Match!
IEEE Access
IF
4.10
Papers
23562
Papers 10000
1 page of 1,000 pages (10k results)
Newest
The unlicensed spectrum utilized by Wi-Fi can be regarded as an economic commons in many deployments. Operators of Wi-Fi-enabled devices are usually non-cooperative, vying for spectral resources when in close range to each other, typically adopting a strategy of maximizing their transmission power. With an ever-growing number of wireless devices, this will ultimately lead to depletion of the spectrum, unless players collaborate. Previous studies used cooperative game theory to explore various co...
Source
Last. Rizwan Patan (Velagapudi Ramakrishna Siddhartha Engineering College)H-Index: 2
view all 7 authors...
Big data comprises a large volume of data (i.e., structured and unstructured) stored on a daily basis. Processing such volume of data is a complex task as well as the challenging one. This big data is applied in the cellular network for traffic prediction. Now, benefiting from the big data in cellular networks, it becomes possible to make the analyses one step further into the application level. In order to improve the traffic prediction accuracy with minimum time, Expected Conditional Maximizat...
Source
#1Jaakko Hakala (University of Oulu)
#2Joni Kilpijärvi (University of Oulu)H-Index: 2
Last. Teemu Myllyläki (University of Oulu)
view all 6 authors...
This paper introduces a microwave-based approach that aims to non-invasively measure water, particularly cerebrospinal fluid (CSF) dynamics, in the human brain. The microwave measurement technique is well-known in industrial applications. More recently microwave techniques have awakened interest also in biomedical applications. This is the first time it is suggested to be utilized in measurements of brain water, particularly of CSF. Two different head phantoms were built in order to validate the...
Source
#1Cagin Kazimoglu (Cyprus International University)
#2Liz Bacon (Abertay University)
Source
#1Mohammad ArifH-Index: 4
#2Shurjeel WyneH-Index: 18
Last. Sajid Hussain AlviH-Index: 1
view all 5 authors...
Source
#1Yibo Fan (Fudan University)H-Index: 10
#2Junan Chen (Fudan University)
Last. Ming’e Jing (Fudan University)
view all 5 authors...
Different from the traditional quaternary tree (QT) structure utilized in the previous generation video coding standard H.265/HEVC, a brand new partition structure named quadtree with nested multi-type tree (QTMT) is applied in the latest codec H.266/VVC. The introduction of QTMT brings in superior encoding performance at the cost of great time-consuming. Therefore, a fast intra partition algorithm based on variance and Sobel operator is proposed in this paper. The proposed method settles the no...
Source
#1Jingjing CuiH-Index: 5
#2Zhiguo DingH-Index: 54
Last. Lajos HanzoH-Index: 75
view all 5 authors...
Unmanned aerial vehicles (UAVs) with the potential of providing reliable high-rate connectivity, are becoming a promising component of future wireless networks. A UAV collects data from a set of randomly distributed sensors, where both the locations of these sensors and their data volume to be transmitted are unknown to the UAV. In order to assist the UAV in finding the optimal motion trajectory in the face of the uncertainty without the above knowledge whilst aiming for maximizing the cumulativ...
Source
#1Christian Rathgeb (Darmstadt University of Applied Sciences)H-Index: 23
Last. C. Busch
view all 5 authors...
Facial retouching apps have become common tools which are frequently applied to improve one’s facial appearance, e.g. before sharing face images via social media. Beautification induced by retouching has the ability to substantially alter the appearance of face images and hence might represent a challenge for face recognition. Towards deploying secure face recognition as well as enforcing anti-photoshop legislations, a robust and reliable detection of retouched face image is needed. Published ap...
1 CitationsSource
#1Hanan Hindy (Abertay University)H-Index: 2
#2David Brosset (Naval Academy Research Institute)H-Index: 7
Last. Xavier Bellekens (University of Strathclyde)H-Index: 7
view all 7 authors...
As the world moves towards being increasingly dependent on computers and automation, building secure applications, systems and networks are some of the main challenges faced in the current decade. The number of threats that individuals and businesses face is rising exponentially due to the increasing complexity of networks and services of modern networks. To alleviate the impact of these threats, researchers have proposed numerous solutions for anomaly detection; however, current tools often fai...
1 CitationsSource
Malaysia’s Eleventh Plan started to encourage green building developments and green industries to stimulate green growth. Eventually, the Malaysian government had launched a new commitment to accelerate the green and efficient energy sector and revised the quota of Renewable Energy (RE) towards higher capacity for electricity generation. These scenarios had highlighted the latest commitment of the Malaysian government to implement both green building development and concurrently, streamline the ...
1 CitationsSource
12345678910
Top fields of study
Algorithm
Distributed computing
Pattern recognition
Computer network
Computer science
Control theory