


default search action
Mobile Networks and Applications, Volume 24
Volume 24, Number 1, February 2019
- Shuai Liu

, Zhaojun Li, Yudong Zhang
, Xiaochun Cheng
:
Introduction of Key Problems in Long-Distance Learning and Training. 1-4 - Shuai Liu

, Gaocheng Liu, Huiyu Zhou
:
A Robust Parallel Object Tracking Method for Illumination Variations. 5-17 - Yun Lin

, Sen Wang, Qidi Wu, Lei Chen
:
Key Technologies and Solutions of Remote Distributed Virtual Laboratory for E-Learning and E-Education. 18-24 - Bing Jia, Lifei Hao

, Chuxuan Zhang, Huili Zhao, Khan Muhammad
:
An IoT Service Aggregation Method Based on Dynamic Planning for QoE Restraints. 25-33 - Hao Zhang, Tao Huang, Zhihan Lv

, Sanya Liu, Heng Yang:
MOOCRC: A Highly Accurate Resource Recommendation Model for Use in MOOC Environments. 34-46 - Umar Ali, Amjad Mehmood

, Muhammad Faran Majeed
, Siraj Muhammad, Muhammad Kamal Khan
, Houbing Song
, Khalid Mahmood Malik
:
Innovative Citizen's Services through Public Cloud in Pakistan: User's Privacy Concerns and Impacts on Adoption. 47-68 - Xiao Ma, Yin Zhang

, Jiangfeng Zeng:
Newly Published Scientific Papers Recommendation in Heterogeneous Information Networks. 69-79 - Phan Cong Vinh:

Context-Aware Systems and Applications (ICCASA 2018) and Nature of Computation and Communication (ICTCC 2018). 80-81 - Abdur Rakib

, Ijaz Uddin:
An Efficient Rule-Based Distributed Reasoning Framework for Resource-bounded Systems. 82-99 - Shuangqing Xiang, Xi Wu, Huibiao Zhu, Wanling Xie, Lili Xiao, Phan Cong Vinh

:
Modeling and Verifying Basic Modules of Floodlight. 100-114 - Phuong Luu Vo

, Tuan-Anh Le
, Nguyen Hoang Tran
:
mFAST: A Multipath Congestion Control Protocol for High Bandwidth-Delay Connection. 115-123 - Hong Anh Le

, Anh Tu Bui, Ninh-Thuan Truong:
An Approach to Modeling and Estimating Power Consumption of Mobile Applications. 124-133 - Wanling Xie, Huibiao Zhu, Xi Wu, Phan Cong Vinh

:
Formal Verification of mCWQ Using Extended Hoare Logic. 134-144 - Attasit Patanasiri

, Donyaprueth Krairit:
A Comparative Study of Consumers' Purchase Intention on Different Internet Platforms. 145-159 - Cheonshik Kim, Byung-Gyu Kim, Joel J. P. C. Rodrigues:

Editorial: Recent Advances in Mining Intelligence and Context-Awareness on IoT-Based Platforms. 160-162 - Haein Kim, Geunho Yang, Hosang Jung

, Sang Ho Lee, Jae Joon Ahn:
An Intelligent Product Recommendation Model to Reflect the Recent Purchasing Patterns of Customers. 163-170 - Haibo Ye

, Kai Dong, Tao Gu
, Zhiqiu Huang:
SMinder: Detect a Left-behind Phone using Sensor-based Context Awareness. 171-183 - Duhoe Kim, Dongil Shin, Dongkyoo Shin, Yong-Hyun Kim:

Attack Detection Application with Attack Tree for Mobile System using Log Analysis. 184-192 - Vishnu Vidyadhara Raju Vegesna, Krishna Gurugubelli

, Anil Kumar Vuppala:
Application of Emotion Recognition and Modification for Emotional Telugu Speech Recognition. 193-201 - Sanjay Chatterji

:
Recommending the Best Merchant from Previous Transactions. 202-207 - Jong-Hyeok Lee, Gwang-Soo Hong, Young-Woon Lee

, Chang-Ki Kim, Noik Park, Byung-Gyu Kim:
Design of Efficient Key Video Frame Protection Scheme for Multimedia Internet of Things (IoT) in Converged 5G Network. 208-220 - Anandakumar Haldorai

, Arulmurugan Ramu
, Chee-Onn Chow
:
Editorial: Big Data Innovation for Sustainable Cognitive Computing. 221-223 - R. M. Bommi

, S. Selvakumar Raja:
High Performance Reversible Direct Data Synthesizer for Radio Frequency Applications. 224-233 - Geetha S.

, Deepalakshmi P.
:
Enhanced Energy in Sensors by Avoiding Voids and Saving Sensitive Data on Cloud Using B+ Tree Index with Retrieval of Query Predicates. 234-247 - Muhammad Asim Saleem

, Shijie Zhou, Abida Sharif
:
Data Transmission Using IoT in Vehicular Ad-Hoc Networks in Smart City Congestion. 248-258 - S. Nithya, C. Gomathy

:
Smaclad: Secure Mobile Agent Based Cross Layer Attack Detection and Mitigation in Wireless Network. 259-270 - D. Shanthi

, S. Vengataasalam:
Dominance Lagrange Optimized Rule Generation for Decision Table Evaluation. 271-281 - T. Prasanth

, M. Gunasekaran:
Effective Big Data Retrieval Using Deep Learning Modified Neural Networks. 282-294
Volume 24, Number 2, April 2019
- Pasumpon Pandian

, Joy Iong-Zong Chen, Zubair A. Baig
:
Editorial: Sustainable Mobile Networks and its Applications. 295-297 - J. Reshma, T. Satish Kumar

, B. A. Vani, S. Sakthivel
:
Big Data Oriented Energy Aware Routing for Wireless Sensor Networks. 298-306 - P. Tamil Selvi

, C. Suresh Gnana Dhas:
A Novel Algorithm for Enhancement of Energy Efficient Zone Based Routing Protocol for MANET. 307-317 - M. Padmavathi

, R. M. Suresh:
Secure P2P Intelligent Network Transaction using Litecoin. 318-326 - Giri Prasad Raman

, Venkatesan Perumal:
Group Based Multi-Channel Synchronized Spectrum Sensing in Cognitive Radio Network with 5G. 327-339 - C. Murugesan, C. N. Marimuthu

:
Cost optimization of PV-Diesel Systems in Nanogrid Using L J Cuckoo Search and its Application in Mobile Towers. 340-349 - M. Sabrigiriraj

, K. Manoharan
:
Wavelength Allotment for All-to-All Broadcast in WDM Optical Modified Linear Array for Reliable Communication. 350-356 - P. Supraja, R. Pitchai, Raja

:
Spectrum Prediction in Cognitive Radio with Hybrid Optimized Neural Network. 357-364 - Haijun Liu, Xiaobing Liu:

A Novel Research on the Influence of Enterprise Culture on Internal Control in big Data and Internet of Things. 365-374 - C. Nallusamy, A. Sabari:

Particle Swarm Based Resource Optimized Geographic Routing for Improved Network Lifetime in MANET. 375-385 - G. Arulkumaran

, Ramaswamy Kannan Gnanamurthy
:
Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network. 386-393 - Subramanian Balaji

, Eanoch Golden Julie, Yesudhas Harold Robinson
:
Development of Fuzzy based Energy Efficient Cluster Routing Protocol to Increase the Lifetime of Wireless Sensor Networks. 394-406 - T. Ramraj, R. Prabhakar:

Influence of Krylov subspace in Graph Isomorphism for Mobile Networks. 407-419 - Nandhakumar Ramachandran

, Varalakshmi Perumal:
Target Aucourant Data Dissemination by Collaboratory Sensing in IOT Environment. 420-433 - Navuri Prema Kumar:

Efficient Secure Aggregation in VANETs Using Fully Homomorphic Encryption (FHE). 434-442 - Trung Quang Duong, Nguyen-Son Vo

:
Editorial: Wireless Communications and Networks for 5G and Beyond. 443-446 - Hassan N. Noura

, Reem Melki, Ali Chehab
, Mohammad M. Mansour:
A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach. 447-463 - Quoc-Tuan Vien

, Tuan Anh Le, Huan Xuan Nguyen
, Tho Le-Ngoc:
A Physical Layer Network Coding Based Modify-and-Forward with Opportunistic Secure Cooperative Transmission Protocol. 464-479 - Cheng Yin

, Emiliano Garcia-Palacios:
Performance Analysis for Secure Cooperative Systems Under Unreliable Backhaul Over Nakagami-m Channels. 480-490 - Yan Lei

, Gang Zhu, Chao Shen, Yanqing Xu
, Xiaozhou Zhang:
Delay-Aware User Association and Power Control for 5G Heterogeneous Network. 491-503 - Truong-Xuan Do, Younghan Kim

:
State Management Function Placement for Service-Based 5G Mobile Core Architecture. 504-516 - Ahmed Mohammed Nor

, Ehab Mahmoud Mohamed
:
Li-Fi Positioning for Efficient Millimeter Wave Beamforming Training in Indoor Environment. 517-531 - Hua Qu, Gongye Ren

, Ji-hong Zhao, Youwei Shi, Zhenjie Tan:
Performance Analysis of the Content Dissemination Mechanism with Proactive Content Fetching and Full-Duplex D2D Communication: an Evolutionary Perspective. 532-555 - Ishtiaq Ahmad

, Zeeshan Kaleem
, Ramsha Narmeen
, Long Dinh Nguyen, Dac-Binh Ha:
Quality-of-Service Aware Game Theory-Based Uplink Power Control for 5G Heterogeneous Networks. 556-563 - Sebastián Rodríguez, Antonio Jurado-Navas

, Juan Jose Vegas Olmos, Idelfonso Tafur Monroy
:
Analytical and Experimental Performance Evaluation of Antenna Misalignment in Ka-band Wireless Links. 564-577 - Alaa A. R. Alsaeedy

, Edwin K. P. Chong:
Tracking Area Update and Paging in 5G Networks: a Survey of Problems and Solutions. 578-595 - Dac-Binh Ha, Sang Quang Nguyen

, Huy T. Nguyen
:
Cooperative Cognitive Non-Orthgonal Multiple Access Under Unreliable Backhaul Connections. 596-617 - Shahira H. Amin

, Ahmed Hesham Mehana, Yasmine A. Fahmy, Samy S. Soliman
:
Maximizing the Number of Users in Clustered MIMO-NOMA Systems Under Rate Constraints. 618-629 - Tran Manh Hoang

, Xuan Nam Tran
, Nguyen Thanh, Le The Dung
:
Performance Analysis of MIMO SWIPT Relay Network with Imperfect CSI. 630-642 - Jaewon Ahn, Joohyung Lee

, Sangdon Park, Hong-Shik Park:
Power Efficient Clustering Scheme for 5G Mobile Edge Computing Environment. 643-652 - Jaime Lloret, Sandra Sendra, Elsa María Macías López

:
Editorial: Advances in Green Communications and Networking. 653-656 - Alberto Huertas Celdrán

, Manuel Gil Pérez
, Félix J. García Clemente
, Gregorio Martínez Pérez:
Policy-Based Management for Green Mobile Networks Through Software-Defined Networking. 657-666 - José Miguel Jiménez

, Oscar Romero
, Jaime Lloret, Juan R. Diaz:
Energy Savings Consumption on Public Wireless Networks by SDN Management. 667-677 - Sandra Sendra

, Jaime Lloret, Raquel Lacuesta
, José Miguel Jiménez
:
Energy Efficiency in Cooperative Wireless Sensor Networks. 678-687 - Domingo Marrero

, Elsa M. Macías
, Álvaro Suárez Sarmiento, Jose Aurelio Santana
, Vicente E. Mena
:
A Method for Power Saving in Dense WiFi Networks. 688-699 - Domingo Marrero

, Elsa M. Macías
, Álvaro Suárez Sarmiento, Jose Aurelio Santana
, Vicente E. Mena
:
Energy Saving in Smart City Wireless Backbone Network for Environment Sensors. 700-711 - Juan F. Valenzuela-Valdés

, Francisco Luna
, Pablo Padilla
, José Luis Padilla
, Rafael Marcos Luque
, Juan Enrique Agudo:
Securing and Greening Wireless Sensor Networks with Beamforming. 712-720
Volume 24, Number 3, June 2019
- Der-Jiunn Deng, Ai-Chun Pang, Lajos Hanzo:

Editorial: Recent Advances in IoT as a Service (IoTaas 2017). 721-723 - Chung-Yun Hsiao

, Chih-Chieh Huang, Yi-Bing Lin, Yun-Wei Lin:
Flower Sermon: An Interactive Visual Design Using IoTtalk. 724-735 - Tzong-Shyan Lin, Pei-Yu Liu, Chun-Cheng Lin

:
Home Healthcare Matching Service System Using the Internet of Things. 736-747 - Bingxian Lu, Lei Wang, Jialin Liu, Wei Zhou, Linlin Guo, Myeong-Hun Jeong, Shaowen Wang, Guangjie Han

:
LaSa: Location Aware Wireless Security Access Control for IoT Systems. 748-760 - Fekher Khelifi

, Abbas Bradai, Abderrahim Benslimane, Priyanka Rawat, Mohamed Atri
:
A Survey of Localization Systems in Internet of Things. 761-785 - Lun-Ping Hung, Yuan-Hung Chao

, Chien-Liang Chen
:
A Hybrid Key Item Locating Method to Assist Elderly Daily Life Using Internet of Things. 786-795 - Mahda Noura

, Mohammed Atiquzzaman
, Martin Gaedke
:
Interoperability in Internet of Things: Taxonomies and Open Challenges. 796-809 - Ming-Fong Tsai, Thanh Nam Pham, Fu-Hsiang Ching, Le-Hung Chen:

Evaluation of the Effect of Variations in Vehicle Velocity and Channel Bandwidth on an Image-Streaming System in Vehicular Networks. 810-828 - Hai-Cheng Chu, Chun-Hsien Sung, Hui-Lin Lee:

The Digital Fingerprinting Analysis of Generic Twitter Sessions from Internet of Things Security Aspect. 829-838 - Hsing-Chung Chen

:
Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application. 839-852 - Fang-Chang Kuo

:
Assessment of LTE Wireless Accessing for Managing Traffic Flow of IoT Services. 853-863 - Kuo-Chang Ting, WenYen Lin, Chiapin Wang:

Loading Aware Green Power Control (LAGPC) for the Mitigation of Co-Tier Downlink Interference for Femtocell in the Future 5G Networks. 864-877 - José María de Fuentes

, Lorena González-Manzano, Javier López, Pedro Peris-Lopez
, Kim-Kwang Raymond Choo
:
Editorial: Security and Privacy in Internet of Things. 878-880 - Ana Nieto

, Antonio Acien, Gerardo Fernandez:
Crowdsourcing Analysis in 5G IoT: Cybersecurity Threats and Mitigation. 881-889 - Alzubair Hassan, Anyembe Andrew Omala

, Mohamed Ali, Chunhua Jin, Fagen Li
:
Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity. 890-902 - Maryam Zarezadeh, Hamid Mala:

Determining Honesty of Accuser Nodes in Key Revocation Procedure for MANETs. 903-912 - Pradip Kumar Sharma

, Jin Ho Park, Young-Sik Jeong, Jong Hyuk Park
:
SHSec: SDN based Secure Smart Home Network Architecture for Internet of Things. 913-924 - Sebastian Pape

, Kai Rannenberg:
Applying Privacy Patterns to the Internet of Things' (IoT) Architecture. 925-933 - Bei Liang

, Aikaterini Mitrokotsa
:
Decentralised Functional Signatures. 934-946 - Yan Zhang, Mithun Mukherjee, Celimuge Wu

, Ming-Tuo Zhou:
Editorial: Advanced Industrial Networks with IoT and Big Data. 947-949 - Wenhui Zhou, Jie Wu, Weifeng Zhong

, Haochuan Zhang, Lei Shu
, Rong Yu:
Optimal and Elastic Energy Trading for Green Microgrids: a two-Layer Game Approach. 950-961 - Song Guo, Deze Zeng, Lin Gu, Jiangtao Luo:

When Green Energy Meets Cloud Radio Access Network: Joint Optimization Towards Brown Energy Minimization. 962-970 - Li Liu, Guangjie Han

, Jiawei Shen, Wenbo Zhang, Yuxin Liu:
Diffusion Distance-Based Predictive Tracking for Continuous Objects in Industrial Wireless Sensor Networks. 971-982 - Xiaolin Jiang, Hossein Shokri Ghadikolaei, Carlo Fischione

, Zhibo Pang
:
A Simplified Interference Model for Outdoor Millimeter-wave Networks. 983-990 - Zhi Liu

, Toshitaka Tsuda, Hiroshi Watanabe
, Satoko Ryuo, Nagateru Iwasawa:
Data Driven Cyber-Physical System for Landslide Detection. 991-1002 - Ke Zhang, Yuming Mao, Supeng Leng, Sabita Maharjan, Alexey V. Vinel, Yan Zhang:

Contract-theoretic Approach for Delay Constrained Offloading in Vehicular Edge Computing Networks. 1003-1014 - Vijayakumar Varadarajan

, Neelanarayanan Venkataraman
, Ron Doyle, Imad Fakhri Alshaikhli, Sven Groppe
:
Emerging Solutions in Big Data and Cloud Technologies for Mobile Networks. 1015-1017 - Logesh Ravi

, V. Subramaniyaswamy
, Vijayakumar Varadharajan
, Xiong Li
:
Efficient User Profiling Based Intelligent Travel Recommender System for Individual and Group of Users. 1018-1033 - (Withdrawn) E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption. 1034-1045

- Marimuthu Karuppiah

, Ashok Kumar Das, Xiong Li
, Saru Kumari
, Fan Wu
, Shehzad Ashraf Chaudhry
, Niranchana Radhakrishnan
:
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment. 1046-1062 - Avinab Marahatta

, Youshi Wang, Fa Zhang, Arun Kumar Sangaiah
, Sumarga Kumar Sah Tyagi
, Zhiyong Liu:
Energy-Aware Fault-Tolerant Dynamic Task Scheduling Scheme for Virtualized Cloud Data Centers. 1063-1077 - Khalim Amjad Meerja

, Praveen Vummadisetty Naidu
, Sri Rama Krishna Kalva
:
Price Versus Performance of Big Data Analysis for Cloud Based Internet of Things Networks. 1078-1094 - Idris Winarno

, Yoshiteru Ishida, Takeshi Okamoto:
A Performance Evaluation of Resilient Server with a Self-Repair Network Model. 1095-1103 - K. Anitha Kumari

, G. Sudha Sadasivam
:
Two-Server 3D ElGamal Diffie-Hellman Password Authenticated and Key Exchange Protocol Using Geometrical Properties. 1104-1119 - Ahmed Ben Said

, Abdelkarim Erradi, Azadeh Ghari Neiat
, Athman Bouguettaya
:
A Deep Learning Spatiotemporal Prediction Framework for Mobile Crowdsourced Services. 1120-1133 - Bing Jia, Lifei Hao, Chuxuan Zhang, Huili Zhao, Khan Muhammad

:
Correction to: An IoT Service Aggregation Method Based on Dynamic Planning for QoE Restraints. 1134
Volume 24, Number 4, August 2019
- Vijayakumar Varadarajan, Neelanarayanan Venkataraman, Ron Doyle, Imad Fakhri Alshaikhli, Sven Groppe

:
Editorial: Mobile Networks in the Era of Big Data. 1135-1138 - G. Ananthachari Preethi

, P. Gauthamarayathirumal, C. Chandrasekar
:
Vertical Handover Analysis Using Modified MADM Method in LTE. 1139-1151 - S. Lavanya, N. M. Saravana Kumar, V. Vijayakumar, S. Thilagam:

Secured Key Management Scheme for Multicast Network Using Graphical Password. 1152-1159 - M. Surya Prabha, B. Sarojini:

Online Healthcare Information Adoption Assessment Using Text Mining Techniques. 1160-1165 - S. Rajkumar

, G. Malathi
:
Impact of Image Artifact and Solution to the Image Quality Issues in Real Time SAR Images. 1166-1173 - Bharathiraja S

, B. Rajesh Kanna
:
Anti-Forensics Contrast Enhancement Detection (AFCED) Technique in Images Based on Laplace Derivative Histogram. 1174-1180 - Abdul Quadir Muhammed

, Vijayakumar Varadarajan, Karan Mandal:
Efficient Algorithm for Identification and Cache Based Discovery of Cloud Services. 1181-1197 - Abdul Quadir Muhammed

, Vijayakumar Varadarajan, Karan Mandal:
Correction to: Efficient Algorithm for Identification and Cache Based Discovery of Cloud Services. 1198 - Joshua Christy Jackson

, Duraisamy Rekha, Vijayakumar Varadarajan:
A Reputation based Weighted Clustering Protocol in VANET: A Multi-objective Firefly Approach. 1199-1209 - Nikolas Klug, Alok Chauhan

, V. Vijayakumar, Ramesh Ragala
:
k-RNN: Extending NN-heuristics for the TSP. 1210-1213 - Prassanna Jayachandran

, Neelanarayanan Venkataraman
:
Threshold Based Multi-Objective Memetic Optimized Round Robin Scheduling for Resource Efficient Load Balancing in Cloud. 1214-1225 - Logesh Ravi

, V. Subramaniyaswamy
, Varadarajan Vijayakumar, Siguang Chen, A. Karmel, Malathi Devarajan
:
Hybrid Location-based Recommender System for Mobility and Travel Planning. 1226-1239 - Linda Joseph

, Rajeswari Mukesh:
Securing and Self recovery of Virtual Machines in cloud with an Autonomic Approach using Snapshots. 1240-1248 - Ajay D. M.

, E. Umamaheswari:
Packet Encryption for Securing Real-Time Mobile Cloud Applications. 1249-1254 - Mohammed N. M. Ali

, M. M. Hafizur Rahman
, Rizal Bin Mohd. Nor
, Dhiren Kumar Behera
, Tengku Mohd Tengku Sembok, Yasuyuki Miura, Yasushi Inoguchi:
SCCN: A Time-Effective Hierarchical Interconnection Network for Network-On-Chip. 1255-1264 - Muhammad Alam, Ting Wu, Fazlullah Khan

, Yuanfang Chen:
Editorial: Securing Internet of Things Through Big Data Analytics. 1265-1268 - Lingyan Fan, Wuyi Sun, Guorui Feng:

Image Steganalysis via Random Subspace Fisher Linear Discriminant Vector Functional Link Network and Feature Mapping. 1269-1278 - Jia Liu, Mingchu Li, Muhammad Alam, Yuanfang Chen, Ting Wu:

A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism. 1279-1294 - Syed Rooh Ullah Jan

, Mian Ahmad Jan
, Rahim Khan
, Hakeem Ullah, Muhammad Alam, Muhammad Usman
:
An Energy-Efficient and Congestion Control Data-Driven Approach for Cluster-Based Sensor Network. 1295-1305 - Haroon Khan, Mian Ahmad Jan

, Muhammad Alam, Wael Dghais:
A Channel Borrowing Approach for Cluster-based Hierarchical Wireless Sensor Networks. 1306-1316 - Weitong Hu, Ye Yao

, Di Zhou, Qiuhua Zheng, Kim-Kwang Raymond Choo
:
A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method. 1317-1335 - Guangpei Cong, Duhui Lu, Yunrong Lv, Yi He:

A Novel Industrial Safety IoTs Architecture for External Corrosion Perception Based on Infrared. 1336-1345 - Song Guo, Zhen Liu, Peng Li:

Editorial: Big Data and Cyber-Physical-Social Computing. 1346-1347 - J. V. Bibal Benifa

, Dejey Dharma
:
RLPAS: Reinforcement Learning-based Proactive Auto-Scaler for Resource Provisioning in Cloud Environment. 1348-1363 - Rachad Atat

, Lingjia Liu
, Jinsong Wu
, Jonathan D. Ashdown, Yang Yi:
Green Massive Traffic Offloading for Cyber-Physical Systems over Heterogeneous Cellular Networks. 1364-1372 - Xiaoping Fan, Zhijie Chen, Fei Cai, Jinsong Wu

, Shengzong Liu, Zhining Liao, Zhifang Liao
:
Local Core Members Aided Community Structure Detection. 1373-1381 - Zhifang Liao, Benhong Zhao, Shengzong Liu, Haozhi Jin, Dayu He, Liu Yang, Yan Zhang, Jinsong Wu

:
A Prediction Model of the Project Life-Span in Open Source Software Ecosystem. 1382-1391 - Munish Bhatia

, Sandeep K. Sood
:
Exploring Temporal Analytics in Fog-Cloud Architecture for Smart Office HealthCare. 1392-1410
Volume 24, Number 5, October 2019
- Bo Li, Song Xiao, Yong Li:

Editorial: Networking and Communications for the Next Generation IoT. 1411-1413 - Gunasekaran Raja

, Anil Thomas
:
SAFER: Crowdsourcing Based Disaster Monitoring System Using Software Defined Fog Computing. 1414-1424 - Run Zhou, Bo Li, Mao Yang

, Zhongjiang Yan
, Annan Yang:
DRA-OFDMA: Double Random Access Based QoS Oriented OFDMA MAC Protocol for the Next Generation WLAN. 1425-1436 - Ruonan Zhang

, Xiaoshen Song
, Jianping Pan
, Jiajia Liu
:
Stochastic Cooperative Communications Using a Geometrical Probability Approach for Wireless Networks. 1437-1451 - Jie Zheng

, Ling Gao, Hai Wang, Xiaoya Li, Pengfei Xu, Lin Wang, Bo Jiang, Xudong Yang:
Joint Downlink and Uplink Edge Computing Offloading in Ultra-Dense HetNets. 1452-1460 - Qiao Qu, Bo Li, Mao Yang

, Zhongjiang Yan
, Annan Yang, Der-Jiunn Deng, Kwang-Cheng Chen
:
Survey and Performance Evaluation of the Upcoming Next Generation WLANs Standard - IEEE 802.11ax. 1461-1474 - Wen-Shu Lai, Yi-Bing Lin, Chung-Yun Hsiao

, Li-Kuan Chen, Chao-Fan Wu, Shu-Min Lin:
FrameTalk: Human and Picture Frame Interaction through the IoT Technology. 1475-1485 - Mohammad Alaei

, Fahimeh Yazdanpanah:
EELCM: An Energy Efficient Load-Based Clustering Method for Wireless Mobile Sensor Networks. 1486-1498 - Hemanta Kumar Sahu

, P. R. Sahu:
ABEP Performance of AF System Employing QSSK over IoT Network. 1499-1508 - Jacob John

, Paul Rodrigues:
MOTCO: Multi-objective Taylor Crow Optimization Algorithm for Cluster Head Selection in Energy Aware Wireless Sensor Network. 1509-1525 - Weiqiang Shen, Chuanlin Zhang, Jinglun Shi

:
Weak k-Barrier Coverage Problem in Underwater Wireless Sensor Networks. 1526-1541 - Tianjiao Xie

:
SDSN: Software-defined Space Networking - Architecture and Routing Algorithm. 1542-1554 - Assia Naja

, Mohammed Boulmalf, Mohamed Essaaidi
:
A Distributed Priority-Based Rebroadcasting Protocol for VANETs: Mitigating the Storm Problem. 1555-1568 - Bo Li, Lijun Qian, Daji Qiao, Shihai Shao:

Editorial: MAC for the Next Generation Networks in Unlicensed Band. 1569-1571 - Annan Yang, Bo Li, Mao Yang

, Zhongjiang Yan
:
Concept and Analysis of Capacity Entropy for Uplink Multi-User Media Access Control for the Next-Generation WLANs. 1572-1586 - Yi-Bing Lin, Hung-Chun Tseng, Li-Chang Wang

, Ling-Jyh Chen
:
Performance of Splitting LTE-WLAN Aggregation. 1587-1595 - Shao-Yu Lien, You-Lin Shiau, Der-Jiunn Deng

:
Throughput Analysis of 3GPP Licensed-Assisted Access Using Multiple Carriers. 1596-1602 - Yong Niu

, Liren Yu, Yong Li, Zhangdui Zhong, Bo Ai, Sheng Chen
:
Device-to-Device Communications Enabled Multicast Scheduling with the Multi-level Codebook in mmWave Small Cells. 1603-1617 - Rongfei Fan

, Song Jin, Qi Gu, Gongpu Wang:
Data-Driven Power Allocation for Medium Access Control in LTE-U Coexisting with Wi-Fi. 1618-1629 - Low Jun Wei, Joanne Mun-Yee Lim:

Identifying Transmission Opportunity through Transmission Power and Bit Rate for Improved VANET Efficiency. 1630-1638 - Oscar Mayora

, Luis Enrique Sucar:
Editorial: Applications of Future Internet. 1639-1640 - Youna Jung

:
Community-Based Localized Disaster Response through Temporary Social Overlay Networks. 1641-1653 - Michele Roncalli, Filippo Bistaffa

, Alessandro Farinelli
:
Decentralized Power Distribution in the Smart Grid with Ancillary Lines - An Approach Based on Distributed Constraint Optimization. 1654-1662 - Fadi Al-Turjman:

Cognitive-Node Architecture and a Deployment Strategy for the Future WSNs. 1663-1681 - Fernando Lezama

, Jorge Palominos, Ansel Y. Rodríguez-González
, Alessandro Farinelli
, Enrique Munoz de Cote:
Agent-Based Microgrid Scheduling: An ICT Perspective. 1682-1698 - Jia Hu, Kun Yang, Victor C. M. Leung, Ke Xu:

Guest Editorial: Smart Grid Inspired Data Sensing, Processing and Networking Technologies. 1699-1700 - Muhammad A. Hussain, Werner Brandauer, Myung J. Lee:

Mobility-Aware Vehicle-to-Grid (V2G) Optimization for Uniform Utilization in Smart Grid Based Power Distribution Network. 1701-1712 - Anhtuan Le

, Yue Chen, Kok Keong Chai, Alexandr Vasenev, Lorena Montoya
:
Incorporating FAIR into Bayesian Network for Numerical Assessment of Loss Event Frequencies of Smart Grid Cyber Threats. 1713-1721 - Qiang Tang, Ming-Zhong Xie, Kun Yang, Yuansheng Luo, Dongdai Zhou, Yun Song:

A Decision Function Based Smart Charging and Discharging Strategy for Electric Vehicle in Smart Grid. 1722-1731 - Haina Tang, Yulei Wu, Tong Li, Chunjing Han, Jingguo Ge, Xiangpeng Zhao:

Efficient Identification of TOP-K Heavy Hitters over Sliding Windows. 1732-1741 - Ljupco Jorguseski, Haibin Zhang

, Sylvie Dijkstra-Soudarissanane
, Michal Golinski:
LTE Delay Assessment for Real-Time Management of Future Smart Grids. 1742-1749
Volume 24, Number 6, December 2019
- Anandakumar Haldorai

, Arulmurugan Ramu
, Chee Onn Chow
:
Big Data Analytics for Sustainable Computing. 1751-1754 - P. Preethi, R. Asokan:

An Attempt to Design Improved and Fool Proof Safe Distribution of Personal Healthcare Records for Cloud Computing. 1755-1762 - Vallikannu Ramanathan, T. Meyyappan:

Prediction of Individual's Character in Social Media Using Contextual Semantic Sentiment Analysis. 1763-1777 - K. Jeyanthi, S. Mangai

:
Ensembled Population Rescaled Differential Evolution with Weighted Boosting for Early Breast Cancer Detection. 1778-1792 - (Withdrawn) Filter Bank Multicarrier Based Generalized Discrete Fourier Transform for Peak to Average Power Ratio Reduction. 1793-1803

- Thangavel Saravanan

, N. S. Nithya:
Modeling Displacement and Direction Aware Ad Hoc On-Demand Distance Vector Routing Standard for Mobile Ad Hoc Networks. 1804-1813 - Thirumaraiselvan Packirisamy

, K. Sakthidasan Sankaran, V. Beslin Geo
, V. R. Prakash, Natarajan Vasudevan:
A Statistical Lower UWB Channel Model for in Body Communications. 1814-1820 - R. Rajarajeswari

, D. Suchitra, K. Vijayakumar
, R. Jegatheesan:
Analyzing Customer Outage Cost in a Microgrid. 1821-1834 - George Fernandez Savari

, Vijayakumar Krishnasamy
, Vidyasagar Sugavanam, Kalyanasundaram Vakesan:
Optimal Charging Scheduling of Electric Vehicles in Micro Grids Using Priority Algorithms and Particle Swarm Optimization. 1835-1847 - Michaelraj Kingston Roberts

, S. Sudha Mohanram, N. Shanmugasundaram:
An Improved Low Complex Offset Min-Sum Based Decoding Algorithm for LDPC Codes. 1848-1852 - Suprakash S

, Balakannan S. P:
Service Level Agreement Based Catalogue Management and Resource Provisioning in Cloud for Optimal Resource Utilization. 1853-1861 - A. Karthikeyan, V. P. Arunachalam

, S. Karthik:
Performing Data Assessment in Terms of Sensor Node Positioning over Three Dimensional Wireless Sensor Network. 1862-1871 - K. Indira

, M. K. Kavithadevi:
Efficient Machine Learning Model for Movie Recommender Systems Using Multi-Cloud Environment. 1872-1882 - D. Gowtham Chakravarthy

, S. Kannimuthu
:
Extreme Gradient Boost Classification Based Interesting User Patterns Discovery for Web Service Composition. 1883-1895 - Prabhakar Krishnan

, Subhasri Duttagupta, Krishnashree Achuthan:
SDNFV Based Threat Monitoring and Security Framework for Multi-Access Edge Computing Infrastructure. 1896-1923 - Min Jia, Qing Guo:

Editorial: Intelligent Cognitive Internet of Integrated Space and Terrestrial Things. 1924-1925 - Zhicheng Qu, Ziwei Liu, Xiaojin Ding, Haotong Cao, Gengxin Zhang:

Co-Existence Analysis on Satellite-Terrestrial Integrated IMT System. 1926-1936 - Chenhua Sun, Bo Yin, Zhibin Dou

, Dai Jia, Ce Pang:
A Routing Protocol Combining Link State and Distance Vector for GEO-GEO Satellite Backbone Network. 1937-1946 - Hailong Wang, Gang Wang, Bo Li

, Gongliang Liu, Weidang Lu:
Exploiting Interference for Intelligent Relaying in Integrated Space and Terrestrial Networks Based on PNC and SIC. 1947-1954 - Jinlong Liu, Zhutian Yang

, Zhilu Wu, Zhendong Yin, Xu Jiang, Yanyuan Fu:
Control Code Multiple Encryption Algorithm on Satellite-to-ground Communication. 1955-1974 - Jie Feng, Hongbin Chen

:
Healing Coverage Holes for Big Data Collection in Large-Scale Wireless Sensor Networks. 1975-1984 - Xin Liu

, Min Jia, Zhenyu Na:
Joint Time and Node Optimization for Cluster-Based Energy-Efficient Cognitive Internet of Things. 1985-1993 - Xueqiang Yin, Shining Li, Yun Lin

:
A Novel Hierarchical Data Aggregation with Particle Swarm Optimization for Internet of Things. 1994-2001 - Mu Zhou

, Yaoping Li, Zhian Deng, Yongliang Sun, Yanmeng Wang, Zengshan Tian:
Indoor Target Intrusion Detection via Iterative Transfer Learning Based Cognitive Sensing. 2002-2013 - Dagmar Cagánová

, Predrag K. Nikolic, Corneliu Andy Puscã
, Richard Pospisil:
Editorial: Current Challenges of Smart Cities and Internet of Things. 2014-2015 - Iveta Kremenova

, Milan Gajdos:
Decentralized Networks: The Future Internet. 2016-2023 - Dagmar Cagánová

, Petra Ridzonová Hlásniková, Natália Vranaková
, Andrea Chlpeková
:
Intellectual Capital as a Key Factor in the Automotive Industry. 2024-2031 - Paulo Costa, Ricardo Montenegro, Teresa Susana Mendes Pereira

, Pedro Pinto
:
The Security Challenges Emerging from the Technological Developments. 2032-2037 - Natália Vranaková

, Kristína Koltnerová
, Andrea Chlpeková
, Dagmar Cagánová
:
Application of Exact Methods in Employee Selection in Accordance with the Age Management Concept. 2038-2042 - Milan Husar

, Vladimir Ondrejicka
:
Social Innovations in Smart Cities - Case of Poprad. 2043-2049 - Dagmar Cagánová

, Augustín Starecek
, Natália Hornáková
, Petra Hlásniková:
The Analysis of the Slovak Citizens' Awareness about the Smart City Concept. 2050-2058

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














