Content
November 2022, Volume 18, Issue 11
- 15501329221133291-15501329221133291 Teletraffic analysis of a mobile crowdsensing system: The pedestrian-to-vehicle scenario
by David Miguel-Santiago & Mario E Rivero-Angeles & Laura I Garay-Jiménez & Izlian Y Orea-Flores & Blanca Tovar-Corona - 15501329221134479-15501329221134479 An online intelligent electronic medical record system via speech recognition
by Xin Xia & Yunlong Ma & Ye Luo & Jianwei Lu - 15501329221135060-15501329221135060 Cross-domain entity identity association analysis and prediction based on representation learning
by Mingcheng Gao & Ruiheng Wang & Lu Wang & Yang Xin & Hongliang Zhu - 15501329221135160-15501329221135160 Evolutionary modeling and robustness analysis of multi-domain cooperative communication network under the environment of Internet of things
by Jianrong Wang & Pan Zhang & Wei Bai & Guoyuan Yang & Yunyun Yang - 15501329221135516-15501329221135516 New timestamp mark–based energy efficient time synchronization method for wireless sensor networks
by Yourui Huang & Gang Zhang & Min Kong & Fugui He - 15501329221136978-15501329221136978 A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things
by Yong Shen & Xiaokang Tang & Xiang Zhang & Yongzhuang Zhou & Hongxin Zou
October 2022, Volume 18, Issue 10
- 15501329221102372-15501329221102372 An improved dual-sink architecture with a modified media access control protocol, energy-aware, and quality-of-service guaranteed routing algorithms for wireless body area network
by Abdullahi Abdu Ibrahim - 15501329221126609-15501329221126609 Survey on authentication and security protocols and schemes over 5G networks
by Yahya Tashtoush & Dirar Darweesh & Ola Karajeh & Omar Darwish & Majdi Maabreh & Safa’ Swedat & Rawan Koraysh & Omar Almousa & Nasser Alsaedi - 15501329221132496-15501329221132496 Uplink non-orthogonal multiple access in heterogeneous networks: A review of recent advances and open research challenges
by Bilal Ur Rehman & Mohammad Inayatullah Babar & Arbab Waheed Ahmad & Mohammad Amir & Wasim Habib & Muhammad Farooq & Gamil Abdel Azim - 15501329221133765-15501329221133765 Machine learning for Internet of things anomaly detection under low-quality data
by Shangbin Han & Qianhong Wu & Yang Yang
September 2022, Volume 18, Issue 9
- 15501329221117118-15501329221117118 A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
by Umesh Kumar Lilhore & Osamah Ibrahim Khalaf & Sarita Simaiya & Carlos Andrés Tavera Romero & Ghaida Muttashar Abdulsahib & Poongodi M & Dinesh Kumar - 15501329221119398-15501329221119398 Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher
by Ting Fan & Lingchen Li & Yongzhuang Wei & Enes Pasalic - 15501329221123531-15501329221123531 A willingness-aware user recruitment strategy based on the task attributes in mobile crowdsensing
by Yang Liu & Yong Li & Wei Cheng & Weiguang Wang & Junhua Yang - 15501329221123533-15501329221123533 Hybrid multi-objective node deployment for energy-coverage problem in mobile underwater wireless sensor networks
by Salmah Fattah & Ismail Ahmedy & Mohd Yamani Idna Idris & Abdullah Gani - 15501329221123933-15501329221123933 Unmanned aerial vehicles: Applications, techniques, and challenges as aerial base stations
by Rinju Mariam Rolly & Pandy Malarvezhi & Thomas D Lagkas - 15501329221125110-15501329221125110 PSD characteristics for the random vibration signals used in bridge structural health monitoring in Vietnam based on a multi-sensor system
by Thanh Q Nguyen & Tuan Anh Nguyen & Thuy T Nguyen - 15501329221125111-15501329221125111 Research on privacy protection of dummy location interference for Location-Based Service location
by Ai Zhang & XiaoHui Li - 15501329221125119-15501329221125119 Energy-efficient and intelligent cooperative spectrum sensing algorithm in cognitive radio networks
by Tangsen Huang & Xiangdong Yin & Xiaowu Li
August 2022, Volume 18, Issue 8
- 15501329221112606-15501329221112606 A structural health monitoring method proposal based on optical scanning and computational models
by Wendy Flores-Fuentes & Ivan Yeniseysk Alba-Corpus & Oleg Sergiyenko & Julio C. RodrÃguez-Quiñonez - 15501329221114535-15501329221114535 Security performance analysis for cell-free massive multiple-input multiple-output system with multi-antenna access points deployment in presence of active eavesdropping
by Xiaoyu Wang & Yuanyuan Gao & Guangna Zhang & Mingxi Guo & Kui Xu - 15501329221114566-15501329221114566 Crack fault diagnosis of vibration exciter rolling bearing based on genetic algorithm–optimized Morlet wavelet filter and empirical mode decomposition
by Xiaoming Han & Jin Xu & Songnan Song & Jiawei Zhou - 15501329221115064-15501329221115064 A dynamic decentralized strategy of replica placement on edge computing
by Yingying Yin & Leilei Deng - 15501329221115375-15501329221115375 Machine vision-based testing action recognition method for robotic testing of mobile application
by Tao Zhang & Zhengqi Su & Jing Cheng & Feng Xue & Shengyu Liu
July 2022, Volume 18, Issue 7
- 15501329221105159-15501329221105159 The robustness of popular multiclass machine learning models against poisoning attacks: Lessons and insights
by Majdi Maabreh & Arwa Maabreh & Basheer Qolomany & Ala Al-Fuqaha - 15501329221107822-15501329221107822 Threshold-free multi-attributes physical layer authentication based on expectation–conditional maximization channel estimation in Internet of Things
by Tao Jing & Hongyan Huang & Yue Wu & Qinghe Gao & Yan Huo & Jiayu Sun - 15501329221110810-15501329221110810 Distributed filtering in sensor networks based on linear minimum mean square error criterion with limited sensing range
by Teng Shao - 15501329221111961-15501329221111961 Three-dimensional localization algorithm of mobile nodes based on received signal strength indicator-angle of arrival and least-squares support-vector regression
by Lieping Zhang & Huihao Peng & Jiajie He & Shenglan Zhang & Zuqiong Zhang - 15501329221113508-15501329221113508 Fuzzy logic, genetic algorithms, and artificial neural networks applied to cognitive radio networks: A review
by Ahmed Alkhayyat & Firas Abedi & Ashish Bagwari & Pooja Joshi & Haider Mahmood Jawad & Sarmad Nozad Mahmood & Yousif K Yousif - 15501329221114060-15501329221114060 Connected and automated vehicle control at unsignalized intersection based on deep reinforcement learning in vehicle-to-infrastructure environment
by Juan Chen & Vijayan Sugumaran & Peiyan Qu - 15501329221114546-15501329221114546 A non-asymptotic analysis of adaptive TD(λ) learning in wireless sensor networks
by Bing Li & Tao Li & Muhua Liu & Junlong Zhu & Mingchuan Zhang & Qingtao Wu
June 2022, Volume 18, Issue 6
- 15501329221102371-15501329221102371 Embedded intelligence and the data-driven future of application-specific Internet of Things for smart environments
by Li-Minn Ang & Kah Phooi Seng & Monica Wachowicz - 15501329221102730-15501329221102730 Vehicle state estimation based on extended Kalman filter and radial basis function neural networks
by Yunfei Zha & Xinye Liu & Fangwu Ma & CC Liu - 15501329221102734-15501329221102734 A novel ambiguity resolution model of BeiDou navigation satellite system/inertial navigation system tightly coupled for kinematic-to-kinematic precise relative positioning
by Ling Wu & Yongrong Sun & Xiyu Fu & Qinghua Zeng - 15501329221104330-15501329221104330 Deep learning–based resource allocation for secure transmission in a non-orthogonal multiple access network
by Miao Zhang & Yao Zhang & Qian Cen & Shixun Wu - 15501329221104332-15501329221104332 A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles
by Zhen Li & Qingkai Miao & Shehzad Ashraf Chaudhry & Chien-Ming Chen - 15501329221104352-15501329221104352 Dynamic incentive mechanism in mobile crowdsourcing networks by combining reputation and contract theory
by Nan Zhao & Qixuan Wan & Jinlian Chen & Minghu Wu - 15501329221105202-15501329221105202 Joint timeliness and security provisioning for enhancement of dependability in Internet of Vehicle system
by Tao Jing & Hengyu Yu & Xiaoxuan Wang & Qinghe Gao - 15501329221106935-15501329221106935 Research and application of XGBoost in imbalanced data
by Ping Zhang & Yiqiao Jia & Youlin Shang - 15501329221107246-15501329221107246 TEZEM: A new energy-efficient routing protocol for next-generation wireless sensor networks
by Zain ul Abidin Jaffri & Muhammad Asif & Wali Ullah Khan & Zeeshan Ahmad & Zain ul Abiden Akhtar & Kalim Ullah & Md. Sadek Ali - 15501329221107573-15501329221107573 Wet aggregate stability modeling based on support vector machine in multiuse soils
by Ruizhi Zhai & Jianping Wang & Deshun Yin & Ziheng Shangguan - 15501329221107582-15501329221107582 Robust security transmission design for multi-user peer-to-peer wireless relay networks
by Dongmei Yang & Hongjun Li & Baoquan Ren & Xudong Zhong - 15501329221107868-15501329221107868 Design of a general complex problem-solving architecture based on task management and predictive optimization
by Shabir Ahmad & Salman Khan & Faisal Jamil & Faiza Qayyum & Abid Ali & DoHyeun Kim
May 2022, Volume 18, Issue 5
- 15501329221080658-15501329221080658 A certificateless aggregate signature scheme for security and privacy protection in VANET
by Eko Fajar Cahyadi & Tzu-Wei Su & Chou-Chen Yang & Min-Shiang Hwang - 15501329221097583-15501329221097583 A reduced dimension multiple signal classification–based direct location algorithm with dense arrays
by Jianfeng Li & Gaofeng Zhao & Baobao Li & Xianpeng Wang & Mengxing Huang - 15501329221097588-15501329221097588 A hybrid trust model based on communication and social trust for vehicular social networks
by Na Fan & Shuai Shen & Chase Q Wu & Junfeng Yao - 15501329221097591-15501329221097591 Multi-Kinects fusion for full-body tracking in virtual reality-aided assembly simulation
by Yu Wang & Fuxiang Chang & Yuanjie Wu & Ziran Hu & Lihui Li & Pengyu Li & Pu Lang & Shouwen Yao - 15501329221097815-15501329221097815 Delay-reliability-aware protocol adaption and quality of service guarantee for message queuing telemetry transport-empowered electric Internet of things
by Hao Zhang & Hongshuo Zhang & Zhao Wang & Zhenyu Zhou & Qiang Wang & Guangyuan Xu & Junzhong Yang & Zhong Gan - 15501329221097817-15501329221097817 Vulnerability association evaluation of Internet of thing devices based on attack graph
by Yao Ma & Yuting Wu & Dan Yu & Lv Ding & Yongle Chen - 15501329221097819-15501329221097819 Viability characterization of a proof-of-concept Bluetooth mesh smart building application
by Leonardo Eras & Federico DomÃnguez & Caril Martinez - 15501329221100326-15501329221100326 A distributed scheme for energy-efficient event-based target recognition using Internet of Multimedia Things
by Manal Alsabhan & Adel Soudani & Manan Almusallam - 15501329221100412-15501329221100412 Multi-sensor fusion algorithm in cooperative vehicle-infrastructure system for blind spot warning
by Chao Xiang & Li Zhang & Xiaopo Xie & Longgang Zhao & Xin Ke & Zhendong Niu & Feng Wang - 15501329221102077-15501329221102077 Method for predicting cutter remaining life based on multi-scale cyclic convolutional network
by Tao Li & Yinquan Yu & Chaoqiang Huang & Jinwen Yang & Yuanchang Zhong & Yong Hao - 15501477211049307-15501477211049307 A graph-based sensor recommendation model in semantic sensor network
by Yuanyi Chen & Yihao Lin & Peng Yu & Yanyun Tao & Zengwei Zheng - 15501477211049917-15501477211049917 A distributed energy-efficient opportunistic routing accompanied by timeslot allocation in wireless sensor networks
by Man Gun Ri & Ye Song Han & Jin Pak - 15501477211066304-15501477211066304 Analysis of relay selection schemes in underlay cognitive radio non-orthogonal multiple access networks
by Dongmei Yang & Cheng Li & Baoquan Ren & Hongjun Li & Kefeng Guo
April 2022, Volume 18, Issue 4
- 15501329221084223-15501329221084223 An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms
by Huan Wang & Zhongyuan Jiang & Qing Qian & Hong Wang - 15501329221084882-15501329221084882 Artificial intelligence analysis in cyber domain: A review
by Liguo Zhao & Derong Zhu & Wasswa Shafik & S Mojtaba Matinkhah & Zubair Ahmad & Lule Sharif & Alisa Craig - 15501329221090458-15501329221090458 GLBR: A novel global load balancing routing scheme based on intelligent computing in partially disconnected wireless sensor networks
by Zeyu Sun & Guisheng Liao & Cao Zeng & Lan Lan & Guozeng Zhao - 15501329221090469-15501329221090469 Load frequency control under false data inject attacks based on multi-agent system method in multi-area power systems
by Tengfei Weng & Yan Xie & Guorong Chen & Qi Han & Yuan Tian & Liping Feng & Yangjun Pei - 15501329221091505-15501329221091505 Monitoring of clinical signs of intravenous infusion patients with ZigBee wireless technology
by Xiaobo Zhu & Yunlong Ye - 15501329221092932-15501329221092932 Distributed consensus problem with caching on federated learning framework
by Xin Yan & Yiming Qin & Xiaodong Hu & Xiaoling Xiao - 15501329221092940-15501329221092940 Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems
by Caixue Zhou & Lihua Wang & Lingmin Wang
March 2022, Volume 18, Issue 3
- 15501329221077165-15501329221077165 An improved algorithm of segmented orthogonal matching pursuit based on wireless sensor networks
by Xinmiao Lu & Yanwen Su & Qiong Wu & Yuhan Wei & Jiaxu Wang - 15501329221077922-15501329221077922 An intrusion detection mechanism for IPv6-based wireless sensor networks
by Min Wei & Chunmeng Rong & Erxiong Liang & Yuan Zhuang - 15501329221077932-15501329221077932 End-to-end data collection strategy using mobile sink in wireless sensor networks
by Xiaofeng Wu & Zhuangqi Chen & Yi Zhong & Hui Zhu & Pingjian Zhang - 15501329221080417-15501329221080417 Exploring the vulnerability in the inference phase of advanced persistent threats
by Qi Wu & Qiang Li & Dong Guo & Xiangyu Meng - 15501329221080665-15501329221080665 Light-weighted vehicle detection network based on improved YOLOv3-tiny
by Pingshu Ge & Lie Guo & Danni He & Liang Huang - 15501329221080666-15501329221080666 Research on disaster information dissemination based on social sensor networks
by Shanshan Wan & Zhuo Chen & Cheng Lyu & Ruofan Li & Yuntao Yue & Ying Liu - 15501329221082030-15501329221082030 Intelligent control system of smart home for context awareness
by Minbo Li & Yu Wu - 15501329221082415-15501329221082415 A security detection approach based on autonomy-oriented user sensor in social recommendation network
by Shanshan Wan & Ying Liu - 15501329221082430-15501329221082430 Thermal-induced influences considered spindle unit angular contact ball bearing preload determination using embedded fiber Bragg gating sensors
by Yanfang Dong & Feifan Chen & Ming Qiu - 15501329221083168-15501329221083168 A content awareness module for predictive lossless image compression to achieve high throughput data sharing over the network storage
by Asif Rajput & Jianqiang Li & Faheem Akhtar & Zahid Hussain Khand & Jason C Hung & Yan Pei & Anko Börner - 15501329221084226-15501329221084226 A novel two-dimensional reversible data hiding scheme based on high-efficiency histogram shifting for JPEG images
by Ben He & Yi Chen & Yonghui Zhou & Yongrong Wang & Yanli Chen - 15501329221085495-15501329221085495 Collection tree-oriented mesh routing optimization for extending the lifetime of wireless sensor networks
by Li-Yong Yuan & Fei-Long Lin - 15501329221087055-15501329221087055 Improved firefly algorithm–extended Kalman filter–least-square support-vector machine voltage sag monitoring and classification method based on edge computing
by Zhu Liu & Xuesong Qiu & Yonggui Wang & Shuai Zhang & Zhi Li - 15501329221087183-15501329221087183 A case study of newly tunnels over-crossing the existing subway tunnels
by Ben Wu & Wei Liu & Peixin Shi & Xiangyang Xu & Yingjing Liu - 15501329221088450-15501329221088450 A controllable privacy data transmission mechanism for Internet of things system based on blockchain
by ZiXiang Nie & YuanZhenTai Long & SenLin Zhang & YueMing Lu - 15501329221088740-15501329221088740 Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations
by Yan Lin & Hongliang Zhu & Guoai Xu & Guosheng Xu - 15501477211049910-15501477211049910 A novel and highly efficient botnet detection algorithm based on network traffic analysis of smart systems
by Li Duan & Jingxian Zhou & You Wu & Wenyao Xu - 15501477211062835-15501477211062835 Artificial intelligence Internet of Things: A new paradigm of distributed sensor networks
by Kah Phooi Seng & Li Minn Ang & Ericmoore Ngharamike - 15501477211064755-15501477211064755 Second-degree branch structure blockchain expansion model
by Qiang Liu & Baoyan Song & Junlu Wang - 15501477211066305-15501477211066305 Re-ranking vehicle re-identification with orientation-guide query expansion
by Xue Zhang & Xiushan Nie & Ziruo Sun & Xiaofeng Li & Chuntao Wang & Peng Tao & Sumaira Hussain - 15501477211067740-15501477211067740 Wireless power transfer and energy harvesting in distributed sensor networks: Survey, opportunities, and challenges
by Gerald K Ijemaru & Kenneth Li-Minn Ang & Jasmine KP Seng - 15501477211069903-15501477211069903 Multiplicatively weighted Voronoi-based sensor collaborative redeployment in software-defined wireless sensor networks
by Minghua Wang & Ran Ou & Yan Wang - 15501477221075544-15501477221075544 Fast and computationally efficient generative adversarial network algorithm for unmanned aerial vehicle–based network coverage optimization
by Marek RužiÄ ka & Marcel VoloÅ¡in & Juraj Gazda & Taras Maksymyuk & Longzhe Han & MisCha Dohler
February 2022, Volume 18, Issue 2
- 15501477211006347-15501477211006347 Security of medical images over insecure communication channels using zero-steganography
by Wadood Abdul - 15501477211061251-15501477211061251 Study on body area network of smart clothing for physiological monitoring
by Shen Lei & Ren Xiangfang & Wu Jianbin & Chen Han & Ouyang Jianyong - 15501477211065936-15501477211065936 A combined algorithm for tunnel personnel localization based on error areal division
by Jian Xu & Haiying Wang & Yiqing Ren & Yingzhi Zhang - 15501477211069910-15501477211069910 Interactive communication with clustering collaboration for wireless powered communication networks
by Lina Yuan & Huajun Chen & Jing Gong - 15501477211070202-15501477211070202 Dynamic optimization of intersatellite link assignment based on reinforcement learning
by Weiwu Ren & Jialin Zhu & Hui Qi & Ligang Cong & Xiaoqiang Di - 15501477211073037-15501477211073037 A novel Fruit Fly Optimization Algorithm with quasi-affine transformation evolutionary for numerical optimization and application
by Ru-Yu Wang & Pei Hu & Chia-Cheng Hu & Jeng-Shyang Pan - 15501477211073044-15501477211073044 A study on the cabin indoor localization algorithm based on adaptive K-values
by Junbo Gao & Tao Fan & Zhenxiao Qin & Wei Sun
January 2022, Volume 18, Issue 1
- 15501477211059945-15501477211059945 Attack and protection schemes on fabric isomorphic crosschain systems
by Zhuo Lv & Di Wu & Wen Yang & Li Duan - 15501477211064741-15501477211064741 Optimal downlink power allocation schemes for OFDM-NOMA-based Internet of things
by Ya Gao & Fei Yu & Haoran Zhang & Yongpeng Shi & Yujie Xia - 15501477211064758-15501477211064758 A hybrid cooperative navigation method for UAV swarm based on factor graph and Kalman filter
by Mingxing Chen & Zhi Xiong & Jun Xiong & Rong Wang - 15501477211067743-15501477211067743 Secure performance analysis and pilot spoofing attack detection in cell-free massive MIMO systems with finite-resolution ADCs
by Xianyu Zhang & Xiaoqiang Qiao & Tao Liang & Kang An - 15501477211068389-15501477211068389 A software-defined multi-modal wireless sensor network for ocean monitoring
by Hanjiang Luo & Xu Wang & Ziyang Xu & Chao Liu & Jeng-Shyang Pan - 15501477211072699-15501477211072699 Cooperative NOMA system with incremental relaying over Nakagami-m fading channels
by Zhenling Wang & Dawei Qiao
December 2021, Volume 17, Issue 12
- 15501477211039134-15501477211039134 Energy efficient multi-hop routing protocol for smart vehicle monitoring using intelligent sensor networks
by Yuvaraja Teekaraman & Hariprasath Manoharan & Ramya Kuppusamy & Shabana Urooj & Fadwa Alrowais - 15501477211055958-15501477211055958 Minimizing the number of wireless charging PAD for unmanned aerial vehicle–based wireless rechargeable sensor networks
by Yingjue Chen & Yingnan Gu & Panfeng Li & Feng Lin - 15501477211057443-15501477211057443 Joint power control and user grouping for uplink power domain non-orthogonal multiple access
by Bilal Ur Rehman & Mohammad Inayatullah Babar & Arbab Waheed Ahmad & Hesham Alhumyani & Gamil Abdel Azim & Rashid A. Saeed & Sayed Abdel Khalek - 15501477211058667-15501477211058667 Modeling and proving dynamic behaviors of a routing protocol: A tutorial
by Agnieszka Paszkowska & Konrad Iwanicki - 15501477211058672-15501477211058672 Seepage behavior assessment of earth-rock dams based on Bayesian network
by Lu He & Shijun Wang & Yanchang Gu & Qiong Pang & Yunxing Wu & Jiefa Ding & Jihao Yan - 15501477211058673-15501477211058673 Smart contract-based secure cooperative spectrum sensing algorithm
by Chu Ji & Qi Zhu - 15501477211059097-15501477211059097 Physical layer security in cognitive NOMA sensor networks with full-duplex technique
by Zhihui Shang & Tao Zhang & Liwei Tao & Zhongwu Xiang & Weiwei Yang - 15501477211059392-15501477211059392 Using Internet of things technology to construct an integrated intelligent sensing environment for long-term care service
by Lun-Ping Hung & Nan-Chen Hsieh & Li-Ju Lin & Zong-Jie Wu - 15501477211059934-15501477211059934 A randomized block policy gradient algorithm with differential privacy in Content Centric Networks
by Lin Wang & Xingang Xu & Xuhui Zhao & Baozhu Li & Ruijuan Zheng & Qingtao Wu - 15501477211059940-15501477211059940 A multi-factor integration-based semi-supervised learning for address resolution protocol attack detection in SDIIoT
by Zhong Li & Huimin Zhuang - 15501477211060673-15501477211060673 Efficiently computing Pareto optimal G-skyline query in wireless sensor network
by Leigang Dong & Guohua Liu & Xiaowei Cui & Quan Yu - 15501477211061250-15501477211061250 PrivItem2Vec: A privacy-preserving algorithm for top-N recommendation
by Zhengqiang Ge & Xinyu Liu & Qiang Li & Yu Li & Dong Guo - 15501477211061252-15501477211061252 Autonomy-oriented proximity mobile social network modeling in smart city for emergency rescue
by Zhao Chunxiao & Guo Junjie - 15501477211064800-15501477211064800 A computing allocation strategy for Internet of things’ resources based on edge computing
by Zengrong Zhang
November 2021, Volume 17, Issue 11
- 15501477211033115-15501477211033115 Petersen-star networks modeled by optical transpose interconnection system
by Jung-hyun Seo & HyeongOk Lee - 15501477211050552-15501477211050552 ISEE: Industrial Internet of Things perception in solar cell detection based on edge computing
by Meiya Dong & Jumin Zhao & Deng-ao Li & Biaokai Zhu & Sihai An & Zhaobin Liu - 15501477211052371-15501477211052371 Image-tag-based indoor localization using end-to-end learning
by Mohammed Alarfaj & Zhenqiang Su & Raymond Liu & Abdulaziz Al-Humam & Huaping Liu - 15501477211053997-15501477211053997 Improved trilateration for indoor localization: Neural network and centroid-based approach
by Satish R Jondhale & Amruta S Jondhale & Pallavi S Deshpande & Jaime Lloret - 15501477211055376-15501477211055376 Novel Convolutional Restricted Boltzmann Machine manifold learning inspired dynamic user clustering hybrid precoding for millimeter-wave massive multiple-input multiple-output systems
by Xiaoping Zhou & Haichao Liu & Bin Wang & Qian Zhang & Yang Wang - 15501477211055931-15501477211055931 Quality-related fault diagnosis based on k-nearest neighbor rule for non-linear industrial processes
by Zelin Ren & Yongqiang Tang & Wensheng Zhang - 15501477211057037-15501477211057037 Feature fusion-based collaborative learning for knowledge distillation
by Yiting Li & Liyuan Sun & Jianping Gou & Lan Du & Weihua Ou - 15501477211057737-15501477211057737 A PCC-Ensemble-TCN model for wind turbine icing detection using class-imbalanced and label-missing SCADA data
by Shenyi Ding & Zhijie Wang & Jue Zhang & Fang Han & Xiaochun Gu & Guangxiao Song - 15501477211059092-15501477211059092 Privacy-preserving inpainting for outsourced image
by Fang Cao & Jiayi Sun & Xiangyang Luo & Chuan Qin & Ching-Chun Chang
October 2021, Volume 17, Issue 10
- 15501477211033765-15501477211033765 An explainable sentiment prediction model based on the portraits of users sharing representative opinions in social sensors
by Bin Wang & Enhui Wang & Zikun Zhu & Yangyang Sun & Yaodong Tao & Wei Wang - 15501477211042543-15501477211042543 MPDP k-medoids: Multiple partition differential privacy preserving k-medoids clustering for data publishing in the Internet of Medical Things
by Zekun Zhang & Tongtong Wu & Xiaoting Sun & Jiguo Yu - 15501477211049327-15501477211049327 A self-adaptive deployment model of UAV cluster for emergency communication network
by Ying Fang & Bin Cheng & KunPeng Kang & Hai Tan - 15501477211050729-15501477211050729 Review and classification of trajectory summarisation algorithms: From compression to segmentation
by Daniel Amigo & David Sánchez Pedroche & Jesús GarcÃa & José Manuel Molina - 15501477211052202-15501477211052202 Toward lightweight intrusion detection systems using the optimal and efficient feature pairs of the Bot-IoT 2018 dataset
by Erman Özer & Murat İskefiyeli & Jahongir Azimjonov - 15501477211052210-15501477211052210 Quantum-based wireless sensor networks: A review and open questions
by Mario E Rivero-Angeles - 15501477211053706-15501477211053706 A novel method for asynchronous source localisation based on time of arrival measurements
by Huijie Zhu & Sheng Liu & Zhiqiang Yao & Moses Chukwuka Okonkwo & Zheng Peng - 15501477211053777-15501477211053777 Effect of frost on plants, leaves, and forecast of frost events using convolutional neural networks
by Sobia Wassan & Chen Xi & NZ Jhanjhi & Laiqa Binte-Imran
September 2021, Volume 17, Issue 9
- 15501477211041272-15501477211041272 Activity-based routing algorithm in opportunistic mobile social networks
by Sheng Zhang & Houzhong Liu & Caisen Chen & Zhaojun Shi & William Wei Song - 15501477211044338-15501477211044338 Group authentication and key distribution for sensors in wireless body area network
by Yong Ding & Hui Xu & Meng Zhao & Hai Liang & Yujue Wang
August 2021, Volume 17, Issue 8
- 15501477211028549-15501477211028549 Energy harvesting effect on prolonging low-power lossy networks lifespan
by Mohamed Hadi Habaebi & Abdullah Ahmed S Basaloom & Md Rafiqul Islam & Merrad Yacine & M Mesri & Elfatih AA Elsheikh & FM Suliman - 15501477211034069-15501477211034069 Perceptions of spatial patterns of visitors in urban green spaces for the sustainability of smart city
by Qi Liu & Li Hou & Sana Shaukat & Usman Tariq & Rabia Riaz & Sanam Shahla Rizvi - 15501477211039137-15501477211039137 Long-term changes of forest biomass and its driving factors in karst area, Guizhou, China
by Chunhua Qian & Hequn Qiang & Guangming Zhang & Mingyang Li - 15501477211040367-15501477211040367 An active detection of compromised nodes based on en-route trap in wireless sensor network
by Jiang-Tao Wang & Zhi-Xiong Liu - 15501477211041541-15501477211041541 Review of key management techniques for advanced metering infrastructure
by Otisitswe Kebotogetse & Ravi Samikannu & Abid Yahya
July 2021, Volume 17, Issue 7
- 15501477211024846-15501477211024846 Sitsen: Passive sitting posture sensing based on wireless devices
by Miaoyu Li & Zhuohan Jiang & Yutong Liu & Shuheng Chen & Marcin Wozniak & Rafal Scherer & Robertas Damasevicius & Wei Wei & Ziyi Li & Zuxin Li - 15501477211028399-15501477211028399 Energy-efficient distributed heterogeneous clustered spectrum-aware cognitive radio sensor network for guaranteed quality of service in smart grid
by Emmanuel Ogbodo & David Dorrell & Adnan Abu-Mahfouz - 15501477211030121-15501477211030121 A balanced sensor scheduling for multitarget localization in a distributed multiple-input multiple-output radar network
by Chenggang Wang & Zengfu Wang & Xiong Xu & Yuhang Hao - 15501477211030122-15501477211030122 A mobile sink–integrated framework for the collection of farmland wireless sensor network information based on a virtual potential field
by Ying Yang & Wude Yang & Huarui Wu & Yisheng Miao - 15501477211031473-15501477211031473 A novel divergence measure in Dempster–Shafer evidence theory based on pignistic probability transform and its application in multi-sensor data fusion
by Shijun Xu & Yi Hou & Xinpu Deng & Peibo Chen & Kewei Ouyang & Ye Zhang - 15501477211031748-15501477211031748 A satellite selection algorithm based on adaptive simulated annealing particle swarm optimization for the BeiDou Navigation Satellite System/Global Positioning System receiver
by Ershen Wang & Caimiao Sun & Chuanyun Wang & Pingping Qu & Yufeng Huang & Tao Pang - 15501477211031750-15501477211031750 An UAV-assisted VANET architecture for intelligent transportation system in smart cities
by Ali Raza & Syed Hashim Raza Bukhari & Farhan Aadil & Zeshan Iqbal - 15501477211033761-15501477211033761 Calculation of deception probability of netted radar based on non-central chi-square distribution
by Yue Yuan & Gang-yi Tu & Ben Wang & Ling-ling Wang - 15501477211033764-15501477211033764 BeiDou satellites cross-regional communication path assignment model and resource management
by Sheng Liu & Di Wu & Lanyong Zhang - 15501477211034071-15501477211034071 Bio-inspired cluster–based optimal target identification using multiple unmanned aerial vehicles in smart precision agriculture
by Abdu Salam & Qaisar Javaid & Masood Ahmad - 15501477211035332-15501477211035332 ScalEdge: A framework for scalable edge computing in Internet of things–based smart systems
by Mohammad Babar & Muhammad Sohail Khan - 15501477211036383-15501477211036383 Research on time synchronization of linear pulse-coupled oscillators model with delay in nearest neighbor wireless multi-hop networks
by Lizhen Cui & Jian Cao & Zhulin An & Yong Yang & Qianqian Guo - 15501477211036877-15501477211036877 Distributed sensing units deploying on group unmanned vehicles
by Bao Rong Chang & Hsiu-Fen Tsai & Jyong-Lin Lyu & Chien-Feng Huang
June 2021, Volume 17, Issue 6
- 15501477211017820-15501477211017820 Cost-effective reliable transmission service for Internet of Flying Things
by Najmul Hassan & Noor M Khan - 15501477211017825-15501477211017825 Pilot design for underwater MIMO cosparse channel estimation based on compressed sensing
by Yun Li & Lingxia Liao & Shanlin Sun & Zhicheng Tan & Xing Yao - 15501477211021525-15501477211021525 Adaptive coverage control for multi-USV system in complex environment with unknown obstacles
by Yao Yao & Jun-Hua Cao & Yi Guo & Zhun Fan & Bing Li & Biao Xu & Ke Li - 15501477211023010-15501477211023010 Incentive mechanism based on Stackelberg game under reputation constraint for mobile crowdsensing
by Xiaoxiao Yang & Jing Zhang & Jun Peng & Lihong Lei - 15501477211023021-15501477211023021 Meta-heuristic-based offloading task optimization in mobile edge computing
by Aamir Abbas & Ali Raza & Farhan Aadil & Muazzam Maqsood - 15501477211023022-15501477211023022 Optimal sensor placements using modified Fisher information matrix and effective information algorithm
by Eun-Taik Lee & Hee-Chang Eun - 15501477211024838-15501477211024838 Throughput optimization of multi-hop and multi-path cooperation in WPSNs with hardware noises
by Lina Yuan & Huajun Chen & Jing Gong - 15501477211026804-15501477211026804 An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities
by Xueya Xia & Sai Ji & Pandi Vijayakumar & Jian Shen & Joel J. P. C. Rodrigues
May 2021, Volume 17, Issue 5
- 15501477211015145-15501477211015145 HackerRank: Identifying key hackers in underground forums
by Cheng Huang & Yongyan Guo & Wenbo Guo & Ying Li - 15501477211015147-15501477211015147 On-demand multi-hop forwarding for sustainable vehicular data transfer network
by Ayoub el Bendali & Anis Ur Rahman & Asad Waqar Malik & Muazzam Ali Khan & Sri Devi Ravana - 15501477211016757-15501477211016757 A bagging tree-based pseudorange correction algorithm for global navigation satellite system positioning in foliage canyons
by Fan Qin & Linxia Fu & Yuanqing Wang & Yi Mao - 15501477211018126-15501477211018126 Apply IOT technology to practice a pandemic prevention body temperature measurement system: A case study of response measures for COVID-19
by Wei-Ling Lin & Chun-Hung Hsieh & Tung-Shou Chen & Jeanne Chen & Jian-Le Lee & Wei-Chung Chen - 15501477211018140-15501477211018140 Improved whale optimization algorithm and its application in heterogeneous wireless sensor networks
by Yinggao Yue & Hairong You & Shuxin Wang & Li Cao - 15501477211018346-15501477211018346 Application research on the time–frequency analysis method in the quality detection of ultrasonic wire bonding
by Wuwei Feng & Xin Chen & Cuizhu Wang & Yuzhou Shi - 15501477211018374-15501477211018374 An improved traffic lights recognition algorithm for autonomous driving in complex scenarios
by Ziyue Li & Qinghua Zeng & Yuchao Liu & Jianye Liu & Lin Li - 15501477211018623-15501477211018623 A low-complexity, energy-efficient data securing model for wireless sensor network based on linearly complex voice encryption mechanism of GSM technology
by M Saud Khan & Noor M Khan & Ahmad Khan & Farhan Aadil & M Tahir & M Sardaraz - 15501477211019911-15501477211019911 Research on error compensation in the process of geomagnetic sensor measurement
by Zhang Pingan & Wang Wei & Gao Ming & Wang Yi - 15501477211019912-15501477211019912 User preference–based QoS-aware service function placement in IoT-Edge cloud
by Briytone Mutichiro & Younghan Kim
April 2021, Volume 17, Issue 4
- 15501477211007407-15501477211007407 Identification of cucumber leaf diseases using deep learning and small sample size for agricultural Internet of Things
by Jingyao Zhang & Yuan Rao & Chao Man & Zhaohui Jiang & Shaowen Li - 15501477211007411-15501477211007411 Maximizing network throughput by cooperative reinforcement learning in clustered solar-powered wireless sensor networks
by Yujia Ge & Yurong Nan & Xianhai Guo - 15501477211007412-15501477211007412 Parameter analysis and optimization of polling-based medium access control protocol for multi-sensor communication
by Jialin Guo & Fufang Li & Tian Wang & Shaobo Zhang & Yuqing Zhao - 15501477211009047-15501477211009047 Graph-based service recommendation in Social Internet of Things
by Yuanyi Chen & Yanyun Tao & Zengwei Zheng & Dan Chen - 15501477211009808-15501477211009808 Detection of smoke from infrared image frames in the aircraft cargoes
by Li Deng & Qian Chen & Yuanhua He & Xiubao Sui & Qin Wang - 15501477211009814-15501477211009814 UAV attitude estimation based on MARG and optical flow sensors using gated recurrent unit
by Xiaoqin Liu & Xiang Li & Qi Shi & Chuanpei Xu & Yanmei Tang - 15501477211010663-15501477211010663 A Janus compatible software-defined underwater acoustic multiple-input multiple-output modem
by Surinder Singh & Mark Crispo & Jean-François Bousquet & Shadi Aljendi - 15501477211014131-15501477211014131 Improved simultaneous localization and mapping algorithm combined with semantic segmentation model
by Xuerong Cui & Shengjie Xue & Juan Li & Shibao Li & Jianhang Liu & Haihua Chen - 15501477211014132-15501477211014132 Medical image security authentication method based on wavelet reconstruction and fractal dimension
by Tiankai Sun & Xingyuan Wang & Da Lin & Rong Bao & Daihong Jiang & Bin Ding & Dan Li - 1550147721992298-1550147721992298 A novel topology optimization of coverage-oriented strategy for wireless sensor networks
by Shuxin Wang & Hairong You & Yinggao Yue & Li Cao
March 2021, Volume 17, Issue 3
- 15501477211000287-15501477211000287 A simulation work for generating a novel dataset to detect distributed denial of service attacks on Vehicular Ad hoc NETwork systems
by Fahd A Alhaidari & Alia Mohammed Alrehan - 15501477211001760-15501477211001760 Time-constrained strong multi-designated verifier signature suitable for Internet of things–based collaborative fog computing systems
by Han-Yu Lin - 15501477211003767-15501477211003767 Tightly combined triple-frequency GPS and BDS for rapid wide-lane RTK positioning with consideration of carrier-phase differential inter-system bias
by Wang Gao & Shuguo Pan & Liwei Liu & He Wen - 15501477211003830-15501477211003830 Resource scheduling based on routing tree and detection matrix for Internet of things
by Hongying Bai & Xiaotong Zhang & Yuxin Liu & Yingdong Xie - 15501477211004112-15501477211004112 Nonlinear time series prediction algorithm based on AD-SSNET for artificial intelligence–powered Internet of Things
by Banteng Liu & Wei Chen & Meng Han & Zhangquan Wang & Ping Sun & Xiaowen Lv & Jiaming Xu & Zegao Yin - 15501477211004115-15501477211004115 A new polar alignment algorithm based on the Huber estimation filter with the aid of BeiDou Navigation Satellite System
by Bin Zhao & Qinghua Zeng & Jianye Liu & Chunlei Gao & Tianyu Zhao - 15501477211006346-15501477211006346 Research of vehicular cloud storage resource management based on trust mechanism
by Jin Wang & Miao Zhang & Xiang Gu & Tiequan Wang & Jie Wang & Liang Chen - 1550147721997218-1550147721997218 Server consolidation: A technique to enhance cloud data center power efficiency and overall cost of ownership
by Mueen Uddin & Mohammed Hamdi & Abdullah Alghamdi & Mesfer Alrizq & Mohammad Sulleman Memon & Maha Abdelhaq & Raed Alsaqour - 1550147721999616-1550147721999616 BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing
by Yuting Zuo & Zhaozhe Kang & Jian Xu & Zhide Chen - 1550147721999986-1550147721999986 Internet of things for health and well-being applications
by Oresti Banos & Joseph Rafferty & Luis A Castro
February 2021, Volume 17, Issue 2
- 1550147720980326-1550147720980326 Lightweight load-balanced and authentication scheme for a cluster-based wireless sensor network
by Jiliang Zhou & Ziqiang Lin - 1550147720986113-1550147720986113 Compressive sampling–based ultrasonic computerized tomography technique for damage detection in concrete-filled steel tube in a bridge
by Binbin Li & Bo Liu & Fan Xu & Yang Liu & Wentao Wang & Tao Yang - 1550147721991706-1550147721991706 An efficient routing protocol for internet of medical things focusing hot spot node problem
by Ghufran Ahmed & Danish Mehmood & Khurram Shahzad & Rauf Ahmed Shams Malick - 1550147721991770-1550147721991770 Interval analysis-based Bi-iterative algorithm for robust TDOA-FDOA moving source localisation
by Ningning Qin & Chao Wang & Changxu Shan & Le Yang - 1550147721992626-1550147721992626 Research on emitter individual identification technology based on Automatic Dependent Surveillance–Broadcast signal
by Shiwen Chen & Junjian Yuan & Xiaopeng Xing & Xin Qin - 1550147721992730-1550147721992730 A video steganalysis method based on coding cost variation
by Jianyi Liu & Cong Zhang & Ru Zhang & Yi Li & Jie Cheng - 1550147721992881-1550147721992881 Editorial
by Chi-Hua Chen & Kuo-Ming Chao & Feng-Jang Hwang & Chunjia Han & Lianrong Pu - 1550147721992883-1550147721992883 Editorial
by Hiram Ponce & Lourdes MartÃnez-Villaseñor & Gregory O’Hare & José Roberto Ayala-Solares - 1550147721993402-1550147721993402 A trajectory data publishing algorithm satisfying local suppression
by Xiaohui Li & Yuliang Bai & Yajun Wang & Bo Li - 1550147721993403-1550147721993403 A dynamic service migration strategy based on mobility prediction in edge computing
by Lanlan Rui & Shuyun Wang & Zhili Wang & Ao Xiong & Huiyong Liu - 1550147721993410-1550147721993410 A node localization algorithm based on Voronoi diagram and support vector machine for wireless sensor networks
by Zhanjun Hao & Jianwu Dang & Yan Yan & Xiaojuan Wang - 1550147721994424-1550147721994424 A low-delay information sharing algorithm for multiple-radio-per-platform networking
by Ge Lin & Xu Renhui & Peng Laixian & Li Aijing & Yang Yaoqi