Skip to main content

previous disabled Page of 84
and
  1. No Access

    Article

    A novel multi-objective optimized DAG task scheduling strategy for fog computing based on container migration mechanism

    In order to solve the complex task scheduling problem of fog computing processing big data in the industrial Internet of Things, a task scheduling strategy based on ant colony algorithm called TSSAC (task sche...

    Wenjia Deng, Lin Zhu, Yang Shen, Chuan Zhou, Jian Guo, Yong Cheng in Wireless Networks (2024)

  2. No Access

    Article

    Conjunctive searchable encryption with efficient authorization for group sharing

    Multi-user searchable encryption (MUSE) schemes provide solutions for searching over ciphertexts shared by different users, but the significant overhead of communication and computation leads to high latency i...

    Lin Mei, Chungen Xu, Lei Xu in Wireless Networks (2024)

  3. No Access

    Article

    A supervised privacy preservation transaction system for aviation business

    Data security is a crucial issue for aviation business transaction. In order to prevent privacy leakage for the business participants, it is essential to construct a credible transaction environment. For this ...

    **ngguang Zhou, Weihan Li, Lin Zhong in Peer-to-Peer Networking and Applications (2024)

  4. No Access

    Article

    Cloud Computing-aided Multi-type Data Fusion with Correlation for Education

    As one of the major constitutes of human society, education has been continuously producing a huge amount of data and become an important of sources of big data. Deeply mining and analyzing these big education...

    Baoqing Tai, **ndong Li, Lifang Yang, Ying Miao, Wenmin Lin, Chao Yan in Wireless Networks (2024)

  5. No Access

    Article

    Cooperative positioning of UAV internet of things based on optimization algorithm

    Unmanned Aerial Vehicle (UAV) Internet of things have been widely used in military and civilian fields such as rescue, disaster relief, urban planning. Positioning service is the core technology for UAVs to pe...

    Hao Hu, YuLin Chen, Bao Peng, Zhenjun Li, Qibao Wu, ZiRan Lin in Wireless Networks (2024)

  6. Article

    Open Access

    Multi-aspect detection and classification with multi-feed dynamic frame skip** in vehicle of internet things

    Consumer demand for automobiles is changing because of the vehicle’s dependability and utility, and the superb design and high comfort make the vehicle a wealthy object class. The creation of object classes ne...

    Usman Ahmed, Jerry Chun-Wei Lin, Gautam Srivastava in Wireless Networks (2024)

  7. Article

    Open Access

    Research on multifractal dimension and improved gray relation theory for intelligent satellite signal recognition

    In the wake of the development and advancement of signal processing technology for communication radiation source individual, Signal fingerprint feature extraction and analysis technology for communication rad...

    Zhen Zhang, Yibing Li, Lin Qi in Wireless Networks (2024)

  8. No Access

    Article

    Variable length deep cross-modal hashing based on Cauchy probability function

    With the rapid development of multimedia technology, considerable achievement has been achieved in image retrieval technology. On the one hand, users’ demand for cross-modal retrieval is increasing rapidly. On...

    Chen Li, Zhuotong Liu, Sijie Li, Ziniu Lin, Lihua Tian in Wireless Networks (2024)

  9. No Access

    Article

    A Blockchain-enabled decentralized settlement model for IoT data exchange services

    IoT data exchange services are emerging to connect various and distributed IoT data sources, which facilitate data owners exchange their IoT data flexibly. Traditional IoT data exchange services rely on a cent...

    Wenmin Lin, **aochun Yin, Shou** Wang, Mohammad R. Khosravi in Wireless Networks (2024)

  10. No Access

    Article

    A credibility scoring algorithm to match surveillance video targets and UWB tags

    Pedestrian positioning by surveillance video offers high accuracy and real-time performance in indoor scenes. However, pedestrian positioning based on surveillance video presents both challenges and promising ...

    Jiachen Yan, Guang Yang, Weihong Li, Qunxiong Lin, Junjie Chen in Wireless Networks (2024)

  11. Article

    Open Access

    Retraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

    This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00153-8.

    Lin Yang in EURASIP Journal on Information Security (2024)

  12. No Access

    Article

    Improved DV-Hop based on parallel compact Willow Catkin Optimization algorithm for 3D nodes localization in WSN

    Wireless sensor networks (WSNs) play a critical role in environmental sensing and data transmission. However, their performances are often hindered by challenges like localization accuracy and storage capacity...

    Ruo-Bin Wang, Rui-Bin Hu, Fang-Dong Geng, Lin Xu in Wireless Networks (2024)

  13. No Access

    Article

    Residual Time Based Energy Harvesting for Framed Slotted ALOHA Based Wireless Powered IoT Networks

    This paper considers a wireless power transfer for framed slotted ALOHA in wireless powered Internet of Things (IoT) networks. Compared to devices in conventional networks, IoT devices might produce smaller pa...

    Ying-Jen Lin, Show-Shiow Tzeng in Wireless Personal Communications (2024)

  14. Article

    Open Access

    Joint beamforming and power splitting design for MISO downlink communication with SWIPT: a comparison between cell-free massive MIMO and small-cell deployments

    Simultaneous wireless information and power transfer (SWIPT) has been advocated as a highly promising technology for enhancing the capabilities of 5G and 6G devices. However, the challenge of dealing with larg...

    Jain-Shing Liu, Chun-Hung Richard Lin in EURASIP Journal on Wireless Communications… (2024)

  15. No Access

    Article

    Modeling and analysis of computation offloading in NOMA-based fog radio access networks

    The hierarchical local-fog-cloud computing-enabled paradigm applied in fog radio access networks (F-RANs) has been considered as a promising architecture to cope with the surge of mobile intelligent applicatio...

    Lixia Lin, Zhicheng Yang, Zhihong Dong in Wireless Networks (2024)

  16. Article

    Open Access

    Infrared and visible image fusion in a rolling guided filtering framework based on deep feature extraction

    To preserve rich detail information and high contrast, a novel image fusion algorithm is proposed based on rolling-guided filtering combined with deep feature extraction. Firstly, input images are filtered to ...

    Wei Cheng, Bing Lin, Liming Cheng, Yong Cui in Wireless Networks (2024)

  17. No Access

    Article

    Distributed Flexible Job Shop Scheduling through Deploying Fog and Edge Computing in Smart Factories Using Dual Deep Q Networks

    Flexible job shop scheduling (FJSP) has garnered enormous attention within the realm of smart manufacturing, where, beyond job sequencing, the selection of machines holds considerable importance. As smart fact...

    Chun-Cheng Lin, Yi-Chun Peng, Zhen-Yin Annie Chen in Mobile Networks and Applications (2024)

  18. Article

    Open Access

    RETRACTED ARTICLE: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

    In recent years, various smart devices based on IoT technology, such as smart homes, healthcare, detection, and logistics systems, have emerged. However, as the number of IoT-connected devices increases, secur...

    Lin Yang in EURASIP Journal on Information Security (2024)

  19. No Access

    Article

    Improved multi-objective brain storm optimization algorithm for RFID network planning

    The problem of radio frequency identification network planning (RNP) is one of the biggest challenges in the field of RFID research. In order to improve the service quality of RFID systems, in addition to find...

    Jiali Zheng, Zihan Lin, **aode **e in Wireless Networks (2024)

  20. No Access

    Article

    Energy-Efficient joint Resource Allocation and Computation Offloading in NOMA-enabled Vehicular Fog Computing

    The rapid growth in vehicle data fosters the development of vehicular computational offloading. By exploiting the superiority of non-orthogonal multiple access (NOMA) in the offloading process, NOMA-enabled ve...

    Zhijian Lin, Yonghang Lin, Jianjie Yang, Qingsong Zhang in Mobile Networks and Applications (2024)

previous disabled Page of 84