


default search action
Computer Communications, Volume 153
Volume 153, March 2020
- Dimitrios Zorbas

, Khaled Q. Abdelfadeel
, Panayiotis Kotzanikolaou
, Dirk Pesch:
TS-LoRa: Time-slotted LoRaWAN for the Industrial Internet of Things. 1-10
- Waleed Ejaz

, Mehak Basharat, Salman Saadat
, Asad Masood Khattak, Muhammad Naeem
, Alagan Anpalagan
:
Learning paradigms for communication and computing technologies in IoT systems. 11-25
- Quanhua Hou, Weijia Li, Xiaoqing Zhang, Yinnan Fang, Ya-Qiong Duan, Lingda Zhang, Wenqian Liu:

Intelligent urban planning on smart city blocks based on bicycle travel data sensing. 26-33
- Dong Wang, Qingcheng Huang, Xin Chen, Lijuan Ji:

Location of three-dimensional movement for a human using a wearable multi-node instrument implemented by wireless body area networks. 34-41
- Zhihan Lv

, Neeraj Kumar
:
Software defined solutions for sensors in 6G/IoE. 42-47
- Divya Prerna, Rajkumar Tekchandani, Neeraj Kumar

:
Device-to-device content caching techniques in 5G: A taxonomy, solutions, and challenges. 48-84
- A. Sundar Raj

, M. Chinnadurai:
Energy efficient routing algorithm in wireless body area networks for smart wearable patches. 85-94
- Wei Liu, Zhijun Gao:

A distributed flocking control strategy for UAV groups. 95-101
- Bhisham Sharma

, Gautam Srivastava, Jerry Chun-Wei Lin
:
A bidirectional congestion control transport protocol for the internet of drones. 102-116
- Pu Yuan, Kan Zheng, Xiong Xiong, Kuan Zhang, Lei Lei:

Performance modeling and analysis of a Hyperledger-based system using GSPN. 117-124
- Dijesh P., SuvanamSasidhar Babu, Yellepeddi Vijayalakshmi:

Enhancement of e-commerce security through asymmetric key algorithm. 125-134
- Xiupeng Gao, Yiwei Yin:

Design on a wearable armband device for assessing the motion function of upper limbs. 135-144
- Xiaowen Ma, Hongyan Xue:

Intelligent smart city parking facility layout optimization based on intelligent IoT analysis. 145-151
- K. Siva Kumar, S. Sasi Kumar, N. Mohan Kumar:

Effcient video compression and improving quality of video in communication for computer endcoding applications. 152-158
- Zhixin Liu, Meihua Zhou, Yanyan Shen, Kit Yan Chan, Xinping Guan:

Energy-efficient resource allocation in wireless powered CCRNs with simultaneous wireless information and power transfer. 159-168
- Xiangtao Liu, Tianle Zhang, Ning Hu, Peng Zhang, Yu Zhang:

The method of Internet of Things access and network communication based on MQTT. 169-176
- Yuncheng Wang:

Construction and simulation of performance evaluation index system of Internet of Things based on cloud model. 177-187 - Jianpeng Zhang:

Real-time detection of energy consumption of IoT network nodes based on artificial intelligence. 188-195
- Hikmat Ullah Khan

, Pir Masoom Shah
, Munam Ali Shah
, Saif ul Islam
, Joel J. P. C. Rodrigues:
Cascading handcrafted features and Convolutional Neural Network for IoT-enabled brain tumor segmentation. 196-207
- Jun Liu, Yuan Tian, Yu Zhou, Yang Xiao

, Nirwan Ansari
:
Privacy preserving distributed data mining based on secure multi-party computation. 208-216
- Mahdi Abbasi

, Mina Yaghoobikia, Milad Rafiee
, Alireza Jolfaei
, Mohammad Reza Khosravi:
Efficient resource management and workload allocation in fog-cloud computing paradigm in IoT using learning classifier systems. 217-228
- Basudeb Bera

, Durbadal Chattaraj
, Ashok Kumar Das:
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment. 229-249
- Dapeng Man, Qi Lu, Yao Wang, Wu Yang, Xiaojiang Du, Mohsen Guizani:

An adaptive cache management approach in ICN with pre-filter queues. 250-263
- Yannis Thomas, George Xylomenos, George C. Polyzos:

Multipath congestion control with network assistance. 264-278
- Jingyu Liu, Jing Wu, Linan Sun:

Control method of urban intelligent parking guidance system based on Internet of Things. 279-285 - Fengmei Gao, Linhong Wang, Tao Lin:

Intelligent wearable rehabilitation robot control system based on mobile communication network. 286-293
- Feiran Fu

, Ming Fang
, Huamin Yang, Zhe Li:
High-order Taylor expansion based image space transform method for real-time augmented reality. 294-301
- Marc Jayson Baucas

, Petros Spachos:
A scalable IoT-fog framework for urban sound sensing. 302-310
- Jigna J. Hathaliya, Sudeep Tanwar

:
An exhaustive survey on security and privacy issues in Healthcare 4.0. 311-335
- Abdulrahman Saad Alqahtani:

Security threats and countermeasures in software defined network using efficient and secure trusted routing mechanism. 336-341
- Yunsick Sung, Sejun Jang, Young-Sik Jeong, James J. Park:

Malware classification algorithm using advanced Word2vec-based Bi-LSTM for ground control stations. 342-348
- Mariselvam V.

, Varatharajan Ramachandran:
Compact DGS quad band filter for multi-service wireless communication systems using stub loaded stepped impedance resonators. 349-352
- Sathishkumar V. E.

, Jangwoo Park, Yongyun Cho
:
Using data mining techniques for bike sharing demand prediction in metropolitan city. 353-366
- Xin Wang

, Zhihong Qian, Shuang Zhai, Xue Wang:
Social-aware resource allocation for multicast device-to-device communications underlying UAV-assisted networks. 367-374
- Edwin Raja S.

, R. Ravi:
A performance analysis of Software Defined Network based prevention on phishing attack in cyberspace using a deep machine learning with CANTINA approach (DMLCA). 375-381
- Yan-Wen Li

, Ke Cao:
Establishment and application of intelligent city building information model based on BP neural network model. 382-389
- Zonglin Zhong, Wengui Hu:

Error detection and control of IIoT network based on CRC algorithm. 390-396
- Lan Liu, Cheng-Fan Li, Xian-Kun Sun, Jun-Juan Zhao:

Event alert and detection in smart cities using anomaly information from remote sensing earthquake data. 397-405 - Rajesh Gupta

, Sudeep Tanwar
, Sudhanshu Tyagi, Neeraj Kumar
:
Machine Learning Models for Secure Data Analytics: A taxonomy and threat model. 406-440
- Fujie Yang, Mingyi Deng:

Research on intelligent identification technology of lithology wireless remote transmission based on element measurement. 441-450
- Lunqiang Ye:

Study on embedded system in monitoring of intelligent city pipeline network. 451-458
- Deepika Sirohi, Neeraj Kumar

, Prashant Singh Rana
:
Convolutional neural networks for 5G-enabled Intelligent Transportation System : A systematic review. 459-498
- Jingyu Liu, Jing Wu, Mingyu Liu:

UAV monitoring and forecasting model in intelligent traffic oriented applications. 499-506
- R. Krishnamurthy, T. Srinivas:

Physical layer impairments aware routing and spectrum allocation algorithm for transparent flexible-grid optical networks. 507-514 - Vaishnavi Moorthy, Revathi Venkataraman

, T. Rama Rao
:
Security and privacy attacks during data communication in Software Defined Mobile Clouds. 515-526
- Shehzad Ashraf Chaudhry

, Taeshik Shon, Fadi Al-Turjman
, Mohammed H. Alsharif
:
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems. 527-537
- Guobin Chen, Shijin Li:

Research on location fusion of spatial geological disaster based on fuzzy SVM. 538-544
- Rakesh Kumar Mahendran

, Parthasarathy Velusamy
:
A secure fuzzy extractor based biometric key authentication scheme for body sensor network in Internet of Medical Things. 545-552
- S. Ancy, D. Paulraj:

Handling imbalanced data with concept drift by applying dynamic sampling and ensemble classification model. 553-560
- Evelio Astaiza Hoyos, Octavio J. Salcedo Parra, Wilmar Yesid Campo Muñoz:

Centralized sub-Nyquist wideband spectrum sensing for cognitive radio networks over fading channels. 561-568
- Yang Li:

Construction of U2S communications system based on edge fog computing. 569-579
- Guang Chen, Tonghai Jiang, Meng Wang, Xinyu Tang, Wenfei Ji:

Modeling and reasoning of IoT architecture in semantic ontology dimension. 580-594
- Alexandre Marquet

, Nicolas Montavont, Georgios Z. Papadopoulos
:
Towards an SDR implementation of LoRa: Reverse-engineering, demodulation strategies and assessment over Rayleigh channel. 595-605
- Liya Ma, Dongmei Wei, Pei Wang:

Disaster analysis on cultural sites using fuzzy based online open provision geographic data frameworks. 606-613
- Pingzhang Gou

, Gang Mao, Fen Zhang, Xiangdong Jia:
Reconstruction of coverage hole model and cooperative repair optimization algorithm in heterogeneous wireless sensor networks. 614-625
- N. Balasubramanian, A. Askarunisa, A. Ruba:

SOS-WS Host Shield: A sketch-based Service Oriented Shield against web application business layer IDS attacks. 626-631 - Tamizhselvan C.

, Vijayalakshmi V.:
SDN-MCHO: Software Define network based Multi-criterion Hysteresis Optimization based for reliable device routing in Internet of Things for the smart surveillance application. 632-640

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














