default search action
Computer Communications, Volume 195
Volume 195, November 2022
- G. Thirumal, Chiranjeev Kumar:
Multilevel sensor deployment approach in IIoT-based environmental monitoring system in underground coal mines. 1-13 - Min Zhang, Yanbao Guo, Qiuju Xie, Yuansheng Zhang, Deguo Wang, Jinzhong Chen:
Defect identification for oil and gas pipeline safety based on autonomous deep learning network. 14-26 - Palak Bagga, Ankush Mitra, Ashok Kumar Das, Pandi Vijayakumar, Youngho Park, Marimuthu Karuppiah:
Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system. 27-39
- Houssam ElBouanani, Chadi Barakat, Walid Dabbous, Thierry Turletti:
Passive delay measurement for fidelity monitoring of distributed network emulation. 40-48
- Arash Ghorbannia Delavar, Reza Akraminejad, Sahar Mozafari:
HDECO: A method for Decreasing energy and cost by using virtual machine migration by considering hybrid parameters. 49-60 - Kaimin Guo, Xin Xie, Sheng Chen, Heng Qi, Keqiu Li:
Efficient collision-slot utilization for missing tags identification in RFID system. 61-72
- Vinayakumar Ravi, Mamoun Alazab, Shymalagowri Selvaganapathy, Rajasekhar Chaganti:
A Multi-View attention-based deep learning framework for malware detection in smart healthcare systems. 73-81
- Erik Ortiz Guerra, Vitalio Alfonso Reguera, Cristian Duran-Faundez, Thi Mai Trang Nguyen:
Channel hopping for blind rendezvous in cognitive radio networks: A review. 82-98 - Julio César Huarachi Soto, Iandra Galdino, Egberto Caballero, Vinicius C. Ferreira, Débora C. Muchaluat-Saade, Célio Vinicius N. de Albuquerque:
A survey on vital signs monitoring based on Wi-Fi CSI data. 99-110
- Alisson Renan Svaigen, Azzedine Boukerche, Linnyer Beatrys Ruiz, Antonio A. F. Loureiro:
BioMixD: A Bio-Inspired and Traffic-Aware Mix Zone Placement Strategy for Location Privacy on the Internet of Drones. 111-123
- Le Zhang, Ye Du:
Resilience of space information network based on combination of complex networks and hypergraphs. 124-136
- Ghullam Murtaza Jatoi, Bhagwan Das, Sarang Karim, Jitander Kumar Pabani, Moez Krichen, Roobaea Alroobaea, Mahender Kumar:
Floating Nodes Assisted Cluster-Based Routing for Efficient Data Collection in Underwater Acoustic Sensor Networks. 137-147
- Libing Wu, Shuqin Cao, Yanjiao Chen, Jianxin Li, Jianqun Cui, Yanan Chang:
A cooperative mobility model for multiple autonomous vehicles. 148-161
- Dinesh Kumar Sah, Tarachand Amgoth, Korhan Cengiz, Yasser Ali Alshehri, Noha Alnazzawi:
TDMA policy to optimize resource utilization in Wireless Sensor Networks using reinforcement learning for ambient environment. 162-172
- Tapan Kumar Mohanta, Dushmanta Kumar Das:
Multiple objective optimization-based DV-Hop localization for spiral deployed wireless sensor networks using Non-inertial Opposition-based Class Topper Optimization (NOCTO). 173-186 - Vanlin Sathya, Muhammad Iqbal Rochman, Thomas Valerian Pasca, Monisha Ghosh:
Impact of hidden node problem in association and data transmission for LAA Wi-Fi coexistence. 187-206 - Houyu Zheng, Lin You, Gengran Hu:
A novel insurance claim blockchain scheme based on zero-knowledge proof technology. 207-216
- Perumalla Suman Prakash, Dwaram Kavitha, P. Chenna Reddy:
Energy and congestion-aware load balanced multi-path routing for wireless sensor networks in ambient environments. 217-226
- Jyoti Verma, Abhinav Bhandari, Gurpreet Singh:
iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System. 227-247
- Nicola Auricchio, Andrea Cappuccio, Francesco Caturano, Gaetano Perrone, Simon Pietro Romano:
An automated approach to Web Offensive Security. 248-261 - Kishalay Bairagi, Sulata Mitra, Uma Bhattacharya:
Multi-objective optimization for coverage aware energy consumption in wireless 3D video sensor network. 262-280 - Yanping Liu, Chunju Tang:
Concurrent multi-beam transmissions for reliable communication in millimeter-wave networks. 281-291 - Panduranga Ravi Teja, Pavan Kumar Mishra:
Path selection and resource allocation for 5G multi-hop D2D networks. 292-302 - Dimitrios Zorbas:
Improving LoRaWAN downlink performance in the EU868 spectrum. 303-314
- T. V. Ramana, M. Thirunavukkarasan, Amin Salih Mohammed, Ganesh Gopal Deverajan, Senthil Murugan Nagarajan:
Ambient intelligence approach: Internet of Things based decision performance analysis for intrusion detection. 315-322
- Xing Liu, Qi Wang, Chengming Zou, Mei Yu, Denghong Liao:
Edge intelligence for smart airport runway: Architectures and enabling technologies. 323-333 - Jiayin Zhang, Huiqun Yu, Guisheng Fan, Zengpeng Li:
Cold-start aware cloud-native service function chain caching in resource-constrained edge: A reinforcement learning approach. 334-345
- Shaashwat Agrawal, Sagnik Sarkar, Ons Aouedi, Gokul Yenduri, Kandaraj Piamrat, Mamoun Alazab, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu:
Federated Learning for intrusion detection system: Concepts, challenges and future directions. 346-361
- Christian Grasso, Raoul Raftopoulos, Giovanni Schembra:
Slicing a FANET for heterogeneous delay-constrained applications. 362-375
- Enzo Baccarelli, Michele Scarpiniti, Alireza Momenzadeh, Sima Sarv Ahrabi:
AFAFed - Asynchronous Fair Adaptive Federated learning for IoT stream applications. 376-402
- Marco Skocaj, Lorenzo Mario Amorosa, Giorgio Ghinamo, Giuliano Muratore, Davide Micheli, Flavio Zabini, Roberto Verdone:
Cellular Network Capacity and Coverage Enhancement with MDT Data and Deep Reinforcement Learning. 403-415
- Jun Tu, Jia Zhou, Donglin Ren:
An asynchronous distributed training algorithm based on Gossip communication and Stochastic Gradient Descent. 416-423 - Daniel Bezerra, Assis Tiago Oliveira Filho, Iago Richard Rodrigues Silva, Marrone Dantas, Gibson B. N. Barbosa, Ricardo S. Souza, Judith Kelner, Djamel Sadok:
A machine learning-based optimization for end-to-end latency in TSN networks. 424-440
- Ahmed Barnawi, Neeraj Kumar, Ishan Budhiraja, Krishan Kumar, Amal Almansour, Bander A. Alzahrani:
Deep reinforcement learning based trajectory optimization for magnetometer-mounted UAV to landmine detection. 441-450 - Kaushik Ray, Vipin Pal, Gaurav Singal, Soumen Moulik:
Fuzzy-MAC: An FIS based MAC protocol for a multi-constrained traffic in wireless body area networks. 451-462
- Renata do Nascimento Mota Macambira, Celso Barbosa Carvalho, José Ferreira de Rezende:
Energy-efficient routing in LEO satellite networks for extending satellites lifetime. 463-475 - Yanghao Xie, Yuyang Kong, Lin Huang, Sheng Wang, Shizhong Xu, Xiong Wang, Jing Ren:
Resource allocation for network slicing in dynamic multi-tenant networks: A deep reinforcement learning approach. 476-487
- Jiaju Tan, Qili Zhao, Xuemei Guo, Xin Zhao, Guoli Wang:
A review on uncertainty quantification of shadowing reconstruction and signal measurements in Radio Tomographic Imaging. 488-498
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.