Pub Date : 2023-08-18DOI: 10.1007/s11036-023-02192-w
Yuanzhi Hu, M. Kundi
{"title":"A Multi-Scale Gabor Filter-Based Method for Enhancing Video Images in Distance Education","authors":"Yuanzhi Hu, M. Kundi","doi":"10.1007/s11036-023-02192-w","DOIUrl":"https://doi.org/10.1007/s11036-023-02192-w","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"146 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86500822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-17DOI: 10.1007/s11036-023-02190-y
Lei Ma, Hong-shan Yang, Jian-Feng Yang
{"title":"A Multimodal Teaching Quality Evaluation for Hybrid Education Based on Stepwise Regression Analysis","authors":"Lei Ma, Hong-shan Yang, Jian-Feng Yang","doi":"10.1007/s11036-023-02190-y","DOIUrl":"https://doi.org/10.1007/s11036-023-02190-y","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73182784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-17DOI: 10.1007/s11036-023-02199-3
Lokesh Bommisetty, T. Venkatesh
{"title":"Contextual Bandit Based Adaptive Numerology for Initial Access in 5G NR Networks","authors":"Lokesh Bommisetty, T. Venkatesh","doi":"10.1007/s11036-023-02199-3","DOIUrl":"https://doi.org/10.1007/s11036-023-02199-3","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85030113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-16DOI: 10.1007/s11036-023-02220-9
Kexiang Ma, Sungwon Lee, Hui Chen
{"title":"Application of Visual Communication in Image Enhancement and Optimization of Human–Computer Interface","authors":"Kexiang Ma, Sungwon Lee, Hui Chen","doi":"10.1007/s11036-023-02220-9","DOIUrl":"https://doi.org/10.1007/s11036-023-02220-9","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"75 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74310788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-16DOI: 10.1007/s11036-023-02162-2
Chong-gao Chen, Jin Zhang, Loknath Sai Ambati
{"title":"Explosive force acquisition of sprinter lower limb in training based on WSN","authors":"Chong-gao Chen, Jin Zhang, Loknath Sai Ambati","doi":"10.1007/s11036-023-02162-2","DOIUrl":"https://doi.org/10.1007/s11036-023-02162-2","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91205881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-15DOI: 10.1007/s11036-023-02134-6
Yao-Pei Zhao, Jian Li, Zhenjiang Zhang, Bo Shen
{"title":"SECC Framework: Get the Best from Both the Cloud and Edge Computing in Internet of Things","authors":"Yao-Pei Zhao, Jian Li, Zhenjiang Zhang, Bo Shen","doi":"10.1007/s11036-023-02134-6","DOIUrl":"https://doi.org/10.1007/s11036-023-02134-6","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83609961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-12DOI: 10.1007/s11036-023-02231-6
Mengfan Xu, Xinghua Li
{"title":"PPFL-IDS: Privacy-Preserving Federated Learning Based IDS Against Poisoning Attacks","authors":"Mengfan Xu, Xinghua Li","doi":"10.1007/s11036-023-02231-6","DOIUrl":"https://doi.org/10.1007/s11036-023-02231-6","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"120 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77417725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-10DOI: 10.1007/s11036-023-02207-6
Cong'an Xu, Hang Su, Long Gao, Junfeng Wu, Wenjun Yan
{"title":"Rotated SAR Ship Detection based on Gaussian Wasserstein Distance Loss","authors":"Cong'an Xu, Hang Su, Long Gao, Junfeng Wu, Wenjun Yan","doi":"10.1007/s11036-023-02207-6","DOIUrl":"https://doi.org/10.1007/s11036-023-02207-6","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"188 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78583217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-10DOI: 10.1007/s11036-023-02223-6
Amani K. Samha, Nidhi Malik, Deepak Sharma, K. S, P. Dutta
{"title":"Intrusion Detection System Using Hybrid Convolutional Neural Network","authors":"Amani K. Samha, Nidhi Malik, Deepak Sharma, K. S, P. Dutta","doi":"10.1007/s11036-023-02223-6","DOIUrl":"https://doi.org/10.1007/s11036-023-02223-6","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78657341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}