


default search action
Mobile Networks and Applications, Volume 29
Volume 29, Number 1, February 2024
- José Escorcia-Gutierrez

, Romany Fouad Mansour, Esmeide Leal, Jair A. Villanueva, Javier Jiménez-Cabas
, Carlos Soto, Roosvel Soto-Díaz
:
Privacy Preserving Blockchain with Energy Aware Clustering Scheme for IoT Healthcare Systems. 1-12 - Prince Sharma

, Nisha
, Shailendra Shukla, Amol Vasudeva:
An Era of Mobile Data Offloading Opportunities: A Comprehensive Survey. 13-28 - Manjarini Mallik, Garga Sarkar, Chandreyee Chowdhury

:
A Deep Learning Framework for Smartphone Based Human Activity Recognition. 29-41 - Swadesh Jana

, Asif Iqbal Middya
, Sarbani Roy
:
Participatory Sensing Based Urban Road Condition Classification using Transfer Learning. 42-58 - Ulpan Tokkozhina

, Bruno Mataloto
, Ana Lúcia Martins
, João Ferreira
:
Decentralizing Online Food Delivery Services: A Blockchain and IoT Model for Smart Cities. 59-69 - Jarlin Dario Alejandro-Chable, Tomás Eloy Salais-Fierro, Jania Astrid Saucedo-Martínez, Miguel Gastón Cedillo-Campos

:
A New Lean Logistics Management Model for the Modern Supply Chain. 70-81 - Giovanna Hernández-Palomo, Román Rodríguez-Aguilar

, Francisco Venegas-Martínez
:
Modeling the Optimal Supply Chain of Liquefied Natural Gas as Fuel in Fishing Vessels in Mexico. 82-97 - José-Fernando Camacho-Vallejo, Juan-Carlos García-Vélez

, Carlos Corpus
:
A 5G Hubs Location Hierarchized Problem that Balances the Connection of the Users. 98-108 - Jose Antonio Marmolejo Saucedo

, Utku Kose
:
Numerical Grad-Cam Based Explainable Convolutional Neural Network for Brain Tumor Diagnosis. 109-118 - Jozef Husár

, Lucia Knapcíková:
Implementation of Augmented Reality in Smart Engineering Manufacturing: Literature Review. 119-132 - Branka Mikavica

, Aleksandra Kostic-Ljubisavljevic
, Dragan Perakovic
, Ivan Cvitic
:
Deadline-Aware Task Offloading and Resource Allocation in a Secure Fog-Cloud Environment. 133-146 - Aleksandar Jevremovic

, Zona Kostic, Dragan Perakovic
:
Energy-Efficient Edge Intelligence: A Comparative Analysis of AIoT Technologies. 147-155 - Katarzyna Huk

, Mateusz Kurowski
, Lucia Knapcíková, Rebeka Tauberová:
Modern Mobile Infrastructure in Transport and Forwarding. 156-165 - Peter Korba

, Annamária Behúnová
, Cristian Dan Stratyinski:
Implementation of Modern Software Systems in Aviation Engineering. 166-175 - Mohammed Maray

, Ghadah Aldehim
, Abdulrahman Alzahrani, Faiz Abdullah Alotaibi, Safa Alsafari, Elham Abdullah Alghamdi, Manar Ahmed Hamza:
Deer Hunting Optimization with Deep Learning-Driven Automated Fabric Defect Detection and Classification. 176-186 - Abdelwahed Motwakel, Aisha Hassan Abdalla Hashim, Hanan Abdullah Mengash, Nuha Alruwais, Ayman Yafoz

, Raed Alsini
, Alaa Edris:
Green Anaconda Optimization Based Energy Aware Clustering Protocol for 6G Wireless Communication Systems. 187-200 - Jared Piña-Barcenas, Miguel Gastón Cedillo-Campos

, Eric Moreno-Quintero, Daniel Covarrubias
:
Graph Theory to Achieve the Digital Transformation in Managing Freight Transportation Corridors. 201-210 - Igor S. Litvinchev

, Luis Infante
, Tetyana Romanova
, Alberto Martinez-Noa, Luis Gutierrez:
Packing Soft Convex Polygons in an Optimized Convex Container. 211-220 - Román Rodríguez-Aguilar

, José Antonio Marmolejo-Suacedo, Miriam Rodriguez Aguilar, Liliana Marmolejo Saucedo:
Machine Learning for Digital Shadow Design in Health Insurance Sector. 221-234 - Jania Astrid Saucedo-Martínez, Tomás Eloy Salais-Fierro, Román Rodríguez-Aguilar, Jose Antonio Marmolejo Saucedo:

Selecting the Distribution System using AHP and Fuzzy AHP Methods. 235-242 - Dang Van Pham

, Vinh Cong Phan
:
Algebraic aspects of big data in livestream in internet of mobile things. 243-261 - Long Tan Le, Tung-Anh Nguyen

, Tuan-Dung Nguyen, Nguyen Hoang Tran, Nguyen Binh Truong, Phuong L. Vo, Bui Thanh Hung
, Tuan Anh Le:
Distributionally Robust Federated Learning for Mobile Edge Networks. 262-272 - Zhiru Hou, Lili Xiao, Huibiao Zhu, Phan Cong Vinh:

Formalization and Analysis of Aeolus-based File System from Process Algebra Perspective. 273-285 - Nguyen Van Han

, Phan Cong Vinh
, Marie Duzí
:
Towards Modeling Conceptual Graphs and Transparent Intensional Logic. 286-293 - Tri Ngo Quang

, Thanh Tung Nguyen, Huong Pham Thi Viet:
Machine Learning Approach for Early Detection of Diabetes Using Raman Spectroscopy. 294-305 - Cam Ngoc Thi Huynh, Phuoc Vinh Tran, Trung Vinh Tran:

The Approach of Winner-domain to Selecting Members for High School Team Participating in National Excellent Student Competition. 306-313
Volume 29, Number 2, April 2024
- Huan Zhan, Xiangyun Meng, Muhammad Asif:

Risk Early Warning of a Dynamic Ideological and Political Education System Based on LSTM-MLP: Online Education Data Processing and Optimization. 1 - Mohan Prakash

, S. Neelakandan
, Bong-Hyun Kim:
Reinforcement Learning-Based Multidimensional Perception and Energy Awareness Optimized Link State Routing for Flying Ad-Hoc Networks. 315-333 - An-Chao Tsai, Anirut Saengsoi:

Artificial Intelligent IoT-Based Cognitive Hardware for Agricultural Precision Analysis. 334-348 - Anbazhagan Geetha, S. Suprakash, Se-Jung Lim:

Sensor based Battery Management System in Electric Vehicle using IoT with Optimized Routing. 349-372 - Daegeon Kim, S. Velliangiri

, Bhuvaneswari Amma N. G.
, Dongoun Lee:
Class Scatter Ratio Based Mahalanobis Distance Approach for Detection of Internet of Things Traffic Anomalies. 373-384 - K. Sakthidasan Sankaran, Seng-Phil Hong:

Trust Aware Secured Data Transmission Based Routing Strategy Using Optimal Ch Selection in Mobile Ad-Hoc Network. 385-397 - Faheem Khan, Rahat Ullah, Umm-e Laila:

Editorial: Ubiquitous Computing Entity-aware Data Management on Mobile Devices. 398-400 - Qianqian Deng, Yuan Guo, Tan Meng:

E-Commerce Commodity Recommendation System Based on Social Perception and Mobile Computing. 401-412 - Firdous Kausar, Mostefa Mesbah, Waseem Iqbal

, Awais Ahmad, Ikram Sayyed:
Fall Detection in the Elderly using Different Machine Learning Algorithms with Optimal Window Size. 413-423 - Ahmer Khan Jadoon

, Jian Shen, Jabran Khan:
Secure Key Distribution for Vehicular Network Based on Kirchhoff Law Johnson Noise. 424-432 - N. Noor Alleema

, Abhay Chaturvedi, Ashok Kumar Nanda, P. Joel Josephson, Ahmed Mateen Buttar
, Dinesh Komarasamy:
Computation Offloading for Image Compression in Mobile Edge Computing Using a Deep Belief Network Based on the Markov Approximation Algorithm. 433-447 - Deepak Sharma

, Mohamed A. Elmagzoub
, Abdullah Alghamdi, Mesfer Alrizq, Kusum Yadav
, Sachin Sharma
, V. Prashanth:
Entity-Aware Data Management on Mobile Devices: Utilizing Edge Computing and Centric Information Networking in the Context of 5G and IoT. 448-459 - Munish Bhatia:

IoT-Inspired Secure Healthcare Framework for Adult: Blockchain Perspective. 460-476 - Sulaiman Khan

, Habib Ullah Khan
, Shah Nazir, Bayan Albahooth, Mohammad Arif:
Users Sentiment Analysis Using Artificial Intelligence-Based FinTech Data Fusion in Financial Organizations. 477-488 - Habib Ullah Khan

, Nasir Ali, Shah Nazir, Abdulatif Alabdulatif, Mohammad Arif:
Multi-Criterial Based Feature Selection for Health Care System. 489-502 - Lucia Knapcíková, Dragan Perakovic

:
Editorial to the Special Issue "Synergies in Smart Technologies and Mobility" MONET Journal. 503-505 - Annamária Behúnová

, Tomás Mandicák
, Marcel Behún
, Peter Mésáros
:
The Building Information Modelling Through Information Technology and Impacts on Selected Circular Economy Performance Indicators of Construction Projects. 506-515 - Curtis Shull

, Krystian Marecki, Katarzyna Huk
, Robert Wolski
:
The Study of RFID Technology and Laser Telemetry to Locate Products in Space. 516-532 - Ivan Cvitic

, Aleksandar Jevremovic
, Petre Lameski
:
Approaches and Opportunities of Using Machine Learning Methods in Telecommunications and Industry 4.0. 533-544 - Shakib Zohrehvandi:

A Fuzzy Overlapping Project Resource Optimization Model in the Project Construction Industry with a Fractal Approach. 545-556 - Michal Holubcik

, Jozef Jandacka
, Miriam Nicolanská
:
Improvement of Emission Monitoring System Accuracy in Aims of Increasing Air Quality of Smart City. 557-566
Volume 29, Number 3, June 2024
- Yuwen Sha, Bo Sun

, Hadi Jahanshahi, Linian Wang:
A Fast and Effective Image Encryption Scheme Based on DSVSM and (7, 4) Hamming Code. 567-582 - Xuejun Li, Bo Sun

, Xiuguo Bi, Huizhen Yan, Linian Wang:
A Novel Color Image Encryption Algorithm Based on Cross-plane Scrambling and Diffusion. 583-594 - Xintong Han, Peng Li

, Bo Sun, Lujie Ren:
A New Three-Dimensional Map Based Discrete Memristor and Its Hardware Implementation. 595-602 - Tianming Liu, Bo Sun, Peng Li

, Tao Ma, Yanjie Ma:
Multistability Analysis of a Fractional-Order Multi-Wing Chaotic System and its Circuit Realization. 603-613 - Jieyang Wang, Peng Li

, Santo Banerjee, Yixin Chen, Xuan Wang:
A HNN Chaotic System with Attractor Coexistence and its Circuit Realization. 614-622 - Songtao Zhang, Chifu Yang, Jianfei Zhu, Jin Tian, Mengqiang Fu, Changbing Chen, Yingjie Liu, Baichun Wei:

A Method for Obtaining Barbell Velocity and Displacement and Motion Counting Based on IMU. 623-633 - Mingkai Chen, Xinmeng Tan, Huiyan Han, Lei Wang:

Tactile Codec with Visual Assistance in Multi-modal Communication for Digital Health. 634-646 - Yifan Chen

, Haiqi Zhu, Zhiyuan Chen:
Multi-DGI: Multi-head Pooling Deep Graph Infomax for Human Activity Recognition. 647-658 - Abderrahmane Salmi, Wei Zhang, Feng Jiang:

Reducing Data Transmission Efficiency in Wireless Capsule Endoscopy through DL-CEndo Framework: Reconstructing Lossy Low-Resolution Luma Images and Improving Summarization. 659-675 - Leila Aissaoui Ferhi, Manel Ben Amar, Fethi Choubani, Ridha Bouallegue

:
Empowering Medical Diagnosis: A Machine Learning Approach for Symptom-Based Health Checker. 676-702 - Priscila Basto Fagundes

, Douglas Dyllon Jeronimo de Macedo
, António Lucas Soares:
FIRMa: A Framework to Support the Requirements Management Process Based on Information Management Tools. 703-713 - Young-Chool Choi, Nafsiah Mohamed:

Methodological Exploration of Social Value Measurement in Mobile Network Services: Application of Social Network Analysis and System Dynamics Methodology. 714-728 - Young-Chool Choi, Nafsiah Mohamed:

Measuring Social Value of Information Technology: Application of Topic Modelling and System Dynamics. 729-741 - Raulivan Rodrigo da Silva

, Thiago Magela Rodrigues Dias
, Washington Luís Ribeiro de Carvalho Segundo
:
Collection and Integration of Patent Data for Analysis and Validation of Brazilian Technical Production. 742-753 - Fábio Lorensi do Canto

, Adilson Luiz Pinto
, Thiago Magela Rodrigues Dias
, Edson Mário Gavron
, Marcos Talau
:
Gsm_hdata: a bibliometric tool to analyze data from google scholar metrics. 754-761 - Yawen Xing, Huizhe Lu, Lifei Zhao, Shihua Cao:

Privacy and Security Issues in Mobile Medical Information Systems MMIS. 762-773 - Vivek Srivastava

, Sumita Mishra
, Nishu Gupta:
Traffic Flow Labelling for Congestion Prediction with Improved Heuristic Algorithm and Atrous Convolution-based Hybrid Attention Networks. 774-791 - Subhash Suman, Ayush Kumar Singh, Prakash Pareek

, Jitendra K. Mishra:
Efficient Power Prediction for Intersatellite Optical Wireless Communication System Using Artificial Neural Network. 792-800 - Ankita Kumari, Prakash Pareek

, Jitendra K. Mishra:
Performance Analysis of Spatially Multiplexed Hybrid BPSK-MPPM Modulated Optical Interconnect System Using Triangular Index Multicore Fiber. 801-808 - Vidyapati Jha

, Priyanka Tripathi:
Probabilistic SAX: A Cognitively-Inspired Method for Time Series Classification in Cognitive IoT Sensor Network. 809-824 - Yifeng Zhao

, Xuanhui Liu, Haoran Liu, Xiaoqi Wang, Lianfen Huang:
RIS-Aided MmWave Hybrid Relay Network Based on Multi-Agent Deep Reinforcement Learning. 825-840 - Hongguang Zhang, Liangqian Chen, Shengwen Ma, Puyan Zhang, Hao Zheng, Yuanan Liu:

Broad Learning System Routing to Mitigate the Impact of Dynamic Changing Topology for 3D Flying Ad Hoc Networks. 841-855 - Dipen Bepari, Soumen Mondal, Prakash Pareek

, Nishu Gupta:
Uplink Performance Analysis of Wireless Energy Harvesting-Enabled NOMA-based Networks. 856-866 - Khalid Haseeb, Fahad F. Alruwaili, Atif Khan, Teg Alam, Abrar Wafa, Amjad Rehman Khan:

AI Assisted Energy Optimized Sustainable Model for Secured Routing in Mobile Wireless Sensor Network. 867-875 - Amjad Rehman, Khalid Haseeb, Fahad F. Alruwaili, Anees Ara

, Tanzila Saba:
Autonomous and Intelligent Mobile Multimedia Cyber-Physical System with Secured Heterogeneous IoT Network. 876-885 - Chun-Cheng Lin, Yi-Chun Peng

, Zhen-Yin Annie Chen
, Yu-Hong Fan, Hui-Hsin Chin:
Distributed Flexible Job Shop Scheduling through Deploying Fog and Edge Computing in Smart Factories Using Dual Deep Q Networks. 886-904 - Ruey-Chyi Wu:

Development of an Intelligent Virtualization Platform Key Metrics Monitoring System: Collaborative Implementation with Self-Training and Bagging Algorithm. 905-921 - Xintong Pei, Zhenjiang Zhang, Yaochen Zhang:

Cost-efficient Hierarchical Federated Edge Learning for Satellite-terrestrial Internet of Things. 922-934 - Hsiao-Yu Wang, Ching-Hua Hung, Cheng-Hui Chen:

Evaluating Service Life of Metal Processing Machinery: An Intelligent Monitoring Perspective. 935-946 - Jen-En Huang, Li-Wei Chang, Hui-Hsin Chin:

5G Metaverse in Education. 947-960 - Chandra Wijaya

, Rita Wiryasaputra, I-Jan Wang, Ruey-Chyi Wu, Chao-Tung Yang:
Simulation of DOS Attacks Mitigation in Software Defined Network Architecture using Load Balancing Algorithm. 961-980 - Piotr Trojanowski

, Jozef Husár
, Stella Hrehová
, Lucia Knapcíková:
Cluster Analysis as a Basis for the Development of an Application Assessing the Reliability of Transport Infrastructure. 981-990 - Gordana Jotanovic

, Goran Jausevac
, Dragan Perakovic
, Dalibor Dobrilovic
, Zeljko Stojanov
, Vladimir Brtka
:
Modeling a LoRAWAN Network for Vehicle Wildlife Collision Avoidance System on Rural Roads. 991-999 - Srdjan Atanasijevic, Aleksandar Jevremovic

, Dragan Perakovic
, Mladen D. Veinovic, Tibor Mijo Kuljanic:
Just-in-time Software Distribution in (A)IoT Environments. 1000-1007 - Muhusina Ismail, Saed Alrabaee, Kim-Kwang Raymond Choo, Luqman Ali, Saad Harous:

A Comprehensive Evaluation of Machine Learning Algorithms for Web Application Attack Detection with Knowledge Graph Integration. 1008-1037 - Peter Mésáros, Jana Smetanková

, Annamária Behúnová
, Katarína Krajníková:
The Potential of Using Artificial Intelligence (AI) to Analyse the Impact of Construction Industry on the Carbon Footprint. 1038-1052 - Matous Machka

, Theodor Beran
:
Monitoring of Material and Energy Flows: Integration of MFCA System with an Open Input-Output Model Separating Variable and Fixed Costs. 1053-1066
Volume 29, Number 4, August 2024
- Shuhui Bi, Xue Li, Liyao Ma

, Qinjun Zhao, Tao Shen, Shengjun Shi:
Apple Internal Quality Fusion Prediction by Multi-pattern Recognition Technology and Evidence Theory. 1067-1075 - Yu-Dong Zhang

, Xianwei Jiang, Shui-Hua Wang:
Fingerspelling Recognition by 12-Layer CNN with Stochastic Pooling. 1076-1088 - Mingxu Sun, Yanli Gao, Zhuqing Jiao, Yuan Xu, Yuan Zhuang

, Pengjiang Qian:
R-T-S Assisted Kalman Filtering for Robot Localization Using UWB Measurement. 1089-1098 - Jing Yin, Xiao-lin Xu, Xiao-hua Xiong, Zbigniew Marszalek:

An enhancement method of waveform simulation in dual-color laser field imaging based on Internet of Things. 1099-1107 - Yu-Dong Zhang

, Wei Wang
, Xin Zhang, Shui-Hua Wang:
Secondary Pulmonary Tuberculosis Recognition by 4-Direction Varying-Distance GLCM and Fuzzy SVM. 1108-1121 - Shui-Hua Wang, Jin Zhou, Yu-Dong Zhang

:
Community-Acquired Pneumonia Recognition by Wavelet Entropy and Cat Swarm Optimization. 1122-1139 - Deep Chandra Binwal

, Rajeev Tiwari
, Monit Kapoor
:
Modeling and Optimization of Vehicular Fog Network Towards Minimizing Latency. 1140-1151 - Lokesh Bommisetty

, T. G. Venkatesh:
Contextual Bandit Based Adaptive Numerology for Initial Access in 5G NR Networks. 1152-1164 - Abdullah Alqahtani

, Shtwai Alsubai
, Mohemmed Sha
, Munish Bhatia:
Game Theoretic Systematic Approach for Transportation Quality Assessment. 1165-1180 - Shuang Zheng, Junfeng Wu, Songnan Duan

, Fugang Liu
, Jingyi Pan:
An Improved Crowd Counting Method Based on YOLOv3. 1181-1189 - Mingyuan Ren

, Ruidong Zhang, Xiaolin Jiang
:
BLE Transmitter with Multiple Feedback Filter for Low-Power IoT Applications. 1190-1195 - Changchun Dong, Mingyuan Ren, Xiaolin Jiang

:
A Tunable Integrated N-Path Bandpass Filter. 1196-1202 - Xiaolin Jiang

, Lihuan Zhang
:
SD-Based Low-Complexity Signal Detection Algorithm in Massive MIMO Systems. 1203-1211 - Han Tian, Zhang Zhu

, Xu Jing:
Deep learning for Depression Recognition from Speech. 1212-1227 - Waralak V. Siricharoen

:
Improving User Experience (UX) by Applying (Interactive) Infographic in the Human Computer Interaction Context. 1228-1238 - Dang Van Pham

, Vinh Cong Phan
:
Overview of the Stream Theory-Based Big Data in Livestream. 1239-1256 - Zhiru Hou

, Jiaqi Yin, Huibiao Zhu, Phan Cong Vinh:
Formal Modeling and Verifying Dubbo Using Process Algebra. 1257-1272 - Thanh Phuong Nguyen, Hung Nguyen, Ha Quang Thinh Ngo

:
Developing and Evaluating the Context-Aware Performance of Synchronization Control in the Real-Time Network Protocol for the Connected Vehicle. 1273-1294 - Ijaz Uddin

, Abdur Rakib
, Mumtaz Ali, Hafiz Mahfooz Ul Haque, Altaf Uddin:
A Semantic-Based Approach to Modelling Smart Indoor Kitchen Garden. 1295-1310 - Le Anh Duc, Nguyen Thanh Tung, Tran Thi Oanh, Ngo Quang Tri

, Ngo Thuy Linh:
Non-Invasive In Vivo Type 2 Diabetes Mellitus Diagnosis Using Raman Spectroscopy in Combination with Machine Learning. 1311-1323 - Yang Li, Houbing Herbert Song:

Editorial: Resource Efficient Deep Learning for Computer Vision Applications. 1324-1325 - Nadia Mumtaz, Naveed Ejaz, Imad Rida

, Muhammad Attique Khan, Mi Young Lee:
Towards Real-world Violence Recognition via Efficient Deep Features and Sequential Patterns Analysis. 1326-1335 - Kamini Lamba

, Shalli Rani
, Muhammad Attique Khan, Mohammad Shabaz:
RE-InCep-BT-:Resource-Efficient InCeptor Model for Brain Tumor Diagnostic Healthcare Applications in Computer Vision. 1336-1350 - Ebtisam Abdullah Alabdulqader, Muhammad Umer, Khaled Alnowaiser

, Huihui Wang, Aisha Ahmed AlArfaj, Imran Ashraf:
Image Processing-based Resource-Efficient Transfer Learning Approach for Cancer Detection Employing Local Binary Pattern Features. 1351-1367 - Camellia Ray

, Sambit Bakshi, Pankaj Kumar Sa, Ganapati Panda:
A Resource-Efficient Deep Learning Approach to Visual-Based Cattle Geographic Origin Prediction. 1368-1377 - Ping Guo, Guoping Liu, Huan Liu:

TMPSformer: An Efficient Hybrid Transformer-MLP Network for Polyp Segmentation. 1378-1392 - Honglei Cheng, Haorui Yi, Guipeng Lan, Shuai Xiao:

Emo-AEN: A Lightweight Network for Brand Image Design Based on Aesthetic Evaluation. 1393-1401
Volume 29, Number 5, October 2024
- Zhigao Zheng, Shahid Mumtaz, Krishn K. Mishra, Joel J. P. C. Rodrigues, Bo Ai:

Editorial: Heterogeneous High Performance Computing for Intelligent Data Analysis. 1403-1405 - Li Gang

, Zhao Huanbin, Zhao Tongzhou:
Document Vector Representation with Enhanced Features Based on Doc2VecC. 1406-1415 - Changbing Huang, Ruibo Li, Aiping Li:

Parallel Implementation of Key Algorithms for Intelligent Processing of Graphic Signal Data of Consumer Digital Equipment. 1416-1423 - Lisheng Li, Shuai Li

, Yan Wen, Shidong Zhang, Xiangyu Wen:
Cloud-Edge Multi-Service Data Offloading Optimization for New Type Distribution Grid. 1424-1432 - Tao Gu, Lin Yang, Hua Wang

:
Data Privacy Protection Model Based on Graph Convolutional Neural Network. 1433-1440 - Kehuan Wen, Junhao Feng, Xiangyong Yang, Bo Geng, Boyang Huang:

5G Edge Intelligence-based Refined Power Distribution Monitoring Technology and Application. 1441-1450 - Guohong Yi, Zhichao Cao

:
An Algorithm of Image Encryption based on AES & Rossler Hyperchaotic Modeling. 1451-1459 - Kexiang Ma, Sungwon Lee, Hui Chen:

Application of Visual Communication in Image Enhancement and Optimization of Human-Computer Interface. 1460-1466 - Yingshu Wang, Jian Ding, Xiaomeng He, Qian Wei, Shu Yuan, Jun Zhang

:
Intrusion Detection Method Based on Denoising Diffusion Probabilistic Models for UAV Networks. 1467-1476 - Mingxi Liu, Ning Lu, Yihong Wen, Qingfeng Cheng, Wenbo Shi

:
SEA: Secure and Efficient Public Auditing for Edge-Assisted IoT Aggregated Data Sharing. 1477-1488 - Piyush Kumar, Mobashshirur Rahman, Suyel Namasudra, Nageswara Rao Moparthi

:
Enhancing Security of Medical Images Using Deep Learning, Chaotic Map, and Hash Table. 1489-1503 - Hongyu Yang

, Haihang Yuan, Liang Zhang:
Risk Assessment Method of IoT Host Based on Attack Graph. 1504-1513 - Mengfan Xu, Xinghua Li:

PPFL-IDS: Privacy-Preserving Federated Learning Based IDS Against Poisoning Attacks. 1514-1525 - Honghao Gao:

Cloud-Edge Intelligence Collaborative Computing: Software, Communication and Human. 1526-1528 - Yönal Kirsal

:
A Stochastic Performance Model and Mobility Analysis in the Integrated Cloud-Fog-Edge Computing System. 1529-1550 - Rui Zhang, Juan Chen, Yujia Song, Wenyu Shan, Peng Chen

, Yunni Xia:
An Effective Transformation-Encoding-Attention Framework for Multivariate Time Series Anomaly Detection in IoT Environment. 1551-1563 - Zhijian Lin

, Yonghang Lin, Jianjie Yang, Qingsong Zhang:
Energy-Efficient joint Resource Allocation and Computation Offloading in NOMA-enabled Vehicular Fog Computing. 1564-1576 - Haole Hou

, Zhengyi Chai
, Xu Liu
, Yalun Li, Yue Zeng:
A Task Offloading Algorithm using Multi-Objective Optimization under Hybrid Mode in Mobile Edge Computing. 1577-1593 - Amir Javadpour, Arun Kumar Sangaiah

, Hadi Zaviyeh, Forough Ja'fari:
Enhancing Energy Efficiency in IoT Networks Through Fuzzy Clustering and Optimization. 1594-1617 - Priyanka Verma, A. Rama Krishna Kowsik, Rajesh Kumar Pateriya, Nitesh Bharot, Ankit Vidyarthi

, Deepak Gupta:
A Stacked Ensemble Approach to Generalize the Classifier Prediction for the Detection of DDoS Attack in Cloud Network. 1618-1632 - Arunkumar Arulappan, Gunasekaran Raja, Ali Kashif Bashir, Aniket Mahanti, Marwan Omar:

ZTMP: Zero Touch Management Provisioning Algorithm for the On-boarding of Cloud-native Virtual Network Functions. 1633-1645 - Biplab Kanti Sen

, Sunirmal Khatua, Rajib Kumar Das:
Multichannel Pipelined Scheduling for Raw Data Convergecast in Sensor-Cloud. 1646-1662 - Zhengzhe Xiang, Dezhi Wang, Mengzhu He, Yuanyi Chen:

Dynamic System Reconfiguration in Stable and Green Edge Service Provisioning. 1663-1679 - Zhihong Tian, Wei Shi

, Zhiyuan Tan, Jing Qiu
, Yanbin Sun, Feng Jiang, Yan Liu:
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. 1680-1689 - Liting Deng, Chengli Yu, Hui Wen

, Mingfeng Xin, Yue Sun, Limin Sun, Hongsong Zhu:
Few-Shot Malware Classification via Attention-Based Transductive Learning Network. 1690-1704 - Liangjia Li, Yuling Luo

, Junxiu Liu, Senhui Qiu:
A Blind and Robust Image Watermarking Algorithm in the Spatial Domain using Two-level Partition. 1705-1718
Volume 29, Number 6, December 2024
- Amani K. Samha, Nidhi Malik

, Deepak Sharma
, Kavitha S
, Papiya Dutta
:
Intrusion Detection System Using Hybrid Convolutional Neural Network. 1719-1731 - Intyaz Alam, Manisha Manjul

, Vinay Pathak, Vajenti Mala, Anuj Mangal, Hardeo Kumar Thakur
, Deepak Kumar Sharma:
Efficient and Secure Graph-Based Trust-Enabled Routing in Vehicular Ad-Hoc Networks. 1732-1752 - Alaa A. Qaffas

:
Applying an Improved Squirrel Search Algorithm (ISSA) for Clustering and Low-Energy Routing in Wireless Sensor Networks (WSNs). 1753-1768 - Shalini Stalin

, Manish Gupta, K. Makanyadevi
, Amit Agrawal, Anupriya Jain
, Shraddha V. Pandit
, Ali Rizwan
:
Applying Machine Learning Approach to Identifying Channels in MIMO Networks for Communications in 5G-Enabled Sustainable Smart Cities. 1769-1781 - Yibo Chen, Honglian Li, Shengbin Zhuang, Xing Wei:

SupportNet: a Deep Learning Based Channel Equalization Network for Multi-type Multipath Fading. 1782-1795 - Mohammad Alauthman

, Hanan Aljuaid, P. Sathyaprakash
, Amjad Aldweesh, Anand M, Tariq Rasheed
, Awais Khan Jumani:
Unintended Data Behaviour Analysis Using Cryptography Stealth Approach Against Security and Communication Network. 1796-1810 - Ha Huy Cuong Nguyen, Daniel Grzonka

, Bui Thanh Khoa
, K. V. Daya Sagar
, Irshad Ahmed Abbasi
, R. Mahaveerakannan
, Ahmed Alkhayyat:
New Trends in Over the Top Media Service (OTT) Web User Behaviour Analysis and Unethical User Prediction. 1811-1827 - Vinay Bhardwaj, Deepak Prashar, Mamoon Rashid:

SIRFRM - Secure and Intelligent Routing Fairness Rate Model for Flying Adhoc Networks. 1828-1838 - Man Zhou, Lansheng Han:

Sensor Spoofing Detection On Autonomous Vehicle Using Channel-spatial-temporal Attention Based Autoencoder Network. 1839-1852 - Subha Ghosh

:
AdHocVDew: Graph Theory Based Dew Enabled 5G Vehicular Ad Hoc Network. 1853-1871 - Fanfeng Shi, Jiaji Wang, Vishnuvarthanan Govindaraj:

SGS: SqueezeNet-guided Gaussian-kernel SVM for COVID-19 Diagnosis. 1872-1885 - Xiaoyan Jiang, Zuojin Hu, Zhaozhao Xu:

CSO-CNN: Cat Swarm Optimization-guided Convolutional Neural Network for Mobile Detection of Breast Cancer. 1886-1896 - Xue Han, Zuojin Hu:

Mobile Diagnosis of COVID-19 by Biogeography-based Optimization-guided CNN. 1897-1908 - Guifen Wu, Norbert Herencsar:

Single-Channel Speech Quality Enhancement in Mobile Networks Based on Generative Adversarial Networks. 1909-1923 - Jun Wan, Marcin Wozniak:

A Sentiment Analysis Method for Big Social Online Multimodal Comments Based on Pre-trained Models. 1924-1937 - Kaustubh Ranjan Singh, Rashmi Chaudhry, Vinay Rishiwal, Mano Yadav:

Model-Free QoE-Aware Seamless Handoff in Heterogeneous Wireless Networks. 1938-1950 - Changting Shi, Dongdong Tao, Haibo Liu, Jinlong Bai:

A Rapid Planning Repair Method of Three-Dimensional Path for AUV. 1951-1966 - Jinyin Peng, Xiangjin Zhu, Li Zhao:

Minimum cascade repair method for mobile network nodes failure under time-frequency feature fusion. 1967-1979 - Dan Shan, Fanfeng Shi, Tianzhi Le:

Alzheimer's detection by Artificial Bee Colony and Convolutional Neural Network at Mobile Environment. 1980-1989 - Cuihong Wen

, Lemin Yin, Shuai Liu
:
DGNet: A Handwritten Mathematical Formula Recognition Network Based on Deformable Convolution and Global Context Attention. 1990-2003 - Wei-Kuo Chiang, Tsung-Ying Li:

An Extended SDN Architecture for Video-on-Demand Caching. 2004-2021 - Xia Liu, Rongyao Jing, Kun Zhang, Qinjun Zhao, Mingxu Sun:

Research on Moving Liquid Level Detection Method of Viscometer in Dynamic Scene. 2022-2029 - Adel A. Alyoubi

:
Enhancing Data Security in Mobile Ad-hoc Network (MANETs) Using Trust-Based Approach with RSSI and Fuzzy Logic. 2030-2046 - Geng Chen, Qingbin Wang, Xiaoxian Kong, Qingtian Zeng:

Collaborative Localization Strategy Based on Node Selection and Power Allocation in Resource-Constrained Environments. 2047-2061 - Dan Wang, Syed Atif Moqurrab, Joon Yoo:

An improved mobile reinforcement learning for wrong actions detection in aerobics training videos. 2062-2074 - Yong Gong, Gautam Srivastava:

Real-Time Tracking of Basketball Trajectory Based on the Associative MCMC Model. 2075-2087 - Ding Chen, Abeer Aljohani:

Secured Data Sharing Method for Wireless Communication Network Based on Digital Twin and Merkle Hash Tree. 2088-2097 - Zhaolin Yang, Loknath Sai Ambati:

Human Body Full-body Motion Gesture Image Feature Capture in Mobile Sensor Networks. 2098-2109

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














