


default search action
Mobile Networks and Applications, Volume 29
Volume 29, Number 1, February 2024
- José Escorcia-Gutierrez
, Romany Fouad Mansour, Esmeide Leal, Jair A. Villanueva, Javier Jiménez-Cabas
, Carlos Soto, Roosvel Soto-Díaz
:
Privacy Preserving Blockchain with Energy Aware Clustering Scheme for IoT Healthcare Systems. 1-12 - Prince Sharma
, Nisha
, Shailendra Shukla, Amol Vasudeva:
An Era of Mobile Data Offloading Opportunities: A Comprehensive Survey. 13-28 - Manjarini Mallik, Garga Sarkar, Chandreyee Chowdhury
:
A Deep Learning Framework for Smartphone Based Human Activity Recognition. 29-41 - Swadesh Jana
, Asif Iqbal Middya
, Sarbani Roy
:
Participatory Sensing Based Urban Road Condition Classification using Transfer Learning. 42-58 - Ulpan Tokkozhina
, Bruno Mataloto
, Ana Lúcia Martins
, João Ferreira
:
Decentralizing Online Food Delivery Services: A Blockchain and IoT Model for Smart Cities. 59-69 - Jarlin Dario Alejandro-Chable, Tomás Eloy Salais-Fierro, Jania Astrid Saucedo-Martínez, Miguel Gastón Cedillo-Campos
:
A New Lean Logistics Management Model for the Modern Supply Chain. 70-81 - Giovanna Hernández-Palomo, Román Rodríguez-Aguilar
, Francisco Venegas-Martínez
:
Modeling the Optimal Supply Chain of Liquefied Natural Gas as Fuel in Fishing Vessels in Mexico. 82-97 - José-Fernando Camacho-Vallejo, Juan-Carlos García-Vélez
, Carlos Corpus
:
A 5G Hubs Location Hierarchized Problem that Balances the Connection of the Users. 98-108 - Jose Antonio Marmolejo Saucedo
, Utku Kose
:
Numerical Grad-Cam Based Explainable Convolutional Neural Network for Brain Tumor Diagnosis. 109-118 - Jozef Husár
, Lucia Knapcíková:
Implementation of Augmented Reality in Smart Engineering Manufacturing: Literature Review. 119-132 - Branka Mikavica
, Aleksandra Kostic-Ljubisavljevic
, Dragan Perakovic
, Ivan Cvitic
:
Deadline-Aware Task Offloading and Resource Allocation in a Secure Fog-Cloud Environment. 133-146 - Aleksandar Jevremovic
, Zona Kostic, Dragan Perakovic
:
Energy-Efficient Edge Intelligence: A Comparative Analysis of AIoT Technologies. 147-155 - Katarzyna Huk
, Mateusz Kurowski
, Lucia Knapcíková, Rebeka Tauberová:
Modern Mobile Infrastructure in Transport and Forwarding. 156-165 - Peter Korba
, Annamária Behúnová
, Cristian Dan Stratyinski:
Implementation of Modern Software Systems in Aviation Engineering. 166-175 - Mohammed Maray
, Ghadah Aldehim
, Abdulrahman Alzahrani, Faiz Abdullah Alotaibi, Safa Alsafari, Elham Abdullah Alghamdi, Manar Ahmed Hamza:
Deer Hunting Optimization with Deep Learning-Driven Automated Fabric Defect Detection and Classification. 176-186 - Abdelwahed Motwakel, Aisha Hassan Abdalla Hashim, Hanan Abdullah Mengash, Nuha Alruwais, Ayman Yafoz
, Raed Alsini
, Alaa Edris:
Green Anaconda Optimization Based Energy Aware Clustering Protocol for 6G Wireless Communication Systems. 187-200 - Jared Piña-Barcenas, Miguel Gastón Cedillo-Campos
, Eric Moreno-Quintero, Daniel Covarrubias
:
Graph Theory to Achieve the Digital Transformation in Managing Freight Transportation Corridors. 201-210 - Igor S. Litvinchev
, Luis Infante
, Tetyana Romanova
, Alberto Martinez-Noa, Luis Gutierrez:
Packing Soft Convex Polygons in an Optimized Convex Container. 211-220 - Román Rodríguez-Aguilar
, José Antonio Marmolejo-Suacedo, Miriam Rodriguez Aguilar, Liliana Marmolejo Saucedo:
Machine Learning for Digital Shadow Design in Health Insurance Sector. 221-234 - Jania Astrid Saucedo-Martínez, Tomás Eloy Salais-Fierro, Román Rodríguez-Aguilar, Jose Antonio Marmolejo Saucedo:
Selecting the Distribution System using AHP and Fuzzy AHP Methods. 235-242 - Dang Van Pham
, Vinh Cong Phan
:
Algebraic aspects of big data in livestream in internet of mobile things. 243-261 - Long Tan Le, Tung-Anh Nguyen
, Tuan-Dung Nguyen, Nguyen Hoang Tran, Nguyen Binh Truong, Phuong L. Vo, Bui Thanh Hung
, Tuan Anh Le:
Distributionally Robust Federated Learning for Mobile Edge Networks. 262-272 - Zhiru Hou, Lili Xiao, Huibiao Zhu, Phan Cong Vinh:
Formalization and Analysis of Aeolus-based File System from Process Algebra Perspective. 273-285 - Nguyen Van Han
, Phan Cong Vinh
, Marie Duzí
:
Towards Modeling Conceptual Graphs and Transparent Intensional Logic. 286-293 - Tri Ngo Quang
, Thanh Tung Nguyen, Huong Pham Thi Viet:
Machine Learning Approach for Early Detection of Diabetes Using Raman Spectroscopy. 294-305 - Cam Ngoc Thi Huynh, Phuoc Vinh Tran, Trung Vinh Tran:
The Approach of Winner-domain to Selecting Members for High School Team Participating in National Excellent Student Competition. 306-313
Volume 29, Number 2, April 2024
- Huan Zhan, Xiangyun Meng, Muhammad Asif:
Risk Early Warning of a Dynamic Ideological and Political Education System Based on LSTM-MLP: Online Education Data Processing and Optimization. 1 - Mohan Prakash
, S. Neelakandan
, Bong-Hyun Kim:
Reinforcement Learning-Based Multidimensional Perception and Energy Awareness Optimized Link State Routing for Flying Ad-Hoc Networks. 315-333 - An-Chao Tsai, Anirut Saengsoi:
Artificial Intelligent IoT-Based Cognitive Hardware for Agricultural Precision Analysis. 334-348 - Anbazhagan Geetha, S. Suprakash, Se-Jung Lim:
Sensor based Battery Management System in Electric Vehicle using IoT with Optimized Routing. 349-372 - Daegeon Kim, S. Velliangiri
, Bhuvaneswari Amma N. G.
, Dongoun Lee:
Class Scatter Ratio Based Mahalanobis Distance Approach for Detection of Internet of Things Traffic Anomalies. 373-384 - K. Sakthidasan Sankaran, Seng-Phil Hong:
Trust Aware Secured Data Transmission Based Routing Strategy Using Optimal Ch Selection in Mobile Ad-Hoc Network. 385-397 - Faheem Khan, Rahat Ullah, Umm-e Laila:
Editorial: Ubiquitous Computing Entity-aware Data Management on Mobile Devices. 398-400 - Qianqian Deng, Yuan Guo, Tan Meng:
E-Commerce Commodity Recommendation System Based on Social Perception and Mobile Computing. 401-412 - Firdous Kausar, Mostefa Mesbah, Waseem Iqbal
, Awais Ahmad, Ikram Sayyed:
Fall Detection in the Elderly using Different Machine Learning Algorithms with Optimal Window Size. 413-423 - Ahmer Khan Jadoon
, Jian Shen, Jabran Khan:
Secure Key Distribution for Vehicular Network Based on Kirchhoff Law Johnson Noise. 424-432 - N. Noor Alleema
, Abhay Chaturvedi, Ashok Kumar Nanda, P. Joel Josephson, Ahmed Mateen Buttar
, Dinesh Komarasamy:
Computation Offloading for Image Compression in Mobile Edge Computing Using a Deep Belief Network Based on the Markov Approximation Algorithm. 433-447 - Deepak Sharma
, Mohamed A. Elmagzoub
, Abdullah Alghamdi, Mesfer Alrizq, Kusum Yadav
, Sachin Sharma
, V. Prashanth:
Entity-Aware Data Management on Mobile Devices: Utilizing Edge Computing and Centric Information Networking in the Context of 5G and IoT. 448-459 - Munish Bhatia:
IoT-Inspired Secure Healthcare Framework for Adult: Blockchain Perspective. 460-476 - Sulaiman Khan
, Habib Ullah Khan
, Shah Nazir, Bayan Albahooth, Mohammad Arif:
Users Sentiment Analysis Using Artificial Intelligence-Based FinTech Data Fusion in Financial Organizations. 477-488 - Habib Ullah Khan
, Nasir Ali, Shah Nazir, Abdulatif Alabdulatif, Mohammad Arif:
Multi-Criterial Based Feature Selection for Health Care System. 489-502 - Lucia Knapcíková, Dragan Perakovic
:
Editorial to the Special Issue "Synergies in Smart Technologies and Mobility" MONET Journal. 503-505 - Annamária Behúnová
, Tomás Mandicák
, Marcel Behún
, Peter Mésáros
:
The Building Information Modelling Through Information Technology and Impacts on Selected Circular Economy Performance Indicators of Construction Projects. 506-515 - Curtis Shull
, Krystian Marecki, Katarzyna Huk
, Robert Wolski
:
The Study of RFID Technology and Laser Telemetry to Locate Products in Space. 516-532 - Ivan Cvitic
, Aleksandar Jevremovic
, Petre Lameski
:
Approaches and Opportunities of Using Machine Learning Methods in Telecommunications and Industry 4.0. 533-544 - Shakib Zohrehvandi:
A Fuzzy Overlapping Project Resource Optimization Model in the Project Construction Industry with a Fractal Approach. 545-556 - Michal Holubcik
, Jozef Jandacka
, Miriam Nicolanská
:
Improvement of Emission Monitoring System Accuracy in Aims of Increasing Air Quality of Smart City. 557-566
Volume 29, Number 3, June 2024
- Yuwen Sha, Bo Sun
, Hadi Jahanshahi, Linian Wang:
A Fast and Effective Image Encryption Scheme Based on DSVSM and (7, 4) Hamming Code. 567-582 - Xuejun Li, Bo Sun
, Xiuguo Bi, Huizhen Yan, Linian Wang:
A Novel Color Image Encryption Algorithm Based on Cross-plane Scrambling and Diffusion. 583-594 - Xintong Han, Peng Li
, Bo Sun, Lujie Ren:
A New Three-Dimensional Map Based Discrete Memristor and Its Hardware Implementation. 595-602 - Tianming Liu, Bo Sun, Peng Li
, Tao Ma, Yanjie Ma:
Multistability Analysis of a Fractional-Order Multi-Wing Chaotic System and its Circuit Realization. 603-613 - Jieyang Wang, Peng Li
, Santo Banerjee, Yixin Chen, Xuan Wang:
A HNN Chaotic System with Attractor Coexistence and its Circuit Realization. 614-622 - Songtao Zhang, Chifu Yang, Jianfei Zhu, Jin Tian, Mengqiang Fu, Changbing Chen, Yingjie Liu, Baichun Wei:
A Method for Obtaining Barbell Velocity and Displacement and Motion Counting Based on IMU. 623-633 - Mingkai Chen, Xinmeng Tan, Huiyan Han, Lei Wang:
Tactile Codec with Visual Assistance in Multi-modal Communication for Digital Health. 634-646 - Yifan Chen
, Haiqi Zhu, Zhiyuan Chen:
Multi-DGI: Multi-head Pooling Deep Graph Infomax for Human Activity Recognition. 647-658 - Abderrahmane Salmi, Wei Zhang, Feng Jiang:
Reducing Data Transmission Efficiency in Wireless Capsule Endoscopy through DL-CEndo Framework: Reconstructing Lossy Low-Resolution Luma Images and Improving Summarization. 659-675 - Leila Aissaoui Ferhi, Manel Ben Amar, Fethi Choubani, Ridha Bouallegue
:
Empowering Medical Diagnosis: A Machine Learning Approach for Symptom-Based Health Checker. 676-702 - Priscila Basto Fagundes
, Douglas Dyllon Jeronimo de Macedo
, António Lucas Soares:
FIRMa: A Framework to Support the Requirements Management Process Based on Information Management Tools. 703-713 - Young-Chool Choi, Nafsiah Mohamed:
Methodological Exploration of Social Value Measurement in Mobile Network Services: Application of Social Network Analysis and System Dynamics Methodology. 714-728 - Young-Chool Choi, Nafsiah Mohamed:
Measuring Social Value of Information Technology: Application of Topic Modelling and System Dynamics. 729-741 - Raulivan Rodrigo da Silva
, Thiago Magela Rodrigues Dias
, Washington Luís Ribeiro de Carvalho Segundo
:
Collection and Integration of Patent Data for Analysis and Validation of Brazilian Technical Production. 742-753 - Fábio Lorensi do Canto
, Adilson Luiz Pinto
, Thiago Magela Rodrigues Dias
, Edson Mário Gavron
, Marcos Talau
:
Gsm_hdata: a bibliometric tool to analyze data from google scholar metrics. 754-761 - Yawen Xing, Huizhe Lu, Lifei Zhao, Shihua Cao:
Privacy and Security Issues in Mobile Medical Information Systems MMIS. 762-773 - Vivek Srivastava
, Sumita Mishra
, Nishu Gupta:
Traffic Flow Labelling for Congestion Prediction with Improved Heuristic Algorithm and Atrous Convolution-based Hybrid Attention Networks. 774-791 - Subhash Suman, Ayush Kumar Singh, Prakash Pareek
, Jitendra K. Mishra:
Efficient Power Prediction for Intersatellite Optical Wireless Communication System Using Artificial Neural Network. 792-800 - Ankita Kumari, Prakash Pareek
, Jitendra K. Mishra:
Performance Analysis of Spatially Multiplexed Hybrid BPSK-MPPM Modulated Optical Interconnect System Using Triangular Index Multicore Fiber. 801-808 - Vidyapati Jha
, Priyanka Tripathi:
Probabilistic SAX: A Cognitively-Inspired Method for Time Series Classification in Cognitive IoT Sensor Network. 809-824 - Yifeng Zhao
, Xuanhui Liu, Haoran Liu, Xiaoqi Wang, Lianfen Huang:
RIS-Aided MmWave Hybrid Relay Network Based on Multi-Agent Deep Reinforcement Learning. 825-840 - Hongguang Zhang, Liangqian Chen, Shengwen Ma, Puyan Zhang, Hao Zheng, Yuanan Liu:
Broad Learning System Routing to Mitigate the Impact of Dynamic Changing Topology for 3D Flying Ad Hoc Networks. 841-855 - Dipen Bepari, Soumen Mondal, Prakash Pareek
, Nishu Gupta:
Uplink Performance Analysis of Wireless Energy Harvesting-Enabled NOMA-based Networks. 856-866 - Khalid Haseeb, Fahad F. Alruwaili, Atif Khan, Teg Alam, Abrar Wafa, Amjad Rehman Khan:
AI Assisted Energy Optimized Sustainable Model for Secured Routing in Mobile Wireless Sensor Network. 867-875 - Amjad Rehman, Khalid Haseeb, Fahad F. Alruwaili, Anees Ara
, Tanzila Saba:
Autonomous and Intelligent Mobile Multimedia Cyber-Physical System with Secured Heterogeneous IoT Network. 876-885 - Chun-Cheng Lin, Yi-Chun Peng
, Zhen-Yin Annie Chen
, Yu-Hong Fan, Hui-Hsin Chin:
Distributed Flexible Job Shop Scheduling through Deploying Fog and Edge Computing in Smart Factories Using Dual Deep Q Networks. 886-904 - Ruey-Chyi Wu:
Development of an Intelligent Virtualization Platform Key Metrics Monitoring System: Collaborative Implementation with Self-Training and Bagging Algorithm. 905-921 - Xintong Pei, Zhenjiang Zhang, Yaochen Zhang:
Cost-efficient Hierarchical Federated Edge Learning for Satellite-terrestrial Internet of Things. 922-934 - Hsiao-Yu Wang, Ching-Hua Hung, Cheng-Hui Chen:
Evaluating Service Life of Metal Processing Machinery: An Intelligent Monitoring Perspective. 935-946 - Jen-En Huang, Li-Wei Chang, Hui-Hsin Chin:
5G Metaverse in Education. 947-960 - Chandra Wijaya, Rita Wiryasaputra, I-Jan Wang, Ruey-Chyi Wu, Chao-Tung Yang:
Simulation of DOS Attacks Mitigation in Software Defined Network Architecture using Load Balancing Algorithm. 961-980 - Piotr Trojanowski
, Jozef Husár
, Stella Hrehová
, Lucia Knapcíková:
Cluster Analysis as a Basis for the Development of an Application Assessing the Reliability of Transport Infrastructure. 981-990 - Gordana Jotanovic
, Goran Jausevac
, Dragan Perakovic
, Dalibor Dobrilovic
, Zeljko Stojanov
, Vladimir Brtka
:
Modeling a LoRAWAN Network for Vehicle Wildlife Collision Avoidance System on Rural Roads. 991-999 - Srdjan Atanasijevic, Aleksandar Jevremovic
, Dragan Perakovic
, Mladen D. Veinovic, Tibor Mijo Kuljanic:
Just-in-time Software Distribution in (A)IoT Environments. 1000-1007 - Muhusina Ismail, Saed Alrabaee, Kim-Kwang Raymond Choo, Luqman Ali, Saad Harous:
A Comprehensive Evaluation of Machine Learning Algorithms for Web Application Attack Detection with Knowledge Graph Integration. 1008-1037 - Peter Mésáros, Jana Smetanková
, Annamária Behúnová
, Katarína Krajníková:
The Potential of Using Artificial Intelligence (AI) to Analyse the Impact of Construction Industry on the Carbon Footprint. 1038-1052 - Matous Machka
, Theodor Beran
:
Monitoring of Material and Energy Flows: Integration of MFCA System with an Open Input-Output Model Separating Variable and Fixed Costs. 1053-1066
Volume 29, Number 4, August 2024
- Shuhui Bi, Xue Li, Liyao Ma
, Qinjun Zhao, Tao Shen, Shengjun Shi:
Apple Internal Quality Fusion Prediction by Multi-pattern Recognition Technology and Evidence Theory. 1067-1075 - Yu-Dong Zhang
, Xianwei Jiang, Shui-Hua Wang:
Fingerspelling Recognition by 12-Layer CNN with Stochastic Pooling. 1076-1088 - Mingxu Sun, Yanli Gao, Zhuqing Jiao, Yuan Xu, Yuan Zhuang
, Pengjiang Qian:
R-T-S Assisted Kalman Filtering for Robot Localization Using UWB Measurement. 1089-1098 - Jing Yin, Xiao-lin Xu, Xiao-hua Xiong, Zbigniew Marszalek:
An enhancement method of waveform simulation in dual-color laser field imaging based on Internet of Things. 1099-1107 - Yu-Dong Zhang
, Wei Wang
, Xin Zhang, Shui-Hua Wang:
Secondary Pulmonary Tuberculosis Recognition by 4-Direction Varying-Distance GLCM and Fuzzy SVM. 1108-1121 - Shui-Hua Wang, Jin Zhou, Yu-Dong Zhang
:
Community-Acquired Pneumonia Recognition by Wavelet Entropy and Cat Swarm Optimization. 1122-1139 - Deep Chandra Binwal
, Rajeev Tiwari
, Monit Kapoor
:
Modeling and Optimization of Vehicular Fog Network Towards Minimizing Latency. 1140-1151 - Lokesh Bommisetty
, T. G. Venkatesh:
Contextual Bandit Based Adaptive Numerology for Initial Access in 5G NR Networks. 1152-1164 - Abdullah Alqahtani
, Shtwai Alsubai
, Mohemmed Sha
, Munish Bhatia:
Game Theoretic Systematic Approach for Transportation Quality Assessment. 1165-1180 - Shuang Zheng, Junfeng Wu, Songnan Duan
, Fugang Liu
, Jingyi Pan:
An Improved Crowd Counting Method Based on YOLOv3. 1181-1189 - Mingyuan Ren
, Ruidong Zhang, Xiaolin Jiang
:
BLE Transmitter with Multiple Feedback Filter for Low-Power IoT Applications. 1190-1195 - Changchun Dong, Mingyuan Ren, Xiaolin Jiang
:
A Tunable Integrated N-Path Bandpass Filter. 1196-1202 - Xiaolin Jiang
, Lihuan Zhang
:
SD-Based Low-Complexity Signal Detection Algorithm in Massive MIMO Systems. 1203-1211 - Han Tian, Zhang Zhu
, Xu Jing:
Deep learning for Depression Recognition from Speech. 1212-1227 - Waralak V. Siricharoen
:
Improving User Experience (UX) by Applying (Interactive) Infographic in the Human Computer Interaction Context. 1228-1238 - Dang Van Pham
, Vinh Cong Phan
:
Overview of the Stream Theory-Based Big Data in Livestream. 1239-1256 - Zhiru Hou
, Jiaqi Yin, Huibiao Zhu, Phan Cong Vinh:
Formal Modeling and Verifying Dubbo Using Process Algebra. 1257-1272 - Thanh Phuong Nguyen, Hung Nguyen, Ha Quang Thinh Ngo
:
Developing and Evaluating the Context-Aware Performance of Synchronization Control in the Real-Time Network Protocol for the Connected Vehicle. 1273-1294 - Ijaz Uddin
, Abdur Rakib
, Mumtaz Ali, Hafiz Mahfooz Ul Haque, Altaf Uddin:
A Semantic-Based Approach to Modelling Smart Indoor Kitchen Garden. 1295-1310 - Le Anh Duc, Nguyen Thanh Tung, Tran Thi Oanh, Ngo Quang Tri
, Ngo Thuy Linh:
Non-Invasive In Vivo Type 2 Diabetes Mellitus Diagnosis Using Raman Spectroscopy in Combination with Machine Learning. 1311-1323 - Yang Li, Houbing Herbert Song:
Editorial: Resource Efficient Deep Learning for Computer Vision Applications. 1324-1325 - Nadia Mumtaz, Naveed Ejaz, Imad Rida
, Muhammad Attique Khan, Mi Young Lee:
Towards Real-world Violence Recognition via Efficient Deep Features and Sequential Patterns Analysis. 1326-1335 - Kamini Lamba, Shalli Rani
, Muhammad Attique Khan, Mohammad Shabaz:
RE-InCep-BT-:Resource-Efficient InCeptor Model for Brain Tumor Diagnostic Healthcare Applications in Computer Vision. 1336-1350 - Ebtisam Abdullah Alabdulqader, Muhammad Umer, Khaled Alnowaiser, Huihui Wang, Aisha Ahmed AlArfaj, Imran Ashraf:
Image Processing-based Resource-Efficient Transfer Learning Approach for Cancer Detection Employing Local Binary Pattern Features. 1351-1367 - Camellia Ray
, Sambit Bakshi, Pankaj Kumar Sa, Ganapati Panda:
A Resource-Efficient Deep Learning Approach to Visual-Based Cattle Geographic Origin Prediction. 1368-1377 - Ping Guo, Guoping Liu, Huan Liu:
TMPSformer: An Efficient Hybrid Transformer-MLP Network for Polyp Segmentation. 1378-1392 - Honglei Cheng, Haorui Yi, Guipeng Lan, Shuai Xiao:
Emo-AEN: A Lightweight Network for Brand Image Design Based on Aesthetic Evaluation. 1393-1401
Volume 29, Number 5, October 2024
- Zhigao Zheng, Shahid Mumtaz, Krishn K. Mishra, Joel J. P. C. Rodrigues, Bo Ai:
Editorial: Heterogeneous High Performance Computing for Intelligent Data Analysis. 1403-1405 - Li Gang
, Zhao Huanbin, Zhao Tongzhou:
Document Vector Representation with Enhanced Features Based on Doc2VecC. 1406-1415 - Changbing Huang, Ruibo Li, Aiping Li:
Parallel Implementation of Key Algorithms for Intelligent Processing of Graphic Signal Data of Consumer Digital Equipment. 1416-1423 - Lisheng Li, Shuai Li
, Yan Wen, Shidong Zhang, Xiangyu Wen:
Cloud-Edge Multi-Service Data Offloading Optimization for New Type Distribution Grid. 1424-1432 - Tao Gu, Lin Yang, Hua Wang
:
Data Privacy Protection Model Based on Graph Convolutional Neural Network. 1433-1440 - Kehuan Wen, Junhao Feng, Xiangyong Yang, Bo Geng, Boyang Huang:
5G Edge Intelligence-based Refined Power Distribution Monitoring Technology and Application. 1441-1450 - Guohong Yi, Zhichao Cao
:
An Algorithm of Image Encryption based on AES & Rossler Hyperchaotic Modeling. 1451-1459 - Kexiang Ma, Sungwon Lee, Hui Chen:
Application of Visual Communication in Image Enhancement and Optimization of Human-Computer Interface. 1460-1466 - Yingshu Wang, Jian Ding, Xiaomeng He, Qian Wei, Shu Yuan, Jun Zhang
:
Intrusion Detection Method Based on Denoising Diffusion Probabilistic Models for UAV Networks. 1467-1476 - Mingxi Liu, Ning Lu, Yihong Wen, Qingfeng Cheng, Wenbo Shi
:
SEA: Secure and Efficient Public Auditing for Edge-Assisted IoT Aggregated Data Sharing. 1477-1488 - Piyush Kumar, Mobashshirur Rahman, Suyel Namasudra, Nageswara Rao Moparthi
:
Enhancing Security of Medical Images Using Deep Learning, Chaotic Map, and Hash Table. 1489-1503 - Hongyu Yang
, Haihang Yuan, Liang Zhang:
Risk Assessment Method of IoT Host Based on Attack Graph. 1504-1513 - Mengfan Xu, Xinghua Li:
PPFL-IDS: Privacy-Preserving Federated Learning Based IDS Against Poisoning Attacks. 1514-1525 - Honghao Gao:
Cloud-Edge Intelligence Collaborative Computing: Software, Communication and Human. 1526-1528 - Yönal Kirsal
:
A Stochastic Performance Model and Mobility Analysis in the Integrated Cloud-Fog-Edge Computing System. 1529-1550 - Rui Zhang, Juan Chen, Yujia Song, Wenyu Shan, Peng Chen
, Yunni Xia:
An Effective Transformation-Encoding-Attention Framework for Multivariate Time Series Anomaly Detection in IoT Environment. 1551-1563 - Zhijian Lin
, Yonghang Lin, Jianjie Yang, Qingsong Zhang:
Energy-Efficient joint Resource Allocation and Computation Offloading in NOMA-enabled Vehicular Fog Computing. 1564-1576 - Haole Hou
, Zhengyi Chai
, Xu Liu
, Yalun Li, Yue Zeng:
A Task Offloading Algorithm using Multi-Objective Optimization under Hybrid Mode in Mobile Edge Computing. 1577-1593 - Amir Javadpour, Arun Kumar Sangaiah
, Hadi Zaviyeh, Forough Ja'fari:
Enhancing Energy Efficiency in IoT Networks Through Fuzzy Clustering and Optimization. 1594-1617 - Priyanka Verma, A. Rama Krishna Kowsik, Rajesh Kumar Pateriya, Nitesh Bharot, Ankit Vidyarthi
, Deepak Gupta:
A Stacked Ensemble Approach to Generalize the Classifier Prediction for the Detection of DDoS Attack in Cloud Network. 1618-1632 - Arunkumar Arulappan, Gunasekaran Raja, Ali Kashif Bashir, Aniket Mahanti, Marwan Omar:
ZTMP: Zero Touch Management Provisioning Algorithm for the On-boarding of Cloud-native Virtual Network Functions. 1633-1645 - Biplab Kanti Sen
, Sunirmal Khatua, Rajib Kumar Das:
Multichannel Pipelined Scheduling for Raw Data Convergecast in Sensor-Cloud. 1646-1662 - Zhengzhe Xiang, Dezhi Wang, Mengzhu He, Yuanyi Chen:
Dynamic System Reconfiguration in Stable and Green Edge Service Provisioning. 1663-1679 - Zhihong Tian, Wei Shi
, Zhiyuan Tan, Jing Qiu
, Yanbin Sun, Feng Jiang, Yan Liu:
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. 1680-1689 - Liting Deng, Chengli Yu, Hui Wen
, Mingfeng Xin, Yue Sun, Limin Sun, Hongsong Zhu:
Few-Shot Malware Classification via Attention-Based Transductive Learning Network. 1690-1704 - Liangjia Li, Yuling Luo
, Junxiu Liu, Senhui Qiu:
A Blind and Robust Image Watermarking Algorithm in the Spatial Domain using Two-level Partition. 1705-1718
Volume 29, Number 6, December 2024
- Amani K. Samha, Nidhi Malik
, Deepak Sharma
, Kavitha S
, Papiya Dutta
:
Intrusion Detection System Using Hybrid Convolutional Neural Network. 1719-1731 - Intyaz Alam, Manisha Manjul
, Vinay Pathak, Vajenti Mala, Anuj Mangal, Hardeo Kumar Thakur
, Deepak Kumar Sharma:
Efficient and Secure Graph-Based Trust-Enabled Routing in Vehicular Ad-Hoc Networks. 1732-1752 - Alaa A. Qaffas
:
Applying an Improved Squirrel Search Algorithm (ISSA) for Clustering and Low-Energy Routing in Wireless Sensor Networks (WSNs). 1753-1768 - Shalini Stalin
, Manish Gupta, K. Makanyadevi
, Amit Agrawal, Anupriya Jain
, Shraddha V. Pandit
, Ali Rizwan
:
Applying Machine Learning Approach to Identifying Channels in MIMO Networks for Communications in 5G-Enabled Sustainable Smart Cities. 1769-1781 - Yibo Chen, Honglian Li, Shengbin Zhuang, Xing Wei:
SupportNet: a Deep Learning Based Channel Equalization Network for Multi-type Multipath Fading. 1782-1795 - Mohammad Alauthman
, Hanan Aljuaid, P. Sathyaprakash, Amjad Aldweesh, Anand M, Tariq Rasheed, Awais Khan Jumani:
Unintended Data Behaviour Analysis Using Cryptography Stealth Approach Against Security and Communication Network. 1796-1810 - Ha Huy Cuong Nguyen, Daniel Grzonka
, Bui Thanh Khoa
, K. V. Daya Sagar
, Irshad Ahmed Abbasi
, R. Mahaveerakannan
, Ahmed Alkhayyat:
New Trends in Over the Top Media Service (OTT) Web User Behaviour Analysis and Unethical User Prediction. 1811-1827 - Vinay Bhardwaj, Deepak Prashar, Mamoon Rashid:
SIRFRM - Secure and Intelligent Routing Fairness Rate Model for Flying Adhoc Networks. 1828-1838 - Man Zhou, Lansheng Han:
Sensor Spoofing Detection On Autonomous Vehicle Using Channel-spatial-temporal Attention Based Autoencoder Network. 1839-1852 - Subha Ghosh
:
AdHocVDew: Graph Theory Based Dew Enabled 5G Vehicular Ad Hoc Network. 1853-1871 - Fanfeng Shi, Jiaji Wang, Vishnuvarthanan Govindaraj:
SGS: SqueezeNet-guided Gaussian-kernel SVM for COVID-19 Diagnosis. 1872-1885 - Xiaoyan Jiang, Zuojin Hu, Zhaozhao Xu:
CSO-CNN: Cat Swarm Optimization-guided Convolutional Neural Network for Mobile Detection of Breast Cancer. 1886-1896 - Xue Han, Zuojin Hu:
Mobile Diagnosis of COVID-19 by Biogeography-based Optimization-guided CNN. 1897-1908 - Guifen Wu, Norbert Herencsar:
Single-Channel Speech Quality Enhancement in Mobile Networks Based on Generative Adversarial Networks. 1909-1923 - Jun Wan, Marcin Wozniak:
A Sentiment Analysis Method for Big Social Online Multimodal Comments Based on Pre-trained Models. 1924-1937 - Kaustubh Ranjan Singh, Rashmi Chaudhry, Vinay Rishiwal, Mano Yadav:
Model-Free QoE-Aware Seamless Handoff in Heterogeneous Wireless Networks. 1938-1950 - Changting Shi, Dongdong Tao, Haibo Liu, Jinlong Bai:
A Rapid Planning Repair Method of Three-Dimensional Path for AUV. 1951-1966 - Jinyin Peng, Xiangjin Zhu, Li Zhao:
Minimum cascade repair method for mobile network nodes failure under time-frequency feature fusion. 1967-1979 - Dan Shan, Fanfeng Shi, Tianzhi Le:
Alzheimer's detection by Artificial Bee Colony and Convolutional Neural Network at Mobile Environment. 1980-1989 - Cuihong Wen
, Lemin Yin, Shuai Liu:
DGNet: A Handwritten Mathematical Formula Recognition Network Based on Deformable Convolution and Global Context Attention. 1990-2003 - Wei-Kuo Chiang, Tsung-Ying Li:
An Extended SDN Architecture for Video-on-Demand Caching. 2004-2021 - Xia Liu, Rongyao Jing, Kun Zhang, Qinjun Zhao, Mingxu Sun:
Research on Moving Liquid Level Detection Method of Viscometer in Dynamic Scene. 2022-2029 - Adel A. Alyoubi
:
Enhancing Data Security in Mobile Ad-hoc Network (MANETs) Using Trust-Based Approach with RSSI and Fuzzy Logic. 2030-2046 - Geng Chen, Qingbin Wang, Xiaoxian Kong, Qingtian Zeng:
Collaborative Localization Strategy Based on Node Selection and Power Allocation in Resource-Constrained Environments. 2047-2061 - Dan Wang, Syed Atif Moqurrab, Joon Yoo:
An improved mobile reinforcement learning for wrong actions detection in aerobics training videos. 2062-2074 - Yong Gong, Gautam Srivastava:
Real-Time Tracking of Basketball Trajectory Based on the Associative MCMC Model. 2075-2087 - Ding Chen, Abeer Aljohani:
Secured Data Sharing Method for Wireless Communication Network Based on Digital Twin and Merkle Hash Tree. 2088-2097 - Zhaolin Yang, Loknath Sai Ambati:
Human Body Full-body Motion Gesture Image Feature Capture in Mobile Sensor Networks. 2098-2109

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.