| alpha-Fraction First Strategy for Hierarchical Model in Wireless Sensor Networks |
48 |
| Research on Cost-Driven Services Composition in an Uncertain Environment |
43 |
| Feature Extraction and Area Identification of Wireless Channel in Mobile Communication |
21 |
| A Clustering Scheme for Wireless Sensor Networks Based on Genetic Algorithm and Dominating Set |
20 |
| Research on 3D Positioning of Handheld Terminal Based on Particle Swarm Optimization |
9 |
| Algorithm Research of Known-plaintext Attack on Double Random Phase Mask Based on WSNs |
9 |
| A Privacy-preserving BGN-type Parallel Homomorphic Encryption Algorithm Based on LWE |
8 |
| Hyperspectral Image Recognition Using SVM Combined Deep Learning |
7 |
| A Novel Nodes Deployment Assignment Scheme with Data Association Attributed in Wireless Sensor Networks |
5 |
| Dynamic Content Selection Framework Applied to Coverless Information Hiding |
5 |
| Knowledge Structure and Its Impact on Knowledge Transfer in the Big Data Environment |
5 |
| A Gait Sequence Analysis for IP Camera Using a Modified LBP |
4 |
| An Efficient Hash-based RFID Grouping Authentication Protocol Providing Missing Tags Detection |
4 |
| Employing MCDM Methodology to Verify Correlationship between Social Media and Service Quality in the Dynamic M-commerce Era |
4 |
| Software Defined Wireless Sensor Networks (SDWSN): A Review on Efficient Resources, Applications and Technologies |
4 |
| A Fog Computing-based IoT Framework for Precision Agriculture |
4 |
| Development of Path Planning Approach Using Improved A-star Algorithm in AGV System |
4 |
| Smart Fire Evacuation Service Based on Internet of Things Computing for Web3D |
3 |
| A Novel Rough Fuzzy Clustering Algorithm with A New Similarity Measurement |
3 |
| Disjoint Multipath Based Secure Routing in Opportunistic Networks |
3 |
| Cloud-based Personal Data Protection System and Its Performance Evaluation |
3 |
| Based on QoS and Energy Efficiency Virtual Machines Consolidation Techniques in Cloud |
3 |
| Cloud-enabled Software-Defined Vehicular Networks: Architecture, Applications and Challenges |
3 |
| Fingerprint Liveness Detection Using Histogram of Oriented Gradient Based Texture Feature |
3 |
| An Energy-aware Method for Multi-domain Service Function Chaining |
3 |
| Hybrid Recommendation Algorithm Based on Latent Factor Model and PersonalRank |
3 |
| Fast American Sign Language Image Recognition Using CNNs with Fine-tuning |
3 |
| Self-enforcing Game Theory-based Resource Allocation for LoRaWAN Assisted Public Safety Communications |
3 |
| Intelligence Augmented Reality Tutoring System for Mathematics Teaching and Learning |
3 |
| Packet Scheduling Using SVM Models in Wireless Communication Networks |
3 |
| Prompt Image Search with Deep Convolutional Neural Network via Efficient Hashing Code and Addictive Latent Semantic Layer |
3 |
| MeteCloud: Meteorological Cloud Computing Platform for Mobile Weather Forecasts based on Energy-aware Scheduling |
2 |
| Investigation on the Traffic Flow Based on Wireless Sensor Network Technologies Combined with FA-BPNN Models |
2 |
| An Improved Lightweight Identity Authentication Protocol for VANET |
2 |
| Short-time Traffic Flow Prediction Based on Wavelet Neural Network |
2 |
| A Proposed Framework Against Code Injection Vulnerabilities in Online Applications |
2 |
| Charismatic Learning: Students' Satisfaction with E-Learning in Higher Education |
2 |
| Mining of High Average-Utility Patterns with Item-Level Thresholds |
2 |
| A Further Study of Optimal Matrix Construction for Matrix Embedding Steganography |
2 |
| Deep Learning-Based Firework Video Pattern Classification |
2 |
| An Optimal Cache Resource Allocation in Fog Radio Access Networks |
2 |
| Authentications for Internet of Things Security: Threats, Challenges and Studies |
2 |
| A Novel Image Encryption Algorithm Based on Plaintext-related Hybrid Modulation Map |
2 |
| An Investigator Unearths Illegal Behavior via a Subliminal Channel |
2 |
| Method of Target Recognition in High-resolution Remote Sensing Image Based on Visual Saliency Mechanism and ROI Region Extraction |
2 |
| Decision Tree Generation Algorithm for Image-based Video Conferencing |
2 |
| The Implementation of Mobile Technologies in Higher Education: A Mobile Application for University Course Advising |
2 |
| HODetector: The Hidden Objects Detection Based on Static Semantic Information Library Outside Virtual Machine |
2 |
| CCNHCaching: A High-speed Caching Throughput Simulator for Information-Centric Networks |
2 |
| Capacity Gain in Spread Spectrum Based Collaborative Communication in Wireless Sensor Networks |
2 |