![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
1,665 Result(s)
-
Article
A novel multi-objective optimized DAG task scheduling strategy for fog computing based on container migration mechanism
In order to solve the complex task scheduling problem of fog computing processing big data in the industrial Internet of Things, a task scheduling strategy based on ant colony algorithm called TSSAC (task sche...
-
Article
Conjunctive searchable encryption with efficient authorization for group sharing
Multi-user searchable encryption (MUSE) schemes provide solutions for searching over ciphertexts shared by different users, but the significant overhead of communication and computation leads to high latency i...
-
Article
A supervised privacy preservation transaction system for aviation business
Data security is a crucial issue for aviation business transaction. In order to prevent privacy leakage for the business participants, it is essential to construct a credible transaction environment. For this ...
-
Article
Cloud Computing-aided Multi-type Data Fusion with Correlation for Education
As one of the major constitutes of human society, education has been continuously producing a huge amount of data and become an important of sources of big data. Deeply mining and analyzing these big education...
-
Article
Cooperative positioning of UAV internet of things based on optimization algorithm
Unmanned Aerial Vehicle (UAV) Internet of things have been widely used in military and civilian fields such as rescue, disaster relief, urban planning. Positioning service is the core technology for UAVs to pe...
-
Article
Open AccessMulti-aspect detection and classification with multi-feed dynamic frame skip** in vehicle of internet things
Consumer demand for automobiles is changing because of the vehicle’s dependability and utility, and the superb design and high comfort make the vehicle a wealthy object class. The creation of object classes ne...
-
Article
Open AccessResearch on multifractal dimension and improved gray relation theory for intelligent satellite signal recognition
In the wake of the development and advancement of signal processing technology for communication radiation source individual, Signal fingerprint feature extraction and analysis technology for communication rad...
-
Article
Variable length deep cross-modal hashing based on Cauchy probability function
With the rapid development of multimedia technology, considerable achievement has been achieved in image retrieval technology. On the one hand, users’ demand for cross-modal retrieval is increasing rapidly. On...
-
Article
A Blockchain-enabled decentralized settlement model for IoT data exchange services
IoT data exchange services are emerging to connect various and distributed IoT data sources, which facilitate data owners exchange their IoT data flexibly. Traditional IoT data exchange services rely on a cent...
-
Article
A credibility scoring algorithm to match surveillance video targets and UWB tags
Pedestrian positioning by surveillance video offers high accuracy and real-time performance in indoor scenes. However, pedestrian positioning based on surveillance video presents both challenges and promising ...
-
Article
Open AccessRetraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00153-8.
-
Article
Improved DV-Hop based on parallel compact Willow Catkin Optimization algorithm for 3D nodes localization in WSN
Wireless sensor networks (WSNs) play a critical role in environmental sensing and data transmission. However, their performances are often hindered by challenges like localization accuracy and storage capacity...
-
Article
Residual Time Based Energy Harvesting for Framed Slotted ALOHA Based Wireless Powered IoT Networks
This paper considers a wireless power transfer for framed slotted ALOHA in wireless powered Internet of Things (IoT) networks. Compared to devices in conventional networks, IoT devices might produce smaller pa...
-
Article
Open AccessJoint beamforming and power splitting design for MISO downlink communication with SWIPT: a comparison between cell-free massive MIMO and small-cell deployments
Simultaneous wireless information and power transfer (SWIPT) has been advocated as a highly promising technology for enhancing the capabilities of 5G and 6G devices. However, the challenge of dealing with larg...
-
Article
Modeling and analysis of computation offloading in NOMA-based fog radio access networks
The hierarchical local-fog-cloud computing-enabled paradigm applied in fog radio access networks (F-RANs) has been considered as a promising architecture to cope with the surge of mobile intelligent applicatio...
-
Article
Open AccessInfrared and visible image fusion in a rolling guided filtering framework based on deep feature extraction
To preserve rich detail information and high contrast, a novel image fusion algorithm is proposed based on rolling-guided filtering combined with deep feature extraction. Firstly, input images are filtered to ...
-
Article
Distributed Flexible Job Shop Scheduling through Deploying Fog and Edge Computing in Smart Factories Using Dual Deep Q Networks
Flexible job shop scheduling (FJSP) has garnered enormous attention within the realm of smart manufacturing, where, beyond job sequencing, the selection of machines holds considerable importance. As smart fact...
-
Article
Open AccessRETRACTED ARTICLE: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment
In recent years, various smart devices based on IoT technology, such as smart homes, healthcare, detection, and logistics systems, have emerged. However, as the number of IoT-connected devices increases, secur...
-
Article
Improved multi-objective brain storm optimization algorithm for RFID network planning
The problem of radio frequency identification network planning (RNP) is one of the biggest challenges in the field of RFID research. In order to improve the service quality of RFID systems, in addition to find...
-
Article
Energy-Efficient joint Resource Allocation and Computation Offloading in NOMA-enabled Vehicular Fog Computing
The rapid growth in vehicle data fosters the development of vehicular computational offloading. By exploiting the superiority of non-orthogonal multiple access (NOMA) in the offloading process, NOMA-enabled ve...