Skip to main content

previous disabled Page of 13
and
  1. No Access

    Article

    A dynamic spectrum access algorithm based on deep reinforcement learning with novel multi-vehicle reward functions in cognitive vehicular networks

    As a revolution in the field of transportation, the demand for communication of vehicles is increasing. Therefore, how to improve the success rate of vehicle spectrum access has become a major problem to be so...

    Lingling Chen, Ziwei Wang, **aohui Zhao, Xuan Shen, Wei He in Telecommunication Systems (2024)

  2. No Access

    Article

    Joint resource and trajectory optimization for video streaming in UAV-based emergency indoor-outdoor communication

    Due to its ability for flexible placement, the Unmanned Aerial Vehicle (UAV) has been widely utilized as an aerial relay to transmit the video streaming data, which is particularly useful in emergency communic...

    Zinan Guo, Bo Hu, Shanzhi Chen, Bufang Zhang, Lei Wang in Telecommunication Systems (2024)

  3. No Access

    Article

    Perspective of virtual machine consolidation in cloud computing: a systematic survey

    Virtual Machine Consolidation (VMC) in cloud computing refers to the process of optimizing resource utilization by consolidating multiple Virtual Machines (VMs) onto fewer physical servers. This approach aims ...

    Junzhong Zou, Kai Wang, Keke Zhang, Murizah Kassim in Telecommunication Systems (2024)

  4. No Access

    Article

    Research on Intelligent Courses in English Education based on Neural Networks

    Accurately predicting students’ performance plays a crucial role in achieving the intellectualization of courses. This paper studied intelligent courses in English education based on neural networks and design...

    Huimin Yao, Haiyan Wang in Annals of Data Science (2024)

  5. No Access

    Article

    Improving scheduling in multi-AGV systems by task prediction

    Automated guided vehicles (AGVs) are driverless robotic vehicles that pick up and deliver materials. Finding ways to improve efficiency while preventing deadlocks is a core issue in designing AGV systems. In t...

    Hongkai Fan, Dong Li, Bo Ouyang, Zhi Yan, Yaonan Wang in Journal of Scheduling (2024)

  6. No Access

    Article

    Generative adversarial networks-based security and applications in cloud computing: a survey

    To meet growing business needs and exponentially increasing development and maintenance costs, the concept of cloud computing has been proposed and developed rapidly. Cloud computing is a brand-new computing m...

    Shiyu Wang, Ming Yin, Yiwen Liu, Guofeng He in Telecommunication Systems (2024)

  7. No Access

    Article

    A new construction of public key authenticated encryption with keyword search based on LWE

    A public key encryption with keyword search (PEKS) scheme allows users to share encrypted data through cloud servers. However, an inside adversary may launch inside keyword guessing attack (IKGA) for a given t...

    Ziqing Wang, ** Li, **aoguang Liu, **nyan Wu, Fagen Li in Telecommunication Systems (2024)

  8. No Access

    Article

    VPIR: an efficient verifiable private information retrieval scheme resisting malicious cloud server

    Private information retrieval, which allows users to securely retrieve information stored in a single server or multiple servers without disclosing any query content to the server, has attracted much attention...

    Wenqi Zhang, Shuai Shang, Haolin Wang, Ziwen Cai, Yun Zhao in Telecommunication Systems (2024)

  9. No Access

    Article

    Coverage analysis and deployment design of RIS-assisted systems

    Reconfigurable intelligent surface (RIS) is a novel technology that can help enhance the wireless propagation environment by altering the electromagnetic properties of its massive low-cost passive reflecting e...

    Ying Wang, Angran Liu, Yiyang Ni, Jie Zhao in Telecommunication Systems (2024)

  10. No Access

    Article

    Adaptive MIMO-FSO space diversity MRC reception characteristics over Malaga turbulence channel with pointing errors

    Atmospheric turbulence channels experience quasi-static fading, which makes it relatively straightforward to utilize feedback information for link adaptive transmission. Applying adaptive modulation to MIMO sy...

    Dan Chen, Feier Ai, Chenhao Wang, Peiyan Zhao, Mengmeng Lu in Telecommunication Systems (2024)

  11. No Access

    Article

    Towards a crop pest control system based on the Internet of Things and fuzzy logic

    Smart agriculture is an emerging concept that helps modern farm management using technologies such as the Internet of Things (IoT), robotics, drones, and artificial intelligence, so that this leads to an incre...

    Xuhui Wang, Vahid Jannesari in Telecommunication Systems (2024)

  12. No Access

    Article

    Supervised Feature Selection via Quadratic Surface Regression with \(l_{2,1}\) -Norm Regularization

    This paper proposes a supervised kernel-free quadratic surface regression method for feature selection (QSR-FS). The method is to find a quadratic function in each class and incorporates it into the least squa...

    Changlin Wang, Zhixia Yang, Junyou Ye, Xue Yang, Manchen Ding in Annals of Data Science (2024)

  13. No Access

    Article

    A reduced peak-to-average power ratio algorithm based on PMI mode in NR

    Orthogonal frequency division multiplexing technology, as a key technology of NR air interface transmission, has the advantages of resisting frequency selective fading and narrowband interference, but the prob...

    Hequn Zhu, Xu Zhao, Dejian Li, Yubo Wang, Yubing Zhang in Telecommunication Systems (2024)

  14. No Access

    Article

    A novel and efficient real-time sequencing strategy for appointment scheduling with unpunctual patients

    No-shows and non-punctual appointments have always been uncertain factors faced by managers of service-oriented enterprises and institutions, which usually lead to a low utilization rate of resources and a rap...

    Chao Li, Zhi Yang, Fajun Yang, Feng Wang in Journal of Scheduling (2024)

  15. No Access

    Article

    Performance analysis for visible light communications with Gaussian-plus-Laplacian additive noise

    In this paper, the performance of an indoor visible light communication (VLC) system in the presence of Gaussian-plus-Laplacian additive noise is investigated. Initially, a realistic VLC system model is establ...

    Na Liu, Li-Hua Hong, Pan Feng, Hao-Nan Yang, **-Yuan Wang in Telecommunication Systems (2024)

  16. Book Series

  17. Chapter and Conference Paper

    Body and Mind in Virtual Dark Tourism Experiences and Artwork Creations: Embodied Cognition Reaction Perspectives

    Dark tourism experiences visualized in destinations evoke diverse tourist experiences, triggering negative emotions and offering insights into historical events. Embodied cognition reactions prompt distinct ex...

    Halim Budi Santoso, Benjamin Quarshie in Information and Communication Technologies… (2024)

  18. No Access

    Chapter

    Build Your Security Program for GenAI

    This chapter explores policies, processes, and procedures to build a robust security program tailored for GenAI models and applications. It discusses key policy elements like goals, risk management, compliance...

    Ken Huang, John Yeoh, Sean Wright, Henry Wang in Generative AI Security (2024)

  19. No Access

    Chapter

    From LLMOps to DevSecOps for GenAI

    This chapter explores the emerging discipline of LLMOps, contrasting it with traditional MLOps approaches and highlighting unique considerations when operationalizing GenAI models and applications. A detailed ...

    Ken Huang, Vishwas Manral, Wickey Wang in Generative AI Security (2024)

  20. No Access

    Book

previous disabled Page of 13