default search action
Mobile Information Systems, Volume 2020
Volume 2020, 2020
- Wei Wang
, Yutao Li
, Ting Zou
, Xin Wang
, Jieyu You
, Yanhong Luo
:
A Novel Image Classification Approach via Dense-MobileNet Models. 7602384:1-7602384:8 - Bo Zhao
, Xiang Li
, Jiayue Li
, Jianwen Zou
, Yifan Liu
:
An Area-Context-Based Credibility Detection for Big Data in IoT. 5068731:1-5068731:12 - JoonSeok Park
, Daeho Kim, Keunhyuk Yeom
:
An Approach for Reconstructing Applications to Develop Container-Based Microservices. 4295937:1-4295937:23 - Felipe A. Cruz-Pérez, Genaro Hernández-Valdez, Andrés Rico-Páez, Sandra Lirio Castellanos-Lopez
, Jose Raul Miranda-Tello
, Grethell G. Pérez-Sánchez
, Ernesto R. Vazquez Ceron:
Performance Sensitivity to the High-Order Statistics of Time Interval Variables in Cellular Networks. 1347601:1-1347601:16 - Guanhua Wang
, Hua Ji
, Dexin Kong
, Na Zhang
:
Modality-Dependent Cross-Modal Retrieval Based on Graph Regularization. 4164692:1-4164692:17 - Cheng Xu
, Hengjie Luo, Hong Bao
, Pengfei Wang:
STEIM: A Spatiotemporal Event Interaction Model in V2X Systems Based on a Time Period and a Raster Map. 1375426:1-1375426:20 - Jingke Dai
, Peng Zhao, Xiao Chen, Fenggan Zhang
:
Analysis and Design of Systematic Rateless Codes in FH/BFSK System with Interference. 9049284:1-9049284:8 - Jinsong Gui
, Xiangwen Dai, Xiaoheng Deng
:
Stabilizing Transmission Capacity in Millimeter Wave Links by Q-Learning-Based Scheme. 7607316:1-7607316:17 - Zhidong Shen
, Siyuan Lu, Huijuan Huang, Meng Yuan, Guoming Tang, Weiying Chen, Taige Zhang, Ting Zhong:
An Approach Based on Customized Robust Cloaked Region for Geographic Location Information Privacy Protection. 3903681:1-3903681:12 - Antonio García-Domínguez
, Carlos Eric Galván-Tejada
, Laura A. Zanella-Calzada
, Hamurabi Gamboa-Rosales
, Jorge I. Galván-Tejada, José M. Celaya-Padilla, Huizilopoztli Luna-García, Rafael Magallanes-Quintanar:
Feature Selection Using Genetic Algorithms for the Generation of a Recognition and Classification of Children Activities Model Using Environmental Sound. 8617430:1-8617430:12 - Mingqi Lv, Chao Huang, Tieming Chen
, Ting Wang:
A Collaborative Deep and Shallow Semisupervised Learning Framework for Mobile App Classification. 4521723:1-4521723:12 - Bingxin Zhang
, Guopeng Zhang
, Weice Sun, Kun Yang:
Task Offloading with Power Control for Mobile Edge Computing Using Reinforcement Learning-Based Markov Decision Process. 7630275:1-7630275:6 - Na Su, Qi Zhu
, Ying Wang:
Resource Allocation Algorithm for NOMA-Enhanced D2D Communications with Energy Harvesting. 4062487:1-4062487:11 - Zhanjun Hao
, Yu Duan
, Xiaochao Dang
, Tong Zhang:
CSI-HC: A WiFi-Based Indoor Complex Human Motion Recognition Method. 3185416:1-3185416:20 - Sabit Rahim
, Sadruddin Bahadur Qutoshi
, Gul Sahar
, Gul Jabeen
, Imran Ali:
Mobile Phone Technologies in Coping with the Challenges and Opportunities of CPEC by the Youth of Rural Mountainous Areas of Gilgit-Baltistan, Pakistan. 5816803:1-5816803:9 - Chunlei Chen
, Peng Zhang
, Huixiang Zhang
, Jiangyan Dai
, Yugen Yi
, Huihui Zhang
, Yonghui Zhang
:
Deep Learning on Computational-Resource-Limited Platforms: A Survey. 8454327:1-8454327:19 - Daegyu Choe
, Eunjeong Choi
, Dong Keun Kim
:
The Real-Time Mobile Application for Classifying of Endangered Parrot Species Using the CNN Models Based on Transfer Learning. 1475164:1-1475164:13 - Ping Ji, Danyang Qin
, Pan Feng, Tingting Lan, Guanyu Sun:
Research on Indoor Scene Classification Mechanism Based on Multiple Descriptors Fusion. 4835198:1-4835198:14 - Sungwook Kim
:
Cooperative Game-Based Virtual Machine Resource Allocation Algorithms in Cloud Data Centers. 9840198:1-9840198:11 - Taoufik Rachad
, Ali Idri:
Intelligent Mobile Applications: A Systematic Mapping Study. 6715363:1-6715363:17 - Ruizhen Gao, Xiaohui Li
, Jingjun Zhang:
Recognition of Point Sets Objects in Realistic Scenes. 4925821:1-4925821:13 - Muhammad Imran Tariq, Nisar Ahmed Memon, Shakeel Ahmed, Shahzadi Tayyaba, Muhammad Tahir Mushtaq, Natash Ali Mian, Muhammad Imran, Muhammad Waseem Ashraf:
A Review of Deep Learning Security and Privacy Defensive Techniques. 6535834:1-6535834:18 - Zhongyuan Wang
, Zijian Wang
, Li Fan
, Zhihao Yu
:
A Hybrid Wi-Fi Fingerprint-Based Localization Scheme Achieved by Combining Fisher Score and Stacked Sparse Autoencoder Algorithms. 5710450:1-5710450:14 - Yannian Zhao, Yonglong Luo
, Qingying Yu, Zhaoyan Hu:
A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points. 3429256:1-3429256:12 - Myoungbeom Chung
:
Density Estimation System of Space Users Using High Frequencies of Speaker. 7684710:1-7684710:9 - Guangpeng Fan
, Yanqi Dong, Danyu Chen, Feixiang Chen
:
New Method for Forest Resource Data Collection Based on Smartphone Fusion with Multiple Sensors. 5736978:1-5736978:11 - Guangpeng Fan, Feixiang Chen
, Danyu Chen, Yan Li, Yanqi Dong:
A Deep Learning Model for Quick and Accurate Rock Recognition with Smartphones. 7462524:1-7462524:14 - Ziyang Li, Jiong Yu, Chen Bian
, Yonglin Pu, Yuefei Wang, Yitian Zhang, Binglei Guo
:
Flink-ER: An Elastic Resource-Scheduling Strategy for Processing Fluctuating Mobile Stream Data on Flink. 5351824:1-5351824:17 - Mahdi Abbasi
, Navid Mousavi, Milad Rafiee
, Mohammad Reza Khosravi, Varun G. Menon
:
A CRC-Based Classifier Micro-Engine for Efficient Flow Processing in SDN-Based Internet of Things. 7641073:1-7641073:8 - Jianbin Xue, Zesen Wang
, Yonggang Zhang
, Lu Wang:
Task Allocation Optimization Scheme Based on Queuing Theory for Mobile Edge Computing in 5G Heterogeneous Networks. 1501403:1-1501403:12 - Shun Li, Quan Xiao
:
Classification and Improvement Strategy for Design Features of Mobile Tourist Guide Application: A Kano-IPA Approach. 8816130:1-8816130:9 - Limin Shen, Hui Li
, Hongyi Wang, Yihuan Wang:
Multifeature-Based Behavior of Privilege Escalation Attack Detection Method for Android Applications. 3407437:1-3407437:16 - Jimmy Singla
, Balwinder Kaur, Deepak Prashar, Sudan Jha
, Gyanendra Prasad Joshi
, Kyungyun Park
, Usman Tariq
, Changho Seo
:
A Novel Fuzzy Logic-Based Medical Expert System for Diagnosis of Chronic Kidney Disease. 8887627:1-8887627:13 - Min Zhao, Danyang Qin
, Ruolin Guo, Guangchao Xu:
Efficient Protection Mechanism Based on Self-Adaptive Decision for Communication Networks of Autonomous Vehicles. 2168086:1-2168086:9 - Allan Ng'ang'a
, Paula M. W. Musuva
:
Enhancing Accuracy in a Touch Operation Biometric System: A Case on the Android Pattern Lock Scheme. 4165457:1-4165457:12 - Zhonghui Pei
, Wei Chen
, Hongjiang Zheng, Luyao Du:
Optimization of Maximum Routing Hop Count Parameter Based on Vehicle Density for VANET. 2741648:1-2741648:11 - José García-Alonso, Javier Berrocal
, Alejandro Pérez-Vereda
, Jaime Galán-Jiménez
, Carlos Canal, Juan Manuel Murillo:
Using Bluetooth Low Energy Advertisements for the Detection of People Temporal Proximity Patterns. 8506323:1-8506323:17 - Sabit Rahim
, Sadruddin Bahadur Qutoshi
, Syeda Abida, Faqeer Muhammad
, Imtiaz Hussain:
Access and Use of Mobile Phone in Daily Life Activities by Rural Women of Gilgit-Baltistan, Pakistan. 8835877:1-8835877:11 - Bingxin Zhang
, Guopeng Zhang
, Shuai Ma
, Kun Yang, Kezhi Wang
:
Efficient Multitask Scheduling for Completion Time Minimization in UAV-Assisted Mobile Edge Computing. 8791030:1-8791030:11 - Chia-Huei Wu, Zi-Chun Yan
, Sang-Bing Tsai
, Weinan Wang, Boshu Cao, Xin Li:
An Empirical Study on Sales Performance Effect and Pricing Strategy for E-Commerce: From the Perspective of Mobile Information. 7561807:1-7561807:8 - Inayat Khan, Shah Khusro
:
Towards the Design of Context-Aware Adaptive User Interfaces to Minimize Drivers' Distractions. 8858886:1-8858886:23 - Shengxiang Wang
, Xiaofan Jia, Qianqian Sang:
A Dual Privacy Preserving Algorithm in Spatial Crowdsourcing. 1960368:1-1960368:6 - Usha Yadav
, Neelam Duhan, Komal Kumar Bhatia:
Dealing with Pure New User Cold-Start Problem in Recommendation System Based on Linked Open Data and Social Network Features. 8912065:1-8912065:20 - Muhammad Asghar Khan
, Insaf Ullah, Shibli Nisar, Fazal Noor
, Ijaz Mansoor Qureshi, Fahim Ullah Khanzada, Hizbullah Khattak, Muhammad Adnan Aziz
:
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption. 8861947:1-8861947:15 - Junguk Ahn
, Byung Mun Lee
:
Smart Edge Broker for Location-Based Transfer between Services and Distributed Data in IoT Smart Services. 8896252:1-8896252:12 - Dongsheng Liu, Sai Zhao, Quanzhong Li
, Jiayin Qin:
Rate Maximization for Suspicious Multicast Communication Networks with Full-Duplex Proactive Monitoring. 7847623:1-7847623:6 - Bin Wang
, Shumin Li, Fengming Xin:
LWS-Based Time-Domain Synthetic Algorithm with Constant Amplitude in Radar Transmit Waveform. 8864147:1-8864147:16 - Tao Hong
, Gengxin Zhang
:
Power Allocation for Reducing PAPR of Artificial-Noise-Aided Secure Communication System. 6203079:1-6203079:15 - Qinbao Xu, Li Liu, Rizwan Akhtar, Muhammad Asif Zahoor Raja
, Changda Wang
:
Provenance Transmission through a Two-Dimensional Covert Timing Channel in WSNs. 8818374:1-8818374:9 - Noor Gul, Muhammad Sajjad Khan, Junsu Kim, Su Min Kim
:
Robust Spectrum Sensing via Double-Sided Neighbor Distance Based on Genetic Algorithm in Cognitive Radio Networks. 8876824:1-8876824:10 - Pan Jun Sun
:
A Trust-Game-Based Access Control Model for Cloud Service. 4651205:1-4651205:14 - Zahid Ullah, Asim Zeb
, Insaf Ullah, Khalid Mahmood Awan, Yousaf Saeed, Muhammad Irfan Uddin
, Mahmoud Ahmad Al-Khasawneh
, Marwan Mahmoud
, Mahdi Zareei:
Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content-Centric Network (CCN). 4138516:1-4138516:13 - Sana Shokat, Rabia Riaz
, Sanam Shahla Rizvi, Khalil Khan
, Farina Riaz, Se Jin Kwon
:
Analysis and Evaluation of Braille to Text Conversion Methods. 3461651:1-3461651:14 - Huixiang Zhang
, Wenteng Xu, Chunlei Chen, Liang Bai, Yonghui Zhang:
Your Knock Is My Command: Binary Hand Gesture Recognition on Smartphone with Accelerometer. 8864627:1-8864627:16 - Zilin Xu, Wenqiang Li, Yan Li, Jinlong Ma, Qiyu Liu
:
Research on Patent-Knowledge Representation and Automatic Classification Based on Situation Mapping. 5494602:1-5494602:11 - Puneet Garg
, Ashutosh Dixit
, Preeti Sethi
, Plácido Rogério Pinheiro:
Impact of Node Density on the QoS Parameters of Routing Protocols in Opportunistic Networks for Smart Spaces. 8868842:1-8868842:18 - Liang Ma
, Xiaoyan Ding, Xin Zhang, Ge Zhang:
Mobile Users' Self-Disclosure Behaviour on WeChat: Application of Social Cognitive Theory. 8903247:1-8903247:13 - Xueyan Liu
, Yukun Luo, Xiaotao Yang:
Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks. 3984048:1-3984048:12 - Xingsi Xue
, Xiaoquan Lin, Chaofan Yang, Xiaojing Wu:
An Improved Indoor Positioning Technique Based on Receiving Signal's Strength. 8822288:1-8822288:10 - Maleeha Javed, Hassan Dawood
, Muhammad Murtaza Khan, Ameen Banjar
, Riad Alharbey, Hussain Dawood
:
Personal Communication Technologies for Smart Spaces Density-Based Clustering for Content and Color Adaptive Tone Mapping. 8846033:1-8846033:10 - Dominik Neznik, L'ubomír Dobos
, Ján Papaj:
Smart Radio Resource Management for Content Delivery Services in 5G and Beyond Networks. 8898798:1-8898798:14 - Emilio Sansano-Sansano
, Óscar Belmonte Fernández
, Raúl Montoliu, Arturo Gascó-Compte, Antonio Caballer Miedes
:
Multimodal Sensor Data Integration for Indoor Positioning in Ambient-Assisted Living Environments. 5204158:1-5204158:16 - Yu Zhang, Wei He
, Yin Li
:
Efficient Boolean Keywords Search over Encrypted Cloud Data in Public Key Setting. 2904861:1-2904861:15 - Ashir Javeed
, Sanam Shahla Rizvi
, Shijie Zhou, Rabia Riaz, Shafqat Ullah Khan, Se Jin Kwon
:
Heart Risk Failure Prediction Using a Novel Feature Selection Method for Feature Refinement and Neural Network for Classification. 8843115:1-8843115:11 - Muhammad Imran Tariq
, Natash Ali Mian, Abid Sohail, Tahir Alyas
, Rehan Ahmad:
Evaluation of the Challenges in the Internet of Medical Things with Multicriteria Decision Making (AHP and TOPSIS) to Overcome Its Obstruction under Fuzzy Environment. 8815651:1-8815651:19 - Guangsong Li, Yang Wang
, Bin Zhang, Siqi Lu:
Smart Contract-Based Cross-Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks. 2964562:1-2964562:16 - Zhaorui Li, Xiaobei Wu, Peizhang Cui
, Guangkai Liu:
The Mean First Passage Time of the Stochastic Resonance Driven by Dual-Sequence-Frequency-Hopping Signal and Noise. 8845160:1-8845160:8 - Qaisar Shaheen
, Muhammad Shiraz, Muhammad Usman Hashmi, Danish Mahmood, Zhiyu Zhu, Rizwan Akhtar
:
A Lightweight Location-Aware Fog Framework (LAFF) for QoS in Internet of Things Paradigm. 8871976:1-8871976:15 - Arvind Ramtohul
, Kavi Kumar Khedo
:
Mobile Positioning Techniques and Systems: A Comprehensive Review. 3708521:1-3708521:18 - Hwan-Seok Yang
:
A Study on Improving Secure Routing Performance Using Trust Model in MANET. 8819587:1-8819587:17 - Rui Zhang, Hui Xia
, Shu-shu Shao, Hang Ren, Shuai Xu, Xiangguo Cheng
:
An Intrusion Detection Scheme Based on Repeated Game in Smart Home. 8844116:1-8844116:9 - Tian Bai
, Zhijie Li, Bo Fan
:
Multiprocessor Scheduling of Sensor Transactions for Real-Time Data Quality Maintenance. 8834383:1-8834383:13 - Lingqiu Zeng, Sheng Cheng, Qingwen Han
, Lei Ye:
A Vehicular Service-Oriented Dynamical Routing Searching Algorithm in Software-Defined BusNet. 8856130:1-8856130:10 - Gang Liu, Shaoqing Fei, Zi-Chun Yan, Chia-Huei Wu
, Sang-Bing Tsai
, Jinglan Zhang:
An Empirical Study on Response to Online Customer Reviews and E-Commerce Sales: From the Mobile Information System Perspective. 8864764:1-8864764:12 - David Chunhu Li
, Bo-Hun Chen, Chia-Wei Tseng, Li-Der Chou
:
A Novel Genetic Service Function Deployment Management Platform for Edge Computing. 8830294:1-8830294:22 - Sung Tae Kim, Taeyong Park, Geochang Jeon, Jeong Hyun Yi
:
Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting. 8813243:1-8813243:11 - Weiping Ouyang
, Chunguang Ma, Guoyin Zhang, Keming Diao:
Achieving Message-Encapsulated Leveled FHE for IoT Privacy Protection. 8862920:1-8862920:10 - Xiangjun Zhang
, Weiguo Wu
, Shiyuan Yang, Xiong Wang:
Falcon: A Blockchain-Based Edge Service Migration Framework in MEC. 8820507:1-8820507:17 - Sana Messous
, Hend Liouane:
Online Sequential DV-Hop Localization Algorithm for Wireless Sensor Networks. 8195309:1-8195309:14 - Hongzhi Li
, Dezhi Han:
A Novel Time-Aware Hybrid Recommendation Scheme Combining User Feedback and Collaborative Filtering. 8896694:1-8896694:16 - Vladimir Sobeslav
, Josef Horalek
:
A Smart Parking System Based on Mini PC Platform and Mobile Application for Parking Space Detection. 8875301:1-8875301:15 - Uzair Javaid, Furqan Jameel
, Umair Javaid, Muhammad Toaha Raza Khan, Riku Jäntti:
Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach. 8831976:1-8831976:13 - Vinay Arora
, Rohan Singh Leekha
, Kyungroul Lee
, Aman Kataria
:
Facilitating User Authorization from Imbalanced Data Logs of Credit Cards Using Artificial Intelligence. 8885269:1-8885269:13 - Mohammad Moradi
, Kheirollah Rahsepar Fard:
A Method to Diagnose, Improve, and Evaluate Children's Learning Using Wearable Devices Such as Mobile Devices in the IoT Environment. 8850244:1-8850244:25 - Hamid Garmani
, Driss Ait Omar
, Mohamed El Amrani
, Mohamed Baslam
, Mostafa Jourhmane
:
The Effect of Caching on CP and ISP Policies in Information-Centric Networks. 8895271:1-8895271:18 - Daohua Pan
, Hongwei Liu
, Dongming Qu, Zhan Zhang:
Human Falling Detection Algorithm Based on Multisensor Data Fusion with SVM. 8826088:1-8826088:9 - Mingze Wei
, Lei Yuan
:
Performance Optimization Mechanism of Adolescent Physical Training Based on Reinforcement Learning and Markov Model. 8868225:1-8868225:10 - Wasif Akbar
, Wei-Ping Wu, Sehrish Saleem, Muhammad Farhan
, Muhammad Asim Saleem
, Ashir Javeed
, Liaqat Ali
:
Development of Hepatitis Disease Detection System by Exploiting Sparsity in Linear Support Vector Machine to Improve Strength of AdaBoost Ensemble Model. 8870240:1-8870240:9 - Yen-Wu Ti
, Shang-Kuan Chen
, Wen-Chieh Wu
:
A New Visual Cryptography-Based QR Code System for Medication Administration. 8885242:1-8885242:10 - Pin Lv
, Siyu Pan
, Jia Xu
:
WiFi-Based Virtual Access Network Scheduling for Downlink Traffic Dominated Smart Spaces. 8848558:1-8848558:9 - Xiaojuan Xie
, Shengliang Peng
, Xi Yang
:
Deep Learning-Based Signal-To-Noise Ratio Estimation Using Constellation Diagrams. 8840340:1-8840340:9 - Xinman Zhang
, Kunlei Jing
, Guokun Song:
Research and Development of Palmprint Authentication System Based on Android Smartphones. 8846192:1-8846192:16 - Qiufen Ni
, Chuanhe Huang
, Panos M. Pardalos, Jia Ye, Bin Fu:
Different Approximation Algorithms for Channel Scheduling in Wireless Networks. 8836517:1-8836517:13 - Slavomir Matuska
, Martin Paralic
, Róbert Hudec
:
A Smart System for Sitting Posture Detection Based on Force Sensors and Mobile Application. 6625797:1-6625797:13 - Hongyi Li, Xinrui Che
:
DRL-Based Edge Computing Model to Offload the FIFA World Cup Traffic. 8825643:1-8825643:11 - Sungwook Kim
:
Heterogeneous Network Spectrum Allocation Scheme for Network-Assisted D2D Communications. 8825119:1-8825119:11 - Jiuren Qin
, Zhaoxue Wang
, Kai Gao
, Lujie Zhong
:
Failure-Aware and Delay-Predicted Multipath Virtual Queue Scheduling for Multimedia Transmission in Edge IoT. 6673134:1-6673134:12 - Jiho Shin
, Ilsun You
, Jung-Taek Seo
:
Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process. 8878088:1-8878088:11 - Yuan Yu
, Tieyan Zhang, Yan Zhao:
Optimization Strategy of Multiarea Interconnected Integrated Energy System Based on Consistency Theory. 8884525:1-8884525:10 - Xinyu Gu
, Yiyi Xu
, Jiahan Zhang
:
Joint Resource Allocation and Power Control Based on Vehicle's Motion Characteristics in NOMA-Based V2V Systems. 8811067:1-8811067:13 - Bingcheng Wang
, Man Wu, Pei-Luen Patrick Rau
, Qin Gao:
Influence of Native Video Advertisement Duration and Key Elements on Advertising Effectiveness in Mobile Feeds. 8836195:1-8836195:12 - Thien-Phuc Doan
, Jungsoo Park
, Souhwan Jung
:
HAL-Based Resource Manipulation Monitoring on AOSP. 8863385:1-8863385:9 - Pawel Weichbroth
, Lukasz Lysik:
Mobile Security: Threats and Best Practices. 8828078:1-8828078:15
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.