


default search action
CITS 2020: Hangzhou, China
- Mohammad S. Obaidat, Kuei-Fang Hsiao, Petros Nicopolitidis, Daniel Cascado Caballero:

International Conference on Computer, Information and Telecommunication Systems, CITS 2020, Hangzhou, China, October 5-7, 2020. IEEE 2020, ISBN 978-1-7281-6544-8 - Tao Zheng, Jian Wan, Jilin Zhang, Congfeng Jiang, Gangyong Jia:

A Survey of Computation Offloading in Edge Computing. 1-6 - Ruisong Liu, Shaojie Liu, Ning Wang:

Optimization Scheduling of Cloud Service Resources Based on Beetle Antennae Search Algorithm. 1-5 - Xinyong Zhang:

Effects of Different Representation Styles on User Attention in MOOC. 1-5 - Wenxuan Liu:

The Planning Model of Transmission Line Using Bidirectional Particle Swarm Optimization Based on Time Series. 1-5 - Ping Zhu, Dongmei Luo, Xuhui Chen:

Fault-tolerant and power-aware scheduling in embedded real-time systems. 1-5 - Min Tian, Hongtao Deng, Mengying Xu:

Immune Parallel Artificial Bee Colony Algorithm For Spectrum Allocation In Cognitive Radio Sensor Networks. 1-4 - Ahmed El Emine Sejad

, Khadidiatou Wane Keita, Khaly Tall, Idy Diop:
Proposal of a DH optimization model. 1-5 - Arpit Shukla, Nirav Paid, Sudeep Tanwar

, Balqies Sadoun, Mohammad S. Obaidat:
BDoTs: Blockchain-based Evaluation Scheme for Online Teaching under COVID-19 Environment. 1-5 - Jiaqi Li, Xiaodong Yang:

A Cyclical Learning Rate Method in Deep Learning Training. 1-5 - Yinghui Zhao, Ru An, Dongyang Ou, Congfeng Jiang:

An InterPlanetary File System Based Picture Archiving and Communication System. 1-5 - Guoyi Jiang, Linhua Su, Haibo Liu

, Yang Cao, Rui Sun, Fengxin Diao:
Constructing the Power Knowledge graph by Multi-source Electricity Data. 1-5 - Omar Mohamed Gouda, Dina J. Hejji, Mohammad S. Obaidat:

Privacy Assessment of Fitness Tracker Devices. 1-8 - Abdullah Yaqot

, Lutz Rauchhaupt:
Efficient Resource Allocation Paradigm for MIMO Industrial Cognitive Networks. 1-5 - Liwei Liu, Maozhi Xu:

Improvements to the Descent Step in the Number Field Sieve for Discrete Logarithms. 1-6 - Faiez Altamimi, Waqar Asif, Muttukrishnan Rajarajan:

DADS: Decentralized (Mobile) Applications Deployment System Using Blockchain : Secured Decentralized Applications Store. 1-8 - Ping Wang, Qifan Zhao, Yingliang Huang, Juan Nie, Xuemin Mao, Zhao Mingxue:

Comprehensive Evaluation of Road Risk in Earthquake Disaster Area Based on Normalization Method. 1-5 - Shuaifeng Jiang, Yuyuan Chang, Kazuhiko Fukawa:

Distributed Inter-cell Interference Coordination for Small Cell Wireless Communications: A Multi-Agent Deep Q-Learning Approach. 1-5 - Janis Nötzel:

Entanglement-Enabled Communication. 1-6 - Yingliang Huang, Pengfei Yin, Gang Zhou, Pengcheng Liu, Yuyang Tang, Wenbo Li:

Construction of public safety knowledge graphs. 1-4 - Chandrashekhar Meshram, Mohammad S. Obaidat, Akshaykumar Meshram

:
New Efficient QERPKC based on Partial Discrete Logarithm Problem. 1-5 - Tao Zhang, Zhihui Shang, Hao Wu, Yu Zhang

, Xiaoqiang Qiao:
Secure Transmission in Cognitive MIMO Networks Using Cooperative Jammer With Outdated CSI. 1-5 - Janis Nötzel, Stephen Diadamo:

Entanglement-Enabled Communication for the Internet of Things. 1-6 - Georgios L. Stavrinides, Helen D. Karatza

:
Multi-Criteria Scheduling of Complex Workloads on Distributed Resources. 1-5 - Haibo Pang, Qi Xuan, Meiqin Xie, Chengming Liu, Zhanbo Li:

Target Tracking Based on Siamese Convolution Neural Networks. 1-5 - Yang Gao, Aoran Xu, Baoliang Liu, Cailian Gu, Xuemin Leng, Xinlei Shu:

Research on Wind Power Prediction of Acoustic Radar Based on Wireless Technology. 1-5 - Xuan Cai, Yifan Wang, Xiaoqing Sun, Wentao Liu, Yuyang Tang, Wenbo Li:

Comparing the performance of ResNets on COVID-19 diagnosis using CT scans. 1-4 - Haizhou Hu, Congfeng Jiang:

Edge Intelligence: Challenges and Opportunities. 1-5 - A. Xanthopoulos

, Anastasios Valkanis, Georgia A. Beletsioti, Georgios I. Papadimitriou, Petros Nicopolitidis:
On the Use of Backoff Algorithms in Slotted ALOHA LoRaWAN Networks. 1-4 - Waleed Obaid, Mohammad S. Obaidat:

Automatic Spine Bone Segmentation and Feature Extraction in Computed Tomography Images for Biometric Recognition. 1-5 - Monika Prakash, Atef Abdrabou:

Performance Insights on Using Multipath TCP for Wireless Multihomed IoT Gateways. 1-5 - Mingxue Zhao, Ping Wang, Qifan Zhao, Xuemin Mao, Juan Nie, Yingliang Huang:

Research on the route selection of emergency rescue materials based on fairness and timeliness in the early post earthquake period. 1-4 - Xiaoyong Zhao, Jingwei Wang:

Pathogenic virus detection method based on multi-model fusion. 1-4 - Yinghui Zhao, Ru An, Dongyang Ou, Congfeng Jiang:

A Video Capturing and Processing Platform Based on Mobile Edge Computing. 1-6 - Haibo Liu

, Guoyi Jiang, Linhua Su, Yang Cao, Fengxin Diao, Lipeng Mi:
Construction of power projects knowledge graph based on graph database Neo4j. 1-4 - Linlin Xu, Xuemin Mao, Minmin Sun, Wentao Liu, Yifan Wang, Yuyang Tang:

Lung lesions detection from CT images based on the modified Faster R-CNN. 1-5 - Yifan Wang, Zhongxu Li, Xuecheng Yang, Ning Luo, Yu Zhao, Gang Zhou:

Insulator Defect Recognition Based on Faster R-CNN. 1-4 - Dongyang Ou, Congfeng Jiang:

An empirical study on correlation clustering characteristics of interests based on big data. 1-6 - Bingwu Fang, Qiao Li, Hao Hu, Huagang Xiong:

Token Regulated Credit Based Shaper for Time Sensitive Networks. 1-6 - Chandrashekhar Meshram, Mohammad S. Obaidat, Akshaykumar Meshram

:
An Efficient Robust Lightweight Remote User Authentication Protocol using Extended Chaotic Maps. 1-6 - Min Lei, Miao Jin, Tianfu Huang, Zhiwei Guo, Quan Wang, Zhiwu Wu, Zhuo Chen, Xiwen Chen, Jun Zhang:

Ultra-wideband Fingerprinting Positioning Based on Convolutional Neural Network. 1-5 - Rifaqat Ali, Preeti Chandrakar, Mohammad S. Obaidat, Kuei-Fang Hsiao, Arup Kumar Pal

, SK Hafizul Islam:
A Secure Authentication Mechanism for Wireless Sensor Networks. 1-8 - Konstantinos F. Kantelis, Anastasios Valkanis, Petros Nikopolitidis, Georgios Papadimitriou, Dimitrios Kallergis, Christos Douligeris, Panagiotis D. Bamidis:

Adaptive Protocol with Weights for Fair Distribution of Resources in Healthcare-Oriented PONs. 1-6 - JunLin Guan, GongCai Shi, Xin Zhi:

Research and application of Web network attack protection and block chain log storage based on software definition. 1-5 - Bingjie Zhao, Ziyang Li, Tao Zhang:

The Heterogeneous Deployment Tool for Hardware and Software Co-design. 1-5 - Yuan Yu:

Research on coordinating optimization strategy of integrated energy system based on multi-agent consistency theory. 1-5 - Rajesh Gupta

, Urvish Thakker
, Sudeep Tanwar
, Mohammad S. Obaidat, Kuei-Fang Hsiao:
BITS: A Blockchain-driven Intelligent Scheme for Telesurgery System. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














