Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 28, Issue 2Apr 2023
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISSN:1383-469X
Reflects downloads up to 02 Feb 2025Bibliometrics
research-article
The Effects of Climatological Factors on Global Influenza Across Temperate and Tropical Regions
Abstract

Recently, global epidemic models that use climatological factors have been proposed to explain influenza activities for both temperate and tropical regions. In this paper, these global models were extended by including interactions of ...

research-article
Study QoS-aware Fog Computing for Disease Diagnosis and Prognosis
Abstract

The development of medical sensors and the Internet of Things (IoT) offers many opportunities for research on disease diagnosis and prognosis in the electronic healthcare (eHealth) industry. IoT medical applications use wearable medical sensor ...

research-article
An Improved Recommendation Algorithm For Polarized Population
Abstract

The performance of various recommendation algorithms is getting stronger and stronger, which also brings new social problems and group polarization. The recommendation algorithm creates a user’s selective access to information, and the continuous ...

research-article
A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication
Abstract

Convergent encryption has been widely used in secure deduplication technology, but because the data itself is predictable, directly using the hash value of the data as a key is vulnerable to brute force attacks. To this end, researchers have ...

research-article
Predicting Supramolecular Structure from the Statistics of Individual Molecular Events
Abstract

As manipulating the self-assembly of supramolecular and nanoscale constructs at the single-molecule level increasingly becomes the norm, new theoretical scaffolds must be erected to replace the thermodynamic and kinetics based models used to ...

research-article
An Encrypted Proposal Method in Membrane Computing Aggregation (MCA)
Abstract

MCA (MCA (Membrane Computing Aggregation is an experimental bioinspired computational frame, inspired by the inner properties of membrane cells. It is capable of problem-solving activities by maintaining a special, meaningful relationship with the ...

research-article
On Fitness Landscape Analysis of Permutation Problems: From Distance Metrics to Mutation Operator Selection
Abstract

In this paper, we explore the theory and expand upon the practice of fitness landscape analysis for optimization problems over the space of permutations. Many of the computational and analytical tools for fitness landscape analysis, such as ...

research-article
Mesh Router Nodes Placement for Wireless Mesh Networks Based on an Enhanced Moth–Flame Optimization Algorithm
Abstract

This paper proposes an enhanced version of Moth Flame Optimization (MFO) algorithm, called Enhanced Chaotic Lévy Opposition-based MFO (ECLO-MFO) for solving the mesh router nodes placement problem in wireless mesh network (WMN-MRNP). The proposed ...

research-article
A New Meminductor Based Hyperchaotic Circuit and its Implementation
Abstract

A new meminductor based hyperchaotic oscillator and its mathematical model were presented. Meanwhile, some basic dynamic properties such as equilibrium point and stability were analyzed. Through Lyapunov exponents and bifurcation diagram and other ...

brief-report
Detection Algorithm of Compressed Sensing Signal in Generalized Spatial Modulation System
Abstract

For the generalized spatial modulation in the underdetermined system with the number of transmitting antennas larger than the number of receiving antennas, the activation of the antenna is small and inaccurate. The traditional MMSE algorithm and ...

brief-report
Multistability Analysis and Digital Circuit Implementation of a New Conformable Fractional-Order Chaotic System
Abstract

Combining conformable differential definition and Adomian decomposition method (ADM) algorithm, the dynamics of a new 4-D fractional-order chaotic system was studied through numerical simulation in this paper. The dissipation of the system and the ...

brief-report
Study on the Elimination of MIMO Signal Interference in Data Chain System
Abstract

As an important material and technical support of the data link system, the communication network system not only plays an “adhesive” role in integrating the combat forces, optimizing the operational composition and realizing the complementary ...

brief-report
High-Precision Harmonic Analysis Algorithm Based on Five-Term MSD Second-Order Self-Convolution Window Four-Spectrum-Line Interpolation
Abstract

For the frequency spectrum leakage and fence effect generated in Fast Fourier Transform (FFT) during asynchronous sampling and integral period truncation affect the precision of harmonic detection, a new algorithm for harmonic analysis based on ...

brief-report
Simultaneous Wireless Information and Power Transfer for OFDM-based Cooperative Communication
Abstract

In cooperative communication, relay reduces the stored energy for its own transmission due to the energy consumption for forwarding the information from source node. In this paper, simultaneous wireless information and power transfer (SWIPT) for ...

research-article
Iktishaf: a Big Data Road-Traffic Event Detection Tool Using Twitter and Spark Machine Learning
Abstract

Road transportation is the backbone of modern economies despite costing annually millions of human deaths and injuries and trillions of dollars. Twitter is a powerful information source for transportation but major challenges in big data ...

research-article
Extraction of Naturalistic Driving Patterns with Geographic Information Systems
Abstract

A better understanding of Driving Patterns and their relationship with geographical driving areas could bring great benefits for smart cities, including the identification of good driving practices for saving fuel and reducing carbon emissions and ...

research-article
TAAWUN: a Decision Fusion and Feature Specific Road Detection Approach for Connected Autonomous Vehicles
Abstract

Road transportation is among the global grand challenges affecting human lives, health, society, and economy, caused due to road accidents, traffic congestion, and other transportation deficiencies. Autonomous vehicles (AVs) are set to address ...

research-article
Adaptive Security for Self-Protection of Mobile Computing Devices
Abstract

Mobile computing has emerged as a pervasive technology that empowers its users with portable computation and context-aware communication. Smart systems and infrastructures can exploit portable and context-aware computing technologies to provide ...

research-article
Fog-Assisted Secure Data Exchange for Examination and Testing in E-learning System
Abstract

E-learning systems are getting growing interest due to their wide applicability in distance education. A huge amount of data is shared among students, teachers, examiners that should be exchanged in a confidential manner. In literature, a number ...

research-article
Fog Computing for 5G-Enabled Tactile Internet: Research Issues, Challenges, and Future Research Directions
Abstract

From the last few years, we have witnessed an exponential increase in the usage of delay-sensitive applications by the end-users because of the paradigm shift and revolution in different technologies starting from 1G to 5G most of which are having ...

research-article
A Dominating Tree Based Leader Election Algorithm for Smart Cities IoT Infrastructure
Abstract

In wireless sensor and IoT networks dedicated to smart-cities, a leader node performs critical tasks such as generating encryption/decryption keys. In this paper, the leader is the node situated at the extreme left of the network. It is the node ...

research-article
Improving Formal Verification and Testing Techniques for Internet of Things and Smart Cities
Abstract

We are interested in formal verification and model-based testing for Internet of Things and Smart Cities. In general these two techniques suffer from state explosion problem. To remedy this situation we propose a set of techniques which aim to ...

research-article
ZAKI: A Smart Method and Tool for Automatic Performance Optimization of Parallel SpMV Computations on Distributed Memory Machines
Abstract

SpMV is a vital computing operation of many scientific, engineering, economic and social applications, increasingly being used to develop timely intelligence for the design and management of smart societies. Several factors affect the performance ...

research-article
A Novel Approach for Continuous Authentication of Mobile Users Using Reduce Feature Elimination (RFE): A Machine Learning Approach
Abstract

Mobile phones are a valuable object in our daily life. With the acquisition of the latest technologies, their capabilities and demands increase day by day. However, acquiring the latest technologies makes mobile phones vulnerable to various ...

research-article
Advancing Security in the Industrial Internet of Things Using Deep Progressive Neural Networks
Abstract

A machine learning algorithm that can solve complex tasks by leveraging information through transfer learning while avoiding catastrophic forgetting of previously learned data. This clearly is a principal milestone to achieving human-level ...

Comments