Stop the war!
Остановите войну!
for scientists:
default search action
Mobile Networks and Applications, Volume 28
Volume 28, Number 1, February 2023
- Jaime Lloret, Lorena Parra:
Industrial Internet of Things. 1-3 - Imanol Picallo, Peio López-Iturri, Mikel Celaya-Echarri, Leyre Azpilicueta, Francisco Falcone:
Deterministic Wireless Channel Characterization towards the Integration of Communication Capabilities to Enable Context Aware Industrial Internet of Thing Environments. 4-18 - Ming-Tuo Zhou, Tian-Feng Ren, Zhi-Ming Dai, Xin-Yu Feng:
Task Scheduling and Resource Balancing of Fog Computing in Smart Factory. 19-30 - Jose Vicente Sorribes, Lourdes Peñalver, José Miguel Jiménez, Sandra Sendra:
Energy-aware Randomized Neighbor Discovery Protocol based on Collision Detection in Wireless Ad Hoc Networks. 31-48 - Joan Bas, Alexis A. Dowhuszko:
End-To-End Performance of an Uplink NB-IoT Transmission Relayed on a Low-Altitude UAV Platform with Non-Orthogonal Single-Carrier FDMA in the Optical Wireless Backhaul Link. 49-64 - Sandra Sendra, Lorena Parra, José Miguel Jiménez, Laura García, Jaime Lloret:
LoRa-based Network for Water Quality Monitoring in Coastal Areas. 65-81 - Sérgio F. Lopes, António Duarte Costa, Henrique M. Dinis Santos:
Editorial: Wireless Networks and IoT Applications. 82-84 - Amen Debbiche, Ikbal Chammakhi Msadaa, Khaled Grayaa:
EIPSO: An Energy Efficient Indoor Positioning System based on Game Theory. 85-96 - Luis Magadán, Francisco J. Suárez, Juan C. Granda, Daniel F. García:
Low-Cost Industrial IoT System for Wireless Monitoring of Electric Motors Condition. 97-106 - Sondes Ksibi, Faouzi Jaïdi, Adel Bouhoula:
A Comprehensive Study of Security and Cyber-Security Risk Management within e-Health Systems: Synthesis, Analysis and a Novel Quantified Approach. 107-127 - Udayakumar Allimuthu, K. Mahalakshmi:
Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation. 128-159 - David Fotue, Houda Labiod:
Efficient Tree Aggregation and Processing Time for Wireless Sensor Networks. 160-167 - Aicha Guefrachi, Sarra Nighaoui, Sonia Zaibi, Ammar Bouallegue:
Performance Improvement of Kötter and Kschischang Codes and Lifted Rank Metric Codes in Random Linear Network Coding. 168-177 - Faris A. Almalki, Saeed H. Alsamhi, Radhya Sahal, Jahan Hassan, Ammar Hawbani, N. S. Rajput, Abdu Saif, Jeff Morgan, John G. Breslin:
Green IoT for Eco-Friendly and Sustainable Smart Cities: Future Directions and Opportunities. 178-202 - Milos Poliak, Adela Poliaková, Natalia Aleksandrovna Zhuravleva, Elvira Nica:
Identifying the Impact of Parking Policy on Road Transport Economics. 203-210 - Lucia Knapcíková, Annamária Behúnová, Marcel Behún:
The Strategic Impact of E-Business on Competitiveness of the Enterprise. 211-219 - Sebastian Saniuk, Dagmar Cagánová, Anna Saniuk:
Knowledge and Skills of Industrial Employees and Managerial Staff for the Industry 4.0 Implementation. 220-230 - Ivan Cvitic, Dragan Perakovic, Marko Perisa, Anca D. Jurcut:
Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic. 231-242 - Ivan Cvitic, Dragan Perakovic, Marko Perisa, Anca D. Jurcut:
Correction to: Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic. 243 - Devica Verma, Harshit Saraf, Sindhu Hak Gupta:
Prediction of user throughput from Network Parameters of LTE Network using machine learning. 244-253 - Khalid Mohiuddin, Asharul Islam, Mohammad Aminul Islam, Mohammed Abdul Khaleel, Samreen Shahwar, Sajid Ali Khan, Sadaf Yasmin, Mohammad Rashid Hussain:
Component-Centric Mobile Cloud Architecture Performance Evaluation: an Analytical Approach for Unified Models and Component Compatibility with Next Generation Evolving Technologies. 254-271 - Md. Motaharul Islam, Ibna Kowsar, Mashfiq Shahriar Zaman, Md. Fahmidur Rahman Sakib, Nazmus Saquib, Syed Md. Shamsul Alam:
A Novel Approach to Enhance Safety on Drowsy Driving in Self-Driving Car. 272-284 - Hongwei Zhao, Huanzhu Wang, Yue Yan:
SCMA Joint Coding and Decoding Algorithm Based on Code Reliability. 285-295 - Iqbal H. Sarker, Asif Irshad Khan, Yoosef B. Abushark, Fawaz Alsolami:
Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions. 296-312 - Lun-Ping Hung, Dong-Yuh Yang, Zong-Jie Wu, Chien-Liang Chen:
Constructing a Search Mechanism for Dementia Patient Based on Multi-Hop Transmission Path Planning and Clustering Method. 313-324 - Yidian Zhang, Lin Zhang, Ping Lan, Wenyong Li, Dan Yang, Zhiqiang Wu:
Statistical Feature Aided Intelligent Deep Learning Machine Translation in Internet of Things. 325-333 - Jia Xie, Zhou Zhang, Ye Yan, Hailin Zhang:
DOS by Dynamic Groups: a Coalition Formation Game Perspective. 334-345 - Yuyu Yin, Stelios Fuentes:
Editorial: AI-based Data Intelligent for IoT Computing. 346-347 - Yueshen Xu, Xinyu Zhao, Zhiping Jiang, Zhibo Qiu, Lei Hei, Rui Li:
Intelligent Semantic Annotation for Mobile Services for IoT Computing from Heterogeneous Data. 348-358 - Xiangyu Guo, Mingliang Gao, Wenzhe Zhai, Qilei Li, Kyu Hyung Kim, Gwanggil Jeon:
Dense Attention Fusion Network for Object Counting in IoT System. 359-368 - Guoqing Xu, Xiaolong Xu, Honghao Gao, Fu Xiao:
FP-RCNN: A Real-Time 3D Target Detection Model based on Multiple Foreground Point Sampling for Autonomous Driving. 369-381 - Xiaoxian Yang, Yuting Wei, Linxiang Shi, Lin Chen:
Applying Probabilistic Model Checking to Path Planning for a Smart Multimodal Transportation System Using IoT Sensor Data. 382-393 - Zhen Qin, Shuiguang Deng, Xueqiang Yan, Lu Lu, Mingyu Zhao, Yan Xi, Jianjun Wu, Tao Sun, Nanxiang Shi:
6G Data Plane: A Novel Architecture Enabling Data Collaboration with Arbitrary Topology. 394-405 - Xu Ding, Yang Wang, Hang Zheng, Juan Xu, Hua Zhai:
A Novel Variable Convolution Kernel Design According to Time-frequency Resolution Altering in Bearing Fault Diagnosis. 406-420 - Jifeng Chen, Yang Yang:
A Context-aware Approach to Task Scheduling for Time Series Data Prediction in Mobile Edge Computing. 421-431 - Retraction Note: E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption. 432
- Retraction Note: Complex IoT Control System Modeling from Perspectives of Environment Perception and Information Security. 433
- Retraction Note: Large-Scale Data Recommended Regulate Algorithm Based on Distributed Intelligent System Model under Cloud Environment. 434
- Retraction Note: Multi Information Amount Movement Aware- Routing in FANET: Flying Ad-hoc Networks. 435
Volume 28, Number 2, April 2023
- Aakash Ahmad, Asad Waqar Malik, Abdulrahman A. Alshdadi, Wilayat Khan, Maryam Sajjad:
Adaptive Security for Self-Protection of Mobile Computing Devices. 1-20 - Baoqi Huang, Long Zhao, En Wang, Bing Jia:
Editorial: sensing, Service and Security in Mobile Internet (MobilWare 2020). 437-438 - Zhilu Yuan, Shengjun Tang, Qiuyang Huang, Chijun Zhang, Zeynep Ertem, Zhanwei Du, Yuan Bai:
The Effects of Climatological Factors on Global Influenza Across Temperate and Tropical Regions. 439-451 - Dandan Peng, Le Sun, Rui Zhou, Yilin Wang:
Study QoS-aware Fog Computing for Disease Diagnosis and Prognosis. 452-459 - Baowei Wang, Peng Zhao, Mingming Huang, Yuxuan Dai, Wenjie Zhu:
An Improved Recommendation Algorithm For Polarized Population. 460-472 - Hui Qi, Peipei Li, Chunbo Wang, Jinlei Du, Xiaoqiang Di:
A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication. 473-485 - William A. Casey, Yang Cai:
Editorial: Renaissance of Biomimicry Computing. 486-489 - William Austin Casey, Yang Cai:
Correction to: Editorial: Renaissance of Biomimicry Computing. 490 - Kevin R. Pilkiewicz, Pratip Rana, Michael L. Mayo, Preetam Ghosh:
Predicting Supramolecular Structure from the Statistics of Individual Molecular Events. 491-498 - Alberto Arteta Albert, Yanjun Zhao, Luis Fernando de Mingo López, Nuria Gómez Blas:
An Encrypted Proposal Method in Membrane Computing Aggregation (MCA). 499-506 - Vincent A. Cicirello:
On Fitness Landscape Analysis of Permutation Problems: From Distance Metrics to Mutation Operator Selection. 507-517 - Sylia Mekhmoukh Taleb, Yassine Meraihi, Seyedali Mirjalili, Dalila Acheli, Amar Ramdane-Cherif, Asma Benmessaoud Gabis:
Mesh Router Nodes Placement for Wireless Mesh Networks Based on an Enhanced Moth-Flame Optimization Algorithm. 518-541 - Xujiong Ma, Jun Mou, Chenguang Ma, Jieyang Wang, Tianming Liu:
A New Meminductor Based Hyperchaotic Circuit and its Implementation. 542-550 - Xiaolin Jiang, Zhengyu Tang, Susu Qu:
Detection Algorithm of Compressed Sensing Signal in Generalized Spatial Modulation System. 551-560 - Chenguang Ma, Jun Mou, Peng Li, Feifei Yang, Tianming Liu:
Multistability Analysis and Digital Circuit Implementation of a New Conformable Fractional-Order Chaotic System. 561-570 - Xiaolin Jiang, Susu Qu, Zhengyu Tang:
Study on the Elimination of MIMO Signal Interference in Data Chain System. 571-578 - Qingjiang Yang, Xiangxiang Qu:
High-Precision Harmonic Analysis Algorithm Based on Five-Term MSD Second-Order Self-Convolution Window Four-Spectrum-Line Interpolation. 579-585 - Xueying Liu, Xueyan Zhang, Xin Liu:
Simultaneous Wireless Information and Power Transfer for OFDM-based Cooperative Communication. 586-597 - Rashid Mehmood, Aziz Sheikh, Charlie Catlett, Imrich Chlamtac:
Editorial: Smart Societies, Infrastructure, Systems, Technologies, and Applications. 598-602 - Ebtesam Ahmad Alomari, Iyad A. Katib, Rashid Mehmood:
Iktishaf: a Big Data Road-Traffic Event Detection Tool Using Twitter and Spark Machine Learning. 603-618 - José Balsa-Barreiro, Pedro M. Valero-Mora, Mónica Menéndez, Rashid Mehmood:
Extraction of Naturalistic Driving Patterns with Geographic Information Systems. 619-635 - Furqan Alam, Rashid Mehmood, Iyad A. Katib, Saleh M. Altowaijri, Aiiad Albeshri:
TAAWUN: a Decision Fusion and Feature Specific Road Detection Approach for Connected Autonomous Vehicles. 636-652 - Samina Kausar, Huahu Xu, Ata Ullah, Wenhao Zhu, Muhammad Yasir Shabir:
Fog-Assisted Secure Data Exchange for Examination and Testing in E-learning System. 673-689 - Shubhani Aggarwal, Neeraj Kumar:
Fog Computing for 5G-Enabled Tactile Internet: Research Issues, Challenges, and Future Research Directions. 690-717 - Nabil Kadjouh, Ahcène Bounceur, Madani Bezoui, Mohamed Essaid Khanouche, Reinhardt Euler, Mohammad Hammoudeh, Loïc Lagadec, Sohail Jabbar, Fadi M. Al-Turjman:
A Dominating Tree Based Leader Election Algorithm for Smart Cities IoT Infrastructure. 718-731 - Moez Krichen:
Improving Formal Verification and Testing Techniques for Internet of Things and Smart Cities. 732-743 - Sardar Usman, Rashid Mehmood, Iyad A. Katib, Aiiad Albeshri, Saleh M. Altowaijri:
ZAKI: A Smart Method and Tool for Automatic Performance Optimization of Parallel SpMV Computations on Distributed Memory Machines. 744-763 - Suyel Namasudra, Pascal Lorenz, Uttam Ghosh:
Editorial: The New Era of Computer Network by using Machine Learning. 764-766 - Sonal kumari, Karan Singh, Tayyab Ali Khan, Mazeyanti M. Ariffin, Senthilkumar Mohan, Dumitru Baleanu, Ali Ahmadian:
A Novel Approach for Continuous Authentication of Mobile Users Using Reduce Feature Elimination (RFE): A Machine Learning Approach. 767-781 - Mehul Sharma, Shrid Pant, Priety Yadav, Deepak Kumar Sharma, Nitin Gupta, Gautam Srivastava:
Advancing Security in the Industrial Internet of Things Using Deep Progressive Neural Networks. 782-794 - Omar A. Alzubi, Jafar Ahmad Abed Alzubi, Tareq Mahmod Alzubi, Ashish Singh:
Quantum Mayfly Optimization with Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification Model. 795-807 - Yuwen Pan, Yuanwang Yang, Hantao Liu, Wenzao Li:
UAVs and Mobile Sensors Trajectories Optimization with Deep Learning Trained by Genetic Algorithm Towards Data Collection Scenario. 808-823 - Hafiz Munsub Ali, Alain Bertrand Bomgni, Syed Ahmad Chan Bukhari, Tahir Hameed, Jun Liu:
Power-Aware Fog Supported IoT Network for Healthcare Infrastructure Using Swarm Intelligence-Based Algorithms. 824-838 - Hao Zhang, Yuandong Min, Sanya Liu, Hang Tong, Yaopeng Li, Zhihan Lv:
Improve the Security of Industrial Control System: A Fine-Grained Classification Method for DoS Attacks on Modbus/TCP. 839-852 - Kumar Debasis, Lakhan Dev Sharma, Vijay Kumar Bohat, Robin Singh Bhadoria:
An Energy-Efficient Clustering Algorithm for Maximizing Lifetime of Wireless Sensor Networks using Machine Learning. 853-867
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.