Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             79 results found
no title author magazine year volume issue page(s) type
1 Adaptive delay-constrained resource allocation in mobile edge computing for Internet of Things communications networks Zhao, Juan

160 C p. 607-613
article
2 A joint optimization scheme for task offloading and resource allocation based on edge computing in 5G communication networks Yang, Shi

160 C p. 759-768
article
3 A knowledge-based Query Tree with Shortcutting and Couple-Resolution for RFID tag identification Hailemariam, Zelalem Legese

160 C p. 779-789
article
4 Allocation algorithm of CPS communication resources based on cooperative game Zhao, Jin

160 C p. 63-70
article
5 Analysis of network topology and deployment mode of 5G wireless access network Liu, Zhiliang

160 C p. 34-42
article
6 Analysis of system outage probability in underlay cognitive two-way amplify-and-forward relay networks Al-Zubi, Raed T.

160 C p. 253-262
article
7 Analytical and simulation tools for optical camera communications Duque, Alexis

160 C p. 52-62
article
8 An architecture for adaptive task planning in support of IoT-based machine learning applications for disaster scenarios Sacco, Alessio

160 C p. 769-778
article
9 An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture R.M., Swarna Priya

160 C p. 139-149
article
10 An energy harvesting solution for computation offloading in Fog Computing networks Bozorgchenani, Arash

160 C p. 577-587
article
11 An improved migration scheme to achieve the optimal service time for the active jobs in 5G cloud environment Vinoth Kumar, M.

160 C p. 807-814
article
12 An intelligent routing method based on network partition Rao, Zheheng

160 C p. 25-33
article
13 An optimal policy for joint compression and transmission control in delay-constrained energy harvesting IoT devices Hakami, Vesal

160 C p. 554-566
article
14 A performance-aware dynamic scheduling algorithm for cloud-based IoT applications Pandiyan, Sanjeevi

160 C p. 512-520
article
15 Application of wireless sensor network based improved immune gene algorithm in airport floating personnel positioning Liu, Hean

160 C p. 494-501
article
16 A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN Gupta, Ankur

160 C p. 311-325
article
17 Artificial intelligence driven wireless network remote monitoring based on Diffie–Hellman parameter method Zhou, Junyan

160 C p. 132-138
article
18 A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem Shuai, Mengxia

160 C p. 215-227
article
19 A wearable blood oxygen saturation monitoring system based on bluetooth low energy technology Chen, Qingguo

160 C p. 101-110
article
20 Bandwidth abstraction and instantiation under closed-loop latency constraint for tactile slice based on martingale theory Yu, Baozhu

160 C p. 274-283
article
21 Cloud computing model for big data processing and performance optimization of multimedia communication Zhou, Zhicheng

160 C p. 326-332
article
22 Continuous health monitoring of sportsperson using IoT devices based wearable technology Huifeng, Wang

160 C p. 588-595
article
23 Corrigendum to “Performance optimization of IoT based biological systems using deep learning” [Computer Communications 155 (2020) 24–31] Irshad, Omer

160 C p. 863
article
24 Deep Reinforcement Learning-based resource allocation strategy for Energy Harvesting-Powered Cognitive Machine-to-Machine Networks Xu, Yi-Han

160 C p. 706-717
article
25 Design of the navigation system through the fusion of IMU and wheeled encoders Yu, Shibing

160 C p. 730-737
article
26 Detection of algorithmically-generated domains: An adversarial machine learning approach Alaeiyan, Mohammadhadi

160 C p. 661-673
article
27 “DRL + FL”: An intelligent resource allocation model based on deep reinforcement learning for Mobile Edge Computing Shan, Nanliang

160 C p. 14-24
article
28 Edge-centric delegation of authorization for constrained devices in the Internet of Things Grande, Elías

160 C p. 464-474
article
29 Editorial Board
160 C p. ii-iii
article
30 Emotion-controlled spectrum mobility scheme for efficient syntactic interoperability in cognitive radio-based unmanned vehicles Riaz, Faisal

160 C p. 1-13
article
31 Energy-efficient and SDN-enabled routing algorithm for wireless body area networks Cicioğlu, Murtaza

160 C p. 228-239
article
32 Experimental vs. simulation analysis of LoRa for vehicular communications M. Ortiz, Fernando

160 C p. 299-310
article
33 Fastest adaptive estimation algorithms for topological structure errors in smart grid networks Xu, Huihong

160 C p. 197-203
article
34 Fog Computing Based Hybrid Deep Learning Framework in effective inspection system for smart manufacturing Lin, Shih-Yang

160 C p. 636-642
article
35 Fog-inspired smart home environment for domestic animal healthcare Bhatia, Munish

160 C p. 521-533
article
36 Green resource allocation and energy management in heterogeneous small cell networks powered by hybrid energy Han, Qiaoni

160 C p. 204-214
article
37 6G technology based advanced virtual multi-purpose embedding algorithm to solve far-reaching network effects Saad, Aldosary

160 C p. 749-758
article
38 HD video transmission of multi-rotor Unmanned Aerial Vehicle based on 5G cellular communication network Yang, Qi

160 C p. 688-696
article
39 High-performance flow classification using hybrid clusters in software defined mobile edge computing Abbasi, Mahdi

160 C p. 643-660
article
40 Implementing a blockchain-based local energy market: Insights on communication and scalability Meeuw, Arne

160 C p. 158-171
article
41 Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignment Xu, Xiaoxiao

160 C p. 423-430
article
42 Information processing in Internet of Things using big data analytics Li, Chaomin

160 C p. 718-729
article
43 IOT platform of One-Key for Help APP and environment portfolio risk identification algorithm based on MIT Pang, Sulin

160 C p. 596-606
article
44 KATE: Kalman Trust Estimator for Internet of Drones Bhargava, Arpita

160 C p. 388-401
article
45 Learning to upgrade internet information security and protection strategy in big data era Guo, Junjun

160 C p. 150-157
article
46 MAC protocols for unmanned aerial vehicle ecosystems: Review and challenges Vashisht, Sahil

160 C p. 443-463
article
47 Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL Tu, Shanshan

160 C p. 790-798
article
48 NMTLAT: A New robust mobile Multi-Target Localization and Tracking Scheme in marine search and rescue wireless sensor networks under Byzantine attack Xian, Jiangfeng

160 C p. 623-635
article
49 Novel control topology with obstacle detection using RDPSO–GBA in mobile AD-HOC network Vinoba, R.

160 C p. 847-857
article
50 On spectrum and energy efficient survivable multipath routing in off-line Elastic Optical Network Halder, Joy

160 C p. 375-387
article
51 OntoBestFit: A Best-Fit Occurrence Estimation strategy for RDF driven faceted semantic search Deepak, Gerard

160 C p. 284-298
article
52 Optimal multi-part mobile computation offloading with hard deadline constraints Hekmati, Arvin

160 C p. 614-622
article
53 Optimized wireless channel allocation in hybrid data center network based on IEEE 802.11ad Dab, Boutheina

160 C p. 534-546
article
54 PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks Alladi, Tejasvi

160 C p. 81-90
article
55 Performance evaluation of cooperative eigenvalue spectrum sensing GLRT under different impulsive noise environments in cognitive radio Ghamry, Walid K.

160 C p. 567-576
article
56 Precise localization for achieving next-generation autonomous navigation: State-of-the-art, taxonomy and future prospects Shit, Rathin Chandra

160 C p. 351-374
article
57 Priority-based data transmission using selective decision modes in wearable sensor based healthcare applications Alsiddiky, Abdulmonem

160 C p. 43-51
article
58 Real time auxiliary data mining method for wireless communication mechanism optimization based on Internet of things system Li, Lin

160 C p. 333-341
article
59 Remaining useful life prediction based on state assessment using edge computing on deep learning Hsu, Hsin-Yao

160 C p. 91-100
article
60 Research on resource allocation of vocal music teaching system based on mobile edge computing Sun, Jian

160 C p. 342-350
article
61 SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT) Liaqat, Shahzana

160 C p. 697-705
article
62 Securing Internet of Medical Things with Friendly-jamming schemes Li, Xuran

160 C p. 431-442
article
63 Security definitions, entropy measures and constructions for implicitly detecting data corruption Kounavis, Michael

160 C p. 815-846
article
64 Sensors for internet of medical things: State-of-the-art, security and privacy issues, challenges and future directions Ray, Partha Pratim

160 C p. 111-131
article
65 Service architecture of IoT terminal connection based on blockchain identity authentication system Huang, Jui-Chan

160 C p. 411-422
article
66 Signal frequency domain analysis and sensor fault diagnosis based on artificial intelligence Li, Daming

160 C p. 71-80
article
67 Smart city oriented Ecological Sensitivity Assessment and Service Value Computing based on Intelligent sensing data processing Duan, Yaqiong

160 C p. 263-273
article
68 Sparse representation for network traffic recovery Fan, XiaoBo

160 C p. 547-553
article
69 Special Issue on Data Distribution in Industrial and Pervasive Internet Raptis, Theofanis P.

160 C p. 860-862
article
70 Special Issue on Mobile Information Centric Networking Calafate, Carlos T.

160 C p. 858-859
article
71 SSGRU: A novel hybrid stacked GRU-based traffic volume prediction approach in a road network Sun, Peng

160 C p. 502-511
article
72 Target detection in SAR images using Bayesian Saliency and Morphological attribute profiles Banu, A. Shakin

160 C p. 738-748
article
73 Testing and fingerprinting the physical layer of wireless cards with software-defined radios Becker, Johannes K.

160 C p. 186-196
article
74 The characteristics of rumor spreaders on Twitter: A quantitative analysis on real data Bodaghi, Amirhosein

160 C p. 674-687
article
75 The 5G communication technology-oriented intelligent building system planning and design Zhou, Yan

160 C p. 402-410
article
76 Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes Sharma, Avani

160 C p. 475-493
article
77 Uncovering spatiotemporal and semantic aspects of tourists mobility using social sensing Ferreira, Ana P.G.

160 C p. 240-252
article
78 Vehicle communication network in intelligent transportation system based on Internet of Things Zhang, Hong

160 C p. 799-806
article
79 Wake-up radio-based data forwarding for green wireless networks Koutsandria, Georgia

160 C p. 172-185
article
                             79 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands