| Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks |
30 |
| A Hybrid Intelligent System Framework for the Prediction of Heart Disease Using Machine Learning Algorithms |
18 |
| Reliable Flying IoT Networks for UAV Disaster Rescue Operations |
7 |
| Security and Privacy Issues in Vehicular Named Data Networks: An Overview |
7 |
| An Integrated SEM-Neural Network Approach for Predicting Determinants of Adoption of Wearable Healthcare Devices |
6 |
| Energy-Neutral Communication Protocol for Living-Tree Bioenergy-Powered Wireless Sensor Network |
5 |
| EpSoc: Social-Based Epidemic-Based Routing Protocol in Opportunistic Mobile Social Network |
5 |
| Efficient Certificateless Conditional Privacy-Preserving Authentication Scheme in VANETs |
5 |
| An Energy-Aware Task Offloading Mechanism in Multiuser Mobile-Edge Cloud Computing |
4 |
| A Heterogeneous IoV Architecture for Data Forwarding in Vehicle to Infrastructure Communication |
4 |
| A Clustering-Based Approach for Improving the Accuracy of UWB Sensor-Based Indoor Positioning System |
4 |
| Pattern-Identified Online Task Scheduling in Multitier Edge Computing for Industrial IoT Services |
4 |
| Improving Energy Efficiency of Multimedia Content Dissemination by Adaptive Clustering and D2D Multicast |
4 |
| An F-Score-Weighted Indoor Positioning Algorithm Integrating WiFi and Magnetic Field Fingerprints |
4 |
| System Performance of Cooperative NOMA with Full-Duplex Relay over Nakagami-m Fading Channels |
4 |
| Location-Based Test Case Prioritization for Software Embedded in Mobile Devices Using the Law of Gravitation |
3 |
| Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access |
3 |
| Adaptive Step Size Gradient Ascent ICA Algorithm for Wireless MIMO Systems |
3 |
| Developing a Contextually Personalized Hybrid Recommender System |
3 |
| Conjunctive and Disjunctive Keyword Search over Encrypted Mobile Cloud Data in Public Key System |
3 |
| Cascading Failure Model for Command and Control Networks Based on an m-Order Adjacency Matrix |
3 |
| Interactive and Immersive Learning Using 360 degrees Virtual Reality Contents on Mobile Platforms |
3 |
| Robust System Design Using BILP for Wireless Indoor Positioning Systems |
3 |
| The Impact of Container Virtualization on Network Performance of IoT Devices |
3 |
| Computer-Assisted Diagnosis for Diabetic Retinopathy Based on Fundus Images Using Deep Convolutional Neural Network |
3 |
| An Improved Collaborative Filtering Recommendation Algorithm and Recommendation Strategy |
3 |
| Efficient and Reliable Cluster-Based Data Transmission for Vehicular Ad Hoc Networks |
3 |
| Security Awareness Level of Smartphone Users: An Exploratory Case Study |
3 |
| Markov Approximation for Task Offloading and Computation Scaling in Mobile Edge Computing |
3 |
| A Cloud-Assisted Region Monitoring Strategy of Mobile Robot in Smart Greenhouse |
3 |
| TinyDroid: A Lightweight and Efficient Model for Android Malware Detection and Classification |
2 |
| Resource Allocation in Millimeter-Wave Device-to-Device Networks |
2 |
| TDSRC: A Task-Distributing System of Crowdsourcing Based on Social Relation Cognition |
2 |
| HotSpot Thermal Floorplan Solver Using Conjugate Gradient to Speed Up |
2 |
| RoC: Robust and Low-Complexity Wireless Indoor Positioning Systems for Multifloor Buildings Using Location Fingerprinting Techniques |
2 |
| Artificial Intelligence to Prevent Mobile Heart Failure Patients Decompensation in Real Time: Monitoring-Based Predictive Model |
2 |
| Optimization of Cognitive Radio Secondary Information Gathering Station Positioning and Operating Channel Selection for IoT Sensor Networks |
2 |
| An Analysis of Economic Impact on IoT Industry under GDPR |
2 |
| The Dangers of Rooting: Data Leakage Detection in Android Applications |
2 |
| A Sun Path Observation System Based on Augment Reality and Mobile Learning |
2 |
| An End-to-End Automation Framework for Mobile Network Testbeds |
2 |
| A New Vehicle Localization Scheme Based on Combined Optical Camera Communication and Photogrammetry |
2 |
| Smartwatch-Based Legitimate User Identification for Cloud-Based Secure Services |
2 |
| On the Context-Aware, Dynamic Spectrum Access for Robust Intraplatoon Communications |
2 |
| Mobile Edge Assisted Live Streaming System for Omnidirectional Video |
2 |
| An Efficient V2I Authentication Scheme for VANETs |
2 |
| An Education Application for Teaching Robot Arm Manipulator Concepts Using Augmented Reality |
2 |
| CEnsLoc: Infrastructure-Less Indoor Localization Methodology Using GMM Clustering-Based Classification Ensembles |
2 |
| User Association and Small-Cell Base Station On/Off Strategies for Energy Efficiency of Ultradense Networks |
2 |
| Cryptocurrency Networks: A New P2P Paradigm |
2 |