


default search action
Computer Communications, Volume 160
Volume 160, July 2020
- Faisal Riaz, M. Mazhar Rathore
, Adnan Sohail, Naeem Iqbal Ratyal, Samia Abid, Samina Khalid, Tehmina Shehryar, Adil Waheed:
Emotion-controlled spectrum mobility scheme for efficient syntactic interoperability in cognitive radio-based unmanned vehicles. 1-13
- Nanliang Shan, Xiaolong Cui, Zhiqiang Gao:
"DRL + FL": An intelligent resource allocation model based on deep reinforcement learning for Mobile Edge Computing. 14-24
- Zheheng Rao, Yanyan Xu, Shaoming Pan:
An intelligent routing method based on network partition. 25-33
- Zhiliang Liu, Zengzhi Zou:
Analysis of network topology and deployment mode of 5G wireless access network. 34-42 - Abdulmonem Alsiddiky, Waleed Awwad
, Khalid Bakarman, Hassan Fouad
, Azza S. Hassanein, Ahmed M. Soliman
:
Priority-based data transmission using selective decision modes in wearable sensor based healthcare applications. 43-51
- Alexis Duque, Razvan Stanica, Hervé Rivano, Adrien Desportes:
Analytical and simulation tools for optical camera communications. 52-62
- Jin Zhao, Qiuxia Dong:
Allocation algorithm of CPS communication resources based on cooperative game. 63-70
- Daming Li, Zhiming Cai, Bin Qin, Lianbing Deng:
Signal frequency domain analysis and sensor fault diagnosis based on artificial intelligence. 71-80
- Tejasvi Alladi
, Vinay Chamola, Naren Naren, Neeraj Kumar
:
PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks. 81-90
- Hsin-Yao Hsu
, Gautam Srivastava, Hsin-Te Wu
, Mu-Yen Chen
:
Remaining useful life prediction based on state assessment using edge computing on deep learning. 91-100
- Qingguo Chen, Liqin Tang:
A wearable blood oxygen saturation monitoring system based on bluetooth low energy technology. 101-110
- Partha Pratim Ray
, Dinesh Dash, Neeraj Kumar
:
Sensors for internet of medical things: State-of-the-art, security and privacy issues, challenges and future directions. 111-131
- Junyan Zhou:
Artificial intelligence driven wireless network remote monitoring based on Diffie-Hellman parameter method. 132-138
- R. M. Swarna Priya
, Praveen Kumar Reddy Maddikunta
, Parimala M., Srinivas Koppu, Thippa Reddy Gadekallu
, Chiranji Lal Chowdhary, Mamoun Alazab
:
An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. 139-149
- Junjun Guo, Le Wang:
Learning to upgrade internet information security and protection strategy in big data era. 150-157
- Arne Meeuw, Sandro Schopfer, Anselma Wörner, Verena Tiefenbeck, Liliane Ableitner, Elgar Fleisch, Felix Wortmann:
Implementing a blockchain-based local energy market: Insights on communication and scalability. 158-171
- Georgia Koutsandria
, Valerio Di Valerio, Dora Spenza, Stefano Basagni, Chiara Petrioli:
Wake-up radio-based data forwarding for green wireless networks. 172-185
- Johannes K. Becker, Stefan Gvozdenovic, Liangxiao Xin, David Starobinski:
Testing and fingerprinting the physical layer of wireless cards with software-defined radios. 186-196
- Huihong Xu:
Fastest adaptive estimation algorithms for topological structure errors in smart grid networks. 197-203
- Qiaoni Han, Bo Yang, Nan Song, Yuwei Li, Ping Wei:
Green resource allocation and energy management in heterogeneous small cell networks powered by hybrid energy. 204-214 - Mengxia Shuai, Ling Xiong, Changhui Wang, Nenghai Yu:
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem. 215-227 - Murtaza Cicioglu
, Ali Çalhan:
Energy-efficient and SDN-enabled routing algorithm for wireless body area networks. 228-239
- Ana Paula Gomes Ferreira, Thiago Henrique Silva
, Antonio A. F. Loureiro:
Uncovering spatiotemporal and semantic aspects of tourists mobility using social sensing. 240-252
- Raed T. Al-Zubi, Mohannad T. Abu Issa, Ahmad A. Zghoul, Khalid A. Darabkh
, Yazid M. Khattabi
:
Analysis of system outage probability in underlay cognitive two-way amplify-and-forward relay networks. 253-262
- Ya-Qiong Duan, Lingda Zhang, Xiao-Yang Fan, Quanhua Hou, Xinmeng Hou:
Smart city oriented Ecological Sensitivity Assessment and Service Value Computing based on Intelligent sensing data processing. 263-273
- Baozhu Yu, Xuefen Chi, Hongliang Sun
:
Bandwidth abstraction and instantiation under closed-loop latency constraint for tactile slice based on martingale theory. 274-283
- Gerard Deepak, A. Santhana Vijayan:
OntoBestFit: A Best-Fit Occurrence Estimation strategy for RDF driven faceted semantic search. 284-298
- Fernando M. Ortiz
, Thales T. de Almeida, Ana Elisa Ferreira, Luís Henrique M. K. Costa
:
Experimental vs. simulation analysis of LoRa for vehicular communications. 299-310
- Ankur Gupta
, Meenakshi Tripathi, Aakar Sharma:
A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN. 311-325
- Zhicheng Zhou, Liang Zhao:
Cloud computing model for big data processing and performance optimization of multimedia communication. 326-332
- Lin Li:
Real time auxiliary data mining method for wireless communication mechanism optimization based on Internet of things system. 333-341
- Jian Sun:
Research on resource allocation of vocal music teaching system based on mobile edge computing. 342-350
- Rathin Chandra Shit
:
Precise localization for achieving next-generation autonomous navigation: State-of-the-art, taxonomy and future prospects. 351-374
- Joy Halder, Tamaghna Acharya, Monish Chatterjee
, Uma Bhattacharya:
On spectrum and energy efficient survivable multipath routing in off-line Elastic Optical Network. 375-387
- Arpita Bhargava, Shekhar Verma
:
KATE: Kalman Trust Estimator for Internet of Drones. 388-401
- Yan Zhou, Liyuan Li:
The 5G communication technology-oriented intelligent building system planning and design. 402-410
- Jui-Chan Huang, Ming-Hung Shu, Bi-Min Hsu, Chien-Ming Hu:
Service architecture of IoT terminal connection based on blockchain identity authentication system. 411-422
- Xiaoxiao Xu, Mingdan Han, Senthil Murugan Nagarajan, Prathik Anandhan:
Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignment. 423-430
- Xuran Li
, Hong-Ning Dai
, Qubeijian Wang, Muhammad Imran, Dengwang Li, Muhammad Ali Imran
:
Securing Internet of Medical Things with Friendly-jamming schemes. 431-442
- Sahil Vashisht, Sushma Jain, Gagangeet Singh Aujla
:
MAC protocols for unmanned aerial vehicle ecosystems: Review and challenges. 443-463
- Elías Grande, Marta Beltrán
:
Edge-centric delegation of authorization for constrained devices in the Internet of Things. 464-474
- Avani Sharma
, Emmanuel S. Pilli
, Arka Prokash Mazumdar, Poonam Gera:
Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes. 475-493
- Hean Liu
, Kim Yong Ki:
Application of wireless sensor network based improved immune gene algorithm in airport floating personnel positioning. 494-501
- Peng Sun, Azzedine Boukerche, Yanjie Tao:
SSGRU: A novel hybrid stacked GRU-based traffic volume prediction approach in a road network. 502-511
- Sanjeevi Pandiyan, T. Samraj Lawrence, V. Sathiyamoorthi
, Manikandan Ramasamy, Qian Xia, Ya Guo:
A performance-aware dynamic scheduling algorithm for cloud-based IoT applications. 512-520
- Munish Bhatia, Sandeep K. Sood
, Ankush Manocha
:
Fog-inspired smart home environment for domestic animal healthcare. 521-533
- Boutheina Dab, Ilhem Fajjari, Nadjib Aitsaadi:
Optimized wireless channel allocation in hybrid data center network based on IEEE 802.11ad. 534-546 - Xiaobo Fan, Xiaobo Xu:
Sparse representation for network traffic recovery. 547-553
- Vesal Hakami
, Seyedakbar Mostafavi
, Nastooh Taheri Javan
, Zahra Rashidi:
An optimal policy for joint compression and transmission control in delay-constrained energy harvesting IoT devices. 554-566
- Walid K. Ghamry
, Suzan Shukry
:
Performance evaluation of cooperative eigenvalue spectrum sensing GLRT under different impulsive noise environments in cognitive radio. 567-576 - Arash Bozorgchenani
, Simone Disabato
, Daniele Tarchi
, Manuel Roveri
:
An energy harvesting solution for computation offloading in Fog Computing networks. 577-587
- Huifeng Wang, Seifedine Nimer Kadry, Ebin Deni Raj:
Continuous health monitoring of sportsperson using IoT devices based wearable technology. 588-595
- Sulin Pang:
IOT platform of One-Key for Help APP and environment portfolio risk identification algorithm based on MIT. 596-606 - Juan Zhao, Xiaolong Xu, Wei-Ping Zhu:
Adaptive delay-constrained resource allocation in mobile edge computing for Internet of Things communications networks. 607-613
- Arvin Hekmati, Peyvand Teymoori, Terence D. Todd, Dongmei Zhao, George Karakostas:
Optimal multi-part mobile computation offloading with hard deadline constraints. 614-622
- Jiangfeng Xian
, Huafeng Wu, Xiaojun Mei
, Yuanyuan Zhang
, Huixing Chen, Jun Wang
:
NMTLAT: A New robust mobile Multi-Target Localization and Tracking Scheme in marine search and rescue wireless sensor networks under Byzantine attack. 623-635
- Shih-Yang Lin, Yun Du, Po-Chang Ko, Tzu-Jung Wu, Ping-Tsan Ho
, V. Sivakumar
, Rama Subbareddy:
Fog Computing Based Hybrid Deep Learning Framework in effective inspection system for smart manufacturing. 636-642
- Mahdi Abbasi
, Azad Shokrollahi
, Mohammad Reza Khosravi, Varun G. Menon
:
High-performance flow classification using hybrid clusters in software defined mobile edge computing. 643-660
- Mohammad Hadi Alaeiyan
, Saeed Parsa
, Vinod P, Mauro Conti
:
Detection of algorithmically-generated domains: An adversarial machine learning approach. 661-673 - Amirhosein Bodaghi
, Jonice Oliveira:
The characteristics of rumor spreaders on Twitter: A quantitative analysis on real data. 674-687
- Qi Yang, Jonghoon Yang:
HD video transmission of multi-rotor Unmanned Aerial Vehicle based on 5G cellular communication network. 688-696
- Shahzana Liaqat, Adnan Akhunzada
, Fatema Sabeen Shaikh
, Thanassis Giannetsos, Mian Ahmad Jan:
SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT). 697-705
- Yi-Han Xu, Yong-Bo Tian, Prosper Komla Searyoh, Gang Yu, Yueh-Tiam Yong
:
Deep Reinforcement Learning-based resource allocation strategy for Energy Harvesting-Powered Cognitive Machine-to-Machine Networks. 706-717
- Chaomin Li:
Information processing in Internet of Things using big data analytics. 718-729
- Shibing Yu, Zhen Jiang:
Design of the navigation system through the fusion of IMU and wheeled encoders. 730-737
- A. Shakin Banu, P. Vasuki, S. Md. Mansoor Roomi:
Target detection in SAR images using Bayesian Saliency and Morphological attribute profiles. 738-748
- Aldosary Saad
, Mohammad Al-Ma'aitah, Ayed Alwadain:
6G technology based advanced virtual multi-purpose embedding algorithm to solve far-reaching network effects. 749-758
- Shi Yang:
A joint optimization scheme for task offloading and resource allocation based on edge computing in 5G communication networks. 759-768
- Alessio Sacco
, Matteo Flocco, Flavio Esposito, Guido Marchetto:
An architecture for adaptive task planning in support of IoT-based machine learning applications for disaster scenarios. 769-778
- Zelalem Legese Hailemariam
, Yuan-Cheng Lai, Riyanto Jayadi, Yen-Hung Chen
, Sheng-Chi Huang:
A knowledge-based Query Tree with Shortcutting and Couple-Resolution for RFID tag identification. 779-789 - Shanshan Tu, Muhammad Waqas
, Yuan Meng, Sadaqat ur Rehman, Iftekhar Ahmad
, Anis Koubaa, Zahid Halim
, Muhammad Hanif
, Chin-Chen Chang, Chengjie Shi:
Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL. 790-798
- Hong Zhang, Xinxin Lu:
Vehicle communication network in intelligent transportation system based on Internet of Things. 799-806
- M. Vinoth Kumar
, R. Saravana Ram
, Saravana Balaji B.
, B. Amutha, M. Kowsigan
:
An improved migration scheme to achieve the optimal service time for the active jobs in 5G cloud environment. 807-814
- R. Vinoba, M. Vijayaraj:
Novel control topology with obstacle detection using RDPSO-GBA in mobile AD-HOC network. 847-857
- Carlos T. Calafate, Chaker Abdelaziz Kerrache, Marica Amadeo, Yusheng Ji, Syed Hassan Ahmed
:
Special Issue on Mobile Information Centric Networking. 858-859 - Theofanis P. Raptis
, Georgios Z. Papadopoulos
, Archan Misra
, Salil S. Kanhere
:
Special Issue on Data Distribution in Industrial and Pervasive Internet. 860-862 - Omer Irshad
, Muhammad Usman Ghani Khan, Razi Iqbal, Shakila Basheer
, Ali Kashif Bashir:
Corrigendum to "Performance optimization of IoT based biological systems using deep learning" [Computer Communications 155 (2020) 24-31]. 863

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.