default search action
Computer Communications, Volume 152
Volume 152, February 2020
- B. Sarala, S. Rukmani Devi, J. Joselin Jeya Sheela:
Spectrum energy detection in cognitive radio networks based on a novel adaptive threshold energy detection method. 1-7
- Yao-Tung Tsou, Hao Zhen, Sy-Yen Kuo, Ching-Ray Chang, Akio Fukushima, Bor-Doou Rong:
SPARR: Spintronics-based private aggregatable randomized response for crowdsourced data collection and analysis. 8-18
- B. Manickavasagam, B. Amutha:
Analysis of efficient unmanned aerial vehicles to handle medical emergency data transmission surveillance system by using wireless body area network. 19-33
- Shuopeng Li, Mohand Yazid Saidi, Ken Chen:
Survivable services oriented protection level-aware virtual network embedding. 34-45
- Chunqiong Wu, Bingwen Yan, Rongrui Yu, Zhangshu Huang, Baoqin Yu, Na Chen:
An intelligent resource dynamic allocation method for UAV wireless mobile network which supports QoS. 46-53
- Eric Ke Wang, Chien-Ming Chen, Fan Wang, Muhammad Khurram Khan, Saru Kumari:
Joint-learning segmentation in Internet of drones (IoD)-based monitor systems. 54-62
- Fengjun Shang, Xinyan Niu, Dexiang He, Hanchao Gong, Xuelan Luo:
Resource allocation and admission control algorithm based on non-cooperation game in wireless mesh networks. 63-71
- Ashima Anand, Amit Kumar Singh:
An improved DWT-SVD domain watermarking for medical information security. 72-80
- Enver Ever, Eser Gemikonakli, Huan Xuan Nguyen, Fadi Al-Turjman, Adnan Yazici:
Performance evaluation of hybrid disaster recovery framework with D2D communications. 81-92
- Amartya Mukherjee, Nilanjan Dey, Debashis De:
EdgeDrone: QoS aware MQTT middleware for mobile edge computing in opportunistic Internet of Drone Things. 93-108
- Ting Li, Ming Zhao, Kelvin Kian Loong Wong:
Machine learning based code dissemination by selection of reliability mobile vehicles in 5G networks. 109-118
- Amrit Mukherjee, Pratik Goswami, Lixia Yang, Ziwei Yan, Mahmoud Daneshmand:
Dynamic clustering method based on power demand and information volume for intelligent and green IoT. 119-125
- Philippe Jacquet, Bernard Mans:
Blockchain moderated by empty blocks to reduce the energetic impact of crypto-moneys. 126-136
- Sajjad Hosseinzadeh, Maryam Amirmazlaghani, Mehdi Shajari:
An aggregated statistical approach for network flood detection using Gamma-Normal mixture modeling. 137-148
- Bohan Li, Anman Zhang, Weitong Chen, Hai-Lian Yin, Ken Cai:
Active cross-query learning: A reliable labeling mechanism via crowdsourcing for smart surveillance. 149-154
- Chuanxin Zhao, Hengjing Zhang, Fulong Chen, Siguang Chen, Changzhi Wu, Taochun Wang:
Spatiotemporal charging scheduling in wireless rechargeable sensor networks. 155-170
- Kaidong Wang, Konstantinos Psounis:
Efficient scheduling and resource allocation in 802.11ax multi-user transmissions. 171-186 - Shivi Sharma, Hemraj Saini:
Fog assisted task allocation and secure deduplication using 2FBO2 and MoWo in cluster-based industrial IoT (IIoT). 187-199
- Yuwen Chen, Bin Song, Xiaojiang Du, Nadra Guizani:
The enhancement of catenary image with low visibility based on multi-feature fusion network in railway industry. 200-205
- Wei Hu, Jing Li, Jie Cheng, Han Guo, Hui Xie:
Security monitoring of heterogeneous networks for big data based on distributed association algorithm. 206-214
- Mehedi Masud, Ghulam Muhammad, Hesham Alhumyani, Sultan S. Alshamrani, Omar Cheikhrouhou, Saleh Ibrahim, M. Shamim Hossain:
Deep learning-based intelligent face recognition in IoT-cloud environment. 215-222
- Ziping Du:
Energy analysis of Internet of things data mining algorithm for smart green communication networks. 223-231
- Rosario Giuseppe Garroppo, Gregorio Procissi:
A streaming approach to reveal crowded events from cellular data. 232-242
- Vasilios A. Siris, Dimitrios Dimopoulos, Nikos Fotiou, Spyros Voulgaris, George C. Polyzos:
Decentralized authorization in constrained IoT environments exploiting interledger mechanisms. 243-251
- Xiang Tian, Baoxian Zhang, Hussein T. Mouftah:
Distributed robust time-efficient broadcasting algorithms for multi-channel wireless multi-hop networks with channel disruption. 252-265 - M. Manojprabu, V. R. Sarma Dhulipala:
Improved energy efficient design in software defined wireless electroencephalography sensor networks (WESN) using distributed architecture to remove artifact. 266-271
- Akshi Kumar:
Using cognition to resolve duplicacy issues in socially connected healthcare for smart cities. 272-281 - Xianming Huang:
Multi-node topology location model of smart city based on Internet of Things. 282-295
- Chu-Heng Lee, Shang-Juh Kao, Fu-Min Chang:
LSTM-based ACB scheme for machine type communications in LTE-A networks. 296-304
- Guanglei Li, Bohao Feng, Huachun Zhou, Yuming Zhang, Keshav Sood, Shui Yu:
Adaptive service function chaining mappings in 5G using deep Q-learning. 305-315
- P. P. Devi, B. Jaison:
Protection on Wireless Sensor Network from Clone Attack using the SDN-Enabled Hybrid Clone Node Detection Mechanisms. 316-322
- Pablo Chamoso, Alfonso González-Briones, Fernando de la Prieta, Kumar G. Venyagamoorthy, Juan M. Corchado:
Smart city as a distributed platform: Toward a system for citizen-oriented management. 323-332
- R. Palanikumar, K. Ramasamy:
Software defined network based self-diagnosing faulty node detection scheme for surveillance applications. 333-337
- Prosanta Gope:
PMAKE: Privacy-aware multi-factor authenticated key establishment scheme for Advance Metering Infrastructure in smart grid. 338-344 - Yaoming Zhou, Haoran Zhao, Junfeng Chen, Yuhong Jia:
A novel mission planning method for UAVs' course of action. 345-356
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.