


default search action
Mobile Networks and Applications, Volume 28
Volume 28, Number 1, February 2023
- Jaime Lloret, Lorena Parra:

Industrial Internet of Things. 1-3 - Imanol Picallo

, Peio López-Iturri
, Mikel Celaya-Echarri
, Leyre Azpilicueta
, Francisco Falcone
:
Deterministic Wireless Channel Characterization towards the Integration of Communication Capabilities to Enable Context Aware Industrial Internet of Thing Environments. 4-18 - Ming-Tuo Zhou

, Tian-Feng Ren, Zhi-Ming Dai, Xin-Yu Feng:
Task Scheduling and Resource Balancing of Fog Computing in Smart Factory. 19-30 - Jose Vicente Sorribes

, Lourdes Peñalver, José Miguel Jiménez
, Sandra Sendra:
Energy-aware Randomized Neighbor Discovery Protocol based on Collision Detection in Wireless Ad Hoc Networks. 31-48 - Joan Bas

, Alexis A. Dowhuszko
:
End-To-End Performance of an Uplink NB-IoT Transmission Relayed on a Low-Altitude UAV Platform with Non-Orthogonal Single-Carrier FDMA in the Optical Wireless Backhaul Link. 49-64 - Sandra Sendra

, Lorena Parra, José Miguel Jiménez
, Laura García
, Jaime Lloret:
LoRa-based Network for Water Quality Monitoring in Coastal Areas. 65-81 - Sérgio F. Lopes

, António Duarte Costa
, Henrique M. Dinis Santos
:
Editorial: Wireless Networks and IoT Applications. 82-84 - Amen Debbiche

, Ikbal Chammakhi Msadaa
, Khaled Grayaa:
EIPSO: An Energy Efficient Indoor Positioning System based on Game Theory. 85-96 - Luis Magadán

, Francisco J. Suárez
, Juan C. Granda, Daniel F. García:
Low-Cost Industrial IoT System for Wireless Monitoring of Electric Motors Condition. 97-106 - Sondes Ksibi, Faouzi Jaïdi

, Adel Bouhoula
:
A Comprehensive Study of Security and Cyber-Security Risk Management within e-Health Systems: Synthesis, Analysis and a Novel Quantified Approach. 107-127 - Udayakumar Allimuthu

, K. Mahalakshmi:
Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation. 128-159 - David Fotue

, Houda Labiod:
Efficient Tree Aggregation and Processing Time for Wireless Sensor Networks. 160-167 - Aicha Guefrachi

, Sarra Nighaoui, Sonia Zaibi, Ammar Bouallegue:
Performance Improvement of Kötter and Kschischang Codes and Lifted Rank Metric Codes in Random Linear Network Coding. 168-177 - Faris A. Almalki, Saeed H. Alsamhi

, Radhya Sahal, Jahan Hassan
, Ammar Hawbani, N. S. Rajput, Abdu Saif
, Jeff Morgan, John G. Breslin
:
Green IoT for Eco-Friendly and Sustainable Smart Cities: Future Directions and Opportunities. 178-202 - Milos Poliak

, Adela Poliaková
, Natalia Aleksandrovna Zhuravleva, Elvira Nica
:
Identifying the Impact of Parking Policy on Road Transport Economics. 203-210 - Lucia Knapcíková

, Annamária Behúnová
, Marcel Behún
:
The Strategic Impact of E-Business on Competitiveness of the Enterprise. 211-219 - Sebastian Saniuk

, Dagmar Cagánová
, Anna Saniuk
:
Knowledge and Skills of Industrial Employees and Managerial Staff for the Industry 4.0 Implementation. 220-230 - Ivan Cvitic

, Dragan Perakovic
, Marko Perisa
, Anca D. Jurcut
:
Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic. 231-242 - Ivan Cvitic

, Dragan Perakovic
, Marko Perisa
, Anca D. Jurcut
:
Correction to: Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic. 243 - Devica Verma, Harshit Saraf, Sindhu Hak Gupta

:
Prediction of user throughput from Network Parameters of LTE Network using machine learning. 244-253 - Khalid Mohiuddin

, Asharul Islam
, Mohammad Aminul Islam
, Mohammed Abdul Khaleel
, Samreen Shahwar, Sajid Ali Khan, Sadaf Yasmin, Mohammad Rashid Hussain:
Component-Centric Mobile Cloud Architecture Performance Evaluation: an Analytical Approach for Unified Models and Component Compatibility with Next Generation Evolving Technologies. 254-271 - Md. Motaharul Islam

, Ibna Kowsar, Mashfiq Shahriar Zaman, Md. Fahmidur Rahman Sakib
, Nazmus Saquib, Syed Md. Shamsul Alam:
A Novel Approach to Enhance Safety on Drowsy Driving in Self-Driving Car. 272-284 - Hongwei Zhao, Huanzhu Wang, Yue Yan:

SCMA Joint Coding and Decoding Algorithm Based on Code Reliability. 285-295 - Iqbal H. Sarker

, Asif Irshad Khan
, Yoosef B. Abushark
, Fawaz Alsolami
:
Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions. 296-312 - Lun-Ping Hung, Dong-Yuh Yang, Zong-Jie Wu, Chien-Liang Chen

:
Constructing a Search Mechanism for Dementia Patient Based on Multi-Hop Transmission Path Planning and Clustering Method. 313-324 - Yidian Zhang, Lin Zhang

, Ping Lan, Wenyong Li, Dan Yang, Zhiqiang Wu:
Statistical Feature Aided Intelligent Deep Learning Machine Translation in Internet of Things. 325-333 - Jia Xie, Zhou Zhang, Ye Yan, Hailin Zhang:

DOS by Dynamic Groups: a Coalition Formation Game Perspective. 334-345 - Yuyu Yin, Stelios Fuentes:

Editorial: AI-based Data Intelligent for IoT Computing. 346-347 - Yueshen Xu

, Xinyu Zhao, Zhiping Jiang, Zhibo Qiu, Lei Hei, Rui Li:
Intelligent Semantic Annotation for Mobile Services for IoT Computing from Heterogeneous Data. 348-358 - Xiangyu Guo

, Mingliang Gao, Wenzhe Zhai, Qilei Li
, Kyu Hyung Kim, Gwanggil Jeon:
Dense Attention Fusion Network for Object Counting in IoT System. 359-368 - Guoqing Xu, Xiaolong Xu

, Honghao Gao, Fu Xiao:
FP-RCNN: A Real-Time 3D Target Detection Model based on Multiple Foreground Point Sampling for Autonomous Driving. 369-381 - Xiaoxian Yang

, Yuting Wei, Linxiang Shi, Lin Chen:
Applying Probabilistic Model Checking to Path Planning for a Smart Multimodal Transportation System Using IoT Sensor Data. 382-393 - Zhen Qin, Shuiguang Deng, Xueqiang Yan, Lu Lu, Mingyu Zhao, Yan Xi, Jianjun Wu, Tao Sun, Nanxiang Shi:

6G Data Plane: A Novel Architecture Enabling Data Collaboration with Arbitrary Topology. 394-405 - Xu Ding, Yang Wang, Hang Zheng, Juan Xu, Hua Zhai:

A Novel Variable Convolution Kernel Design According to Time-frequency Resolution Altering in Bearing Fault Diagnosis. 406-420 - Jifeng Chen

, Yang Yang:
A Context-aware Approach to Task Scheduling for Time Series Data Prediction in Mobile Edge Computing. 421-431 - Retraction Note: E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption. 432

- Retraction Note: Complex IoT Control System Modeling from Perspectives of Environment Perception and Information Security. 433

- Retraction Note: Large-Scale Data Recommended Regulate Algorithm Based on Distributed Intelligent System Model under Cloud Environment. 434

- Retraction Note: Multi Information Amount Movement Aware- Routing in FANET: Flying Ad-hoc Networks. 435

Volume 28, Number 2, April 2023
- Aakash Ahmad

, Asad Waqar Malik
, Abdulrahman A. Alshdadi, Wilayat Khan, Maryam Sajjad:
Adaptive Security for Self-Protection of Mobile Computing Devices. 1-20 - Baoqi Huang, Long Zhao, En Wang, Bing Jia:

Editorial: sensing, Service and Security in Mobile Internet (MobilWare 2020). 437-438 - Zhilu Yuan, Shengjun Tang

, Qiuyang Huang
, Chijun Zhang, Zeynep Ertem, Zhanwei Du, Yuan Bai:
The Effects of Climatological Factors on Global Influenza Across Temperate and Tropical Regions. 439-451 - Dandan Peng, Le Sun, Rui Zhou, Yilin Wang:

Study QoS-aware Fog Computing for Disease Diagnosis and Prognosis. 452-459 - Baowei Wang

, Peng Zhao, Mingming Huang, Yuxuan Dai, Wenjie Zhu:
An Improved Recommendation Algorithm For Polarized Population. 460-472 - Hui Qi

, Peipei Li, Chunbo Wang, Jinlei Du, Xiaoqiang Di:
A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication. 473-485 - William A. Casey, Yang Cai:

Editorial: Renaissance of Biomimicry Computing. 486-489 - William Austin Casey, Yang Cai:

Correction to: Editorial: Renaissance of Biomimicry Computing. 490 - Kevin R. Pilkiewicz

, Pratip Rana, Michael L. Mayo, Preetam Ghosh:
Predicting Supramolecular Structure from the Statistics of Individual Molecular Events. 491-498 - Alberto Arteta Albert

, Yanjun Zhao, Luis Fernando de Mingo López, Nuria Gómez Blas
:
An Encrypted Proposal Method in Membrane Computing Aggregation (MCA). 499-506 - Vincent A. Cicirello

:
On Fitness Landscape Analysis of Permutation Problems: From Distance Metrics to Mutation Operator Selection. 507-517 - Sylia Mekhmoukh Taleb, Yassine Meraihi

, Seyedali Mirjalili
, Dalila Acheli, Amar Ramdane-Cherif, Asma Benmessaoud Gabis
:
Mesh Router Nodes Placement for Wireless Mesh Networks Based on an Enhanced Moth-Flame Optimization Algorithm. 518-541 - Xujiong Ma, Jun Mou

, Chenguang Ma, Jieyang Wang, Tianming Liu:
A New Meminductor Based Hyperchaotic Circuit and its Implementation. 542-550 - Xiaolin Jiang, Zhengyu Tang, Susu Qu:

Detection Algorithm of Compressed Sensing Signal in Generalized Spatial Modulation System. 551-560 - Chenguang Ma, Jun Mou

, Peng Li, Feifei Yang, Tianming Liu:
Multistability Analysis and Digital Circuit Implementation of a New Conformable Fractional-Order Chaotic System. 561-570 - Xiaolin Jiang, Susu Qu, Zhengyu Tang:

Study on the Elimination of MIMO Signal Interference in Data Chain System. 571-578 - Qingjiang Yang, Xiangxiang Qu:

High-Precision Harmonic Analysis Algorithm Based on Five-Term MSD Second-Order Self-Convolution Window Four-Spectrum-Line Interpolation. 579-585 - Xueying Liu, Xueyan Zhang, Xin Liu

:
Simultaneous Wireless Information and Power Transfer for OFDM-based Cooperative Communication. 586-597 - Rashid Mehmood

, Aziz Sheikh, Charlie Catlett, Imrich Chlamtac:
Editorial: Smart Societies, Infrastructure, Systems, Technologies, and Applications. 598-602 - Ebtesam Ahmad Alomari

, Iyad A. Katib
, Rashid Mehmood:
Iktishaf: a Big Data Road-Traffic Event Detection Tool Using Twitter and Spark Machine Learning. 603-618 - José Balsa-Barreiro

, Pedro M. Valero-Mora, Mónica Menéndez, Rashid Mehmood:
Extraction of Naturalistic Driving Patterns with Geographic Information Systems. 619-635 - Furqan Alam

, Rashid Mehmood, Iyad A. Katib, Saleh M. Altowaijri, Aiiad Albeshri:
TAAWUN: a Decision Fusion and Feature Specific Road Detection Approach for Connected Autonomous Vehicles. 636-652 - Samina Kausar, Huahu Xu, Ata Ullah

, Wenhao Zhu, Muhammad Yasir Shabir
:
Fog-Assisted Secure Data Exchange for Examination and Testing in E-learning System. 673-689 - Shubhani Aggarwal

, Neeraj Kumar
:
Fog Computing for 5G-Enabled Tactile Internet: Research Issues, Challenges, and Future Research Directions. 690-717 - Nabil Kadjouh, Ahcène Bounceur

, Madani Bezoui
, Mohamed Essaid Khanouche, Reinhardt Euler, Mohammad Hammoudeh
, Loïc Lagadec, Sohail Jabbar, Fadi M. Al-Turjman
:
A Dominating Tree Based Leader Election Algorithm for Smart Cities IoT Infrastructure. 718-731 - Moez Krichen

:
Improving Formal Verification and Testing Techniques for Internet of Things and Smart Cities. 732-743 - Sardar Usman

, Rashid Mehmood, Iyad A. Katib
, Aiiad Albeshri
, Saleh M. Altowaijri
:
ZAKI: A Smart Method and Tool for Automatic Performance Optimization of Parallel SpMV Computations on Distributed Memory Machines. 744-763 - Suyel Namasudra, Pascal Lorenz, Uttam Ghosh:

Editorial: The New Era of Computer Network by using Machine Learning. 764-766 - Sonal kumari, Karan Singh, Tayyab Ali Khan, Mazeyanti M. Ariffin, Senthilkumar Mohan, Dumitru Baleanu, Ali Ahmadian

:
A Novel Approach for Continuous Authentication of Mobile Users Using Reduce Feature Elimination (RFE): A Machine Learning Approach. 767-781 - Mehul Sharma, Shrid Pant, Priety Yadav, Deepak Kumar Sharma, Nitin Gupta, Gautam Srivastava

:
Advancing Security in the Industrial Internet of Things Using Deep Progressive Neural Networks. 782-794 - Omar A. Alzubi

, Jafar Ahmad Abed Alzubi, Tareq Mahmod Alzubi
, Ashish Singh:
Quantum Mayfly Optimization with Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification Model. 795-807 - Yuwen Pan

, Yuanwang Yang, Hantao Liu, Wenzao Li:
UAVs and Mobile Sensors Trajectories Optimization with Deep Learning Trained by Genetic Algorithm Towards Data Collection Scenario. 808-823 - Hafiz Munsub Ali

, Alain Bertrand Bomgni, Syed Ahmad Chan Bukhari, Tahir Hameed, Jun Liu:
Power-Aware Fog Supported IoT Network for Healthcare Infrastructure Using Swarm Intelligence-Based Algorithms. 824-838 - Hao Zhang

, Yuandong Min, Sanya Liu, Hang Tong, Yaopeng Li, Zhihan Lv
:
Improve the Security of Industrial Control System: A Fine-Grained Classification Method for DoS Attacks on Modbus/TCP. 839-852 - Kumar Debasis, Lakhan Dev Sharma

, Vijay Kumar Bohat, Robin Singh Bhadoria:
An Energy-Efficient Clustering Algorithm for Maximizing Lifetime of Wireless Sensor Networks using Machine Learning. 853-867
Volume 28, Number 3, June 2023
- Yishu Huang, Changling Peng, Weina Fu:

Key Technologies of Quality Assessment in Network and Distance Education. 869-872 - Jiaji Wang, Suresh Chandra Satapathy, Shuihua Wang, Yudong Zhang

:
LCCNN: a Lightweight Customized CNN-Based Distance Education App for COVID-19 Recognition. 873-888 - Feng Chen, Thippa Reddy Gadekallu

:
Multi-dimensional Data Optimal Classification Algorithm for Quality Evaluation of Distance Teaching in Universities. 889-899 - Jing Zhou, Norbert Herencsar:

Abnormal Behavior Determination Model of Multimedia Classroom Students Based on Multi-task Deep Learning. 900-913 - Xiao Liu, Gautam Srivastava, Maazen Alsabaan:

Quantitative Evaluation of NDE Reliability Based on Back Propagation Neural Network and Fuzzy Comprehensive Evaluation. 914-923 - Lili Chen, Mohamed Baza

, Hani Alshahrani:
Data Integration Method of Multi-source Feedback Evaluation for Remote Teaching Quality. 924-934 - Lili Chen, Mohamed Baza, Hani Alshahrani:

Correction: Data Integration Method of Multi-source Feedback Evaluation for Remote Teaching Quality. 935 - Feng Xue, Dawid Polap

:
Detail Feature Inpainting of Art Images in Online Educational Videos based on Double Discrimination Network. 936-949 - Yuan Hu

, Mahwish Kundi:
A Multi-Scale Gabor Filter-Based Method for Enhancing Video Images in Distance Education. 950-959 - Lei Ma, Hongxue Yang, Jianxing Yang:

A Multimodal Teaching Quality Evaluation for Hybrid Education Based on Stepwise Regression Analysis. 960-970 - Yang Yang, Haitao Shang, Nasir Jamal, Farhan Ullah

:
Video Resources Recommendation for Online Tourism Teaching in Interactive Network. 971-982 - Wenqing Chen, Ting Yang

:
A Recommendation System of Personalized Resource Reliability for Online Teaching System under Large-scale User Access. 983-994 - Can Wang, Syed Atif Moqurrab, Joon Yoo:

Face Recognition of Remote Teaching Video Image Based on Improved Frame Difference Method. 995-1006 - Hongbin Cao, Gautam Srivastava:

An Encryption Transmission System for High-speed Private Data Streams in Online Education in the Specialty of "Traffic Engineering". 1007-1018 - Meiping Peng, Bo Li, Zhongjiang Yan

:
Multi-BSS Multi-User Full Duplex MAC Protocol based on AP Cooperation for the Next Generation WLAN. 1019-1030 - Yao Zhao, Jian Li

, Zhenjiang Zhang, Bo Shen:
SECC Framework: Get the Best from Both the Cloud and Edge Computing in Internet of Things. 1031-1042 - Chun-Cheng Lin, Ching-Tsorng Tsai, Yu-Liang Liu

, Tsai-Ting Chang, Yung-Sheng Chang:
Security and Privacy in 5G-IIoT Smart Factories: Novel Approaches, Trends, and Challenges. 1043-1058 - Zhenzhen Yan, Mao Yang

, Xiaochang Zhang:
Co-NOMA: AP Coordination Based NOMA Protocol for the Next-Generation WLANs. 1059-1075 - Fang-Chang Kuo, Hwang-Cheng Wang, Chih-Cheng Tseng, Jung-Shyr Wu, Jia-Hao Xu, Jieh-Ren Chang

:
D2D Resource Allocation Based on Reinforcement Learning and QoS. 1076-1095 - Chung-Ming Huang, Rung-Shiang Cheng, Yan-Jia Pan:

The Claim-based Priority-Discriminated Channel Access (CPDCA) Method using the Registered Backoff Time Mechanism for IEEE 802.11ah. 1096-1115 - Miroslav Kostadinovic

, Dalibor Dobrilovic
, Goran Jausevac
, Gordana Jotanovic
, Zeljko Stojanov
, Vladimir Brtka
:
Performance Investigation of WirelessHART in the Coexistence with Wi-Fi Networks. 1116-1125 - Andreia Figueiredo

, Pedro Rito
, Miguel Luís
, Susana Sargento
:
Mobility Sensing and V2X Communication for Emergency Services. 1126-1141 - Nguyen-Son Vo, Antonino Masaracchia, Zhichao Sheng, Thanh Tuan Nguyen:

Editorial: Towards 6G Networks: Technologies, Services and Applications. 1142-1144 - Huaqiong Duan, Abbas Mirzaei

:
Adaptive Rate Maximization and Hierarchical Resource Management for Underlay Spectrum Sharing NOMA HetNets with Hybrid Power Supplies. 1145-1161 - Youqing Wang, Kun Zhao

, Zhengqi Zheng:
An Improved 3D Indoor Positioning Study with Ray Tracing Modeling for 6G Systems. 1162-1175 - Sagar Kavaiya

:
Learn with Curiosity: A Hybrid Reinforcement Learning Approach for Resource Allocation for 6G enabled Connected Cars. 1176-1186 - Van-Phuc Hoang, Ngoc-Tuan Do

, Van-Sang Doan
:
Performance Analysis of Deep Learning Based Non-profiled Side Channel Attacks Using Significant Hamming Weight Labeling. 1187-1196 - Cuong Pham-Quoc

, Vien Nguyen-Duy-Nhat
, Mai T. P. Le
, Hung Nguyen-Le, Chien Tang-Tan, Tuan Tang-Anh, Nghia Nguyen-Xuan:
Robust 3D Beamforming for Secure UAV Communications by DAE. 1197-1205 - Ba Cao Nguyen

, Quyet-Nguyen Van
, Le The Dung
, Tran Manh Hoang
, Nguyen Van Vinh
, Gia Thien Luu
:
Secrecy Performance of Multi-RIS-Assisted Wireless Systems. 1206-1219
Volume 28, Number 4, August 2023
- Wei-Kuo Chiang

, Kai-Heng Lin:
An Efficient Group-based Service Authentication and Session Key Negotiation Scheme for mMTC Devices in 5G. 1221-1245 - Goran Jausevac

, Dalibor Dobrilovic
, Vladimir Brtka
, Gordana Jotanovic
, Dragan Perakovic
, Zeljko Stojanov
:
Multirole UAVs Supported Parking Surveillance System. 1246-1254 - Antonio Muñoz

, Carmen Fernández Gago, Roberto López-Villa:
A Test Environment for Wireless Hacking in Domestic IoT Scenarios. 1255-1264 - Annamária Behúnová

, Marcel Behún
, Lucia Knapcíková
:
Using Industry 4.0 Tools in the Implementation of Modern Event Marketing. 1265-1271 - Jack Long, Ivan Cvitic

, Xiaolu Zhang, Dragan Perakovic
, Kim-Kwang Raymond Choo
:
Badoo Android and iOS Dating Application Analysis. 1272-1281 - George Grispos

, Kim-Kwang Raymond Choo, William Bradley Glisson
:
Sickly Apps: A Forensic Analysis of Medical Device Smartphone Applications on Android and iOS Devices. 1282-1292 - Stella Hrehová

, Jozef Husár
, Lucia Knapcíková
:
The Fuzzy Logic Predictive Model for Remote Increasing Energy Efficiency. 1293-1305 - Ivan Cvitic

, Dragan Perakovic
, Marko Perisa
, Dominik Sever:
Defining Cross-Site Scripting Attack Resilience Guidelines Based on BeEF Framework Simulation. 1306-1318 - Matús Marticek, Lucia Knapcíková

:
Online Monitoring of the Friction Coefficient in the Conditions of Digital Enterprise. 1319-1324 - Annamária Behúnová

, Lucia Zemanová, Marcel Behún:
Design of an Intelligent Application Using a Genetic Algorithm to Determine the Structure and Sales Volumes of Customized Products. 1325-1333 - Ivan Cvitic

, Dragan Perakovic
, Marko Perisa
, Aleksandar Jevremovic
, Andrii Shalaginov
:
An Overview of Smart Home IoT Trends and related Cybersecurity Challenges. 1334-1348 - Kun Liu, Jianqing Li

, Wenting Li, Zhigao Zheng:
Bi-Level Optimization Model for Greener Transportation by Vehicular Networks. 1349-1361 - Haitao Wu, Shi Ying:

Finding Similar Users over Multiple Attributes on the Basis of Intuitionistic Fuzzy Set. 1362-1370 - Priya Selvaraj, R. Varatharajan:

Whirlpool Algorithm with Hash Function Based Watermarking Algorithm for the Secured Transmission of Digital Medical Images. 1371-1384 - Chinnandi Arul Murugan, P. Karthigaikumar

:
Survey on Image Encryption Schemes, Bio cryptography and Efficient Encryption Algorithms. 1385-1390 - Minqiang Yang, Yinru Ye, Kai Ye, Wei Zhou, Xiping Hu

, Bin Hu
:
Retinal Vessel Segmentation in Medical Diagnosis using Multi-scale Attention Generative Adversarial Networks. 1391-1401 - Omar Said

:
A Large-Scale IoT-Based Scheme for Real-Time Prediction of Infectious Disease Symptoms. 1402-1420 - Boyu Chen, Xuanrui Xiong

, Lanfang Sun, Yi Guo:
Abnormal Brain Function Network Analysis Based on EEG and Machine Learning. 1421-1442 - Shuyu Lyu, Xinfa Dai, Zhong Ma, Ying Zhou, Xing Liu, Yi Gao, Zhekun Hu:

A Heterogeneous Cloud-Edge Collaborative Computing Architecture with Affinity-Based Workflow Scheduling and Resource Allocation for Internet-of-Things Applications. 1443-1459 - Douglas J. Leith

:
Contact Tracing App Privacy: What Data is Shared by Non-GAEN Contact Tracing Apps. 1460-1472 - Dania Marabissi, Andrea Abrardo, Lorenzo Mucchi:

A new framework for Physical Layer Security in HetNets based on Radio Resource Allocation and Reinforcement Learning. 1473-1481 - Quinn Burke

, Patrick D. McDaniel, Thomas La Porta, Mingli Yu, Ting He:
Misreporting Attacks Against Load Balancers in Software-Defined Networking. 1482-1497 - Guoqiang Zhang, Yueyue Dai, Jian Wu, Xiaojie Zhu, Yunlong Lu:

Swarm Learning-based Secure and Fair Model Sharing for Metaverse Healthcare. 1498-1509 - Sujie Shao, Lili Su, Shaoyong Guo, Peng Yu, Xuesong Qiu:

Multi-Agent Cooperative Game Based Task Computing Mechanism for UAV-Assisted 6G NTN. 1510-1518 - Hanmin Deng, Weiqi Wang, Min Liu:

Deep Learning Enabled Task-Oriented Semantic Communication for Memory-Limited Devices. 1519-1530 - Wei Wei, Zuxiang Zheng, Yun Wang, Yi Su, Xiujie Wang, Lizhe Liu, Bin Wang, Chenhua Sun, Dongdong Wang:

Random Access Control and Beam Management Scheme for the 5G NR based Beam Hopping LEO Satellite Communication Systems. 1531-1542 - Tian Gao, Zhao Chen, Liuguo Yin:

Covert UAV Communication by Exploiting Imperfect Cancellation Under Channel Uncertainty. 1543-1552 - Dongdong Wang, Chenhua Sun, Xiujie Wang, Lizhe Liu, Bin Wang:

5G Integrated User Downlink Adaptive Transmission Scheme for Low Earth Orbit Satellite Internet Access Network. 1553-1564
Volume 28, Number 5, October 2023
- Yuyang Wang, Xianjia Meng, Ximeng Liu:

Differentially Private Recurrent Variational Autoencoder For Text Privacy Preservation. 1565-1580 - Kaiqi Zhang, Dianhui Chu, Zhiying Tu

, Chunshan Li:
Service Availability Assessment Model Based on User Tolerance. 1581-1596 - Bo Ning, Xinjian Zhang

, Shuai Gao, Guanyu Li:
DP-AGM: A Differential Privacy Preserving Method for Binary Relationship in Mobile Networks. 1597-1616 - Tao Feng, Fanqi Kong

, Chunyan Liu, Ye Lu:
Multi-Authorization Attribute-Based Verifiable Encryption Scheme Based on Blockchain. 1617-1624 - Yan Zhou, Changgen Peng, Youliang Tian, Zuolong Li, Weijie Tan:

Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow. 1625-1635 - Jing Yang, Zhiyang Yin, Tong Tang:

Adaptive Intra Refresh for Screen Content Video Transmission in Dynamic Network. 1636-1646 - Lele Zheng, Tao Zhang

, Yulong Shen, Bowen Deng, Ze Tong:
A Task-based Personalized Privacy-Preserving Participant Selection Mechanism for Mobile Crowdsensing. 1647-1657 - Wenxiang Zhang, Zhenyuan Tian, Shuai Wang, Ting Yang:

A Brief Introduction to Vision Based Mobile Information System. 1658-1661 - Yehui Su, Youcef Djenouri:

High-Precision Matching Algorithm for Multi-Image Segmentation of Micro Animation Videos in Mobile Network Environment. 1662-1672 - Yi Xiong, Syed Atif Moqurrab, Awais Ahmad:

Enhancing Human Motion Prediction through Joint-based Analysis and AVI Video Conversion. 1673-1686 - Yan Zhang, Wei Wei:

Sports Training Correction based on 3D Virtual Image Model. 1687-1698 - Botao Zhang, Yiheng Zhang, Bandar Alshawi

, Ryan Alturki:
Basketball Flight Trajectory Tracking using Video Signal Filtering. 1699-1711 - Jing Ge, Kangcheng Wu, Nasir Jamal, Farhan Ullah

:
Dynamic Resource Allocation Techniques for Wireless Network Data in Elastic Optical Network Applications. 1712-1723 - Yajuan Sun, Gautam Srivastava:

Digital Watermarks for Videos Based on a Locality-Sensitive Hashing Algorithm. 1724-1737 - Jing Zhang, Thippa Reddy Gadekallu

:
A Remote Health Detection System with Sensor Signal Purification. 1738-1750 - Wei Li, Hui Liu:

Design of Network Medical Image Information Feature Diagnosis Method Based on Big Data. 1751-1761 - Jian-zhao Sun, Kun Yang, Marcin Wozniak

:
Research on Hybrid Data Clustering Algorithm for Wireless Communication Intelligent Bracelets. 1762-1771 - Dan Zhou, Mohamed Baza

, Amar Rasheed:
Highly Reliable Robust Mining of Educational Data Features in Universities Based on Dynamic Semantic Memory Networks. 1772-1782 - Minghe Hu, Jiancang He, Maazen Alsabaan:

Image Identification Method of Ice Thickness on Transmission Line Based on Visual Sensing. 1783-1792 - Yishu Huang, Changling Peng, Shuai Liu

:
Empirical Research of Classroom Behavior Based on Online Education: A Systematic Review. 1793-1805 - Jinyin Peng, Li Zhao:

Shortest Path Control for Target Searching Using Robot in Complex Task with Large Range. 1806-1817 - Qisen Xi, Yizhi Ren, Liang Kou

, Yongrui Cui, Zuohua Chen, Lifeng Yuan
, Dong Wang:
EABERT: An Event Annotation Enhanced BERT Framework for Event Extraction. 1818-1830 - Rong Ma

, Tao Feng, Youliang Tian, Jinbo Xiong:
EPMA: Edge-Assisted Hierarchical Privacy-Preserving Multidimensional Data Aggregation Mechanism. 1831-1841 - Congan Xu, Hang Su, Long Gao, Junfeng Wu, Wenjun Yan:

Rotated SAR Ship Detection based on Gaussian Wasserstein Distance Loss. 1842-1851 - Jibo Shi, Bin Ge, Qiong Wu, Ruichang Yang, Yan Sun

:
Radio Frequency Fingerprint Identification of WiFi Signals Based on Federated Learning for Different Data Distribution Scenarios. 1852-1864 - Wenchen Liu, Mingran Li, Fuyu Liu, Yuan Xu

:
Dual Predictive Quaternion Kalman Filter and its Application in Seamless Wireless Mobile Human Lower Limb Posture Tracking. 1865-1876 - Yudong Zhang, Vishnuvarthanan Govindaraj, Ziquan Zhu:

FECNet: a Neural Network and a Mobile App for COVID-19 Recognition. 1877-1890 - Qing Wei, Qiaoli Lin, Gautam Srivastava:

Embedded Design and Implementation of a Wireless Multimedia Platform for Digital Estimation of Agricultural Output. 1891-1900 - Doaa Aboshady

, Naglaa E. Ghannam, Eman K. Elsayed
, Lamiaa Diab:
APKOWL: An Automatic Approach to Enhance the Malware Detection. 1901-1912 - Wenbing Jiang, Yihuo Jiang, Gautam Srivastava:

Remote Early Warning System for Mountain Floods with Robust ZigBee Wireless Networks. 1913-1924 - Chonggao Chen, Jin Zhang, Loknath Sai Ambati:

Explosive force acquisition of sprinter lower limb in training based on WSN. 1925-1935 - Yudong Zhang

, Yanrong Pei, Juan Manuel Górriz:
SCNN: A Explainable Swish-based CNN and Mobile App for COVID-19 Diagnosis. 1936-1949 - Geng Chen

, Lili Cheng, Xiaoxian Kong, Qingtian Zeng, Yu-Dong Zhang:
Joint Node Selection and Power Allocation for Cooperative Positioning Based on Bidding Auction in VANET. 1950-1963 - Ying Zhou, Zhichao Zheng, Quansen Sun:

Texture Pattern-based Bi-directional Projections for Medical Image Super-resolution. 1964-1974
Volume 28, Number 6, December 2023
- Yong Gong, Vicente García-Díaz:

Medical parameter extraction method of sports injury based on sensor network. 1975-1986 - Wenkui Zheng, Wei Hou, Jerry Chun-Wei Lin

:
A Deep Learning based Feature Entity Relationship Extraction Method for Telemedicine Sensing Big Data. 1987-1996 - Haiying Chen, Marcin Wozniak

:
Mathematical Model Simulation of Detailed Classification of Telemedicine Sensing Data. 1997-2006 - Bin Xia

, Xianzhi Zheng, Nan Xie, Liye Zhang:
Grey Wolf Cooperative Positioning Algorithm for UWB Network. 2007-2014 - Bin Sun

, Renkang Geng, Tao Shen, Yuan Xu
, Shuhui Bi:
Dynamic Emergency Transit Forecasting with IoT Sequential Data. 2015-2029 - Ying Song, Gautam Srivastava:

Remote Sports Injury Monitoring using Wireless Sensor Networks. 2030-2040 - Geng Chen

, Xianjie Xu, Qingtian Zeng, Yu-Dong Zhang
:
A Vehicle-Assisted Computation Offloading Algorithm Based on Proximal Policy Optimization in Vehicle Edge Networks. 2041-2055 - Shtwai Alsubai

, Mohemmed Sha
, Abdullah Alqahtani
, Munish Bhatia:
Hybrid IoT-Edge-Cloud Computing-based Athlete Healthcare Framework: Digital Twin Initiative. 2056-2075 - Aripriharta

, Gwo-Jiun Horng
:
A New Defect Diameter Prediction using Heart Sound and Possibility to Implement as IoT Healthcare. 2076-2092 - Liu Xurui, Zhang Guobao:

Enhancing the Swimmer Movement Techniques Using Cloud Computing and Artificial Intelligence. 2093-2108 - Huanxue Liu, Fengqin Ke, Zhenzhong Zhang, Yanan Gao, Quanyu Zhang:

Fault Tolerance in Electric Vehicles Using Deep Learning for Intelligent Transportation Systems. 2109-2117 - Xiangyong Zhang:

River Ecological Protection and Restoration Using Multi-source Remote Sensing Data. 2118-2129 - Tingrong Yin:

Music Track Recommendation Using Deep-CNN and Mel Spectrograms. 2130-2137 - Cai Wangang:

Design and Implementation of an Educational Information Management System Using Deep Learning and Wireless Communication. 2138-2148 - Cai Wangang:

A Model for Digital Education Management Information System Using Wireless Communication and BP Neural Networks. 2149-2161 - Zhenxing Song, Di Zhang, Yue Wang:

Designing a Human Enterprise Management Model Using Deep Learning and Wireless Connectivity. 2162-2170 - Yizhen Sun:

Timbre-Based Portable Musical Instrument Recognition Using LVQ Learning Algorithm. 2171-2181 - Linlin Peng:

Piano Players' Intonation and Training Using Deep Learning and MobileNet Architecture. 2182-2190 - Xingzhu Wang:

Fast Localization Model of Network Intrusion Detection System for Enterprises Using Cloud Computing Environment. 2191-2203 - Lili Ren, Baiyun Deng, Zhiling Chen:

Using Wireless Network Sensors as a New Medium of Communication for Sustainable Eco-cultural Tourism. 2204-2214 - Qi Wang:

An Intelligent System of Permanent Magnet Synchronous Using Synovial Motor Control and PID Motor Control for EoT Computing: a Comparative Simulation Study. 2215-2223 - Nguyen-Son Vo, Antonino Masaracchia, Zhichao Sheng, Thanh Tuan Nguyen:

Editorial: Towards 6G Technologies, Networks, Hardware, and Architectures. 2224-2226 - Thang Nguyen Quoc

, Trang Hoang
, Lihong Zhang, Octavia A. Dobre, Trung Q. Duong:
A Survey on Smart Optimisation Techniques for 6G-oriented Integrated Circuits Design. 2227-2244 - Dac-Binh Ha, Van-Truong Truong, Tien-Vu Truong, Thanh-Minh Phan

:
STAR-RIS-aided UAV NOMA Mobile Edge Computing Network with RF Energy Harvesting. 2245-2257 - Arun Raj

, Durbadal Mandal:
Comparative analysis of fractal antennae for sub-6 GHz and 5G bands for wireless and IoT applications. 2258-2274 - Nguyen Quoc Long, Viet-Hung Dang, Nhu Gia Nguyen, Thanh Trong Nguyen, Tu Dac Ho, Hung Tran, Duc-Dung Tran, Cong Le Thanh, Van Nhan Vo:

Deep Learning for Outage Probability Minimization in Secure NOMA Energy Harvesting UAV IoT Networks. 2275-2287 - Wenjun Huang, Keran Zhang, Hangzai Luo, Sheng Zhong:

Hardware-Based Satellite Network Broadcast Storm Suppression Method. 2288-2299

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














