Skip to main content

Mobile Networks and Applications OnlineFirst articles

29.02.2024 | Correction

Correction: A Joint Caching and Offloading Strategy Using Reinforcement Learning for Multi-access Edge Computing Users

verfasst von:
Yuan Yuan, Wei Su, Gaofeng Hong, Haoru Li, Chang Wang

24.02.2024 | Research

Tactile Codec with Visual Assistance in Multi-modal Communication for Digital Health

In the digital health, with the development of communication, medical information in all modalities is growing exponentially. Therefore, an effective communication for multi-modal data including tactile and visual information is paramount. In this …

verfasst von:
Mingkai Chen, Xinmeng Tan, Huiyan Han, Lei Wang

19.02.2024 | Research

A Method for Obtaining Barbell Velocity and Displacement and Motion Counting Based on IMU

Velocity-based training (VBT) is a scientifically grounded approach to resistance training that provides trainers with precise and reliable guidance by measuring the velocity of the barbell during exercise. Inertial measurement units (IMUs) …

verfasst von:
Songtao Zhang, Chifu Yang, Jianfei Zhu, Jin Tian, Mengqiang Fu, Changbing Chen, Yingjie Liu, Baichun Wei

31.01.2024 | Research

Covert UAV Communication by Exploiting Imperfect Cancellation Under Channel Uncertainty

Covert communication has emerged as a promising scheme to protect the communication process from being detected by illegal users with arbitrarily small probability. In this paper, we study the problem of hiding private messages under public …

verfasst von:
Tian Gao, Zhao Chen, Liuguo Yin


The Claim-based Priority-Discriminated Channel Access (CPDCA) Method using the Registered Backoff Time Mechanism for IEEE 802.11ah

IEEE 802.11ah is a protocol that adopts the CSMA/CA-based channel access way for Internet of Thing (IOT). This work proposed a newly devised Restricted Access Window (RAW) called the Claiming RAW to let those spontaneous stations having high …

verfasst von:
Chung-Ming Huang, Rung-Shiang Cheng, Yan-Jia Pan

26.01.2024 | Research

Online Caching Algorithm for VR Video Streaming in Mobile Edge Caching System

The transmission optimization of VR video streaming can improve the quality of user experience, which includes content prediction optimization and caching strategy optimization. Existing work either focuses on content prediction or on caching …

verfasst von:
Qiuming Liu, Hao Chen, Zihui Li, Yaxin Bai, Dong Wu, Yang Zhou


Sensor based Battery Management System in Electric Vehicle using IoT with Optimized Routing

IoT based BMS (battery management system) is becoming an essential factor of an EV (electric vehicle) in recent years. The BMS is responsible for monitoring and controlling the state of the battery pack in an EV using appropriate. The IoT based …

verfasst von:
Anbazhagan Geetha, S. Suprakash, Se-Jung Lim


A Brief Introduction to Vision Based Mobile Information System

Mobile information is one of the most widely-used information forms in real world, which includes more content than any other information forms. However, Mobile information also has more complex architecture than other information processing …

verfasst von:
Wenxiang Zhang, Zhenyuan Tian, Shuai Wang, Ting Yang

17.01.2024 | Research

Machine Learning for Digital Shadow Design in Health Insurance Sector

The digital transformation process in organizations has accelerated significantly in recent years; the COVID-19 pandemic was a catalyst that highlighted the need for digitalization in all sectors. In the case of the health sector, this process is …

verfasst von:
Román Rodríguez-Aguilar, José-Antonio Marmolejo-Suacedo, Miriam Rodríguez-Aguilar, Liliana Marmolejo-Saucedo

Open Access 13.01.2024 | Research

SGS: SqueezeNet-guided Gaussian-kernel SVM for COVID-19 Diagnosis

The ongoing global pandemic has underscored the importance of rapid and reliable identification of COVID-19 cases to enable effective disease management and control. Traditional diagnostic methods, while valuable, often have limitations in terms …

verfasst von:
Fanfeng Shi, Jiaji Wang, Vishnuvarthanan Govindaraj

12.01.2024 | Research

A Fuzzy Overlapping Project Resource Optimization Model in the Project Construction Industry with a Fractal Approach

When the number of projects in a company increases, it becomes very important to choose the right strategy to supply resources and raw materials in profit and loss and finish the work according to the schedule. This study presents a new …

verfasst von:
Shakib Zohrehvandi

12.01.2024 | Research

Selecting the Distribution System using AHP and Fuzzy AHP Methods

In this research, we present a supporting tool for decision making by designing a distribution system for a trading company of supplies for the welding industry in Mexico. The case study encompasses a distribution system with shortage problems and …

verfasst von:
Jania Astrid Saucedo-Martínez, Tomás Eloy Salais-Fierro, Roman Rodriguez-Aguilar, Jose Antonio Marmolejo-Saucedo

12.01.2024 | Research

A Joint Caching and Offloading Strategy Using Reinforcement Learning for Multi-access Edge Computing Users

The increasing adoption of UHD video applications in connected car mobile terminals is placing significant demands on the real-time processing capabilities of in-vehicle devices. Previous studies have proposed a combination of caching and …

verfasst von:
Yuan Yuan, Wei Su, Gaofeng Hong, Haoru Li, Chang Wang


Efficient and Secure Graph-Based Trust-Enabled Routing in Vehicular Ad-Hoc Networks

Vehicular Ad hoc Networks (VANETs) have gained significant recognition as a prospective technology for augmenting road safety and optimizing traffic efficiency through facilitating instantaneous communication between vehicles and roadside …

verfasst von:
Intyaz Alam, Manisha Manjul, Vinay Pathak, Vajenti Mala, Anuj Mangal, Hardeo Kumar Thakur, Deepak Kumar Sharma


Misreporting Attacks Against Load Balancers in Software-Defined Networking

Load balancers enable efficient use of network resources by distributing traffic fairly across them. In software-defined networking (SDN), load balancing is most often realized by a controller application that solicits traffic load reports from …

verfasst von:
Quinn Burke, Patrick McDaniel, Thomas La Porta, Mingli Yu, Ting He


Energy-Efficient joint Resource Allocation and Computation Offloading in NOMA-enabled Vehicular Fog Computing

The rapid growth in vehicle data fosters the development of vehicular computational offloading. By exploiting the superiority of non-orthogonal multiple access (NOMA) in the offloading process, NOMA-enabled vehicular computation offloading enables …

verfasst von:
Zhijian Lin, Yonghang Lin, Jianjie Yang, Qingsong Zhang

09.01.2024 | Research

Packing Soft Convex Polygons in an Optimized Convex Container

Packing soft convex polygonal objects in an optimized convex container is considered. The shape of the soft object can be changed in certain limits, but the object remains convex and maintains its area unchanged under all shape transformations.

verfasst von:
Igor Litvinchev, Luis Infante, Tetyana Romanova, Alberto Martinez-Noa, Luis Gutierrez

04.01.2024 | Research

AdHocVDew: Graph Theory Based Dew Enabled 5G Vehicular Ad Hoc Network

In this article, a vehicular ad hoc network (VANET) based on dew computing and graph theory is proposed. A major challenge in vehicular networks is to accurately and quickly process the data generated by the growing number of vehicles. Vehicle to …

verfasst von:
Subha Ghosh


An Intelligent System of Permanent Magnet Synchronous Using Synovial Motor Control and PID Motor Control for EoT Computing: a Comparative Simulation Study

Developing intelligent control models for permanent magnet synchronous motors (PMSM) is crucial from both a theoretical and practical standpoint due to the growing use of these motors in industrial production, agriculture, and edge computing …

verfasst von:
Qi Wang

16.12.2023 | Research

Sensor Spoofing Detection On Autonomous Vehicle Using Channel-spatial-temporal Attention Based Autoencoder Network

Autonomous vehicles heavily rely on various sensors to evaluate their surroundings and issue essential control commands. Nonetheless, these sensors are susceptible to false data injection and spoofing attacks, posing a significant security threat.

verfasst von:
Man Zhou, Lansheng Han