• A Research on the Identification of Internet User Based on Deep Learning

  • Speed Prediction of High Speed Mobile Vehicle Based on Extended Kalman Filter in RFID System

  • Real-Time Drone Detection Using Deep Learning Approach

  • Deflection Angle Detection of the Rotor and Signal Processing for a Novel Rotational Gyroscope

  • Distributed Channel Allocation for Wireless Mesh Networks Based on Hypergraph Interference Model

  • Joint Resource Allocation for Wireless Energy Harvesting Based on DF Relaying

  • Optimal Power Splitting of Cognitive Radio Networks with SWIPT-Enabled Relay

  • Real-Valued Orthogonal Sequences for Ultra-low Overhead Channel Estimation in MIMO-FBMC Systems

  • A Novel Spectrum Allocation Scheme in Femtocell Networks Using Improved Graph Theory

  • Physical Violence Detection with Movement Sensors

  • Random Sequence Generation Algorithm for Multi-chaotic Systems

  • VulAware: Towards Massive-Scale Vulnerability Detection in Cyberspace

  • Smartphone Application Identification by Convolutional Neural Network

  • Variable Tap-Length Blind Equalization for Underwater Acoustic Communication

  • Joint D2D Cooperative Relaying and Friendly Jamming Selection for Physical Layer Security

  • An Improved Constrained Least Squares Localization Algorithm in NLOS Propagating Environment

  • Probabilistic Sorting Memory Constrained Tree Search Algorithm for MIMO System

  • Research on the Contextual Information in Scene Classification

  • Contract Theory Based on Wireless Energy Harvesting with Transmission Performance Optimization

  • Dynamic Opportunistic Spectrum Access with Channel Bonding in Mesh Networks: A Game-Theoretic Approach

  • Secrecy Performance Analysis of SWIPT System Based on OFDM Assisted Interference

  • Probability-Based Routing Symmetry Metrics

  • Dynamic Network Access for Multi-UAV Networks: A Cloud-Assisted Learning Algorithm

  • OFDM Based SWIPT in a Two-Way Relaying Network

  • Pedestrian Walking Model for Floor Plan Building Based on Crowdsourcing PDR Data

  • Weight Matrix Analysis Algorithm for WLAN Indoor Positioning System

  • Manifold Alignment-Based Radio Map Construction in Indoor Localization

  • The Technology-Enhanced Ability Continuum-of-Care Home Program for People with Cognitive Disorders: Concept Design and Scenario of Use

  • First Insights into Applying the Game Transfer Phenomena Framework for Positive Means

  • Investigating Prosodic Accommodation in Clinical Interviews with Depressed Patients

  • Tools and Technologies for Patients and Caregivers Engagement: A Qualitative Analysis of Health Professionals’ Attitudes and Day-to-Day Practice

  • Learning to Use Tablets After 65: Auto-regulative Effects of a Training Program

  • Extraversion Affects Attentive Processes of Personal Images

  • Reading Between the Lines: A Computational Bibliometric Analysis on Emotion Regulation

  • The Use of 3D Body Scanner in Medicine and Psychology: A Narrative Review

  • iStim. A New Portable Device for Interoceptive Stimulation

  • Learning into the Wild: A Protocol for the Use of 360° Video for Foreign Language Learning

  • The Contribution of Allocentric Impairments to the Cognitive Decline in Alzheimer’s Disease

  • Using an Aging Simulator Suit for Modeling Visuo-Motor Limitations of Elderly Users Interacting with a Mobile Application: Feasibility Study

  • Psychophysiological Specificity of Four Basic Emotions Through Autobiographical Recall and Videos

  • Emerging Technology in Positive Psychology

  • The Italian Adaptation of Interpersonal Communication Competences Questionnaire

  • Engaging Elderly Breast Cancer Patients Through an e-health Intervention: A Case Series Study

  • A “First Look” on Frailty: A Scientometric Analysis

  • The Mobile App for Diabetes Self-management: First Adherence Data and Analysis of Patients’ in-App Notes

  • Mindful Age and Technology: Promoting Quality of Life in Older Adults with a Tablet/Smartphone App

  • Understanding the Role of Data-Centric Social Context in Personalized Mobile Applications

  • A Multi-connection Encryption Algorithm Applied in Secure Channel Service System

  • Kernel-Space Intrusion Detection Using Software-Defined Networking

  • SilentPhone: Inferring User Unavailability based Opportune Moments to Minimize Call Interruptions