default search action
Mobile Networks and Applications, Volume 24
Volume 24, Number 1, February 2019
- Shuai Liu, Zhaojun Li, Yudong Zhang, Xiaochun Cheng:
Introduction of Key Problems in Long-Distance Learning and Training. 1-4 - Shuai Liu, Gaocheng Liu, Huiyu Zhou:
A Robust Parallel Object Tracking Method for Illumination Variations. 5-17 - Yun Lin, Sen Wang, Qidi Wu, Lei Chen:
Key Technologies and Solutions of Remote Distributed Virtual Laboratory for E-Learning and E-Education. 18-24 - Bing Jia, Lifei Hao, Chuxuan Zhang, Huili Zhao, Khan Muhammad:
An IoT Service Aggregation Method Based on Dynamic Planning for QoE Restraints. 25-33 - Hao Zhang, Tao Huang, Zhihan Lv, Sanya Liu, Heng Yang:
MOOCRC: A Highly Accurate Resource Recommendation Model for Use in MOOC Environments. 34-46 - Umar Ali, Amjad Mehmood, Muhammad Faran Majeed, Siraj Muhammad, Muhammad Kamal Khan, Houbing Song, Khalid Mahmood Malik:
Innovative Citizen's Services through Public Cloud in Pakistan: User's Privacy Concerns and Impacts on Adoption. 47-68 - Xiao Ma, Yin Zhang, Jiangfeng Zeng:
Newly Published Scientific Papers Recommendation in Heterogeneous Information Networks. 69-79 - Phan Cong Vinh:
Context-Aware Systems and Applications (ICCASA 2018) and Nature of Computation and Communication (ICTCC 2018). 80-81 - Abdur Rakib, Ijaz Uddin:
An Efficient Rule-Based Distributed Reasoning Framework for Resource-bounded Systems. 82-99 - Shuangqing Xiang, Xi Wu, Huibiao Zhu, Wanling Xie, Lili Xiao, Phan Cong Vinh:
Modeling and Verifying Basic Modules of Floodlight. 100-114 - Phuong Luu Vo, Tuan-Anh Le, Nguyen Hoang Tran:
mFAST: A Multipath Congestion Control Protocol for High Bandwidth-Delay Connection. 115-123 - Hong Anh Le, Anh Tu Bui, Ninh-Thuan Truong:
An Approach to Modeling and Estimating Power Consumption of Mobile Applications. 124-133 - Wanling Xie, Huibiao Zhu, Xi Wu, Phan Cong Vinh:
Formal Verification of mCWQ Using Extended Hoare Logic. 134-144 - Attasit Patanasiri, Donyaprueth Krairit:
A Comparative Study of Consumers' Purchase Intention on Different Internet Platforms. 145-159 - Cheonshik Kim, Byung-Gyu Kim, Joel J. P. C. Rodrigues:
Editorial: Recent Advances in Mining Intelligence and Context-Awareness on IoT-Based Platforms. 160-162 - Haein Kim, Geunho Yang, Hosang Jung, Sang Ho Lee, Jae Joon Ahn:
An Intelligent Product Recommendation Model to Reflect the Recent Purchasing Patterns of Customers. 163-170 - Haibo Ye, Kai Dong, Tao Gu, Zhiqiu Huang:
SMinder: Detect a Left-behind Phone using Sensor-based Context Awareness. 171-183 - Duhoe Kim, Dongil Shin, Dongkyoo Shin, Yong-Hyun Kim:
Attack Detection Application with Attack Tree for Mobile System using Log Analysis. 184-192 - Vishnu Vidyadhara Raju Vegesna, Krishna Gurugubelli, Anil Kumar Vuppala:
Application of Emotion Recognition and Modification for Emotional Telugu Speech Recognition. 193-201 - Sanjay Chatterji:
Recommending the Best Merchant from Previous Transactions. 202-207 - Jong-Hyeok Lee, Gwang-Soo Hong, Young-Woon Lee, Chang-Ki Kim, Noik Park, Byung-Gyu Kim:
Design of Efficient Key Video Frame Protection Scheme for Multimedia Internet of Things (IoT) in Converged 5G Network. 208-220 - Anandakumar Haldorai, Arulmurugan Ramu, Chee-Onn Chow:
Editorial: Big Data Innovation for Sustainable Cognitive Computing. 221-223 - R. M. Bommi, S. Selvakumar Raja:
High Performance Reversible Direct Data Synthesizer for Radio Frequency Applications. 224-233 - Geetha S., Deepalakshmi P.:
Enhanced Energy in Sensors by Avoiding Voids and Saving Sensitive Data on Cloud Using B+ Tree Index with Retrieval of Query Predicates. 234-247 - Muhammad Asim Saleem, Shijie Zhou, Abida Sharif:
Data Transmission Using IoT in Vehicular Ad-Hoc Networks in Smart City Congestion. 248-258 - S. Nithya, C. Gomathy:
Smaclad: Secure Mobile Agent Based Cross Layer Attack Detection and Mitigation in Wireless Network. 259-270 - D. Shanthi, S. Vengataasalam:
Dominance Lagrange Optimized Rule Generation for Decision Table Evaluation. 271-281 - T. Prasanth, M. Gunasekaran:
Effective Big Data Retrieval Using Deep Learning Modified Neural Networks. 282-294
Volume 24, Number 2, April 2019
- Pasumpon Pandian, Joy Iong-Zong Chen, Zubair A. Baig:
Editorial: Sustainable Mobile Networks and its Applications. 295-297 - J. Reshma, T. Satish Kumar, B. A. Vani, S. Sakthivel:
Big Data Oriented Energy Aware Routing for Wireless Sensor Networks. 298-306 - P. Tamil Selvi, C. Suresh Gnana Dhas:
A Novel Algorithm for Enhancement of Energy Efficient Zone Based Routing Protocol for MANET. 307-317 - M. Padmavathi, R. M. Suresh:
Secure P2P Intelligent Network Transaction using Litecoin. 318-326 - Giri Prasad Raman, Venkatesan Perumal:
Group Based Multi-Channel Synchronized Spectrum Sensing in Cognitive Radio Network with 5G. 327-339 - C. Murugesan, C. N. Marimuthu:
Cost optimization of PV-Diesel Systems in Nanogrid Using L J Cuckoo Search and its Application in Mobile Towers. 340-349 - M. Sabrigiriraj, K. Manoharan:
Wavelength Allotment for All-to-All Broadcast in WDM Optical Modified Linear Array for Reliable Communication. 350-356 - P. Supraja, R. Pitchai, Raja:
Spectrum Prediction in Cognitive Radio with Hybrid Optimized Neural Network. 357-364 - Haijun Liu, Xiaobing Liu:
A Novel Research on the Influence of Enterprise Culture on Internal Control in big Data and Internet of Things. 365-374 - C. Nallusamy, A. Sabari:
Particle Swarm Based Resource Optimized Geographic Routing for Improved Network Lifetime in MANET. 375-385 - G. Arulkumaran, R. K. Gnanamurthy:
Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network. 386-393 - Subramanian Balaji, Eanoch Golden Julie, Yesudhas Harold Robinson:
Development of Fuzzy based Energy Efficient Cluster Routing Protocol to Increase the Lifetime of Wireless Sensor Networks. 394-406 - T. Ramraj, R. Prabhakar:
Influence of Krylov subspace in Graph Isomorphism for Mobile Networks. 407-419 - Nandhakumar Ramachandran, Varalakshmi Perumal:
Target Aucourant Data Dissemination by Collaboratory Sensing in IOT Environment. 420-433 - Navuri Prema Kumar:
Efficient Secure Aggregation in VANETs Using Fully Homomorphic Encryption (FHE). 434-442 - Trung Quang Duong, Nguyen-Son Vo:
Editorial: Wireless Communications and Networks for 5G and Beyond. 443-446 - Hassan N. Noura, Reem Melki, Ali Chehab, Mohammad M. Mansour:
A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach. 447-463 - Quoc-Tuan Vien, Tuan Anh Le, Huan Xuan Nguyen, Tho Le-Ngoc:
A Physical Layer Network Coding Based Modify-and-Forward with Opportunistic Secure Cooperative Transmission Protocol. 464-479 - Cheng Yin, Emiliano Garcia-Palacios:
Performance Analysis for Secure Cooperative Systems Under Unreliable Backhaul Over Nakagami-m Channels. 480-490 - Yan Lei, Gang Zhu, Chao Shen, Yanqing Xu, Xiaozhou Zhang:
Delay-Aware User Association and Power Control for 5G Heterogeneous Network. 491-503 - Truong-Xuan Do, Younghan Kim:
State Management Function Placement for Service-Based 5G Mobile Core Architecture. 504-516 - Ahmed Mohammed Nor, Ehab Mahmoud Mohamed:
Li-Fi Positioning for Efficient Millimeter Wave Beamforming Training in Indoor Environment. 517-531 - Hua Qu, Gongye Ren, Ji-hong Zhao, Youwei Shi, Zhenjie Tan:
Performance Analysis of the Content Dissemination Mechanism with Proactive Content Fetching and Full-Duplex D2D Communication: an Evolutionary Perspective. 532-555 - Ishtiaq Ahmad, Zeeshan Kaleem, Ramsha Narmeen, Long Dinh Nguyen, Dac-Binh Ha:
Quality-of-Service Aware Game Theory-Based Uplink Power Control for 5G Heterogeneous Networks. 556-563 - Sebastián Rodríguez, Antonio Jurado-Navas, Juan Jose Vegas Olmos, Idelfonso Tafur Monroy:
Analytical and Experimental Performance Evaluation of Antenna Misalignment in Ka-band Wireless Links. 564-577 - Alaa A. R. Alsaeedy, Edwin K. P. Chong:
Tracking Area Update and Paging in 5G Networks: a Survey of Problems and Solutions. 578-595 - Dac-Binh Ha, Sang Quang Nguyen, Huy T. Nguyen:
Cooperative Cognitive Non-Orthgonal Multiple Access Under Unreliable Backhaul Connections. 596-617 - Shahira H. Amin, Ahmed Hesham Mehana, Yasmine A. Fahmy, Samy S. Soliman:
Maximizing the Number of Users in Clustered MIMO-NOMA Systems Under Rate Constraints. 618-629 - Tran Manh Hoang, Xuan Nam Tran, Nguyen Thanh, Le The Dung:
Performance Analysis of MIMO SWIPT Relay Network with Imperfect CSI. 630-642 - Jaewon Ahn, Joohyung Lee, Sangdon Park, Hong-Shik Park:
Power Efficient Clustering Scheme for 5G Mobile Edge Computing Environment. 643-652 - Jaime Lloret, Sandra Sendra, Elsa María Macías López:
Editorial: Advances in Green Communications and Networking. 653-656 - Alberto Huertas Celdrán, Manuel Gil Pérez, Félix J. García Clemente, Gregorio Martínez Pérez:
Policy-Based Management for Green Mobile Networks Through Software-Defined Networking. 657-666 - José Miguel Jiménez, Oscar Romero, Jaime Lloret, Juan R. Diaz:
Energy Savings Consumption on Public Wireless Networks by SDN Management. 667-677 - Sandra Sendra, Jaime Lloret, Raquel Lacuesta, José Miguel Jiménez:
Energy Efficiency in Cooperative Wireless Sensor Networks. 678-687 - Domingo Marrero, Elsa M. Macías, Álvaro Suárez Sarmiento, Jose Aurelio Santana, Vicente E. Mena:
A Method for Power Saving in Dense WiFi Networks. 688-699 - Domingo Marrero, Elsa M. Macías, Álvaro Suárez Sarmiento, Jose Aurelio Santana, Vicente E. Mena:
Energy Saving in Smart City Wireless Backbone Network for Environment Sensors. 700-711 - Juan F. Valenzuela-Valdés, Francisco Luna, Pablo Padilla, José Luis Padilla, Rafael Marcos Luque, Juan Enrique Agudo:
Securing and Greening Wireless Sensor Networks with Beamforming. 712-720
Volume 24, Number 3, June 2019
- Der-Jiunn Deng, Ai-Chun Pang, Lajos Hanzo:
Editorial: Recent Advances in IoT as a Service (IoTaas 2017). 721-723 - Chung-Yun Hsiao, Chih-Chieh Huang, Yi-Bing Lin, Yun-Wei Lin:
Flower Sermon: An Interactive Visual Design Using IoTtalk. 724-735 - Tzong-Shyan Lin, Pei-Yu Liu, Chun-Cheng Lin:
Home Healthcare Matching Service System Using the Internet of Things. 736-747 - Bingxian Lu, Lei Wang, Jialin Liu, Wei Zhou, Linlin Guo, Myeong-Hun Jeong, Shaowen Wang, Guangjie Han:
LaSa: Location Aware Wireless Security Access Control for IoT Systems. 748-760 - Fekher Khelifi, Abbas Bradai, Abderrahim Benslimane, Priyanka Rawat, Mohamed Atri:
A Survey of Localization Systems in Internet of Things. 761-785 - Lun-Ping Hung, Yuan-Hung Chao, Chien-Liang Chen:
A Hybrid Key Item Locating Method to Assist Elderly Daily Life Using Internet of Things. 786-795 - Mahda Noura, Mohammed Atiquzzaman, Martin Gaedke:
Interoperability in Internet of Things: Taxonomies and Open Challenges. 796-809 - Ming-Fong Tsai, Thanh Nam Pham, Fu-Hsiang Ching, Le-Hung Chen:
Evaluation of the Effect of Variations in Vehicle Velocity and Channel Bandwidth on an Image-Streaming System in Vehicular Networks. 810-828 - Hai-Cheng Chu, Chun-Hsien Sung, Hui-Lin Lee:
The Digital Fingerprinting Analysis of Generic Twitter Sessions from Internet of Things Security Aspect. 829-838 - Hsing-Chung Chen:
Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application. 839-852 - Fang-Chang Kuo:
Assessment of LTE Wireless Accessing for Managing Traffic Flow of IoT Services. 853-863 - Kuo-Chang Ting, WenYen Lin, Chiapin Wang:
Loading Aware Green Power Control (LAGPC) for the Mitigation of Co-Tier Downlink Interference for Femtocell in the Future 5G Networks. 864-877 - José María de Fuentes, Lorena González-Manzano, Javier López, Pedro Peris-Lopez, Kim-Kwang Raymond Choo:
Editorial: Security and Privacy in Internet of Things. 878-880 - Ana Nieto, Antonio Acien, Gerardo Fernandez:
Crowdsourcing Analysis in 5G IoT: Cybersecurity Threats and Mitigation. 881-889 - Alzubair Hassan, Anyembe Andrew Omala, Mohamed Ali, Chunhua Jin, Fagen Li:
Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity. 890-902 - Maryam Zarezadeh, Hamid Mala:
Determining Honesty of Accuser Nodes in Key Revocation Procedure for MANETs. 903-912 - Pradip Kumar Sharma, Jin Ho Park, Young-Sik Jeong, Jong Hyuk Park:
SHSec: SDN based Secure Smart Home Network Architecture for Internet of Things. 913-924 - Sebastian Pape, Kai Rannenberg:
Applying Privacy Patterns to the Internet of Things' (IoT) Architecture. 925-933 - Bei Liang, Aikaterini Mitrokotsa:
Decentralised Functional Signatures. 934-946 - Yan Zhang, Mithun Mukherjee, Celimuge Wu, Ming-Tuo Zhou:
Editorial: Advanced Industrial Networks with IoT and Big Data. 947-949 - Wenhui Zhou, Jie Wu, Weifeng Zhong, Haochuan Zhang, Lei Shu, Rong Yu:
Optimal and Elastic Energy Trading for Green Microgrids: a two-Layer Game Approach. 950-961 - Song Guo, Deze Zeng, Lin Gu, Jiangtao Luo:
When Green Energy Meets Cloud Radio Access Network: Joint Optimization Towards Brown Energy Minimization. 962-970 - Li Liu, Guangjie Han, Jiawei Shen, Wenbo Zhang, Yuxin Liu:
Diffusion Distance-Based Predictive Tracking for Continuous Objects in Industrial Wireless Sensor Networks. 971-982 - Xiaolin Jiang, Hossein Shokri Ghadikolaei, Carlo Fischione, Zhibo Pang:
A Simplified Interference Model for Outdoor Millimeter-wave Networks. 983-990 - Zhi Liu, Toshitaka Tsuda, Hiroshi Watanabe, Satoko Ryuo, Nagateru Iwasawa:
Data Driven Cyber-Physical System for Landslide Detection. 991-1002 - Ke Zhang, Yuming Mao, Supeng Leng, Sabita Maharjan, Alexey V. Vinel, Yan Zhang:
Contract-theoretic Approach for Delay Constrained Offloading in Vehicular Edge Computing Networks. 1003-1014 - Vijayakumar Varadarajan, Neelanarayanan Venkataraman, Ron Doyle, Imad Fakhri Alshaikhli, Sven Groppe:
Emerging Solutions in Big Data and Cloud Technologies for Mobile Networks. 1015-1017 - Logesh Ravi, V. Subramaniyaswamy, Vijayakumar Varadharajan, Xiong Li:
Efficient User Profiling Based Intelligent Travel Recommender System for Individual and Group of Users. 1018-1033 - (Withdrawn) E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption. 1034-1045
- Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Saru Kumari, Fan Wu, Shehzad Ashraf Chaudhry, Niranchana Radhakrishnan:
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment. 1046-1062 - Avinab Marahatta, Youshi Wang, Fa Zhang, Arun Kumar Sangaiah, Sumarga Kumar Sah Tyagi, Zhiyong Liu:
Energy-Aware Fault-Tolerant Dynamic Task Scheduling Scheme for Virtualized Cloud Data Centers. 1063-1077 - Khalim Amjad Meerja, Praveen Vummadisetty Naidu, Sri Rama Krishna Kalva:
Price Versus Performance of Big Data Analysis for Cloud Based Internet of Things Networks. 1078-1094 - Idris Winarno, Yoshiteru Ishida, Takeshi Okamoto:
A Performance Evaluation of Resilient Server with a Self-Repair Network Model. 1095-1103 - K. Anitha Kumari, G. Sudha Sadasivam:
Two-Server 3D ElGamal Diffie-Hellman Password Authenticated and Key Exchange Protocol Using Geometrical Properties. 1104-1119 - Ahmed Ben Said, Abdelkarim Erradi, Azadeh Ghari Neiat, Athman Bouguettaya:
A Deep Learning Spatiotemporal Prediction Framework for Mobile Crowdsourced Services. 1120-1133 - Bing Jia, Lifei Hao, Chuxuan Zhang, Huili Zhao, Khan Muhammad:
Correction to: An IoT Service Aggregation Method Based on Dynamic Planning for QoE Restraints. 1134
Volume 24, Number 4, August 2019
- Vijayakumar Varadarajan, Neelanarayanan Venkataraman, Ron Doyle, Imad Fakhri Alshaikhli, Sven Groppe:
Editorial: Mobile Networks in the Era of Big Data. 1135-1138 - G. Ananthachari Preethi, P. Gauthamarayathirumal, C. Chandrasekar:
Vertical Handover Analysis Using Modified MADM Method in LTE. 1139-1151 - S. Lavanya, N. M. Saravana Kumar, V. Vijayakumar, S. Thilagam:
Secured Key Management Scheme for Multicast Network Using Graphical Password. 1152-1159 - M. Surya Prabha, B. Sarojini:
Online Healthcare Information Adoption Assessment Using Text Mining Techniques. 1160-1165 - S. Rajkumar, G. Malathi:
Impact of Image Artifact and Solution to the Image Quality Issues in Real Time SAR Images. 1166-1173 - Bharathiraja S, B. Rajesh Kanna:
Anti-Forensics Contrast Enhancement Detection (AFCED) Technique in Images Based on Laplace Derivative Histogram. 1174-1180 - Abdul Quadir Muhammed, Vijayakumar Varadarajan, Karan Mandal:
Efficient Algorithm for Identification and Cache Based Discovery of Cloud Services. 1181-1197 - Abdul Quadir Muhammed, Vijayakumar Varadarajan, Karan Mandal:
Correction to: Efficient Algorithm for Identification and Cache Based Discovery of Cloud Services. 1198 - Joshua Christy Jackson, Duraisamy Rekha, Vijayakumar Varadarajan:
A Reputation based Weighted Clustering Protocol in VANET: A Multi-objective Firefly Approach. 1199-1209 - Nikolas Klug, Alok Chauhan, V. Vijayakumar, Ramesh Ragala:
k-RNN: Extending NN-heuristics for the TSP. 1210-1213 - Prassanna Jayachandran, Neelanarayanan Venkataraman:
Threshold Based Multi-Objective Memetic Optimized Round Robin Scheduling for Resource Efficient Load Balancing in Cloud. 1214-1225 - Logesh Ravi, V. Subramaniyaswamy, Varadarajan Vijayakumar, Siguang Chen, A. Karmel, Malathi Devarajan:
Hybrid Location-based Recommender System for Mobility and Travel Planning. 1226-1239 - Linda Joseph, Rajeswari Mukesh:
Securing and Self recovery of Virtual Machines in cloud with an Autonomic Approach using Snapshots. 1240-1248 - Ajay D. M., E. Umamaheswari:
Packet Encryption for Securing Real-Time Mobile Cloud Applications. 1249-1254 - Mohammed N. M. Ali, M. M. Hafizur Rahman, Rizal Bin Mohd. Nor, Dhiren Kumar Behera, Tengku Mohd Tengku Sembok, Yasuyuki Miura, Yasushi Inoguchi:
SCCN: A Time-Effective Hierarchical Interconnection Network for Network-On-Chip. 1255-1264 - Muhammad Alam, Ting Wu, Fazlullah Khan, Yuanfang Chen:
Editorial: Securing Internet of Things Through Big Data Analytics. 1265-1268 - Lingyan Fan, Wuyi Sun, Guorui Feng:
Image Steganalysis via Random Subspace Fisher Linear Discriminant Vector Functional Link Network and Feature Mapping. 1269-1278 - Jia Liu, Mingchu Li, Muhammad Alam, Yuanfang Chen, Ting Wu:
A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism. 1279-1294 - Syed Rooh Ullah Jan, Mian Ahmad Jan, Rahim Khan, Hakeem Ullah, Muhammad Alam, Muhammad Usman:
An Energy-Efficient and Congestion Control Data-Driven Approach for Cluster-Based Sensor Network. 1295-1305 - Haroon Khan, Mian Ahmad Jan, Muhammad Alam, Wael Dghais:
A Channel Borrowing Approach for Cluster-based Hierarchical Wireless Sensor Networks. 1306-1316 - Weitong Hu, Ye Yao, Di Zhou, Qiuhua Zheng, Kim-Kwang Raymond Choo:
A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method. 1317-1335 - Guangpei Cong, Duhui Lu, Yunrong Lv, Yi He:
A Novel Industrial Safety IoTs Architecture for External Corrosion Perception Based on Infrared. 1336-1345 - Song Guo, Zhen Liu, Peng Li:
Editorial: Big Data and Cyber-Physical-Social Computing. 1346-1347 - J. V. Bibal Benifa, Dejey Dharma:
RLPAS: Reinforcement Learning-based Proactive Auto-Scaler for Resource Provisioning in Cloud Environment. 1348-1363 - Rachad Atat, Lingjia Liu, Jinsong Wu, Jonathan D. Ashdown, Yang Yi:
Green Massive Traffic Offloading for Cyber-Physical Systems over Heterogeneous Cellular Networks. 1364-1372 - Xiaoping Fan, Zhijie Chen, Fei Cai, Jinsong Wu, Shengzong Liu, Zhining Liao, Zhifang Liao:
Local Core Members Aided Community Structure Detection. 1373-1381 - Zhifang Liao, Benhong Zhao, Shengzong Liu, Haozhi Jin, Dayu He, Liu Yang, Yan Zhang, Jinsong Wu:
A Prediction Model of the Project Life-Span in Open Source Software Ecosystem. 1382-1391 - Munish Bhatia, Sandeep K. Sood:
Exploring Temporal Analytics in Fog-Cloud Architecture for Smart Office HealthCare. 1392-1410
Volume 24, Number 5, October 2019
- Bo Li, Song Xiao, Yong Li:
Editorial: Networking and Communications for the Next Generation IoT. 1411-1413 - Gunasekaran Raja, Anil Thomas:
SAFER: Crowdsourcing Based Disaster Monitoring System Using Software Defined Fog Computing. 1414-1424 - Run Zhou, Bo Li, Mao Yang, Zhongjiang Yan, Annan Yang:
DRA-OFDMA: Double Random Access Based QoS Oriented OFDMA MAC Protocol for the Next Generation WLAN. 1425-1436 - Ruonan Zhang, Xiaoshen Song, Jianping Pan, Jiajia Liu:
Stochastic Cooperative Communications Using a Geometrical Probability Approach for Wireless Networks. 1437-1451 - Jie Zheng, Ling Gao, Hai Wang, Xiaoya Li, Pengfei Xu, Lin Wang, Bo Jiang, Xudong Yang:
Joint Downlink and Uplink Edge Computing Offloading in Ultra-Dense HetNets. 1452-1460 - Qiao Qu, Bo Li, Mao Yang, Zhongjiang Yan, Annan Yang, Der-Jiunn Deng, Kwang-Cheng Chen:
Survey and Performance Evaluation of the Upcoming Next Generation WLANs Standard - IEEE 802.11ax. 1461-1474 - Wen-Shu Lai, Yi-Bing Lin, Chung-Yun Hsiao, Li-Kuan Chen, Chao-Fan Wu, Shu-Min Lin:
FrameTalk: Human and Picture Frame Interaction through the IoT Technology. 1475-1485 - Mohammad Alaei, Fahimeh Yazdanpanah:
EELCM: An Energy Efficient Load-Based Clustering Method for Wireless Mobile Sensor Networks. 1486-1498 - Hemanta Kumar Sahu, P. R. Sahu:
ABEP Performance of AF System Employing QSSK over IoT Network. 1499-1508 - Jacob John, Paul Rodrigues:
MOTCO: Multi-objective Taylor Crow Optimization Algorithm for Cluster Head Selection in Energy Aware Wireless Sensor Network. 1509-1525 - Weiqiang Shen, Chuanlin Zhang, Jinglun Shi:
Weak k-Barrier Coverage Problem in Underwater Wireless Sensor Networks. 1526-1541 - Tianjiao Xie:
SDSN: Software-defined Space Networking - Architecture and Routing Algorithm. 1542-1554 - Assia Naja, Mohammed Boulmalf, Mohamed Essaaidi:
A Distributed Priority-Based Rebroadcasting Protocol for VANETs: Mitigating the Storm Problem. 1555-1568 - Bo Li, Lijun Qian, Daji Qiao, Shihai Shao:
Editorial: MAC for the Next Generation Networks in Unlicensed Band. 1569-1571 - Annan Yang, Bo Li, Mao Yang, Zhongjiang Yan:
Concept and Analysis of Capacity Entropy for Uplink Multi-User Media Access Control for the Next-Generation WLANs. 1572-1586 - Yi-Bing Lin, Hung-Chun Tseng, Li-Chang Wang, Ling-Jyh Chen:
Performance of Splitting LTE-WLAN Aggregation. 1587-1595 - Shao-Yu Lien, You-Lin Shiau, Der-Jiunn Deng:
Throughput Analysis of 3GPP Licensed-Assisted Access Using Multiple Carriers. 1596-1602 - Yong Niu, Liren Yu, Yong Li, Zhangdui Zhong, Bo Ai, Sheng Chen:
Device-to-Device Communications Enabled Multicast Scheduling with the Multi-level Codebook in mmWave Small Cells. 1603-1617 - Rongfei Fan, Song Jin, Qi Gu, Gongpu Wang:
Data-Driven Power Allocation for Medium Access Control in LTE-U Coexisting with Wi-Fi. 1618-1629 - Low Jun Wei, Joanne Mun-Yee Lim:
Identifying Transmission Opportunity through Transmission Power and Bit Rate for Improved VANET Efficiency. 1630-1638 - Oscar Mayora, Luis Enrique Sucar:
Editorial: Applications of Future Internet. 1639-1640 - Youna Jung:
Community-Based Localized Disaster Response through Temporary Social Overlay Networks. 1641-1653 - Michele Roncalli, Filippo Bistaffa, Alessandro Farinelli:
Decentralized Power Distribution in the Smart Grid with Ancillary Lines - An Approach Based on Distributed Constraint Optimization. 1654-1662 - Fadi Al-Turjman:
Cognitive-Node Architecture and a Deployment Strategy for the Future WSNs. 1663-1681 - Fernando Lezama, Jorge Palominos, Ansel Y. Rodríguez-González, Alessandro Farinelli, Enrique Munoz de Cote:
Agent-Based Microgrid Scheduling: An ICT Perspective. 1682-1698 - Jia Hu, Kun Yang, Victor C. M. Leung, Ke Xu:
Guest Editorial: Smart Grid Inspired Data Sensing, Processing and Networking Technologies. 1699-1700 - Muhammad A. Hussain, Werner Brandauer, Myung J. Lee:
Mobility-Aware Vehicle-to-Grid (V2G) Optimization for Uniform Utilization in Smart Grid Based Power Distribution Network. 1701-1712 - Anhtuan Le, Yue Chen, Kok Keong Chai, Alexandr Vasenev, Lorena Montoya:
Incorporating FAIR into Bayesian Network for Numerical Assessment of Loss Event Frequencies of Smart Grid Cyber Threats. 1713-1721 - Qiang Tang, Ming-Zhong Xie, Kun Yang, Yuansheng Luo, Dongdai Zhou, Yun Song:
A Decision Function Based Smart Charging and Discharging Strategy for Electric Vehicle in Smart Grid. 1722-1731 - Haina Tang, Yulei Wu, Tong Li, Chunjing Han, Jingguo Ge, Xiangpeng Zhao:
Efficient Identification of TOP-K Heavy Hitters over Sliding Windows. 1732-1741 - Ljupco Jorguseski, Haibin Zhang, Sylvie Dijkstra-Soudarissanane, Michal Golinski:
LTE Delay Assessment for Real-Time Management of Future Smart Grids. 1742-1749
Volume 24, Number 6, December 2019
- Anandakumar Haldorai, Arulmurugan Ramu, Chee Onn Chow:
Big Data Analytics for Sustainable Computing. 1751-1754 - P. Preethi, R. Asokan:
An Attempt to Design Improved and Fool Proof Safe Distribution of Personal Healthcare Records for Cloud Computing. 1755-1762 - Vallikannu Ramanathan, T. Meyyappan:
Prediction of Individual's Character in Social Media Using Contextual Semantic Sentiment Analysis. 1763-1777 - K. Jeyanthi, S. Mangai:
Ensembled Population Rescaled Differential Evolution with Weighted Boosting for Early Breast Cancer Detection. 1778-1792 - (Withdrawn) Filter Bank Multicarrier Based Generalized Discrete Fourier Transform for Peak to Average Power Ratio Reduction. 1793-1803
- Thangavel Saravanan, N. S. Nithya:
Modeling Displacement and Direction Aware Ad Hoc On-Demand Distance Vector Routing Standard for Mobile Ad Hoc Networks. 1804-1813 - P. Thirumaraiselvan, K. Sakthidasan Sankaran, V. Beslin Geo, V. R. Prakash, Natarajan Vasudevan:
A Statistical Lower UWB Channel Model for in Body Communications. 1814-1820 - R. Rajarajeswari, D. Suchitra, K. Vijayakumar, R. Jegatheesan:
Analyzing Customer Outage Cost in a Microgrid. 1821-1834 - George Fernandez Savari, Vijayakumar Krishnasamy, Vidyasagar Sugavanam, Kalyanasundaram Vakesan:
Optimal Charging Scheduling of Electric Vehicles in Micro Grids Using Priority Algorithms and Particle Swarm Optimization. 1835-1847 - Michaelraj Kingston Roberts, S. Sudha Mohanram, N. Shanmugasundaram:
An Improved Low Complex Offset Min-Sum Based Decoding Algorithm for LDPC Codes. 1848-1852 - Suprakash S, Balakannan S. P:
Service Level Agreement Based Catalogue Management and Resource Provisioning in Cloud for Optimal Resource Utilization. 1853-1861 - A. Karthikeyan, V. P. Arunachalam, S. Karthik:
Performing Data Assessment in Terms of Sensor Node Positioning over Three Dimensional Wireless Sensor Network. 1862-1871 - K. Indira, M. K. Kavithadevi:
Efficient Machine Learning Model for Movie Recommender Systems Using Multi-Cloud Environment. 1872-1882 - D. Gowtham Chakravarthy, S. Kannimuthu:
Extreme Gradient Boost Classification Based Interesting User Patterns Discovery for Web Service Composition. 1883-1895 - Prabhakar Krishnan, Subhasri Duttagupta, Krishnashree Achuthan:
SDNFV Based Threat Monitoring and Security Framework for Multi-Access Edge Computing Infrastructure. 1896-1923 - Min Jia, Qing Guo:
Editorial: Intelligent Cognitive Internet of Integrated Space and Terrestrial Things. 1924-1925 - Zhicheng Qu, Ziwei Liu, Xiaojin Ding, Haotong Cao, Gengxin Zhang:
Co-Existence Analysis on Satellite-Terrestrial Integrated IMT System. 1926-1936 - Chenhua Sun, Bo Yin, Zhibin Dou, Dai Jia, Ce Pang:
A Routing Protocol Combining Link State and Distance Vector for GEO-GEO Satellite Backbone Network. 1937-1946 - Hailong Wang, Gang Wang, Bo Li, Gongliang Liu, Weidang Lu:
Exploiting Interference for Intelligent Relaying in Integrated Space and Terrestrial Networks Based on PNC and SIC. 1947-1954 - Jinlong Liu, Zhutian Yang, Zhilu Wu, Zhendong Yin, Xu Jiang, Yanyuan Fu:
Control Code Multiple Encryption Algorithm on Satellite-to-ground Communication. 1955-1974 - Jie Feng, Hongbin Chen:
Healing Coverage Holes for Big Data Collection in Large-Scale Wireless Sensor Networks. 1975-1984 - Xin Liu, Min Jia, Zhenyu Na:
Joint Time and Node Optimization for Cluster-Based Energy-Efficient Cognitive Internet of Things. 1985-1993 - Xueqiang Yin, Shining Li, Yun Lin:
A Novel Hierarchical Data Aggregation with Particle Swarm Optimization for Internet of Things. 1994-2001 - Mu Zhou, Yaoping Li, Zhian Deng, Yongliang Sun, Yanmeng Wang, Zengshan Tian:
Indoor Target Intrusion Detection via Iterative Transfer Learning Based Cognitive Sensing. 2002-2013 - Dagmar Cagánová, Predrag K. Nikolic, Corneliu Andy Puscã, Richard Pospisil:
Editorial: Current Challenges of Smart Cities and Internet of Things. 2014-2015 - Iveta Kremenova, Milan Gajdos:
Decentralized Networks: The Future Internet. 2016-2023 - Dagmar Cagánová, Petra Ridzonová Hlásniková, Natália Vranaková, Andrea Chlpeková:
Intellectual Capital as a Key Factor in the Automotive Industry. 2024-2031 - Paulo Costa, Ricardo Montenegro, Teresa Susana Mendes Pereira, Pedro Pinto:
The Security Challenges Emerging from the Technological Developments. 2032-2037 - Natália Vranaková, Kristína Koltnerová, Andrea Chlpeková, Dagmar Cagánová:
Application of Exact Methods in Employee Selection in Accordance with the Age Management Concept. 2038-2042 - Milan Husar, Vladimir Ondrejicka:
Social Innovations in Smart Cities - Case of Poprad. 2043-2049 - Dagmar Cagánová, Augustín Starecek, Natália Hornáková, Petra Hlásniková:
The Analysis of the Slovak Citizens' Awareness about the Smart City Concept. 2050-2058
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.