-
Analysis of Customization Strategy for E-Commerce Operation Based on Big Data Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-26 Su Chen
In order to improve the efficiency of customization and reduce the cost of customization under Big data environment, this paper uses cost-sharing contract, pricing mechanism, Hotelling model, and game theory tools and research methods, for C2B Electronic Commerce (e-commerce) mode of Supply Chain Pricing Strategy for in-depth discussion. This paper first gives the architecture of the customization
-
A Two-Level Communication Routing Algorithm Based on Vehicle Attribute Information for Vehicular Ad Hoc Network Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-25 Chenguang He; Guanqiao Qu; Liang Ye; Shouming Wei
Recently, the research on the vehicular ad hoc network (VANET) has been paid more attention by researchers with the quick development of the autonomous driving technology. In the VANET, vehicles can communicate with everything through the route established by routing algorithms. However, the topology of the VANET changes fast because the vehicles move fast. Also, as the number of vehicles increases
-
Research on PSO-ARMA-SVR Short-Term Electricity Consumption Forecast Based on the Particle Swarm Algorithm Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-25 Wenbo Zhu; Hao Ma; Gaoyan Cai; Jianwen Chen; Xiucai Wang; Aiyuan Li
Aimed at the problem of order determination of short-term power consumption in a time series model, a new method was proposed to determine the order and the moving average of the ARMA model by particle swarm optimization (PSO).According to the difference between the predicted value and the real value of the ARMA model, the fitness function of the particle swarm optimization algorithm is constructed
-
Energy Balanced Source Location Privacy Scheme Using Multibranch Path in WSNs for IoT Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-25 Huijiao Wang; Lin Wu; Qing Zhao; Yongzhuang Wei; Hua Jiang
Source location privacy, one of the core contents of Wireless Sensor Network (WSN) security, has a significant impact on extensive application of WSNs. In this paper, a novel location privacy protection routing scheme called Energy Balanced Branch Tree (EBBT) is proposed by using multibranch and fake sources. This scheme has three phases. In the first place, the data of the source are randomly sent
-
An Empirical Study on Optimal the Allocations in Advertising and Operation Innovation on Supply Chain Alliance for Complex Data Analysis Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-25 Jiang-Tao Wang; Jian-Jun Yu; Yu-His Yuan; Sang-Bing Tsai; Shu-Fen Zhang
Effective and efficient closed-loop supply chain processes can provide a significant competitive edge for companies. This study considered three investment strategies in the process of initiating closed-loop supply chain alliances. The results showed that a promised proportion has a significant effect on investment decisions under a pure investment strategy. Furthermore, a reasonable promised proportion
-
Fusing Node Embeddings and Incomplete Attributes by Complement-Based Concatenation Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-25 Zheng Wang; Yuexin Wu; Yang Bao; Jing Yu; Xiaohui Wang
Network embedding that learns representations of network nodes plays a critical role in network analysis, since it enables many downstream learning tasks. Although various network embedding methods have been proposed, they are mainly designed for a single network scenario. This paper considers a “multiple network” scenario by studying the problem of fusing the node embeddings and incomplete attributes
-
Sparse Array Design for DOA Estimation of Non-Gaussian Signals: From Global Postage-Stamp Problem Perspective Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-24 Changbo Ye; Luo Chen; Beizuo Zhu
In this paper, a sparse array design problem for non-Gaussian signal direction of arrival (DOA) estimation is investigated. Compared with conventional second-order cumulant- (SOC-) based methods, fourth-order cumulant- (FOC-) based methods achieve improved DOA estimation performance by utilizing all information from received non-Gaussian sources. Considering the virtual sensor location of vectorized
-
Detection Mechanisms of One-Pixel Attack Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-23 Peng Wang; Zhipeng Cai; Donghyun Kim; Wei Li
In recent years, a series of researches have revealed that the Deep Neural Network (DNN) is vulnerable to adversarial attack, and a number of attack methods have been proposed. Among those methods, an extremely sly type of attack named the one-pixel attack can mislead DNNs to misclassify an image via only modifying one pixel of the image, leading to severe security threats to DNN-based information
-
On the Optimization Strategy of EV Charging Station Localization and Charging Piles Density Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-23 Wenzao Li; Lingling Yang; Zhan Wen; Jiali Chen; Xi Wu
The penetration rate of electronic vehicles (EVs) has been increasing rapidly in recent years, and the deployment of EV infrastructure has become an increasingly important topic in some solutions of the Internet of Things (IoT). A reasonable balance needs to be struck between the user experience and the deployment cost of charging stations and the number of charging piles. The deployment of EV’s charging
-
Motion-Compensated Frame Interpolation Using Cellular Automata-Based Motion Vector Smoothing Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-22 Ran Li; Ying Yin; Fengyuan Sun; Yanling Li; Lei You
Motion-Compensated Frame Interpolation (MCFI) is one of the common temporal-domain tamper operations, and it is used to produce faked video frames for improving the visual qualities of video sequences. The instability of temporal symmetry results in many incorrect Motion Vectors (MVs) for Bidirectional Motion Estimation (BME) in MCFI. The existing Motion Vector Smoothing (MVS) works often oversmooth
-
Depth and Width Changeable Network-Based Deep Kernel Learning-Based Hyperspectral Sensor Data Analysis Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-22 Jing Liu; Tingting Wang; Yulong Qiao
Sensor data analysis is used in many application areas, for example, Artificial Intelligence of Things (AIoT), with the rapid developing of the deep neural network learning that promotes its application area. In this work, we propose the Depth and Width Changeable Deep Kernel Learning-based hyperspectral sensing data analysis algorithm. Compared with the traditional kernel learning-based hyperspectral
-
A Source Number Estimation Algorithm Based on Data Local Density and Fuzzy C-Means Clustering Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-22 Na Wu; Ke Wang; Liangtian Wan; Ning Liu
An advanced source number estimation (SNE) algorithm based on both fuzzy C-means clustering (FCM) and data local density (DLD) is proposed in this paper. The DLD of an eigenvalue refers to the number of eigenvalues within a specific neighborhood of this eigenvalue belonging to the data covariance matrix. This local density essentially as the one-dimensional sample feature of the FCM is extracted into
-
Performance Analysis of Backhaul-Aware User Association in 5G Ultradense Heterogeneous Networks Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-20 Junpeng Yu; Hongtao Zhang; Yuqing Chen; Yaduan Ruan
In 5G ultradense heterogeneous networks, wireless backhaul, as one of the important base station (BS) resources that affect user services, has attracted more and more attention. However, a user would access to the BS which is the nearest for the user based on the conventional user association scheme, which constrains the network performance improvement due to the limited backhaul capacity. In this
-
BSSPD: A Blockchain-Based Security Sharing Scheme for Personal Data with Fine-Grained Access Control Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-20 Hongmin Gao; Zhaofeng Ma; Shoushan Luo; Yanping Xu; Zheng Wu
Privacy protection and open sharing are the core of data governance in the AI-driven era. A common data-sharing management platform is indispensable in the existing data-sharing solutions, and users upload their data to the cloud server for storage and dissemination. However, from the moment users upload the data to the server, they will lose absolute ownership of their data, and security and privacy
-
A Cyber Physical System Crowdsourcing Inference Method Based on Tempering: An Advancement in Artificial Intelligence Algorithms Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-19 Jia Liu; Mingchu Li; William C. Tang; Sardar M. N. Islam
Activity selection is critical for the smart environment and Cyber-Physical Systems (CPSs) that can provide timely and intelligent services, especially as the number of connected devices is increasing at an unprecedented speed. As it is important to collect labels by various agents in the CPSs, crowdsourcing inference algorithms are designed to help acquire accurate labels that involve high-level knowledge
-
A Deep Learning-Based Power Control and Consensus Performance of Spectrum Sharing in the CR Network Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-19 Muhammad Muzamil Aslam; Liping Du; Zahoor Ahmed; Muhammad Nauman Irshad; Hassan Azeem
The cognitive radio network (CRN) is aimed at strengthening the system through learning and adjusting by observing and measuring the available resources. Due to spectrum sensing capability in CRN, it should be feasible and fast. The capability to observe and reconfigure is the key feature of CRN, while current machine learning techniques work great when incorporated with system adaption algorithms
-
To Delay Instantiation of a Smart Contract to Save Calculation Resources in IoT Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-18 Hong Su; Bing Guo; Yan Shen; Zhen Zhang; Chaoxia Qin
Smart contracts are required to be instantiated in the predeployed stage, which consumes computation resources from then on. It is a big waste in the blockchain whose nodes are composed of IoT devices, as those devices often have limited resources (such as limited power supplies or a limited number of processes to run). Meanwhile, IoT devices are heterogeneous and different smart contracts are required
-
An E-Commerce Economic Dynamic Data Evaluation Model Based on Multiuser Demand Constraints Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-18 Chenyuan Wang
Forecasting the future earnings of listed companies based on multiuser constraints is the focus of investors, securities dealers, creditors, and management. Some empirical studies at home and abroad indicate that the financial reports issued by listed companies regularly contain information about future changes in earnings. On this basis, this article uses the Bayesian dynamic regression model to predict
-
Research on Supply Chain Financial Risk Assessment Based on Blockchain and Fuzzy Neural Networks Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-17 Yijie Wang
With the development of supply chain finance, the credit risk of small- and medium-sized financing enterprises from the perspective of supply chain finance has arisen. Risk management is one of the key tasks of the credit business of banks and other financial institutions, which runs through all aspects of the credit business before, during, and after the loan. This article combines blockchain and
-
Transaction Prediction in Blockchain: A Negative Link Prediction Algorithm Based on the Sentiment Analysis and Balance Theory Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-16 Ling Yuan; JiaLi Bin; YinZhen Wei; Zhihua Hu; Ping Sun
User relationship prediction in the transaction of Blockchain is to predict whether a transaction will occur between two users in the future, which can be abstracted into the link prediction problem. The link prediction can be categorized into the positive one and the negative one. However, the existing negative link prediction algorithms mainly consider the number of negative user interactions and
-
A Semiopportunistic Task Allocation Framework for Mobile Crowdsensing with Deep Learning Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-16 Zhenzhen Xie; Liang Hu; Yan Huang; Junjie Pang
The IoT era observes the increasing demand for data to support various applications and services. The Mobile Crowdsensing (MCS) system then emerged. By utilizing the hybrid intelligence of humans and sensors, it is significantly beneficial to keep collecting high-quality sensing data for all kinds of IoT applications, such as environmental monitoring, intelligent healthcare services, and traffic management
-
Distant Supervision for Relation Extraction with Sentence Selection and Interaction Representation Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-16 Tiantian Chen; Nianbin Wang; Hongbin Wang; Haomin Zhan
Distant supervision (DS) has been widely used for relation extraction (RE), which automatically generates large-scale labeled data. However, there is a wrong labeling problem, which affects the performance of RE. Besides, the existing method suffers from the lack of useful semantic features for some positive training instances. To address the above problems, we propose a novel RE model with sentence
-
Standard Propagation Channel Models for MIMO Communication Systems Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-16 Agbotiname Lucky Imoize; Augustus Ehiremen Ibhaze; Aderemi A. Atayero; K. V. N. Kavitha
The field of wireless communication networks has witnessed a dramatic change over the last decade due to sophisticated technologies deployed to satisfy various demands peculiar to different data-intensive wireless applications. Consequently, this has led to the aggressive use of the available propagation channels to fulfill the minimum quality of service (QoS) requirement. A major barometer used to
-
An Optimization Method for Mobile Edge Service Migration in Cyberphysical Power System Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-15 Qian Cao; Qilin Wu; Bo Liu; Shaowei Zhang; Yiwen Zhang
To relieve the pressure of processing computation-intensive applications on mobile devices and avoid high latency during data transmission, edge computing is proposed to solve this problem. Mobile edge computing (MEC) allows the deployment of MEC servers at the edge of the network to interact with users on the premise of low transmission delay, thereby improving the quality of service (QoS) for users
-
Path Planning for Smart Car Based on Dijkstra Algorithm and Dynamic Window Approach Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-15 Li-sang Liu; Jia-feng Lin; Jin-xin Yao; Dong-wei He; Ji-shi Zheng; Jing Huang; Peng Shi
Path planning and obstacle avoidance are essential for autonomous driving cars. On the base of a self-constructed smart obstacle avoidance car, which used a LeTMC-520 depth camera and Jetson controller, this paper established a map of an unknown indoor environment based on depth information via SLAM technology. The Dijkstra algorithm is used as the global path planning algorithm and the dynamic window
-
A Survey on Visible Light Positioning from Software Algorithms to Hardware Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-15 Pengpeng Chen; Mingzhi Pang; Di Che; Yuqing Yin; Donghai Hu; Shouwan Gao
The prevalence of illumination equipment and the inherent advantages of the Visible Light Communication (VLC) technique have resulted in a growing interest in Visible Light Positioning (VLP). There exist many excellent VLP techniques over the past several years. However, one limitation of most VLP survey works is that they mainly focus on the analysis from the perspective of techniques but ignore the
-
Energy Efficiency Opposition-Based Learning and Brain Storm Optimization for VNF-SC Deployment in IoT Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-13 Hejun Xuan; Xuelin Zhao; Zhenghui Liu; Jianwei Fan; Yanling Li
Network Function Virtualization (NFV) can provide the resource according to the request and can improve the flexibility of the network. It has become the key technology of the Internet of Things (IoT). Resource scheduling for the virtual network function service chain (VNF-SC) is the key issue of the NFV. Energy consumption is an important indicator for the IoT; we take the energy consumption into
-
Proposing a Density-Based Clustering Approach (DBCA) to Aggregate Data Collected from the Environment in Arid Area for Desertification Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-10 Zhihao Peng; Raziyeh Daraei; Seyed Mojtaba Ahmadpanahi; Amir Seyed Danesh; Safieh Siadat; Poria Pirozmand; Rozita Jamili Oskouei
Nowadays, the expansion of desert areas has become one of the main problems in arid areas due to various reasons such as rising temperatures and vegetation fires. Establishment of wireless sensor networks in these areas can accelerate the process of environmental monitoring and integrate temperature and humidity information sending to base stations in order to make basic decisions on desertification
-
Energy Efficiency Optimization of Cognitive UAV-Assisted Edge Communication for Semantic Internet of Things Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-10 Yilong Gu; Yangchao Huang; Hang Hu; Weiting Gao; Yu Pan
With the consolidation of the Internet of Things (IoT), the unmanned aerial vehicle- (UAV-) based IoT has attracted much attention in recent years. In the IoT, cognitive UAV can not only overcome the problem of spectrum scarcity but also improve the communication quality of the edge nodes. However, due to the generation of massive and redundant IoT data, it is difficult to realize the mutual understanding
-
Effective Capacity Maximization in beyond 5G Vehicular Networks: A Hybrid Deep Transfer Learning Method Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-10 Yi Huang; Xinqiang Ma; Youyuan Liu; Zhigang Yang
How to improve delay-sensitive traffic throughput is an open issue in vehicular communication networks, where a great number of vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) links coexist. To address this issue, this paper proposes to employ a hybrid deep transfer learning scheme to allocate radio resources. Specifically, the traffic throughput maximization problem is first formulated
-
Design of English Diagnostic Practice Sentence Repetition Recognition System Based on Matching Tree and Edge Computing Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-09 Tanping Xi
English reading ability is an important indicator to measure learners’ English ability. However, because reading ability cannot be directly observed, people usually take tests to judge the reading ability of learners. Therefore, it is very necessary to design a reasonable diagnostic practice sentence repetition recognition system to analyze and test, inform learners of the advantages and disadvantages
-
Blockchain-Based DNS Root Zone Management Decentralization for Internet of Things Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-08 Yu Zhang; Wenfeng Liu; Zhongda Xia; Zhongze Wang; Lu Liu; Weizhe Zhang; Hongli Zhang; Binxing Fang
Domain Name System (DNS) is a widely used infrastructure for remote control and batch management of IoT devices. As a critical Internet infrastructure, DNS is structured as a tree-like hierarchy with single root zone authority at the top, which puts the operation of DNS at risk from single point of failure. The current root zone management is lack of transparency and accountability, since only the
-
Trustworthy Jammer Selection with Truth-Telling for Wireless Cooperative Systems Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-08 Yingkun Wen; Tao Jing; Qinghe Gao
In this paper, we propose a trustworthy friendly jammer selection scheme with truth-telling for wireless cooperative systems. We first utilize the reverse auction scheme to enforce truth-telling as the dominant strategy for each candidate friendly jammer. Specifically, we consider two auction cases: (1) constant power (CP) case and (2) the utility of the BS maximization (UBM) case. In both cases, the
-
Histogram Publication over Numerical Values under Local Differential Privacy Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-08 Xu Zheng; Ke Yan; Jingyuan Duan; Wenyi Tang; Ling Tian
Local differential privacy has been considered the standard measurement for privacy preservation in distributed data collection. Corresponding mechanisms have been designed for multiple types of tasks, like the frequency estimation for categorical values and the mean value estimation for numerical values. However, the histogram publication of numerical values, containing abundant and crucial clues
-
Integrating Sensor Ontologies with Global and Local Alignment Extractions Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-08 Xingsi Xue; Xiaojing Wu; Chao Jiang; Guojun Mao; Hai Zhu
In order to enhance the communication between sensor networks in the Internet of things (IoT), it is indispensable to establish the semantic connections between sensor ontologies in this field. For this purpose, this paper proposes an up-and-coming sensor ontology integrating technique, which uses debate mechanism (DM) to extract the sensor ontology alignment from various alignments determined by different
-
An Online Semisupervised Learning Model for Pedestrians’ Crossing Intention Recognition of Connected Autonomous Vehicle Based on Mobile Edge Computing Applications Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-05 Shicai Ji; Ying Peng; Hongjia Zhang; Shengbo Wu
One of the major challenges that connected autonomous vehicles (CAVs) are facing today is driving in urban environments. To achieve this goal, CAVs need to have the ability to understand the crossing intention of pedestrians. However, for autonomous vehicles, it is quite challenging to understand pedestrians’ crossing intentions. Because the pedestrian is a very complex individual, their intention
-
Time Slot Detection-Based -ary Tree Anticollision Identification Protocol for RFID Tags in the Internet of Things Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-04 Xiaojiao Yang; Bizao Wu; Shixun Wu; Xinxin Liu; W. G. Will Zhao
Recently, a number of articles have proposed query tree algorithms based on bit tracking to solve the multitag collision problem in radio frequency identification systems. However, these algorithms still have problems such as idle slots and redundant prefixes. In this paper, a time slot detection-based -ary tree (Time Slot Detection based -ary tree, TSDM) tag anticollision algorithm has been proposed
-
RBM: Region-Based Mobile Routing Protocol for Wireless Sensor Networks Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-04 Muhammad Fahad Mukhtar; Muhammad Shiraz; Qaisar Shaheen; Kamran Ahsan; Rizwan Akhtar; Wang Changda
Wireless sensor networks (WSNs) are employed for different applications for the reason of small-sized and low-cost sensor nodes. However, several challenges that include a low powered battery of the sensor nodes restrict their functionality. Therefore, saving energy in the routing process to extend network life is a serious concern while deploying applications on WSN. To this end, the key technology
-
On the Capacity of Full-Duplex AF/DF Relay System with Energy Harvesting for Vehicle-to-Vehicle Communications Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-04 Ba Cao Nguyen; Xuan Hung Le; Van Duan Nguyen; Le The Dung
This paper studies the ergodic capacity (EC) of full-duplex (FD) amplify-and-forward (AF) and decode-and-forward (DF) relay system with energy harvesting (EH) for vehicle-to-vehicle (V2V) communications. Unlike previous works on FD-EH systems, we consider the case that both relay and destination are mobile vehicles while the source is a static base station. We mathematically derive the exact closed-form
-
Markdown Time for Perishables Based on Dynamic Quality Evaluation for Complex Data Analysis Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-03 Jiang-Tao Wang; Jian-Jun Yu; Yu-His Yuan; Sang-Bing Tsai; Shu-Fen Zhang
Perishables’ freshness is a dynamic state, which can be captured by statistical big data based on advanced product identification and sensory technologies. A time-based markdown strategy model is proposed to consider the markdown strategy in maximizing performance. The results showed that demand uncertainty would force them to implement a markdown strategy in advance, merchants’ profit and initial
-
A Transaction Trade-Off Utility Function Approach for Predicting the End-Price of Online Auctions in IoT Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-03 Xiaohui Li; Hongbin Dong
To stimulate large-scale users to participate in the big data construction of IoT (internet of things), auction mechanisms based on game theory are used to select participants and calculate the corresponding reward in the process of crowdsensing data collection from IoT. In online auctions, bidders bid many times and increase their bid price. All the bidders want to maximize their utility in auctions
-
A Fast Hybrid Strategy-Based RFID Tag Identification Protocol Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-03 Xinyan Wang
Tag collision is one of the critical problems in radiofrequency identification (RFID) technology which can be widely used to identify objects using tag attachment automatically. Through the transmission and reflection of wireless radiofrequency signals, noncontact identification is realized. However, when multiple tags respond to the reader simultaneously, a collision occurs, significantly degrading
-
On Constructing -Spanner in IoT under SINRI Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-02 Xiujuan Zhang; Yongcai Wang; Wenping Chen; Yuqing Zhu; Deying Li; Guangshun Li
Following the recent advances in the Internet of Things (IoT), it is drawing lots of attention to design distributed algorithms for various network optimization problems under the SINR (Signal-to-Interference-and-Noise-Ratio) interference model, such as spanner construction. Since a spanner can maintain a linear number of links while still preserving efficient routes for any pair of nodes in wireless
-
Protecting the Moving User’s Locations by Combining Differential Privacy and -Anonymity under Temporal Correlations in Wireless Networks Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-02-02 Weiqi Zhang; Guisheng Yin; Yuhai Sha; Jishen Yang
The rapid development of the Global Positioning System (GPS) devices and location-based services (LBSs) facilitates the collection of huge amounts of personal information for the untrusted/unknown LBS providers. This phenomenon raises serious privacy concerns. However, most of the existing solutions aim at locating interference in the static scenes or in a single timestamp without considering the correlation
-
Security Analysis of Out-of-Band Device Pairing Protocols: A Survey Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-30 Sameh Khalfaoui; Jean Leneutre; Arthur Villard; Jingxuan Ma; Pascal Urien
Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of the IoT devices. In order to provide the most user-friendly IoT services, the usability assessment has become the main requirement. Thus, the complete
-
TPR-DTVN: A Routing Algorithm in Delay Tolerant Vessel Network Based on Long-Term Trajectory Prediction Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-29 Chao Liu; Yingbin Li; Ruobing Jiang; Yong Du; Qian Lu; Zhongwen Guo
An efficient and low-cost communication system has great significance in maritime communication, but it faces enormous challenges because of high communication costs, incomplete communication infrastructure, and inefficient routing algorithms. Delay Tolerant Vessel Networks (DTVNs), which can create low-cost communication opportunities among vessels, have recently attracted considerable attention in
-
A Conformance Testing Methodology and System for Cognitive Radios Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-29 Francisco S. S. Silva; Andson M. Balieiro; Francisco F. de Mendoça; Kelvin L. Dias; Paulo Guarda
The fifth generation (5G) of mobile networks has started its operation in some countries and is aimed at meeting demands beyond the current system capabilities such as the huge amount of connected devices from IoT applications (e.g., smart cities), explosive growth of high-speed mobile data traffic (e.g., ultrahigh definition video streaming), and ultrareliable and low latency communication (e.g.,
-
Optimal Sensor Placement for Underground Tunnel Monitoring via Wireless Sensor Networks Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-29 Yonggang Li; Bin He; Youming Wang
In replace of human labor, wireless sensor networks (WSNs) are increasingly being utilized to perform structural health monitoring of underground tunnel. Due to its complex environment, the deployment of sensor nodes poses a big challenge to related staff. How to use the optimal number of sensor nodes deployed in the underground tunnel to obtain a satisfactory monitoring is our main consideration.
-
Nonintrusive Load Management Based on Distributed Edge and Secure Key Agreement Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-29 Jing Zhang; Qi Liu; Lu Chen; Ye Tian; Jun Wang
With the advancement of national policies and the rise of Internet of things (IoT) technology, smart meters, smart home appliances, and other energy monitoring systems continue to appear, but due to the fixed application scenarios, it is difficult to apply to different equipment monitoring. At the same time, the limited computing resources of sensing devices make it difficult to guarantee the security
-
An Atomic Cross-Chain Swap-Based Management System in Vehicular Ad Hoc Networks Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-29 Chenkai Tan; Shaoyi Bei; Zhengjun Jing; Neal Xiong
The blockchain-based management system has been regarded as a novel way to improve the efficiency and safety of Vehicular Ad Hoc Networks (VANETs). A blockchain-based scheme’s performance depends on blockchain nodes’ computing power composed from the road-side unit (RSU). However, the throughput of blockchain-based application in VANETs is limited by the network bandwidth. A single blockchain cannot
-
Energy-Efficient Virtual Network Embedding Algorithm Based on Hopfield Neural Network Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-28 Mengyang He; Lei Zhuang; Sijin Yang; Jianhui Zhang; Huiping Meng
To solve the energy-efficient virtual network embedding problem, this study proposes an embedding algorithm based on Hopfield neural network. An energy-efficient virtual network embedding model was established. Wavelet diffusion was performed to take the structural feature value into consideration and provide a candidate set for virtual network embedding. In addition, the Hopfield network was used
-
Corrigendum to “Nodes Availability Analysis of NB-IoT Based Heterogeneous Wireless Sensor Networks under Malware Infection” Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-28 Xiaojun Wu; Qiying Cao; Juan Jin; Yuanjie Li; Hong Zhang
-
Multistrategy Repeated Game-Based Mobile Crowdsourcing Incentive Mechanism for Mobile Edge Computing in Internet of Things Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-27 Chuanxiu Chi; Yingjie Wang; Yingshu Li; Xiangrong Tong
With the advent of the Internet of Things (IoT) era, various application requirements have put forward higher requirements for data transmission bandwidth and real-time data processing. Mobile edge computing (MEC) can greatly alleviate the pressure on network bandwidth and improve the response speed by effectively using the device resources of mobile edge. Research on mobile crowdsourcing in edge computing
-
A Fuzzy-Logic-Based Double -Learning Routing in Delay-Tolerant Networks Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-27 Jiagao Wu; Fan Yuan; Yahang Guo; Hongyu Zhou; Linfeng Liu
Delay-tolerant networks (DTNs) are wireless mobile networks, which suffer from frequent disruption, high latency, and lack of a complete path from source to destination. The intermittent connectivity in DTNs makes it difficult to efficiently deliver messages. Research results have shown that the routing protocol based on reinforcement learning can achieve a reasonable balance between routing performance
-
The Potential of Massive-MIMO on TV Towers for Cellular Coverage Extension Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-22 Tayebeh Taheri; Rickard Nilsson; Jaap van de Beek
Because of low potential revenue, network operators have mainly focused on providing connectivity in urban areas rather than in rural areas resulting in technology improvement in favour of urban areas; and consequently, most of remote areas suffer from poor or lack of connectivity. In this paper, we present the potential of massive-MIMO to provide connectivity to sparse areas. We show that we can cover
-
Mitigation of Imperfect Successive Interference Cancellation and Wavelet-Based Nonorthogonal Multiple Access in the 5G Multiuser Downlink Network Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-21 Muneeb Ahmad; Sobia Baig; Hafiz Muhammad Asif; Kaamran Raahemifar
The fourth Industrial Revolution is expected to lead to an era of technological innovation and digitization that would require connectivity by the users, anywhere and anytime. The fifth generation of wireless communication systems and the technologies therein are being explored to cater to high connectivity needs that encompass high data rates, very low latencies, energy-efficient systems, etc. A multiuser
-
A Semidynamic Bidirectional Clustering Algorithm for Downlink Cell-Free Massive Distributed Antenna System Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-21 Panpan Qian; Huan Zhao; Yanmin Zhu; Qiang Sun
Cell-free massive distributed antenna system (CF-MDAS) can further reduce the access distance between mobile stations (MSs) and remote access points (RAPs), which brings a lower propagation loss and higher multiplexing gain. However, the interference caused by the overlapping coverage areas of distributed RAPs will severely degrade the system performance in terms of the sum-rate. Since that clustering
-
Flexible Investment Strategies for Cloud-Native Architecture of Public Health Information Systems Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-20 Ming Jiang; Ichiro Nakamoto; Weiqing Zhuang; Weiguo Zhang; Yin Guo; Liting Ma
The randomness of public health events requires that the cloud-native architecture, as the mainstream architecture of the new generation of the public health information system, has the appropriate flexibility to meet the needs of environmental change. The flexible acquisition of cloud-native architecture requires organizations to invest additional resources. How to plan and formulate resource input
-
Design of Sanda Action Reconstruction Model Based on 3D Images Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-19 Hongwei Zhao
In order to improve the training level of Sanda movement, this article uses an image analysis method to reconstruct the detailed characteristics of the movement and apply them to the actual training process. Since the traditional wavelet reconstruction method is affected by the accuracy of the decomposition scale, this paper proposes an improved method of Sanda action based on 3D image reconstruction
-
SAR Image Target Recognition Based on Monogenic Signal and Sparse Representation Wirel. Commun. Mob. Comput. (IF 1.819) Pub Date : 2021-01-18 XiuXia Ji; Yinan Sun
It is necessary to recognize the target in the situation of military battlefield monitoring and civilian real-time monitoring. Sparse representation-based SAR image target recognition method uses training samples or feature information to construct an overcomplete dictionary, which will inevitably affect the recognition speed. In this paper, a method based on monogenic signal and sparse representation
Contents have been reproduced by permission of the publishers.