• Power Allocation for Physical Layer Security Among Similar Channels

  • HACIT2: A Privacy Preserving, Region Based and Blockchain Application for Dynamic Navigation and Forensics in VANET

  • RPMA Low-Power Wide-Area Network Planning Method Basing on Data Mining

  • Asymptotical Performance of Ring Based Routing for Wireless Sensor Networks with a Mobile Sink: An Analysis

  • An Energy-Efficient Distributed Routing Protocol for Wireless Sensor Networks with Mobile Sinks

  • Energy Efficient Based Splitting for MPTCP in Heterogeneous Networks

  • Task Assignment for Semi-opportunistic Mobile Crowdsensing

  • Simplicial Complex Reduction Algorithm for Simplifying WSN’s Topology

  • Caching on Vehicles: A Lyapunov Based Online Algorithm

  • A Lightweight Security and Energy-Efficient Clustering Protocol for Wireless Sensor Networks

  • Speed Based Attacker Placement for Evaluating Location Privacy in VANET

  • Resource Allocation Scheme for D2D Communication Based on ILA

  • A Power Allocation Algorithm for D2D-Direct Communication in Relay Cellular Networks

  • Content Aware Resource Allocation for Video Service Provisioning in Wireless Networks

  • An Action Recognition Method Based on Wearable Sensors

  • A Self-adaptive Feedback Handoff Algorithm Based Decision Tree for Internet of Vehicles

  • A Speed-Adjusted Vertical Handover Algorithm Based on Fuzzy Logic

  • Segment-Based Scheduling Algorithm in Cache-Enabled Device-to-Device Wireless Networks

  • A Lightweight Filter-Based Target Tracking Model in Wireless Sensor Network

  • Node Scheduling for Localization in Heterogeneous Software-Defined Wireless Sensor Networks

  • Mobility Assisted Wireless Sensor Network Cooperative Localization via SOCP

  • Radio-Map Search Algorithm Based on Steepest Descent Principle

  • A Joint Power Control and Cooperative Transmission Scheme in Random Networks

  • Implementing Energy Saving Techniques for Sensor Nodes in IoT Applications

  • Outage Probability of Vehicular Networks under Unreliable Backhaul

  • Cooperative Non-Orthogonal Multiple Access for Future Wireless Communications

  • Improving Customer Behaviour Prediction with the Item2Item model in Recommender Systems

  • An Introduction of Real-time Embedded Optimisation Programming for UAV Systems under Disaster Communication

  • Unsupervised Machine Learning based Documents Clustering in Urdu

  • Practical Method for Evaluating the Performance of a Biometric Algorithm

  • A Middleware for Cyber Physical Systems in an Internet of Things Environment: Case of for Mobile Asset Tracking

  • Signal Processing, Control and Coordination in an Intelligent Connected Vehicle

  • Internet of Things-Based Framework for Public Transportation Fleet Management in Non-smart City

  • Software Defined Networking (SDN) for Universal Access

  • Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based

  • UmobiTalk: Ubiquitous Mobile Speech Based Translator for Sesotho Language

  • Development of an Artificial Neural Network Model for Predicting Surface Water Level: Case of Modder River Catchment Area

  • A Predictive Model for Automatic Generation Control in Smart Grids Using Artificial Neural Networks

  • Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype

  • Exploring Users’ Continuance Intention Towards Mobile SNS: A Mobile Value Perspective

  • Awale Game: Application Programming Interface and Augmented Reality Interface

  • Mood and Personality Influence on Emotion

  • Two Parallelized Filter Methods for Feature Selection Based on Spark

  • Vector Space Model of Text Classification Based on Inertia Contribution of Document

  • Smartphone Cyber Security Awareness in Developing Countries: A Case of Thailand

  • Implementation of Cognitive Radio Network Testbed for Multimedia Communications

  • Optimal ZF Precoder for MU massive MIMO Systems over Ricean Channel with per Antenna Power Allocation

  • Survey of Context-Aware Video Transmission over Vehicular Ad-Hoc Networks (VANETs)

  • An Innovative Secure Approach to Detect Clone Node Intruder in Homogeneous Wireless Sensor Network

  • Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications