default search action
Computer Communications, Volume 150
Volume 150, January 2020
- Gines Garcia-Aviles, Marco Gramaglia, Pablo Serrano, Francesco Gringoli, Sergio Fuente-Pascual, Ignacio Labrador Pavón:
Experimenting with open source tools to deploy a multi-service and multi-slice mobile network. 1-12
- Rajanpreet Kaur Chahal, Neeraj Kumar, Shalini Batra:
Trust management in social Internet of Things: A taxonomy, open issues, and challenges. 13-46
- Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Emergent properties, models, and laws of behavioral similarities within groups of twitter users. 47-61
- Xiaoxiang Zhou:
Wearable health monitoring system based on human motion state recognition. 62-71
- Rodolfo W. L. Coutinho, Azzedine Boukerche, Antonio A. F. Loureiro:
A novel opportunistic power controlled routing protocol for internet of underwater things. 72-82
- Quang-Huy Nguyen, Michel Morold, Klaus David, Falko Dressler:
Car-to-Pedestrian communication with MEC-support for adaptive safety of Vulnerable Road Users. 83-93
- B. Nivedetha, Ila Vennila:
FFBKS: Fuzzy Fingerprint Biometric Key Based Security Schema for Wireless Sensor Networks. 94-102
- Boubakr Nour, Kashif Sharif, Fan Li, Hassine Moungla, Yang Liu:
A unified hybrid information-centric naming scheme for IoT applications. 103-114
- Christophe Guyeux, Mohammed Haddad, Mourad Hakem, Matthieu Lagacherie:
Efficient distributed average consensus in wireless sensor networks. 115-121
- Xiang Wu, Huanhuan Wang, Dashun Wei, Minyu Shi:
ANFIS with natural language processing and gray relational analysis based cloud computing framework for real time energy efficient resource allocation. 122-130 - Fahim Niaz, Muhammad Khalid, Zahid Ullah, Nauman Aslam, Mohsin Raza, Priyan Malarvizhi Kumar:
A bonded channel in cognitive wireless body area network based on IEEE 802.15.6 and internet of things. 131-143
- V. Deeban Chakravarthy, B. Amutha:
Software-defined network assisted packet scheduling method for load balancing in mobile user concentrated cloud. 144-149
- M. Anbarasan, BalaAnand Muthu, C. B. Sivaparthipan, Revathi Sundarasekar, Seifedine Nimer Kadry, Sujatha Krishnamoorthy, R. Dinesh Jackson Samuel, A. Antony Dasel:
Detection of flood disaster system based on IoT, big data and convolutional deep neural network. 150-157
- Dingfu Jiang:
The construction of smart city information system based on the Internet of Things and cloud computing. 158-166
- Yanping Jiang:
Combination of wearable sensors and internet of things and its application in sports rehabilitation. 167-176
- Jun Ma, Hongzhi Yu, Yan Xu, Kaiying Deng:
CDAM: Conservative data analytical model for dynamic climate information evaluation using intelligent IoT environment - An application perspective. 177-184
- V. Punitha, C. Mala:
Traffic classification for connectionless services with incremental learning. 185-199
- S. Jayanthi, C. Vennila:
Performance improvement in satellite image classification using adaptive supervised multi-resolution approach. 200-208 - Thiyagarajan Paramasivan, S. SenthilKumar:
Power efficient Memetic Optimized and Adjacent Exponentially Distributed Routing in Mobile Ad Hoc Networks. 209-215
- Fayez Alqahtani, Zafer Al-Makhadmeh, Amr Tolba, Omar Said:
TBM: A trust-based monitoring security scheme to improve the service authentication in the Internet of Things communications. 216-225 - R. P. Meenaakshi Sundhari, K. Jaikumar:
IoT assisted Hierarchical Computation Strategic Making (HCSM) and Dynamic Stochastic Optimization Technique (DSOT) for energy optimization in wireless sensor networks for smart city monitoring. 226-234
- Gifty R., Bharathi R.:
Weibull Cumulative Distribution based real-time response and performance capacity modeling of Cyber-Physical Systems through software defined networking. 235-244 - Yalan Wu, Jigang Wu, Long Chen, Jiaquan Yan, Yuchong Luo:
Efficient task scheduling for servers with dynamic states in vehicular edge computing. 245-253
- Zhao Qian, Fengbin Zhang:
An reactive void handling algorithm in sensor networks and IoT emergency management. 254-261
- Gifty R., Bharathi R., Krishnakumar P.:
Faulty-data detection and data quality measure in cyber-physical systems through Weibull distribution. 262-268
- Song Liu, Runlan Zhang, Yongheng Shi:
Design of coverage algorithm for mobile sensor networks based on virtual molecular force. 269-277
- Mohamed Hashem, Abdulaziz A. Al Kheraif, Hassan Fouad:
Design and development of wireless wearable bio-tooth sensor for monitoring of tooth fracture and its bio metabolic components. 278-285
- Irfan Simsek:
Blind Packet Forwarding in a Hierarchical Level-based Locator/Identifier Split. 286-303
- Jianmin Liu, Qi Wang, Chentao He, Katia Jaffrès-Runser, Yida Xu, Zhenyu Li, Yongjun Xu:
QMR: Q-learning based Multi-objective optimization Routing protocol for Flying Ad Hoc Networks. 304-316
- M. Jamunarani, C. Vasanthanayaki:
Network condition based multi-level image compression and transmission in WSN. 317-324
- Kun Liu, Yunrui Bi, Di Liu:
Internet of Things based acquisition system of industrial intelligent bar code for smart city applications. 325-333
- Akbar Majidi, Nazila Jahanbakhsh, Xiaofeng Gao, Jiaqi Zheng, Guihai Chen:
DC-ECN: A machine-learning based dynamic threshold control scheme for ECN marking in DCN. 334-345
- Yan Liu, Wei Zhang, Shuwen Pan, Yanjun Li, Yangting Chen:
Analyzing the robotic behavior in a smart city with deep enforcement and imitation learning using IoRT. 346-356
- Hua Huang, Shan Lin:
WiDet: Wi-Fi based device-free passive person detection with deep convolutional neural networks. 357-366
- Palash Roy, Anika Tahsin, Sujan Sarker, Tamal Adhikary, Md. Abdur Razzaque, Mohammad Mehedi Hassan:
User mobility and Quality-of-Experience aware placement of Virtual Network Functions in 5G. 367-377
- Muhammad Awais Khan, Sherif Adeshina Busari, Kazi Mohammed Saidul Huq, Shahid Mumtaz, Saba Al-Rubaye, Jonathan Rodriguez, Anwer Al-Dulaimi:
A novel mapping technique for ray tracer to system-level simulation. 378-383
- Zhigang Deng, Longjiang Wang, Weijian Liu, Zhenwei Wang, Qiule E.:
Mathematical modeling and fuzzy approach for disaster analysis on geo-spatial rock mass in open-pit mining. 384-392
- Alvaro Bernal, Matias Richart, Marc Ruiz, Alberto Castro, Luis Velasco:
Near real-time estimation of end-to-end performance in converged fixed-mobile networks. 393-404
- Ahmad Ali AlZubi, Abdulaziz Alarifi, Mohammed Al-Maitah, Omar A. Albasheer:
Location assisted delay-less service discovery method for IoT environments. 405-412
- Ke Wang:
Migration strategy of cloud collaborative computing for delay-sensitive industrial IoT applications in the context of intelligent manufacturing. 413-420 - Xianming Huang:
Intelligent remote monitoring and manufacturing system of production line based on industrial Internet of Things. 421-428
- Ranran Wang, Xiao Ma, Chi Jiang, Yi Ye, Yin Zhang:
Heterogeneous information network-based music recommendation system in mobile networks. 429-437 - Sareena Karapoola, Prasanna Karthik Vairam, Shankar Raman, Veezhinathan Kamakoti:
Net-Police: A network patrolling service for effective mitigation of volumetric DDoS attacks. 438-454
- Xiaomeng Wang, Binxing Fang, Hongli Zhang, Xing Wang:
Predicting the security threats on the spreading of rumor, false information of Facebook content based on the principle of sociology. 455-462
- S. Kalaivani, C. Tharini:
Analysis and implementation of novel Rice Golomb coding algorithm for wireless sensor networks. 463-471 - Suganya P., CH Pradeep Reddy:
LNR-PP: Leaf Node Count and RSSI Based Parent Prediction Scheme to Support QoS in Presence of Mobility in 6LoWPAN. 472-487
- Jingjing Zhao, Qingyue Hu, Gaoyang Liu, Xiaoqiang Ma, Fei Chen, Mohammad Mehedi Hassan:
AFA: Adversarial fingerprinting authentication for deep neural networks. 488-497
- Rashid Ali, Byung-Seo Kim, Sung Won Kim, Hyung Seok Kim, Farruh Ishmanov:
(ReLBT): A Reinforcement learning-enabled listen before talk mechanism for LTE-LAA and Wi-Fi coexistence in IoT. 498-505
- Brahim Djellabi, Mohamed F. Younis, Mourad Amad:
Effective peer-to-peer design for supporting range query in Internet of Things applications. 506-518
- Fadi Al-Turjman, Mohammad Abujubbeh, Arman Malekloo, Leonardo Mostarda:
UAVs assessment in software-defined IoT networks: An overview. 519-536
- T. Murugeswari, S. Rathi:
Priority and interference aware multipath routing based communications for extreme surveillance systems. 537-546
- Tao Zhang:
Advanced Wavelet Sampling Algorithm for IoT based environmental monitoring and management. 547-555
- Gaoxiang Wu, Yiming Miao, Yu Zhang, Ahmed Barnawi:
Energy efficient for UAV-enabled mobile edge computing networks: Intelligent task prediction and offloading. 556-562
- M. Ramalingam, R. Thangarajan:
Mutated k-means algorithm for dynamic clustering to perform effective and intelligent broadcasting in medical surveillance using selective reliable broadcast protocol in VANET. 563-568
- Sumathi M., S. Sangeetha, Anu Thomas:
Generic cost optimized and secured sensitive attribute storage model for template based text document on cloud. 569-580
- Vesna Gersak, Helena Smrtnik Vitulic, Simona Prosen, Gregor Starc, Iztok Humar, Gregor Gersak:
Use of wearable devices to study activity of children in classroom; Case study - Learning geometry using movement. 581-588
- Vicente Mayor, Rafael Estepa, Antonio Jose Estepa, Germán Madinabeitia:
Unified call admission control in corporate domains. 589-602
- Sandeep Saharan, Seema Bawa, Neeraj Kumar:
Dynamic pricing techniques for Intelligent Transportation System in smart cities: A systematic review. 603-625
- Zhenzhen Huang, Qiang Niu, Shuo Xiao, Tianxu Li:
Energy harvesting algorithm considering max flow problem in wireless sensor networks. 626-633
- Chandrasegar Thirumalai, Senthilkumar Mohan, Gautam Srivastava:
An efficient public key secure scheme for cloud and IoT security. 634-643
- Fadi Al-Turjman, Muhammad Hassan Nawaz, Umit Deniz Ulusar:
Intelligence in the Internet of Medical Things era: A systematic review of current and future trends. 644-660
- Bing Bai, Yong Cao, Xiaozheng Li:
DTMM: Evacuation oriented optimized scheduling model for disaster management. 661-671
- Renan Cerqueira Afonso Alves, Cíntia Borges Margi, Fernando A. Kuipers:
Know when to listen: SDN-based protocols for directed IoT networks. 672-686
- Tongqian Peng:
A novel motion detecting strategy for rehabilitation in smart home. 687-695
- Tao Han, Jefferson S. Almeida, Suane Pires P. da Silva, Paulo Honório Filho, Antonio Wendell De Oliveira Rodrigues, Victor Hugo C. de Albuquerque, Pedro Pedrosa Rebouças Filho:
An effective approach to unmanned aerial vehicle navigation using visual topological map in outdoor and indoor environments. 696-702
- Amitesh Singh Rajput, Balasubramanian Raman:
A privacy-preserving protocol for efficient nighttime haze removal using cloud based automatic reference image selection and color transfer as a service. 703-718
- Amr Tolba, Zafer Al-Makhadmeh:
A recursive learning technique for improving information processing through message classification in IoT-cloud storage. 719-728 - Zhuang Wu, Shanshan Jiang, Xiaolei Zhou, Yuanyuan Wang, Yuanyuan Zuo, Zhewei Wu, Lei Liang, Qi Liu:
Application of image retrieval based on convolutional neural networks and Hu invariant moment algorithm in computer telecommunications. 729-738
- R. Suguna, Vimalathithan Rathinasabapathy:
A novel high speed Low Latency Column Bit Compressed MAC architecture for Wireless Sensor Network applications. 739-746
- Lanyong Zhang, Lei Liu, Lei Zhang:
Research on position correction method for AUV large depth navigation based on ranging positioning. 747-756
- Yi Lyu, Peng Yin:
Internet of Things transmission and network reliability in complex environment. 757-763 - P. Srinivasa Ragavan, K. Ramasamy:
Software defined networking approach based efficient routing in multihop and relay surveillance using Lion Optimization algorithm. 764-770 - N. Mohan:
Spread Spectrum Hop Count analyzing technique based code-division multiple access for data frequencies examining in wireless network. 771-776 - Palanivelu Rajmohan, P. S. S. Srinivasan:
Safety and security measurement in industrial environment based on smart IOT technology based augmented data recognizing scheme. 777-787
- Yang Hao, Yu Wu, P. G. Ranjith, Kai Zhang, Houquan Zhang, Yanlong Chen, Ming Li, Pan Li:
New insights on ground control in intelligent mining with Internet of Things. 788-798
- Deevi Radha Rani, G. Geethakumari:
Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN. 799-810
- Qiang Liu, Miao Li, Jun Yang, Jing Lv, Kai Hwang, M. Shamim Hossain, Ghulam Muhammad:
Joint power and time allocation in energy harvesting of UAV operating system. 811-817
- Fengmei Cui:
Deployment and integration of smart sensors with IoT devices detecting fire disasters in huge forest environment. 818-827
- Sania Khadim, Faisal Riaz, Sohail Jabbar, Shehzad Khalid, Moayad Aloqaily:
A non-cooperative rear-end collision avoidance scheme for non-connected and heterogeneous environment. 828-840
- Kaushik Roy Chowdhury, Marco Di Felice, Ibrahim Matta, Bo Sheng:
Special Issue on Wired/Wireless Internet Communications conference (IFIP WWIC 2017). 841-842
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.