subhadeep Patra
, David Van Hamme, Peter Veelaert, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni, Willian Zamora:
Detecting Vehicles' Relative Position on Two-Lane Highways Through a Smartphone-Based Video Overtaking Aid Application. 1084-1094 - Safa Hamdoun
, Abderrezak Rachedi, Yacine Ghamri-Doudane:
Graph-Based Radio Resource Sharing Schemes for MTC in D2D-based 5G Networks. 1095-1113 - Armir Bujari, Ombretta Gaggi, Michele Luglio, Claudio E. Palazzi
, Giacomo Quadrio, Cesare Roseti, Francesco Zampognaro:
Addressing the Bandwidth Demand of Immersive Applications Through NFV in a 5G Network. 1114-1121 - Phan Cong Vinh:
Context-Aware Computing and Nature-Inspired Computing. 1122-1124 - Jiaqi Yin, Huibiao Zhu, Phan Cong Vinh
:
Formalization and Analysis of Haystack Architecture from Process Algebra Perspective. 1125-1139 - Hiep Xuan Huynh
, Huy Quang Dang, Huong Hoang Luong, Linh My Thi Ong, Nghia Duong-Trung
, Toan Phung Huynh, Van-Huy Pham
, Bernard Pottier:
BPH Sensor Network Optimization Based on Cellular Automata and Honeycomb Structure. 1140-1150 - Iqbal H. Sarker
, Alan Colman
, Jun Han, Asif Irshad Khan
, Yoosef B. Abushark, Khaled Salah:
BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model. 1151-1161 - Yuan Fei, Huibiao Zhu, Phan Cong Vinh
:
Security Analysis of the Access Control Solution of NDN Using BAN Logic. 1162-1173