


default search action
Telecommunication Systems, Volume 84
Volume 84, Number 1, September 2023
- Amitesh Kumar Pandit, Kakali Chatterjee, Ashish Singh:
Secure fine grained access control for telecare medical communication system. 1-21 - B. Krishna Kumar, R. Sankar, R. Navaneetha Krishnan, R. Rukmani:
Multiserver call center retrial queue under Bernoulli vacation schedule with two-way communication and orbital search. 23-51 - Siham Zroug
, Laïd Kahloul
, Samir Tigane
, Nadia Hamani
, Saber Benharzallah
:
A new formal approach for performance evaluation of green MAC protocol in energy harvesting WSNs. 53-67 - Fatima Zohra Bouchibane
, Hakim Tayakout
, Elhocine Boutellaa
:
A deep learning-based antenna selection approach in MIMO system. 69-76 - Khaled Ramadan
, Basem M. ElHalawany
, Mohammed S. El-Bakry
:
Performance improvement for DCO-OFDM and ACO-OFDM systems using symbol time compression. 77-100 - Mrityunjay Singh, Dheerendra Mishra:
Post-quantum secure authenticated key agreement protocol for wireless sensor networks. 101-113 - Preetjot Kaur
, Roopali Garg
, Vinay Kukreja
:
Energy-efficiency schemes for base stations in 5G heterogeneous networks: a systematic literature review. 115-151
Volume 84, Number 2, October 2023
- S. Harihara Gopalan
, J. Ashok
, A. Manikandan
, S. Ramalingam:
Data dissemination protocol for VANETs to optimize the routing path using hybrid particle swarm optimization with sequential variable neighbourhood search. 153-165 - Yijie He
, Zou Lian, DongCong Shi, Hui Li, Dan Liao:
A fog-assisted privacy preserving scheme for vehicular LBS query. 167-182 - R. Reka
, A. Manikandan
, C. Venkataramanan, R. Madanachitran:
An energy efficient clustering with enhanced chicken swarm optimization algorithm with adaptive position routing protocol in mobile adhoc network. 183-202 - Shangbo Liu, Baowang Lian, Zesheng Dan:
Neural adaptive robust control for MEMS gyroscope with output constraints. 203-213 - Guduri Sulakshana, Govardhan Reddy Kamatam:
Energy-aware mobile sink visiting nodes selection using a mean-shift clustering strategy for data accumulation in WSNs. 215-233 - Ridlo Sayyidina Auliya
, Chia-Ching Chen, Po-Ru Lin, Deron Liang, Wei-Jen Wang:
Optimization of message delivery reliability and throughput in a DDS-based system with per-publisher sending rate adjustment. 235-250 - M. Mohideen AbdulKader
, S. Ganesh Kumar:
An efficient geometric octal zones distance estimation and attribute-based encryption for secure transfer of sensitive data. 251-270 - Ali Loubany
, Samer Lahoud, Abed Ellatif Samhat
, Melhem El Helou:
Joint throughput-energy optimization in multi-gateway LoRaWAN networks. 271-283
Volume 84, Number 3, November 2023
- Masoud Asghari
:
Integration of semi-permanent wired clusters into intrabody wireless perpetual nanonetworks. 285-301 - Vamsi Kiran Mekathoti
, B. Nithya:
Design and performance analysis of prime number based backoff counter adjustment (PBCA) algorithm for wireless body area networks. 303-319 - Niloofar Tahmasebi-Pouya, Mehdi Agha Sarram, Seyedakbar Mostafavi
:
A reinforcement learning-based load balancing algorithm for fog computing. 321-339 - Raina Raj, Vidyottama Jain
:
Resource and traffic control optimization in MMAP[c]/PH[c]/S queueing system with PH retrial times and catastrophe phenomenon. 341-362 - Kyriaki A. Tychola, Konstantinos Voulgaridis
, Thomas Lagkas:
Tactile IoT and 5G & beyond schemes as key enabling technologies for the future metaverse. 363-385 - Sutanu Ghosh:
Outage analysis of hybrid VLC-RF system for IoT application under energy harvesting. 387-397 - Feten Slimeni
, Tijeni Delleji, Ala Agrebi
, Amine Trabilsi, Noureddine Boulejfen:
Real time implementation of SDR-based RF source detection and localization in restricted area. 399-408 - Marcelo E. Flores Vázquez, Luis Tello-Oquendo
, Vicent Pla
, Juan Manuel Aranda
, Juan Vicente Capella
, Andrea K. Guamo Morocho
:
Impact of information update generation on the radio access network of cellular Internet of Things. 409-420 - Laila Junaid, Kashif Bilal, Osman Khalid, Aiman Erbad:
Blockchain-Enabled land management systems. 421-442
Volume 84, Number 4, December 2023
- Sunil Kumar Singh
, Mangala Prasad Mishra, Deo Prakash Vidyarthi:
A hybrid dynamic aggregation and fragmentation cognitive channel allocation model for mobile communication. 443-455 - Meng Zheng, Moquan Cheng, Wei Liang:
DHRR: a downlink highly reliable retransmission method for industrial URLLC over 5G networks. 457-468 - Engin Zeydan, Yekta Turk:
User plane acceleration service for next-generation cellular networks. 469-485 - Bo-Shiuan Lin, Binayak Kar, Tai-Lin Chin, Ying-Dar Lin, Chung-Yueh Chen:
Cost optimization of cloud-edge-fog federated systems with bidirectional offloading: one-hop versus two-hop. 487-505 - Saeid Pakravan, Ghosheh Abed Hodtani
:
An extension of Cover-Chiang work on point to point channel to less noisy broadcast channel and analysis of the receivers cognition impacts. 507-519 - Xiuwu Yu, Wei Peng
, Yong Liu:
WSN node localization algorithm of sparrow search based on elite opposition-based learning and Levy flight. 521-531 - Kousik Barik
, Sanjay Misra, Luis Fernández Sanz, Murat Koyuncu
:
RONSI: a framework for calculating return on network security investment. 533-548 - Dezhi Han, Hongxu Zhou, Tien-Hsiung Weng, Zhongdai Wu, Bing Han, Kuan-Ching Li
, Al-Sakib Khan Pathan
:
LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT. 549-564 - Harbinder Singh, Simrandeep Singh, Amit Gupta:
Real-time linear antenna array synthesis of broadside pattern using improved dwarf mongoose optimization algorithm. 565-579 - Raaid Alubady
, Mays Salman, Ahmed S. Mohamed:
A review of modern caching strategies in named data network: overview, classification, and research directions. 581-626

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.