![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
423 Result(s)
-
Article
Open AccessRetraction Note : Privacy-preserving routing using jointly established protocol in IoT network environment
-
Article
Open AccessRetraction Note: Blockchain managed federated learning for a secure IoT framework
-
Article
Open AccessResearch of 5G HUDN network selection algorithm based on Dueling-DDQN
Due to the dense deployment and the diversity of user service types in the 5G HUDN environment, a more flexible network selection algorithm is required to reduce the network blocking rate and improve the user’...
-
Article
Open AccessChannel state information-based wireless localization by signal reconstruction
Wireless localization technology has been widely used in indoor and outdoor fields. Channel estimation based on channel state information is a hot research topic in recent years. However, due to the interferen...
-
Article
Open AccessRETRACTED ARTICLE: Blockchain managed federated learning for a secure IoT framework
In this work, we present a blockchain-based federated learning (FL) framework that aims achieving high system efficiency while simultaneously addressing issues relating to data sparsity and the disclosure of p...
-
Article
Open AccessResidual energy maximization for NOMA-enabled UAV-assisted data collection network: trajectory optimization and resource allocation
In this paper, we concentrate on a non-orthogonal multiple access (NOMA)-enabled UAV data collection network for Internet of Things devices (IoTDs), where a unmanned aerial vehicle (UAV) is deployed as an aeri...
-
Article
Open AccessA novel adaptive beamforming scheme for array signal data processing
When the desired signal data exists in the array received data or the steering vector has a mismatch problem, the current traditional adaptive beamformers will suffer from the effect of the desired signal canc...
-
Article
Open AccessRETRACTED ARTICLE: Privacy-preserving routing using jointly established protocol in IoT network environment
In this paper, network energy assesses the capacity of a node to convey messages to others. In most cases, network energy is created when two nodes interact with one another. If a node is part of the same netw...
-
Article
Open AccessPartitioning multi-layer edge network for neural network collaborative computing
There is a trend to deploy neural network on edge devices in recent years. While the mainstream of research often concerns with single edge device processing and edge-cloud two-layer neural network collaborati...
-
Article
Open AccessMmwave massive MIMO: one joint beam selection combining cuckoo search and ant colony optimization
In order to degrade the inter-user interference caused by the same beam selected for different users in mmWave massive MIMO systems, this paper proposes a joint beam selection combining cuckoo search (CS) and ...
-
Article
Open AccessSingle-base station hybrid positioning algorithm based on LOS identification
In the complex multipath propagation environment, whether there is a line of sight (LOS) path will directly affect the positioning accuracy. Therefore, this paper proposes a single base station hybrid position...
-
Article
Open AccessA monopole broadband circularly polarized antenna with coupled disc and folded microstrip stub lines
A broadband circularly polarized (CP) printed monopole antenna which fed by coplanar waveguide (CPW) is proposed in the paper. The structure of the novel antenna includes a quarter circular disc radiating mono...
-
Article
Open AccessA novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing
Internet of things (IoT) has been used in many places. IoT make devices connected to the Internet via sensor devices to achieve the interconnection between things and things, people and things. Sybil attacker ...
-
Article
Open AccessRetraction Note: Investigation of the evaluation system of SMEs’ industrial cluster management performance based on wireless network development
-
Article
Open AccessRetraction Note: Research on the perfection of the countermeasures of the judicial execution scheme in the administrative law system based on annealing algorithm
-
Article
Open AccessA second-order dynamic and static ship path planning model based on reinforcement learning and heuristic search algorithms
Ship path planning plays an important role in the intelligent decision-making system which can provide important navigation information for ship and coordinate with other ships via wireless networks. However, ...
-
Article
Open AccessDynamic visual SLAM and MEC technologies for B5G: a comprehensive review
In recent years, dynamic visual SLAM techniques have been widely used in autonomous navigation, augmented reality, and virtual reality. However, the increasing demand for computational resources by SLAM techni...
-
Article
Open AccessAn improved target tracking scheme based on MC-MPMC method for mobile wireless sensor networks
Target tracking is crucial to many applications in wireless sensor networks (WSNs). Existing tracking schemes used in WSNs can basically be classified two categories, clustering and predicting. Considering net...
-
Article
Open AccessTN-GTN: fault diagnosis of aircraft wiring network over edge computing
Fault diagnosis of the aircraft wiring network plays an important role in the intelligent manufacture of the aircraft. Many studies focus on the feature-based machine learning methods. However, these methods a...
-
Article
Open AccessA dynamic handover scheme based on bidirectional VLC channel in multi-user attocell networks
Light fidelity (LiFi) would be a potential optical wireless communications technology for future mixed-spectrum 5G/6G indoor attocell network, which uses light-emitting diodes based as an optical antenna and o...