


Остановите войну!
for scientists:


default search action
Wireless Communications and Mobile Computing, Volume 2020
Volume 2020, 2020
- Wang Tun, J. Pourqasem
, S. A. Edalatpanah
:
Optimizing Resource Discovery Technique in the P2P Grid Systems. 1069824:1-1069824:9 - Mengyu Peng
, Wei Liu
, Tian Wang
, Zhiwen Zeng
:
Relay Selection Joint Consecutive Packet Routing Scheme to Improve Performance for Wake-Up Radio-Enabled WSNs. 7230565:1-7230565:32 - Xiaohui Shang
, Hao Yin, Aijun Liu, Mu Li, Yida Wang, Yong Wang:
Secure Green-Oriented Multiuser Scheduling for Wireless-Powered Internet of Things. 7845107:1-7845107:11 - Muhammad Mostafa Monowar
, Mohammed Basheri:
On Providing Differentiated Service Exploiting Multi-Instance RPL for Industrial Low-Power and Lossy Networks. 1748647:1-1748647:12 - Pan Gong
, Tanveer Ahmed
, Jianfeng Li
:
Three-Dimensional Coprime Array for Massive MIMO: Array Configuration Design and 2D DOA Estimation. 2686257:1-2686257:14 - Sajida Karim
, Hui He
, A. R. Junejo, Mariyam Sattar:
Measurement of Objective Video Quality in Social Cloud Based on Reference Metric. 5028132:1-5028132:13 - Muhammad Sameer Sheikh
, Jun Liang
, Wensong Wang:
Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey. 5129620:1-5129620:25 - Pedro Thiago Valério de Souza
, Vinícius Samuel Valério de Souza, Luiz Felipe de Queiroz Silveira
:
Design of Wavelet-Encoded Symbol Constellations for Cyclostationary Spectrum Sensing. 9863785:1-9863785:9 - Sapna B. Abdulkareem
, Srivatsun Gopalakrishnan
:
Development of Multilayer Partially Reflective Surfaces for Highly Directive Cavity Antennas: A Study. 9578031:1-9578031:14 - Liyun Su
, Li Deng, Wanlin Zhu, Shengli Zhao:
Statistical Detection of Weak Pulse Signal under Chaotic Noise Based on Elman Neural Network. 9653586:1-9653586:12 - Razaullah Khan
, Xiaofeng Tao
, Adeel Anjum
, Sajjad Haider, Saif Ur Rehman Malik
, Abid Khan
, Fatemeh Amiri:
Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity. 8416823:1-8416823:18 - Jianxiong Pan
, Neng Ye
, Aihua Wang
, Xiangming Li
:
A Deep Learning-Aided Detection Method for FTN-Based NOMA. 5684851:1-5684851:11 - Muhammad Sajjad Khan
, Noor Gul
, Junsu Kim
, Ijaz Mansoor Qureshi, Su Min Kim
:
A Genetic Algorithm-Based Soft Decision Fusion Scheme in Cognitive IoT Networks with Malicious Users. 2509081:1-2509081:10 - Sung-Yoon Jung
, Ji-Hwan Lee, Wonwoo Nam, Byung Wook Kim
:
Complementary Color Barcode-Based Optical Camera Communications. 3898427:1-3898427:8 - Xujun Shen, Qingchun Chen
, Yulong Nie, Keming Gan:
Adaptive Secure MIMO Transmission Mechanism against Smart Attacker. 2786314:1-2786314:14 - Dongsheng Han
, Kai Fu
, Zhixiong Chen:
Pilot Reuse Mode Based on Continuous Pilot Reuse Factors. 9326049:1-9326049:7 - Hongyuan Gao
, Shibo Zhang
, Yumeng Su
, Ming Diao:
Energy Harvesting and Information Transmission Mode Design for Cooperative EH-Abled IoT Applications in beyond 5G Networks. 6136298:1-6136298:17 - Bo Rong
, Shuai Han
, Michel Kadoch
, Xi Chen
, Antonio Jara:
Integration of 5G Networks and Internet of Things for Future Smart City. 2903525:1-2903525:2 - Jinrong Mo
, Shengbo Hu
, Tingting Yan
, Xiaowei Song, Yanfeng Shi:
Transmit Power Allocation with Connectivity Probability for Multi-QoS in Cluster Flight Spacecraft Network. 8676835:1-8676835:11 - Kozo Satoda
, Eiji Takahashi, Takeo Onishi, Takayuki Suzuki, Daisuke Ohta, Kosei Kobayashi, Tutomu Murase
:
Passive Method for Estimating Available Throughput for Autonomous Off-Peak Data Transfer. 3502394:1-3502394:12 - Tengteng Ma
, Yong Zhang
, Fanggang Wang, Dong Wang, Da Guo:
Slicing Resource Allocation for eMBB and URLLC in 5G RAN. 6290375:1-6290375:11 - Feifei Wang
, Guosheng Xu
, Guoai Xu
, Yuejie Wang, Junhao Peng:
A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. 3805058:1-3805058:15 - Sungwook Kim
:
Bargaining Solution-Based Resource Allocation Scheme for Cloud-Assisted Wireless Body Area Networks. 5470428:1-5470428:10 - Jun Wang
, Zhuangzhuang Du
, Zhitao He:
Quantitative Invulnerability Analysis of Artificial Spider-Web Topology Model Based on End-to-End Delay. 4617239:1-4617239:11 - Wenlong Xia
, Yuanping Zhou, Qingdang Meng:
Performance Improvement on Nonorthogonal Multiple Access without CSIT. 3642893:1-3642893:6 - Xin Wang
, Shuhui Chen
, Jinshu Su:
Real Network Traffic Collection and Deep Learning for Mobile App Identification. 4707909:1-4707909:14 - Umair Khadam, Muhammad Munwar Iqbal
, Meshrif Alruily, Mohammed A. AlGhamdi, Muhammad Ramzan
, Sultan H. Almotiri:
Text Data Security and Privacy in the Internet of Things: Threats, Challenges, and Future Directions. 7105625:1-7105625:15 - Carlos Alexandre R. Fernandes
, Jianhe Du
, Alex Pereira da Silva, André L. F. de Almeida
:
Applications of Tensor Models in Wireless Communications and Mobile Computing. 7393080:1-7393080:2 - Wilayat Khan
, Muhammad Kamran
, Syed Rameez Naqvi
, Farrukh Aslam Khan
, Ahmed S. Alghamdi, Eesa Alsolami:
Formal Verification of Hardware Components in Critical Systems. 7346763:1-7346763:15 - José Roberto C. Piqueira
:
Master-Slave Topologies with Phase-Locked Loops. 2727805:1-2727805:12 - Shaddrack Yaw Nusenu
, Emmanuel Asare:
Butler Matrix Frequency Diverse Retrodirective Array Beamforming: An Energy-Efficient Technique for mmWave Networks. 9408519:1-9408519:12 - Ponraj Appandairaj
, Kathiravan Kannan:
Software-Defined Multilayered Admission Control for Quality of Service Assurance in Mobile Ad-hoc Networks. 2989751:1-2989751:23 - Van Khoi Dinh
, Minh-Tuan Le, Vu-Duc Ngo
, Chi Hieu Ta:
PCA-Aided Linear Precoding in Massive MIMO Systems with Imperfect CSI. 3425952:1-3425952:9 - Siye Wang
, Ziwen Cao
, Yanfang Zhang
, Weiqing Huang
, Jianguo Jiang
:
A Temporal and Spatial Data Redundancy Processing Algorithm for RFID Surveillance Data. 6937912:1-6937912:12 - Xiaowu Liu
, Xiaowei Zhang, Jiguo Yu
, Can Fu:
Query Privacy Preserving for Data Aggregation in Wireless Sensor Networks. 9754973:1-9754973:10 - Shan-Shan Li
, Jian Zhou, Xuan Wang:
A New Online Dynamic Testing Method for Noise of Broadcast Transmitter. 3867913:1-3867913:10 - Tran Anh Khoa
, Cao Hoang Phuc, Pham Duc Lam
, Le Mai Bao Nhu, Nguyen Minh Trong, Nguyen Thi Hoang Phuong, Nguyen Van Dung, Nguyen Tan-Y
, Hoang Nam Nguyen
, Duc Ngoc Minh Dang
:
Waste Management System Using IoT-Based Machine Learning in University. 6138637:1-6138637:13 - Shujuan Wang
, Qian Zhang, Shuguang Lu:
NCaAC: Network Coding-Aware Admission Control for Prioritized Data Dissemination in Vehicular Ad Hoc Networks. 6758536:1-6758536:14 - Muhammad Imran
, Hasan Ali Khattak
, David E. Millard, Thanassis Tiropanis, Tariq Bashir, Ghufran Ahmed
:
Calculating Trust Using Multiple Heterogeneous Social Networks. 8545128:1-8545128:14 - Quang H. Nguyen
, Tuan-Dung Cao
:
A Novel Method for Recognizing Vietnamese Voice Commands on Smartphones with Support Vector Machine and Convolutional Neural Networks. 2312908:1-2312908:9 - Joshua Onyeka Ogbebor
, Agbotiname Lucky Imoize
, Aderemi Aaron-Anthony Atayero:
Energy Efficient Design Techniques in Next-Generation Wireless Communication Networks: Emerging Trends and Future Directions. 7235362:1-7235362:19 - Vankamamidi Srinivasa Naresh
, Reddi Sivaranjani, Nistala V. E. S. Murthy:
Secure Lightweight IoT Integrated RFID Mobile Healthcare System. 1468281:1-1468281:13 - Junhee Lee
, Sungjoo Kang
, Jaeho Jeon
, Ingeol Chun
:
Multiaccess Edge Computing-Based Simulation as a Service for 5G Mobile Applications: A Case Study of Tollgate Selection for Autonomous Vehicles. 9869434:1-9869434:15 - Shahzad Ashraf
, Mingsheng Gao
, Zheng Mingchen, Tauqeer Ahmed, Asif Raza, Hamad Naeem
:
USPF: Underwater Shrewd Packet Flooding Mechanism through Surrogate Holding Time. 9625974:1-9625974:12 - Zhenling Wang
, Zhangyou Peng
, Yongsheng Pei
, Haojia Wang
:
Performance Analysis of Cooperative NOMA Systems with Incremental Relaying. 4915638:1-4915638:15 - Zhicai Shi
, Xiaomei Zhang
, Jin Liu:
The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security. 8436917:1-8436917:12 - Fitsum Debebe Tilahun, Chung Gu Kang
:
Decentralized and Dynamic Band Selection in Uplink Enhanced Licensed-Assisted Access: Deep Reinforcement Learning Approach. 5937358:1-5937358:9 - Yongsheng Pei
, Zhangyou Peng
, Zhenling Wang
, Haojia Wang
:
Energy-Efficient Mobile Edge Computing: Three-Tier Computing under Heterogeneous Networks. 6098786:1-6098786:17 - Fatna El Mahdi
, Ahmed Habbani, Zaid Kartit, Bachir Bouamoud:
Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol. 1468976:1-1468976:9 - Pankaj Singh
, Byung Wook Kim
, Sung-Yoon Jung
:
Performance Analysis of Display Field Communication with Advanced Receivers. 3657309:1-3657309:14 - Mohammad Abu Hanif
, Sina Vafi:
A Novel Scheme of Product Polar Codes with High Efficiency and Rate Compatibility. 7573147:1-7573147:13 - Jiaqing Mo
, Wei Shen
, Weisheng Pan
:
An Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems. 5686498:1-5686498:13 - Chun Du, Shuai Ma
, Yang He, Songtao Lu, Hang Li, Han Zhang, Shiyin Li
:
Nonorthogonal Multiple Access for Visible Light Communication IoT Networks. 5791436:1-5791436:10 - Yuefang Sun, Kangkang Jin
, Zhaozhuang Guo, Chen Zhang, Hao Wang:
Research on Intelligent Guidance Optimal Path of Shared Car Charging in the IOT Environment. 3714879:1-3714879:13 - Cheng Zhang
, Dan He:
A Deep Multiscale Fusion Method via Low-Rank Sparse Decomposition for Object Saliency Detection Based on Urban Data in Optical Remote Sensing Images. 7917021:1-7917021:14 - Dianchen He, Li Li
:
A New Kinect-Based Posture Recognition Method in Physical Sports Training Based on Urban Data. 8817419:1-8817419:9 - Wanli Zhang, Xianwei Li
, Liang Zhao
, Xiaoying Yang:
Competition of Duopoly MVNOs for IoT Applications through Wireless Network Virtualization. 8880307:1-8880307:11 - Yuantao Chen
, Jiajun Tao, Qian Zhang, Kai Yang, Xi Chen, Jie Xiong, Runlong Xia, Jingbo Xie:
Saliency Detection via the Improved Hierarchical Principal Component Analysis Method. 8822777:1-8822777:12 - Rodney Martinez Alonso
, David Plets
, Margot Deruyck
, Luc Martens
, Glauco Guillen Nieto
, Wout Joseph:
Dynamic Interference Optimization in Cognitive Radio Networks for Rural and Suburban Areas. 2850528:1-2850528:16 - Guojiang Shen, Xiangyu Zhu, Wei Xu, Longfeng Tang, Xiangjie Kong
:
Research on Phase Combination and Signal Timing Based on Improved K-Medoids Algorithm for Intersection Signal Control. 3240675:1-3240675:11 - Imad Ez-Zazi
, Mounir Arioua, Ahmed El Oualkadi
:
Adaptive Joint Lossy Source-Channel Coding for Multihop IoT Networks. 2127467:1-2127467:15 - Jingke Dai
, Fenggan Zhang, Wenke Yang, Kai Kang:
An Efficient Design of Systematic Rateless Codes. 8068414:1-8068414:8 - Nan Zhao, Pengfei Fan, Yiqiang Cheng:
Dynamic Contract Incentives Mechanism for Traffic Offloading in Multi-UAV Networks. 2361029:1-2361029:11 - Fengquan Zhang
, Qiuming Wei, Zhaohui Wu:
A Coupled Grid-Particle Method for Fluid Animation on GPU. 8865931:1-8865931:13 - M. M. Kamruzzaman
:
Arabic Sign Language Recognition and Generating Arabic Speech Using Convolutional Neural Network. 3685614:1-3685614:9 - Xiaoyan Li, Hongbin Zhuang
, Shuming Zhou, Hongju Cheng, Cheng-Kuan Lin, Wenzhong Guo
:
Reliability Evaluation of Generalized Exchanged X-Cubes Based on the Condition of g-Good-Neighbor. 9793082:1-9793082:16 - Wesley Garey
, Yishen Sun
, Richard A. Rouil
:
Performance Evaluation of Proximity Services and Wi-Fi for Public Safety Mission Critical Voice Application. 8198767:1-8198767:12 - Ba Cao Nguyen
, Nguyen Nhu Thang, Tran Manh Hoang, Le The Dung:
Analysis of Outage Probability and Throughput for Energy Harvesting Full-Duplex Decode-and-Forward Vehicle-to-Vehicle Relay System. 3539450:1-3539450:10 - Leandro Miguel Lopez, Charmae Franchesca Mendoza, Jordi Casademont
, Daniel Camps-Mur:
Understanding the Impact of the PC5 Resource Grid Design on the Capacity and Efficiency of LTE-V2X in Vehicular Networks. 8156908:1-8156908:13 - Han Wang
, Wencai Du
, Xianpeng Wang, Guicai Yu, Lingwei Xu
:
Channel Estimation Performance Analysis of FBMC/OQAM Systems with Bayesian Approach for 5G-Enabled IoT Applications. 2389673:1-2389673:9 - Dazhou Li
, Chuan Lin
, Wei Gao
, Zeying Chen, Zeshen Wang, Guangqi Liu:
Capsules TCN Network for Urban Computing and Intelligence in Urban Traffic Prediction. 6896579:1-6896579:15 - Inam Ullah
, Xin Su
, Xuewu Zhang
, Dongmin Choi
:
Simultaneous Localization and Mapping Based on Kalman Filter and Extended Kalman Filter. 2138643:1-2138643:12 - Jaesung Park
:
Association Game for Conflict Resolution between UEs and Small Cells. 5801217:1-5801217:10 - Zhenquan Qin
, Xueyan Qiu, Jin Ye, Lei Wang:
User-Edge Collaborative Resource Allocation and Offloading Strategy in Edge Computing. 8867157:1-8867157:12 - Hua Wu, Ju Liu
, Zheng Dong, Yang Liu:
A Hybrid Mobile Node Localization Algorithm Based on Adaptive MCB-PSO Approach in Wireless Sensor Networks. 3845407:1-3845407:17 - Gleison O. Medeiros
, João C. W. A. Costa
, Diego Lisboa Cardoso
, Adam Dreyton Ferreira dos Santos
:
An Intelligent SDN Framework Based on QoE Predictions for Load Balancing in C-RAN. 7065202:1-7065202:15 - Zhigang Liu, Jin Shang
, Xufen Hua:
Smart City Moving Target Tracking Algorithm Based on Quantum Genetic and Particle Filter. 8865298:1-8865298:9 - Chen Li, Yi Yang, Kai Liu, Lihua Tian
:
A Semi-Fragile Video Watermarking Algorithm Based on H.264/AVC. 8848553:1-8848553:11 - Hui Li
, Jinjin Hua
, Jinqiu Li, Geng Li
:
Stock Forecasting Model FS-LSTM Based on the 5G Internet of Things. 7681209:1-7681209:7 - Jianbang Gao
, Zhaohui Yuan, Jing Zhou, Bin Qiu:
Artificial-Noise-Aided Energy-Efficient Secure Multibeam Wireless Communication Schemes Based on Frequency Diverse Array. 4715929:1-4715929:14 - Weiguang Wang
, Hui Li, Wenjie Zhang, Shanlin Wei:
Energy Efficiency for Data Offloading in D2D Cooperative Caching Networks. 2730478:1-2730478:11 - Shuai Hao
, Beiyi An, Hu Wen
, Xu Ma, Keping Yu
:
A Heterogeneous Image Fusion Method Based on DCT and Anisotropic Diffusion for UAVs in Future 5G IoT Scenarios. 8816818:1-8816818:11 - Azka Amin, Xi-Hua Liu
, Muhammad Asim Saleem
, Shagufta Henna
, Taseer-ul Islam, Imran Khan, Peerapong Uthansakul
, Muhammad Zeshan Qurashi, Seyed Sajad Mirjavadi
, Masoud Forsat:
Collaborative Wireless Power Transfer in Wireless Rechargeable Sensor Networks. 9701531:1-9701531:13 - Wentao Zhao
, Ping Dong
, Min Guo
, Yuyang Zhang
, Xuehong Chen:
BSS: A Burst Error-Correction Scheme of Multipath Transmission for Mobile Fog Computing. 8846545:1-8846545:10 - Shanshan Yu
, Ju Liu
, Jing Wang, Inam Ullah
:
Adaptive Double-Threshold Cooperative Spectrum Sensing Algorithm Based on History Energy Detection. 4794136:1-4794136:12 - Binbin Huang, Zhongjin Li
, Yunqiu Xu, Linxuan Pan, Shangguang Wang
, Haiyang Hu, Victor Chang
:
Deep Reinforcement Learning for Performance-Aware Adaptive Resource Allocation in Mobile Edge Computing. 2765491:1-2765491:17 - Mehedi Masud
, Ghulam Muhammad
, M. Shamim Hossain
, Hesham Alhumyani, Sultan S. Alshamrani
, Omar Cheikhrouhou, Saleh Ibrahim
:
Light Deep Model for Pulmonary Nodule Detection from CT Scan Images for Mobile Devices. 8893494:1-8893494:8 - Gen Liang
, Guoxi Sun, Jingcheng Fang, Xiaoxue Guo
, Hewei Yu:
An Access Selection Algorithm for Heterogeneous Wireless Networks Based on Optimal Resource Allocation. 8844015:1-8844015:13 - Na Ye
, Xin Qin, Lili Dong, Xiang Zhang, Kangkang Sun:
Chinese Named Entity Recognition Based on Character-Word Vector Fusion. 8866540:1-8866540:7 - Jiarong Liang, Meng Yi
, Yanyan Li, Xinyu Liang:
The Construction of a Virtual Backbone with a Bounded Diameter in a Wireless Network. 5602325:1-5602325:14 - Chunkai Zhang
, Zilin Du
, Yiwen Zu
:
An Efficient Algorithm for Extracting High-Utility Hierarchical Sequential Patterns. 8816228:1-8816228:12 - Zhixiong Chen
, Nan Xiao, Dongsheng Han:
A Multilevel Mobile Fog Computing Offloading Model Based on UAV-Assisted and Heterogeneous Network. 8833722:1-8833722:11 - Qifei Zhao, Gaocai Wang
, Ying Peng, Yuting Lu:
OEDDBOS: An Efficient Data Distributing Strategy with Energy Saving in Sensor-Cloud Systems. 4380462:1-4380462:14 - Yongfeng Xing
, Luo Zhong, Xian Zhong:
An Encoder-Decoder Network Based FCN Architecture for Semantic Segmentation. 8861886:1-8861886:9 - Tao Zhang, Kun Zhao, Ming Yang
, Tilei Gao, Wanyu Xie:
Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov. 8888296:1-8888296:11 - Ruo-Nan Yang, Wei-Tao Zhang
, Shun-Tian Lou:
Joint Adaptive Blind Channel Estimation and Data Detection for MIMO-OFDM Systems. 2508130:1-2508130:9 - Mehedi Masud
, Hesham Alhumyani, Sultan S. Alshamrani
, Omar Cheikhrouhou, Saleh Ibrahim
, Ghulam Muhammad
, M. Shamim Hossain
, Mohammad Shorfuzzaman
:
Leveraging Deep Learning Techniques for Malaria Parasite Detection Using Mobile Application. 8895429:1-8895429:15 - P. Muneer
, V. P. Thafasal Ijyas, Mohamed Abbas
, Hassen Loukil
, Ali Algahtani
, Amir Kessentini, Abdul Wase Mohammed:
A Novel Non-DC Biased Intensity Modulated Indoor MIMO-VLC System Using Walsh Precoder. 1437049:1-1437049:9 - Jie Shen
, Mengxi Xu, Xinyu Du, Yunbo Xiong:
Superresolution Reconstruction of Video Based on Efficient Subpixel Convolutional Neural Network for Urban Computing. 8865110:1-8865110:11 - Adil Hilmani
, Abderrahim Maizate
, Larbi Hassouni:
Hierarchical Protocol Based on Recursive Clusters for Smart Parking Applications Using Internet of Things (IOT). 9179530:1-9179530:21 - Hui Guo, Xuejiao Guo, Chao Deng
, Shangqing Zhao:
Performance Analysis of IQI Impaired Cooperative NOMA for 5G-Enabled Internet of Things. 3812826:1-3812826:12 - Tianyu Chi, Baodong Qin
, Dong Zheng:
An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things. 8816172:1-8816172:11 - Cuong V. Nguyen, Minh Tuan Nguyen
, Toan V. Quyen, Anh M. Le, Linh H. Truong:
The Hybrid Solar-RF Energy for Base Transceiver Stations. 8875760:1-8875760:10 - Yi Jiang
, Yu Xia, Xinyue Cheng, Yuntao Xu:
A Mutual Selection Mechanism of Ride-Hailing Based on Hidden Points. 9520384:1-9520384:9 - Benchao Wang, Pan Qin
, Hong Gu:
Multistep-Ahead Prediction of Urban Traffic Flow Using GaTS Model. 8877731:1-8877731:10 - Muhammad Sajjad Khan, Liaqat Khan, Noor Gul, Muhammad Amir, Junsu Kim, Su Min Kim
:
Support Vector Machine-Based Classification of Malicious Users in Cognitive Radio Networks. 8846948:1-8846948:11 - Xueying Guo, Wenming Wang, Haiping Huang
, Qi Li, Reza Malekian:
Location Privacy-Preserving Method Based on Historical Proximity Location. 8892079:1-8892079:16 - Xingyu He, Guisong Yang
:
CARTA: Coding-Aware Routing via Tree-Based Address. 4730594:1-4730594:16 - S. Tephillah
, J. Martin Leo Manickam:
An SETM Algorithm for Combating SSDF Attack in Cognitive Radio Networks. 9047809:1-9047809:9 - Xuejing Li
, Yajuan Qin
, Huachun Zhou, Du Chen, Shujie Yang, Zhewei Zhang:
An Intelligent Adaptive Algorithm for Servers Balancing and Tasks Scheduling over Mobile Fog Computing Networks. 8863865:1-8863865:16 - Chuang Li, Dantong Ouyang, Xiaoyu Wang, Wei Wei
:
An Intelligent Planning-Based Modeling Method for Diagnosis and Repair. 8887933:1-8887933:10 - Jamal A. Hassan
, Samah A. Mustafa:
Capacity of Cooperative Spatial Modulation (CSM) System with Optimum Relay Selection. 8345878:1-8345878:10 - Yikun Huang
, Xingsi Xue
, Chao Jiang
:
Semantic Integration of Sensor Knowledge on Artificial Internet of Things. 8815001:1-8815001:8 - Dezhi An
, Shengcai Zhang, Jun Lu, Yan Li:
Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT. 8892838:1-8892838:9 - Ali Behmanesh
, Nasrin Sayfouri, Farahnaz Sadoughi
:
Technological Features of Internet of Things in Medicine: A Systematic Mapping Study. 9238614:1-9238614:27 - Haifeng Jiang, Xiaoxiao Liu
, Shuo Xiao, Chaogang Tang, Wei Chen
:
Physarum-Inspired Autonomous Optimized Routing Protocol for Coal Mine MANET. 8816718:1-8816718:14 - Hao Meng, Wasswa Shafik
, S. Mojtaba Matinkhah
, Zubair Ahmad:
A 5G Beam Selection Machine Learning Algorithm for Unmanned Aerial Vehicle Applications. 1428968:1-1428968:16