Match!
Wireless Communications and Mobile Computing
IF
1.40
Papers
1756
Papers 1747
1 page of 175 pages (1,747 results)
Newest
#1Yunming Wang (Dalian Jiaotong University)
#2Bo ChenH-Index: 1
Last.Duoping Zhang (DUT: Dalian University of Technology)
view all 4 authors...
Influential nodes act as a hub for information transmission in a command and control network. The identification of influential nodes in a network of this nature is a significant and challenging task; however, it is necessary if the invulnerability of the network is to be increased. The existing k-shell method is problematic in that it features a coarse sorting granularity and does not consider the local centrality of nodes. Thus, the degree of accuracy with which the influential nodes can be id...
#1Shafiq Ahmad (University College of Engineering)H-Index: 1
#2Ahmed Badwelan (University College of Engineering)H-Index: 1
Last.Ammar S. M. Moohialdin (QUT: Queensland University of Technology)H-Index: 1
view all 7 authors...
#1Ahlem Masmoudi (University of Sfax)H-Index: 2
#2Kais Mnif (University of Sfax)H-Index: 5
Last.Faouzi Zarai (University of Sfax)H-Index: 9
view all 3 authors...
Thanks to the deployment of new techniques to support high data rate, high reliability, and QoS provision, Long-Term Evolution (LTE) can be applied for diverse applications. Vehicle-to-everything (V2X) is one of the evolving applications for LTE technology to improve traffic safety, to minimize congestion, and to ensure comfortable driving which requires stringent reliability and latency requirements. As mentioned in the 3rd Generation Partnership Project (3GPP), LTE-based Device-to-Device (D2D)...
#1Ali Ghubaish (WashU: Washington University in St. Louis)
#2Tara Salman (WashU: Washington University in St. Louis)H-Index: 2
Last.Raj Jain (WashU: Washington University in St. Louis)H-Index: 3
view all 3 authors...
Federal Aviation Administration (FAA) of the United States is considering Remote ID systems for unmanned aerial vehicles (UAVs). These systems act as license plates used on automobiles, but they transmit information using radio waves. To be useful, the transmissions in such systems need to reach long distances to minimize the number of ground stations to capture these transmissions. LoRaWAN is designed as a cheap long-range technology to be used for long-range communication for the Internet of T...
#1Yang Wang (SDU: Shandong University)
#2Mingqiang Wang (SDU: Shandong University)
Last.Jing Wang (China Mobile)
view all 5 authors...
Identity-based cryptography is a type of public key cryptography with simple key management procedures. To our knowledge, till now, the existing identity-based cryptography based on NTRU is all over power-of-2 cyclotomic rings. Whether there is provably secure identity-based cryptography over more general fields is still open. In this paper, with the help of the results of collision resistance preimage sampleable functions (CRPSF) over cyclotomic fields, we give concrete constructions of provabl...
#1Scholas Mbonihankuye (NUIST: Nanjing University of Information Science and Technology)
#2Athanase Nkunzimana (NUIST: Nanjing University of Information Science and Technology)
Last.Ange Ndagijimana (NUIST: Nanjing University of Information Science and Technology)
view all 3 authors...
Information technology (IT) plays an increasingly important and prominent role in the health sector. Data security is more important than ever to the healthcare industry and in world in general. The number of data breaches compromising confidential healthcare data is on the rise. For data security, cloud computing is very useful for securing data. Due to data storage issue, there is a need to use the electronic communication, and a number of methods have been developed for data security technolo...
#1Rab Nawaz Jadoon (CUI: COMSATS Institute of Information Technology)H-Index: 2
#2Wuyang Zhou (USTC: University of Science and Technology of China)H-Index: 12
Last.Nauman Ali Khan (USTC: University of Science and Technology of China)H-Index: 1
view all 6 authors...
Routing remains a most challenging task in sensor networks because of constrained resources like battery power, processing, and memory. Many energy efficiency techniques for the sensor networks have been proposed, among which hierarchical routing is considered the most energy-efficient and extended network lifetime technique. This technique has a lesser number of transmissions in the network. On the contrary, zone-based routing claims lesser control and routing overhead on the overall network li...
#1Mahwish Amjad (Institute of Business Administration, Karachi)
#2Faisal Iradat (Institute of Business Administration, Karachi)H-Index: 2
Major benefits of wireless sensor nodes of IoT like low cost and easy deployment are advocating their usage in variety of applications. Some of them are health monitoring, agriculture, environmental and habitant monitoring, and water monitoring. These nodes are autonomous in nature. It follows that they like to operate in a dynamic and adaptive network environment. So, the communication mechanism between IoT nodes must be robust and adaptive with respect to the environmental change. Unfortunatel...
#1Xi Meng (Beijing University of Posts and Telecommunications)
#2Liyuan Zhong (ZTE)
Last.Dacheng Yang (Beijing University of Posts and Telecommunications)
view all 4 authors...
It is a promising way to successfully operate the fifth generation (5G) system with Internet of Things (IoT) in potential mmWave spectrum bands. This paper investigates the intelligent co-channel coexistence between the 5G IoT system and the fixed-satellite service (FSS) system at 40 GHz. The key issue, as identified, is the accurate estimation of interference based on mmWave propagation characteristics. Our simulation results reveal that interference from the 5G IoT system into the FSS ground s...
#1Fuqiang Ma (USTB: University of Science and Technology Beijing)
#2Jie He (USTB: University of Science and Technology Beijing)H-Index: 14
Last.Xiaotong Zhang (USTB: University of Science and Technology Beijing)
view all 3 authors...
The source localization using direction of arrival (DOA) of target is an important research in the field of Internet of Things (IoTs). However, correntropy suffers the performance degradation for direction of arrival when the two signals contain the similar impulsive noise, which cannot be detected by the difference between two signals. This paper proposes a new correntropy, called the median-difference correntropy, which combines the generalized correntropy and the median difference. The median...
12345678910