


default search action
Computer Communications, Volume 160
Volume 160, July 2020
- Faisal Riaz, M. Mazhar Rathore

, Adnan Sohail, Naeem Iqbal Ratyal
, Samia Abid, Samina Khalid, Tehmina Shehryar, Adil Waheed:
Emotion-controlled spectrum mobility scheme for efficient syntactic interoperability in cognitive radio-based unmanned vehicles. 1-13
- Nanliang Shan, Xiaolong Cui, Zhiqiang Gao:

"DRL + FL": An intelligent resource allocation model based on deep reinforcement learning for Mobile Edge Computing. 14-24
- Zheheng Rao, Yanyan Xu, Shaoming Pan:

An intelligent routing method based on network partition. 25-33
- Zhiliang Liu, Zengzhi Zou:

Analysis of network topology and deployment mode of 5G wireless access network. 34-42 - Abdulmonem Alsiddiky, Waleed Awwad

, Khalid Bakarman, Hassan Fouad
, Azza S. Hassanein, Ahmed M. Soliman
:
Priority-based data transmission using selective decision modes in wearable sensor based healthcare applications. 43-51
- Alexis Duque, Razvan Stanica, Hervé Rivano, Adrien Desportes:

Analytical and simulation tools for optical camera communications. 52-62
- Jin Zhao, Qiuxia Dong:

Allocation algorithm of CPS communication resources based on cooperative game. 63-70
- Daming Li, Zhiming Cai, Bin Qin, Lianbing Deng:

Signal frequency domain analysis and sensor fault diagnosis based on artificial intelligence. 71-80
- Tejasvi Alladi

, Vinay Chamola
, Naren Naren, Neeraj Kumar
:
PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks. 81-90
- Hsin-Yao Hsu

, Gautam Srivastava, Hsin-Te Wu
, Mu-Yen Chen
:
Remaining useful life prediction based on state assessment using edge computing on deep learning. 91-100
- Qingguo Chen, Liqin Tang:

A wearable blood oxygen saturation monitoring system based on bluetooth low energy technology. 101-110
- Partha Pratim Ray

, Dinesh Dash, Neeraj Kumar
:
Sensors for internet of medical things: State-of-the-art, security and privacy issues, challenges and future directions. 111-131
- Junyan Zhou:

Artificial intelligence driven wireless network remote monitoring based on Diffie-Hellman parameter method. 132-138
- R. M. Swarna Priya

, Praveen Kumar Reddy Maddikunta
, Parimala M., Srinivas Koppu, Thippa Reddy Gadekallu
, Chiranji Lal Chowdhary, Mamoun Alazab
:
An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. 139-149
- Junjun Guo, Le Wang:

Learning to upgrade internet information security and protection strategy in big data era. 150-157
- Arne Meeuw, Sandro Schopfer, Anselma Wörner, Verena Tiefenbeck, Liliane Ableitner, Elgar Fleisch, Felix Wortmann:

Implementing a blockchain-based local energy market: Insights on communication and scalability. 158-171
- Georgia Koutsandria

, Valerio Di Valerio, Dora Spenza, Stefano Basagni, Chiara Petrioli:
Wake-up radio-based data forwarding for green wireless networks. 172-185
- Johannes K. Becker, Stefan Gvozdenovic, Liangxiao Xin, David Starobinski:

Testing and fingerprinting the physical layer of wireless cards with software-defined radios. 186-196
- Huihong Xu:

Fastest adaptive estimation algorithms for topological structure errors in smart grid networks. 197-203
- Qiaoni Han, Bo Yang, Nan Song, Yuwei Li, Ping Wei:

Green resource allocation and energy management in heterogeneous small cell networks powered by hybrid energy. 204-214 - Mengxia Shuai, Ling Xiong, Changhui Wang, Nenghai Yu:

A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem. 215-227 - Murtaza Cicioglu

, Ali Çalhan
:
Energy-efficient and SDN-enabled routing algorithm for wireless body area networks. 228-239
- Ana Paula Gomes Ferreira, Thiago Henrique Silva

, Antonio A. F. Loureiro:
Uncovering spatiotemporal and semantic aspects of tourists mobility using social sensing. 240-252
- Raed T. Al-Zubi, Mohannad T. Abu Issa, Ahmad A. Zghoul, Khalid A. Darabkh

, Yazid M. Khattabi
:
Analysis of system outage probability in underlay cognitive two-way amplify-and-forward relay networks. 253-262
- Ya-Qiong Duan, Lingda Zhang, Xiao-Yang Fan, Quanhua Hou, Xinmeng Hou:

Smart city oriented Ecological Sensitivity Assessment and Service Value Computing based on Intelligent sensing data processing. 263-273
- Baozhu Yu, Xuefen Chi, Hongliang Sun

:
Bandwidth abstraction and instantiation under closed-loop latency constraint for tactile slice based on martingale theory. 274-283
- Gerard Deepak, A. Santhana Vijayan:

OntoBestFit: A Best-Fit Occurrence Estimation strategy for RDF driven faceted semantic search. 284-298
- Fernando M. Ortiz

, Thales T. de Almeida, Ana Elisa Ferreira, Luís Henrique M. K. Costa
:
Experimental vs. simulation analysis of LoRa for vehicular communications. 299-310
- Ankur Gupta

, Meenakshi Tripathi, Aakar Sharma:
A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN. 311-325
- Zhicheng Zhou, Liang Zhao:

Cloud computing model for big data processing and performance optimization of multimedia communication. 326-332
- Lin Li:

Real time auxiliary data mining method for wireless communication mechanism optimization based on Internet of things system. 333-341
- Jian Sun:

Research on resource allocation of vocal music teaching system based on mobile edge computing. 342-350
- Rathin Chandra Shit

:
Precise localization for achieving next-generation autonomous navigation: State-of-the-art, taxonomy and future prospects. 351-374
- Joy Halder, Tamaghna Acharya, Monish Chatterjee

, Uma Bhattacharya:
On spectrum and energy efficient survivable multipath routing in off-line Elastic Optical Network. 375-387
- Arpita Bhargava, Shekhar Verma

:
KATE: Kalman Trust Estimator for Internet of Drones. 388-401
- Yan Zhou, Liyuan Li:

The 5G communication technology-oriented intelligent building system planning and design. 402-410
- Jui-Chan Huang, Ming-Hung Shu, Bi-Min Hsu, Chien-Ming Hu:

Service architecture of IoT terminal connection based on blockchain identity authentication system. 411-422
- Xiaoxiao Xu, Mingdan Han, Senthil Murugan Nagarajan, Prathik Anandhan:

Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignment. 423-430
- Xuran Li

, Hong-Ning Dai
, Qubeijian Wang, Muhammad Imran, Dengwang Li, Muhammad Ali Imran
:
Securing Internet of Medical Things with Friendly-jamming schemes. 431-442
- Sahil Vashisht, Sushma Jain, Gagangeet Singh Aujla

:
MAC protocols for unmanned aerial vehicle ecosystems: Review and challenges. 443-463
- Elías Grande, Marta Beltrán

:
Edge-centric delegation of authorization for constrained devices in the Internet of Things. 464-474
- Avani Sharma

, Emmanuel S. Pilli
, Arka Prokash Mazumdar, Poonam Gera:
Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes. 475-493
- Hean Liu

, Kim Yong Ki:
Application of wireless sensor network based improved immune gene algorithm in airport floating personnel positioning. 494-501
- Peng Sun, Azzedine Boukerche, Yanjie Tao:

SSGRU: A novel hybrid stacked GRU-based traffic volume prediction approach in a road network. 502-511
- Sanjeevi Pandiyan, T. Samraj Lawrence, V. Sathiyamoorthi

, Manikandan Ramasamy, Qian Xia, Ya Guo:
A performance-aware dynamic scheduling algorithm for cloud-based IoT applications. 512-520
- Munish Bhatia, Sandeep K. Sood

, Ankush Manocha
:
Fog-inspired smart home environment for domestic animal healthcare. 521-533
- Boutheina Dab, Ilhem Fajjari, Nadjib Aitsaadi:

Optimized wireless channel allocation in hybrid data center network based on IEEE 802.11ad. 534-546 - Xiaobo Fan, Xiaobo Xu:

Sparse representation for network traffic recovery. 547-553
- Vesal Hakami

, Seyedakbar Mostafavi
, Nastooh Taheri Javan
, Zahra Rashidi:
An optimal policy for joint compression and transmission control in delay-constrained energy harvesting IoT devices. 554-566
- Walid K. Ghamry

, Suzan Shukry
:
Performance evaluation of cooperative eigenvalue spectrum sensing GLRT under different impulsive noise environments in cognitive radio. 567-576 - Arash Bozorgchenani

, Simone Disabato
, Daniele Tarchi
, Manuel Roveri
:
An energy harvesting solution for computation offloading in Fog Computing networks. 577-587
- Huifeng Wang, Seifedine Nimer Kadry, Ebin Deni Raj:

Continuous health monitoring of sportsperson using IoT devices based wearable technology. 588-595
- Sulin Pang:

IOT platform of One-Key for Help APP and environment portfolio risk identification algorithm based on MIT. 596-606 - Juan Zhao, Xiaolong Xu, Wei-Ping Zhu:

Adaptive delay-constrained resource allocation in mobile edge computing for Internet of Things communications networks. 607-613
- Arvin Hekmati, Peyvand Teymoori, Terence D. Todd, Dongmei Zhao, George Karakostas:

Optimal multi-part mobile computation offloading with hard deadline constraints. 614-622
- Jiangfeng Xian

, Huafeng Wu, Xiaojun Mei
, Yuanyuan Zhang
, Huixing Chen, Jun Wang
:
NMTLAT: A New robust mobile Multi-Target Localization and Tracking Scheme in marine search and rescue wireless sensor networks under Byzantine attack. 623-635
- Shih-Yang Lin, Yun Du, Po-Chang Ko, Tzu-Jung Wu, Ping-Tsan Ho

, V. Sivakumar
, Rama Subbareddy:
Fog Computing Based Hybrid Deep Learning Framework in effective inspection system for smart manufacturing. 636-642
- Mahdi Abbasi

, Azad Shokrollahi
, Mohammad Reza Khosravi, Varun G. Menon
:
High-performance flow classification using hybrid clusters in software defined mobile edge computing. 643-660
- Mohammad Hadi Alaeiyan

, Saeed Parsa
, Vinod P, Mauro Conti
:
Detection of algorithmically-generated domains: An adversarial machine learning approach. 661-673 - Amirhosein Bodaghi

, Jonice Oliveira:
The characteristics of rumor spreaders on Twitter: A quantitative analysis on real data. 674-687
- Qi Yang, Jonghoon Yang:

HD video transmission of multi-rotor Unmanned Aerial Vehicle based on 5G cellular communication network. 688-696
- Shahzana Liaqat, Adnan Akhunzada

, Fatema Sabeen Shaikh
, Thanassis Giannetsos
, Mian Ahmad Jan:
SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT). 697-705
- Yi-Han Xu, Yong-Bo Tian, Prosper Komla Searyoh, Gang Yu

, Yueh-Tiam Yong
:
Deep Reinforcement Learning-based resource allocation strategy for Energy Harvesting-Powered Cognitive Machine-to-Machine Networks. 706-717
- Chaomin Li:

Information processing in Internet of Things using big data analytics. 718-729
- Shibing Yu, Zhen Jiang:

Design of the navigation system through the fusion of IMU and wheeled encoders. 730-737
- A. Shakin Banu, P. Vasuki, S. Md. Mansoor Roomi:

Target detection in SAR images using Bayesian Saliency and Morphological attribute profiles. 738-748
- Aldosary Saad

, Mohammad Al-Ma'aitah, Ayed Alwadain:
6G technology based advanced virtual multi-purpose embedding algorithm to solve far-reaching network effects. 749-758
- Shi Yang:

A joint optimization scheme for task offloading and resource allocation based on edge computing in 5G communication networks. 759-768
- Alessio Sacco

, Matteo Flocco, Flavio Esposito, Guido Marchetto:
An architecture for adaptive task planning in support of IoT-based machine learning applications for disaster scenarios. 769-778
- Zelalem Legese Hailemariam

, Yuan-Cheng Lai, Riyanto Jayadi, Yen-Hung Chen
, Sheng-Chi Huang:
A knowledge-based Query Tree with Shortcutting and Couple-Resolution for RFID tag identification. 779-789 - Shanshan Tu, Muhammad Waqas

, Yuan Meng, Sadaqat ur Rehman
, Iftekhar Ahmad
, Anis Koubaa, Zahid Halim
, Muhammad Hanif
, Chin-Chen Chang, Chengjie Shi:
Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL. 790-798
- Hong Zhang, Xinxin Lu:

Vehicle communication network in intelligent transportation system based on Internet of Things. 799-806
- M. Vinoth Kumar

, R. Saravana Ram
, Saravana Balaji B.
, B. Amutha, M. Kowsigan
:
An improved migration scheme to achieve the optimal service time for the active jobs in 5G cloud environment. 807-814
- R. Vinoba, M. Vijayaraj:

Novel control topology with obstacle detection using RDPSO-GBA in mobile AD-HOC network. 847-857
- Carlos T. Calafate, Chaker Abdelaziz Kerrache, Marica Amadeo

, Yusheng Ji, Syed Hassan Ahmed
:
Special Issue on Mobile Information Centric Networking. 858-859 - Theofanis P. Raptis

, Georgios Z. Papadopoulos
, Archan Misra
, Salil S. Kanhere
:
Special Issue on Data Distribution in Industrial and Pervasive Internet. 860-862 - Omer Irshad

, Muhammad Usman Ghani Khan, Razi Iqbal, Shakila Basheer
, Ali Kashif Bashir:
Corrigendum to "Performance optimization of IoT based biological systems using deep learning" [Computer Communications 155 (2020) 24-31]. 863

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














