![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Wireless Networks, Volume 29
Volume 29, Number 1, January 2023
- Yuhao Chai
, Yong Zhang, Tengteng Ma
, Da Guo, Yinglei Teng:
Research on multi-service slice resource allocation over licensed and unlicensed bands. 1-17 - Huating Tao
, Jie Yang, Jin Tao:
Research on linear frequency modulation detection technology based on fractional fourier transform. 19-27 - Ganesan Sangeetha
, M. Vijayalakshmi:
Weighted high priority packet transmission using ozmos bio-inspired mechanism for traffic load distribution (WH-DTO) in WSNs. 29-45 - Yuting Wang
, Xiaofan Han
, Shunfu Jin
:
MAP based modeling method and performance study of a task offloading scheme with time-correlated traffic and VM repair in MEC systems. 47-68 - Hassan Jradi
, Fabienne Nouvel, Abed Ellatif Samhat
, Jean-Christophe Prévotet, Mohamad Mroué
:
Secure proxy MIPv6-based mobility solution for LPWAN. 69-85 - Ting Wu, Peng Wen, Shengda Tang
:
Optimal scheduling strategy of AUV based on importance and age of information. 87-95 - Nafiseh Golihaghighi, Mehrzad Biguesh
:
A node selection method for cooperative location estimation in high density wireless networks. 97-108 - Asyraf Wahi Anuar
, Azri Azmi, Nazri Kama, Hazlifah Mohd Rusli, Nur Azaliah Abu Bakar
, Norliza Mohamed:
Integrating user experience assessment in Re-CRUD console framework development. 109-127 - Ricardo Chaves
, Carlos R. Senna
, Miguel Luís
, Susana Sargento
, Ricardo Matos, Diogo Recharte:
Content distribution in a VANET using InterPlanetary file system. 129-146 - Changbo Hou, Dingyi Fu, Lijie Hua, Yun Lin
, Guowei Liu, Zhichao Zhou:
The recognition of multi-components signals based on semantic segmentation. 147-160 - Yizhi Chen, Kaiyan Ye:
A wireless network based technical and tactical analysis of volleyball game based on data mining techniques. 161-172 - Yanglong Sun, Lintao Zhang, Yuliang Tang
, Jianxin Zhang:
PASS: power allocation and SIC order selection of cache-aided NOMA in vehicular networks. 173-187 - Djamila Zamouche, Sofiane Aissani
, Mawloud Omar, Mohamed Mohammedi:
Highly efficient approach for discordant BSMs detection in connected vehicles environment. 189-207 - Kiril Danilchenko, Zeev Nutov, Michael Segal
:
Doing their best: How to provide service by limited number of drones? 209-220 - Khuong Ho-Van
, Thiem Do-Dac:
Joint effects of non-linear energy harvesting, primary interference, and full-duplex destination-assisted jamming on spectrum sharing networks. 221-234 - Fatih Özkan Alkurt
, Emin Unal
, Merih Palandoken
, Yadgar I. Abdulkarim, Ugur Cem Hasar
, Muharrem Karaaslan:
Radiation pattern reconfigurable cubical antenna array for 2.45 GHz wireless communication applications. 235-246 - Kalyan Kumar Jena, Sourav Kumar Bhoi, Debasis Mohapatra, Chittaranjan Mallick, Kshira Sagar Sahoo, Anand Nayyar
:
A fuzzy rule based machine intelligence model for cherry red spot disease detection of human eyes in IoMT. 247-265 - Xinchen Wang, Zengwei Lyu, Zhenchun Wei
, Liangliang Wang, Yang Lu, Lei Shi:
Multi-objective path planning algorithm for mobile charger in wireless rechargeable sensor networks. 267-283 - Menghui Wu, Jingjing Guo, Chunlin Li, Youlong Luo:
Cost-efficient edge caching and Q-learning-based service selection policies in MEC. 285-301 - Haiming Liu, Bo Xu, Bin Liu:
A novel predictive localization algorithm for underwater wireless sensor networks. 303-319 - Yinjun Zhang, Mengji Chen:
An IoT-enabled energy-efficient approach for the detection of leaf curl disease in tomato crops. 321-329 - Yu Wang, Qinyin Ni, Junjiang Yu, Enfu Jia, Xiaorong Zhu:
An intelligent access algorithm for large scale multihop wireless networks based on mean field game. 331-344 - Xuemin Zhao:
A network security algorithm using SVC and sliding window. 345-351 - Zhiyuan Mai
, Yueyun Chen
, Yating Xie, Guang Chen:
An energy efficiency optimization jointing resource allocation for delay-aware traffic in fronthaul constrained C-RAN. 353-368 - Bhaskar Kantapalli, Babu Rao Markapudi
:
SSPO-DQN spark: shuffled student psychology optimization based deep Q network with spark architecture for big data classification. 369-385 - Ya-Pei Tuan, Lo-An Chen, Ting-Yen Lin, Ting-Yu Lin, Yu-Ting Wang, Sok-Ian Sou, Meng-Hsun Tsai
:
Improving QoS mechanisms for IEEE 802.11ax with overlapping basic service sets. 387-401 - Chan Dai Truyen Thai
, Thanh T. Tran
, De-Thu Huynh:
Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers. 403-412 - Ubaid Ullah
, Slawomir Koziel, Anna Pietrenko-Dabrowska:
Circularly polarized antenna array design with the potential of gain-size trade-off and omnidirectional radiation for millimeter-wave small base station applications. 413-422 - Karim H. Moussa
, Shawki Shaaban, Ahmed H. El-Sakka
:
Secured polar code derived from random hopped frozen-bits. 423-435 - Yuhao Huang, Run Ye
, Bin Yan, Cheng Zhang, Xiaojia Zhou:
QSFDEW: a fingerprint positioning method based on quadtree search and fractal direction entropy weighting. 437-448 - Feng Li, Zhongming Sun, Kwok-Yan Lam, Songbo Zhang
, Lianzhong Sun, Li Wang:
Reputation-based power allocation for NOMA cognitive radio networks. 449-457 - Tong Tang, Linfeng Cui, Zhiyang Yin, Shun Hu, Lei Fu
:
Spatiotemporal characteristic aware task allocation strategy using sparse user data in mobile crowdsensing. 459-474
Volume 29, Number 2, February 2023
- Deepaa Selva, K. P. Sridhar, K. B. Mythili:
Scheduling model for task loading in cloud data centres. 475-487 - Ishita Banerjee, P. Madhumathy:
QoS enhanced energy efficient cluster based routing protocol realized using stochastic modeling to increase lifetime of green wireless sensor network. 489-507 - Belmien Carlos Konlack Talla
, Olivier Videme Bossou, Cyrille Feudjio, Joseph Ngimbog Mbogue, Gédéon Ghislain Nkwewo Ngoufo, Roger Tchuidjan:
A new approach of successive interference cancellation decoder in power domain non-orthogonal multiple access transmission. 509-521 - Venkatachalam Balamurugan, Ramamoorthy Karthikeyan, B. Sundaravadivazhagan, Robin Cyriac
:
Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security. 523-537 - Mahmoud A. M. Albreem, Abdul Manan Sheikh, Mohammed J. K. Bashir
, Ayman A. El-Saleh
:
Towards green Internet of Things (IoT) for a sustainable future in Gulf Cooperation Council countries: current practices, challenges and future prospective. 539-567 - Manoj Kumar Somesula
, Sai Krishna Mothku
, Anusha Kotte:
Deep reinforcement learning mechanism for deadline-aware cache placement in device-to-device mobile edge networks. 569-588 - Rajib Kumar Dash
, Puspendu Bikash Saha, Dibyendu Ghoshal, Gopinath Palai:
Fractal slot loaded compact wearable button antenna for IOT and X-band applications. 589-605 - Tao Li, Anjia Yang
, Jian Weng
, Yao Tong, Qingfu Pei:
Concurrent and efficient IoT data trading based on probabilistic micropayments. 607-622 - Seda Üstünbas Gavas
, Ümit Aygölü:
A coordinate interleaved orthogonal design NOMA protocol for two cell-edge users. 623-636 - Lu-Lu Liang, Shu-Chuan Chu
, Zhi-Gang Du, Jeng-Shyang Pan
:
Surrogate-assisted Phasmatodea population evolution algorithm applied to wireless sensor networks. 637-655 - Jonghoek Kim
:
Suppression of NLOS errors in TDOA-AOA hybrid localization. 657-667 - Yi Yang, Zhixin Liu
, Heng Zhu, Xinping Guan, Kit Yan Chan:
Energy minimization by dynamic base station switching in heterogeneous cellular network. 669-684 - Rui Ma, Xuefeng Chen:
Intelligent education evaluation mechanism on ideology and politics with 5G: PSO-driven edge computing approach. 685-696 - Chaduvula Kavitha, Babu Rao Markapudi
, B. Srikanth, A. Srinivasa Rao, A. Sri Nagesh, K. Kranthi Kumar
:
Zero shot image classification system using an optimized generalized adversarial network. 697-712 - Qingzhe Zhang, Chunlin Li, Tianyu Du, Youlong Luo:
Multi-level caching and data verification based on ethereum blockchain. 713-727 - Mintu Singh, Maheshwari Prasad Singh:
Congestion avoidance with source location privacy using octopus-based dynamic routing protocol in WSN. 729-748 - Qiang Wang, Hongbin Zhou, Qiuhan Liu:
Denoising method for terahertz signal using RBF neural network with adaptive projection learning algorithm. 749-759 - Ba Cao Nguyen
, Xuan Nam Tran, Tran Manh Hoang, Thi Thanh Huyen Le, Pham Thanh Hiep
:
Performance analysis for multi-RIS UAV NOMA mmWave communication systems. 761-773 - Xin Tian
, Guoliang Wei
, Yan Song, Derui Ding
:
Cooperative localization based on semidefinite relaxation in wireless sensor networks under non-line-of-sight propagation. 775-785 - Michaël Mahamat
, Ghada Jaber, Abdelmadjid Bouabdallah:
Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challenges. 787-808 - Minsu Shin, Tahira Mahboob
, Danish Mehmood Mughal, Min Young Chung
:
Deep reinforcement learning-based multi-channel spectrum sharing technology for next generation multi-operator cellular networks. 809-820 - Anandhu Mohan
, Vidya Sagar Thalapala, Koppala Guravaiah, M. V. Dhanyamol
:
FMGNR: fuzzy median graph for network routing applications. 821-832 - Lina Huo:
The global path planning for vehicular communication using ant colony algorithm in emerging wireless cloud computing. 833-842 - Vu-Duc Ngo, Thien Van Luong
, Nguyen Cong Luong, Minh-Tuan Le, Thi Thanh Huyen Le, Xuan-Nam Tran:
Generalized BER of MCIK-OFDM with imperfect CSI: selection combining GD versus ML receivers. 843-855 - Anil Kumar Rangisetti, Rishabh Dwivedi, Sudhakar Modem:
Fairness and Applications' transport protocol aware frame aggregation using programmable WLANs. 857-876 - Langtao Hu
, Songjiao Bi, Quanjin Liu, Yu'e Jiang, Chunsheng Chen:
Intelligent reflecting surface aided covert wireless communication exploiting deep reinforcement learning. 877-889 - Caihong Kai, Xiaowei Meng, Linsheng Mei, Wei Huang
:
Multi-agent reinforcement learning based joint uplink-downlink subcarrier assignment and power allocation for D2D underlay networks. 891-907 - Jingfeng Zang, Pengxiang You:
An industrial IoT-enabled smart healthcare system using big data mining and machine learning. 909-918 - S. Vimala, Madhusudhana Rao T. V., A. Balaji
, Balajee Maram
:
Taylor-student psychology based optimization integrated deep learning in IoT application for plant disease classification. 919-939 - Hui Qi, Junrui Si, Jiahui Hou, Zhe Tian, Aowei Zhang, Jing Chen
, Weiwu Ren, Shiwei Zhang, Xiaoqiang Di:
Subflow scheduling strategy for multipath transmission in SDN-based spatial network. 941-953 - Peizhen Xing, Hui Zhang, Mohamed Elsayed Ghoneim, Meshal Shutaywi
:
UAV flight path design using multi-objective grasshopper with harmony search for cluster head selection in wireless sensor networks. 955-967 - Tayebeh Sahraneshin, Razieh Malekhosseini
, Farhad Rad, S. Hadi Yaghoubyan:
Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem. 969-983
Volume 29, Number 3, April 2023
- Longzhi Yang, Varadarajan Vijayakumar, Tossapon Boongoen, Nitin Naik:
Special issue on emerging trends, challenges and applications in cloud computing. 985-987 - Kevin Naik
, Supriya Patel:
An open source smart home management system based on IOT. 989-995 - Elie Chicha, Bechara al Bouna, Mohamed Nassar
, Richard Chbeir:
Cloud-based differentially private image classification. 997-1004 - Noe Elisa, Longzhi Yang, Fei Chao, Yi Cao:
A framework of blockchain-based secure and privacy-preserving E-government system. 1005-1015 - Simone Patonico
, An Braeken
, Kris Steenhaut
:
Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti-Krawczyk security model. 1017-1029 - Ahmed Al-Mansoori, Jemal H. Abawajy, Morshed U. Chowdhury:
SDN enabled BDSP in public cloud for resource optimization. 1031-1041 - Deepal Tennakoon
, Morshed Chowdhury, Tom H. Luan
:
Cloud-based load balancing using double Q-learning for improved Quality of Service. 1043-1050 - Wadii Boulila
, Muhib Al-kmali, Mohammed Farid, Hamzah Mugahed:
A business intelligence based solution to support academic affairs: case of Taibah University. 1051-1058 - M. Traore, Alphousseyni Ndiaye
, Senghane Mbodji, Mactar Faye, Daouda Gueye, M. T. Tankari, G. Lefebvre, L. Thiaw:
Supervision of a PV system with storage connected to the power line and design of a battery protection system. 1059-1067 - Jeremy Ellman
, Nathan Lee, Nanlin Jin
:
Cloud computing deployment: a cost-modelling case-study. 1069-1076 - Yewan Wang
, David Nörtershäuser, Stéphane Le Masson, Jean-Marc Menaud:
Potential effects on server power metering and modeling. 1077-1084 - Arezou Naghib
, Nima Jafari Navimipour, Mehdi Hosseinzadeh, Arash Sharifi:
A comprehensive and systematic literature review on the big data management techniques in the internet of things. 1085-1144 - Anveshkumar Nella
, Anitha Vulugundam
, Sumathi Kumarasamy, Sandeep Kiran Vattiprolu:
A 12-element 360° azimuth plane scanning circular antenna array for THz wireless devices. 1145-1159 - Dipak Kumar Sah, Suyash Srivastava, Ramesh Kumar
, Tarachand Amgoth
:
An energy efficient coverage aware algorithm in energy harvesting wireless sensor networks. 1175-1195 - S. Zehtabchi, Negin Daneshpour
, Masoumeh Safkhani:
A new method for privacy preserving association rule mining using homomorphic encryption with a secure communication protocol. 1197-1212 - Jingya Zhang
:
Designing an intelligent image detection and transmission system for the Internet of Things. 1213-1222 - Min Peng
, Qiqi Yin, Kai Zhang, Caihong Kai:
Adaptive multi-user uplink resource allocation based on access delay analysis in IEEE 802.11ax. 1223-1235 - Chaima Zoghlami
, Rahim Kacimi, Riadh Dhaou:
5G-enabled V2X communications for vulnerable road users safety applications: a review. 1237-1267 - Sheng-Tzong Cheng, Chang Yu He, Ya-Jin Lyu
, Der-Jiunn Deng
:
On self-adaptive 5G network slice QoS management system: a deep reinforcement learning approach. 1269-1279 - Debajyoti Biswas
, Suvankar Barai, Buddhadeb Sau:
New RSSI-fingerprinting-based smartphone localization system for indoor environments. 1281-1297 - Damodar Reddy Edla
, Amruta Lipare, Saidi Reddy Parne
:
Load balanced cluster formation to avoid energy hole problem in WSN using fuzzy rule-based system. 1299-1310 - Sami Ullah
, Ghulam Abbas, Muhammad Waqas
, Ziaul Haq Abbas
, Abd Ullah Khan:
RSU assisted reliable relay selection for emergency message routing in intermittently connected VANETs. 1311-1332 - Sirisha Uppuluri, G. Lakshmeeswari:
Secure user authentication and key agreement scheme for IoT device access control based smart home communications. 1333-1354 - Sagar Kavaiya
, Dhaval K. Patel:
Restricting passive attacks in 6G vehicular networks: a physical layer security perspective. 1355-1365 - Pejman Abdollahzadeh Karegar
, Adnan Al-Anbuky:
UAV-assisted data gathering from a sparse wireless sensor adaptive networks. 1367-1384 - Hiral S. Trivedi
, Sankita J. Patel:
Dynamically scalable privacy-preserving authentication protocol for distributed IoT based healthcare service providers. 1385-1409 - Changliang Huang, Yuting Xu:
Psychological factors of sports injury caused by wireless communication of embedded microprocessor in social sports teaching and training. 1411-1419 - Susmita Mandal:
Provably secure certificateless protocol for wireless body area network. 1421-1438 - Khalid A. Darabkh, Batool R. Awawdeh, Ramzi R. Saifan, Ala' F. Khalifeh, Sharhabeel H. Alnabelsi, Haythem Bany Salameh:
Routing in cognitive radio networks using adaptive full-duplex communications over IoT environment. 1439-1463 - Kristina Wheatman
, Fidan Mehmeti, Mark Mahon, Thomas F. La Porta, Guohong Cao:
EQMS: An improved energy-aware and QoE-aware video streaming policy across multiple competitive mobile devices. 1465-1484 - Nithya Dorairajan
, Chitra M. Perumal, Swetha Vedhagiri:
A low profile triband coupled resonator filtering antenna for wireless applications. 1485-1503
Volume 29, Number 4, May 2023
- Xiaoxian Yang, Li Kuang:
Deep learning to mobile hypermedia and multimedia. 1505-1506 - Junsheng Xiao
, Huahu Xu, Dikai Fang, Chen Cheng
, Honghao Gao:
Boosting and rectifying few-shot learning prototype network for skin lesion classification based on the internet of medical things. 1507-1521 - Kai Wang, Yuqi Liu, Bin Cao, Jing Fan:
TkTC: A framework for top-k text classification of multimedia computing in wireless networks. 1523-1534 - Yangjie Qin
, Ming Li
, Jia Zhu
:
Privacy-preserving federated learning framework in multimedia courses recommendation. 1535-1544 - Zhe Bing, Xing Wang, Zhenliang Dong, Luobing Dong
, Tao He:
A novel edge computing architecture for intelligent coal mining system. 1545-1554 - Pengcheng Zhao, Yuanhao Huang
, De-Xin Zhang, Ling Xing
, Honghai Wu, Jianping Gao:
CCP-federated deep learning based on user trust chain in social IoV. 1555-1566 - Yueshen Xu
, Yunpeng Ding, Zhiping Jiang, Yuyu Yin, Lei Hei, Shaoyuan Zhang:
Web APIs recommendation with neural content embedding for mobile multimedia computing. 1567-1576 - Zheng Wan, Xiaogang Dong
, Changshou Deng:
Optimizing computation offloading under heterogeneous delay requirements for wireless powered mobile edge computing. 1577-1607 - Zheng Wan, Xiaogang Dong, Changshou Deng:
Correction to: Optimizing computation offloading under heterogeneous delay requirements for wireless powered mobile edge computing. 1609-1610 - Tiantian Cao:
Analysis of aerobic training posture using machine vision for body area networks. 1611-1620 - Mehdi Askari, Rezvan Dastanian:
An optimized spectrum sharing scheme for cognitive radio. 1621-1627 - Mohammed Abd-Elnaby, Germien G. Sedhom, El-Sayed M. El-Rabaie, Mohamed Elwekeil
:
NOMA for 5G and beyond: literature review and novel trends. 1629-1653 - Mohammed Abd-Elnaby, Germien G. Sedhom, El-Sayed M. El-Rabaie, Mohamed Elwekeil
:
Correction to: NOMA for 5G and beyond: literature review and novel trends. 1655 - Devarshi Shukla
, Santosh Kumar Gupta, Vijaya Bhadauria, Rajeev Tripathi:
An ultra-wide band IIP3 of 38.2 dBm and conversion gain of 17.95 dB down conversion Gilbert mixer for 5G internet of things applications. 1657-1669 - P. C. Senthil Mahesh, K. Muthumanickam:
Secure and novel authentication model for protecting data centers in fog environment. 1671-1683 - Deepa Jeyaraj, Ahamed Ali Samsu Aliar
, Selvamani Hemamalini
:
Intelligent energy efficient vehicle automation system with sensible edge processing protocol in Internet of Vehicles using hybrid optimization strategy. 1685-1701 - Gopinathan Rajeswari
, M. K. Sandhya, Krishnan Murugan:
Obstacle-aware connectivity restoration for the partitioned wireless sensor networks using mobile data carriers. 1703-1720 - Meet Kumari
:
Performance analysis of high speed hybrid PON-VLC for long-reach land-to-underwater applications. 1721-1735 - Sifeng Zhu, Jiang-hao Cai, En-lin Sun
:
Mobile edge computing offloading scheme based on improved multi-objective immune cloning algorithm. 1737-1750 - D. Kishore Babu, C. Ravindra Raman, D. Venkata Divakara Rao:
Deep residual network-based data streaming approach for soil type application under IoT-based big data environment. 1751-1769 - Kuang-Hao Lin
, Fu-Chi Chen:
Implementation of iterative error detection and correction for BAN transceiver systems. 1771-1786 - D. Prabhu, Alageswaran Ramaiah, S. Miruna Joe Amali:
Multiple agent based reinforcement learning for energy efficient routing in WSN. 1787-1797 - Nurzaman Ahmed
, Md. Iftekhar Hussain:
A QoS-aware scheduling with node grouping for IEEE 802.11ah. 1799-1814 - Sanjai Prasada Rao Banoth, Praveen Kumar Donta
, Tarachand Amgoth:
Target-aware distributed coverage and connectivity algorithm for wireless sensor networks. 1815-1830 - Ugaitz Amozarrain, Mikel Larrea
:
Using publish/subscribe for message routing in mobile environments. 1831-1842 - Steffi Jayakumar, S. Nandakumar
:
Reinforcement learning based distributed resource allocation technique in device-to-device (D2D) communication. 1843-1858 - Mohamed Amine Ouamri, Daljeet Singh
, Mohammed Saleh Ali Muthanna, Ahcène Bounceur, Xingwang Li:
Performance analysis of UAV multiple antenna-assisted small cell network with clustered users. 1859-1872 - Jiagao Wu
, Shenlei Cai, Hongyu Jin, Linfeng Liu:
Vehicular delay tolerant network routing algorithm based on trajectory clustering and dynamic Bayesian network. 1873-1889 - Tejodbhav Koduru
, Manjula Raja
:
Source location privacy in wireless sensor networks: What is the right choice of privacy metric? 1891-1898 - Zhichao Zheng
, Shengming Jiang, Ruoyu Feng, Lige Ge, Chongchong Gu:
An adaptive backoff selection scheme based on Q-learning for CSMA/CA. 1899-1909 - Maheshwari Niranjan, Swechchha Gupta, Buddha Singh:
Sensor node localization with improved hop-size using PSODESA optimization. 1911-1934 - Ranjit Kumar, Sachin Tripathi, Rajeev Agrawal:
Correction to: Trust-based energy-aware routing using GEOSR protocol for Ad-Hoc sensor networks. 1935
Volume 29, Number 5, July 2023
- Hardik K. Molia
, Amit D. Kothari:
TCP-RLLD: TCP with reinforcement learning based loss differentiation for mobile adhoc networks. 1937-1948 - S. Balaji, S. Sankara Narayanan:
Dynamic distributed generative adversarial network for intrusion detection system over internet of things. 1949-1967 - M. Rathika, P. Sivakumar
:
Machine learning-optimized relay selection method for mitigating interference in next generation communication networks. 1969-1981 - Mehdi Monemi
, Omid Yazdani:
Transmit antenna selection and resource allocation for sequential D2D registration in mmWave networks. 1983-1994 - Rahim Umar, Fengfan Yang, Hongjun Xu, Shoaib Mughal:
Distributed turbo coded spatial modulation based on code matched interleaver for MIMO system. 1995-2013 - M. Kanthi, Ravilla Dilli
:
Smart streetlight system using mobile applications: secured fault detection and diagnosis with optimal powers. 2015-2028 - Ruchi Garg, Tarun Gulati, Sumit Kumar:
Range free localization in WSN against wormhole attack using Farkas' Lemma. 2029-2043 - Ruchi Garg, Tarun Gulati, Sumit Kumar:
Correction to: Range free localization in WSN against wormhole attack using Farkas' Lemma. 2045 - Fadoua Debbabi
, Rui Luis Andrade Aguiar
, Rihab Jmal, Lamia Chaari Fourati:
Game theory for B5G upper-tier resource allocation using network slicing. 2047-2059 - Dilip Mandloi
, Rajeev Arya
:
FRAT: a fuzzy rule based adaptive technique for intelligent placement of UAV-mounted base station. 2061-2077 - S. Sumathi
, T. K. Ramesh, Zhiguo Ding:
PSO based power allocation in multiuser hybrid beamforming mmWave NOMA. 2079-2091 - Xiaoya Li
, Wei Zhou, Jinye Peng, HengSheng Shan:
Joint beamwidth and resource optimization in ultra-dense MmWave D2D communications. 2093-2104 - Sanjeev Kumar, Haider Banka, Baijnath Kaushik:
Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing. 2105-2126 - P. V. Pravija Raj, Zaher Al Aghbari
, Ahmed M. Khedr:
ETP-CED: efficient trajectory planning method for coverage enhanced data collection in WSN. 2127-2142 - Tania Taami, Sadoon Azizi
, Ramin Yarinezhad:
Unequal sized cells based on cross shapes for data collection in green Internet of Things (IoT) networks. 2143-2160 - Bandana Mallick, Priyadarsan Parida
, Chittaranjan Nayak
, Pritam Keshari Sahoo, Gopinath Palai:
Quantum key distribution over FSO channel using error reconciliation protocol. 2161-2169 - Chunlin Li, Zhiqiang Yu, Xinyong Li, Libin Zhang, Yong Zhang, Youlong Luo:
Low-latency AP handover protocol and heterogeneous resource scheduling in SDN-enabled edge computing. 2171-2187 - Can Altay
, Mutlu Koca:
Interference mitigation for non-orthogonal multiple access in heterogeneous networks. 2189-2202 - C. Sureshkumar
, S. Sabena:
Design of an adaptive framework with compressive sensing for spatial data in wireless sensor networks. 2203-2216 - Haci Bayram Karakurt
, Cemal Koçak:
Increasing quality of service in wireless local area networks through fuzzy logic based feedback control method. 2217-2233 - Pablo Adasme
, Abdel Lisser:
A stochastic geometric programming approach for power allocation in wireless networks. 2235-2250 - Arpan Desai
, Yi-Fan Tsao, Heng-Tung Hsu
:
High gain substrate integrated waveguide antenna with enhanced bandwidth for millimeter-wave wireless network applications. 2251-2260 - Rong Xie, Mengting Jiang, Yuchen Wang:
Synchronization for dynamic complex networks combining degree distribution and eigenvector criteria. 2261-2278 - Sanjeev Kumar
, Richa Agrawal:
A hybrid C-GSA optimization routing algorithm for energy-efficient wireless sensor network. 2279-2292 - Radhika Kavra, Anjana Gupta, Sangita Kansal:
Optimization of energy and delay on interval data based graph model of wireless sensor networks. 2293-2311 - Haitao Zhao
, Zhiyuan Chen, Wenchao Xia
, Kun Guo
, Yiyang Ni
, Kunlun He
:
Deep unfolding based optimization framework of fractional programming for wireless communication systems. 2313-2320 - Shunzhi Wang, Zhanyou Ma, Xinying Niu, Yilin Liu:
Performance analysis of a Queueing system based on vacation with fault repairable and spare servers in the MP2P network. 2321-2336 - Rasmita Kumari Mohanty
, Satya Prakash Sahoo
, Manas Ranjan Kabat:
Sustainable remote patient monitoring in wireless body area network with Multi-hop routing and scheduling: a four-fold objective based optimization approach. 2337-2351 - Manuel Jesús-Azabal
, Javier Berrocal, Vasco N. G. J. Soares
, José García-Alonso, Jaime Galán-Jiménez:
A self-sustainable opportunistic solution for emergency detection in ageing people living in rural areas. 2353-2370 - Eduardo Santos Escriche
, Stavroula Vassaki, Gunnar Peters:
A comparative study of cellular traffic prediction mechanisms. 2371-2389 - Cheng Zhou
, Congshan Ma, Qian Lin, Xin Man, Tao Ying:
Intelligent bandit learning for jamming strategy generation. 2391-2403 - Kaveh Vaezi, Nail Akar
, Ezhan Karasan
:
Modeling age of information in a cooperative slotted Aloha network. 2405-2417
Volume 29, Number 6, August 2023
- Wenjun Shi
, Jigang Wu, Long Chen, Xinxiang Zhang, Huaiguang Wu:
Energy-efficient cooperative offloading for mobile edge computing. 2419-2435 - Komal Arora, Jaswinder Singh, Yogeshwar Singh Randhawa:
Performance evaluation of energy optimized precoded - LDPC encoded system. 2437-2445 - Ruiyan Du, Tiangui Li, Xiaoyu Li, Fulai Liu
:
CNN-DPC algorithm for hybrid precoding in millimeter-wave massive MIMO systems. 2447-2456 - Avinash Pawar
, Shankar B. Deosarkar:
IoT-based smart agriculture: an exhaustive study. 2457-2470 - Kiyas Kayaalp, Sedat Metlek
, Abdullah Genç
, Habib Dogan
, Ibrahim Bahadir Basyigit
:
Prediction of path loss in coastal and vegetative environments with deep learning at 5G sub-6 GHz. 2471-2480 - G. M. Karthik
, A. S. Kalyana Kumar, Aruna Bhaskar Karri, Naga Padmaja Jagini:
Deep intelligent blockchain technology for securing IoT-based healthcare multimedia data. 2481-2493 - Danyu Diao, Buhong Wang
, Kunrui Cao:
Secure SWIPT-powered UAV communication against full-duplex active eavesdropper. 2495-2504 - Can Zhang, Miao Cui, Guangchi Zhang
:
Throughput optimization for IRS-assisted multi-user NOMA URLLC systems. 2505-2517 - Muhammed Samir Al-Ali, Elias Yaacoub
:
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks. 2519-2538 - Özlem Sabuncu
, Bülent Bilgehan
:
Statistical RMS delay spread representation in 5G mm-Wave analysis using real-time measurements. 2539-2549 - Kuldeep Narayan Tripathi
, Ashish Mohan Yadav, Surendra Nagar, S. C. Sharma:
ReTrust: reliability and recommendation trust-based scheme for secure data sharing among internet of vehicles (IoV). 2551-2575 - Anubhav Shivhare
, Vishal Krishna Singh
, Manish Kumar:
Event detection using the user context in sensor based IoT. 2577-2589 - Gulshan Kumar
, Rajkumar Singh Rathore
, Kutub Thakur, Ahmad S. Almadhor, Sardar Asad Ali Biabani
, Subhash Chander:
Dynamic routing approach for enhancing source location privacy in wireless sensor networks. 2591-2607 - Atiqa Kayani
, Graeme K. Woodward
, Zubair Khalid, Ijaz Haider Naqvi:
On the performance of hybrid beamforming for closely-spaced and randomly located users. 2609-2617 - Abhijit Bhowmick, Binod Prasad
, Srinivas Nallagonda
:
Throughput and harvesting time trade-off in a energy harvesting cognitive radio network. 2619-2633 - Ashish Singh Parihar
, Swarnendu Kumar Chakraborty, Anupama Sharma
, Mehak Saini:
A comparative study and proposal of a novel distributed mutual exclusion in UAV assisted flying ad hoc network using density-based clustering scheme. 2635-2648 - S. Jeen Shene, W. R. Sam Emmanuel, K. Vimal Kumar Stephen:
Review on energy conservation and congestion mechanism in mobile WSN: taxonomy, software programs, challenges, and future trends. 2649-2669 - Lubna Ansari, M. Afshar Alam, Mohd Abdul Ahad, Mohd Tabrez Nafis:
Cloud sans server architecture for sustainable development in smart cities: Indian perspective. 2671-2684 - Rami Halloush
, Haythem Bany Salameh, Mariam Al-Tamimi, Ahmed Musa:
A Jamming-resilient opportunistic QoS-constrained multi-channel routing for green IoT networking. 2685-2701 - S. Tamizharasu
, P. Kalpana:
An intelligent AODV routing with energy efficient weight based clustering algorithm (EEWCA) in wireless Ad hoc network (WANET). 2703-2716 - Biplab Bag
, Kalyan Mondal, Snehasish Saha, Partha Pratim Sarkar:
Wideband monopole antenna: enhanced gain and circular polarization for satellite communication. 2717-2731 - Ali Reza Hazeri
:
Novel Ku/K-Band low-power LNAs with simultaneous input impedance and noise matching. 2733-2746 - Sudipta Mallick
, Susmita Das, Arun Kumar Ray:
A modified three-event energy detection scheme using decision threshold optimization for sensing performance improvement in a cognitive radio system. 2747-2758 - Srinivas Nallagonda
:
Energy-efficiency performance of wireless cognitive radio sensor network with hard-decision fusion over generalized α -μ fading channels. 2759-2771 - Vellaichamy Rajavel
, Dibyendu Ghoshal:
A compact triband antenna using artificial magnetic conductor for wireless body area network communicationsFront. 2773-2795 - Xinpeng Fang
, Zhihao He, Ranjun Shi:
Optimality analysis of range sensor placement under constrained deployment region. 2797-2812 - Hossein Akbari, Farshad Eshghi
, Manoochehr Kelarestaghi
, Mostafa Abdollahi:
Roam on the fly (ROTF): a complementary roaming policy. 2813-2823 - Feng Li
, Songbo Zhang, Kwok-Yan Lam, Xin Liu, Li Wang:
Dynamic spectrum optimization for Internet-of-Things with social distance model. 2825-2832 - Xiangrong Li:
A novel technique with overhead in Multi-Path Network Aggregation by Machine Learning Framework (MPAA-MLF). 2833-2844 - Richard Wandell, Md. Shafaeat Hossain
, Ishtiaque Hussain:
A cost-effective Wi-Fi-based indoor positioning system for mobile phones. 2845-2862 - D. Raghunatha Rao
, T. Jayachandra Prasad, M. N. Giri Prasad:
Gannet optimization algorithm enabled framework for spectrum sensing in OFDM based CR network. 2863-2872 - Shuailiang Zhang, Xiujuan Du
, Xin Liu:
A novel and quantum-resistant handover authentication protocol in IoT environment. 2873-2890
Volume 29, Number 7, October 2023
- Weina Fu, Zeshi Chen, Shuai Liu
:
Key problem on mobile intelligent multimedia system. 2891-2895 - Jian-zhao Sun, Kun Yang, Marcin Wozniak
:
Nonlinear dimensionality reduction method of scheduling frequent information in wireless networks based on multilevel mapping. 2897-2907 - Sen Wang, Yun Lin, Ming Hao, Huaitao Xu, Jiangzhi Fu
:
Assessment of speech communication interference effects under small sample conditions. 2909-2923 - Tianzhu Guan, Gautam Srivastava:
A multi-frequency communication routing protocol for mobile devices in the Internet of things. 2925-2934 - Meiyu Wang, Yun Lin, Chang Liu, Qiao Tian, Haoran Zha, Jiangzhi Fu
:
TESPOSDA-SEI: tensor embedding substructure preserving open set domain adaptation for specific emitter identification. 2935-2951 - Jingchao Li, YuLong Ying
, Shenhua Wang, Bin Zhang:
Slice combination convolutional neural network based radio frequency fingerprint identification for Internet of Things. 2953-2966 - Chao Han
, Ruoxi Qin, Linyuan Wang, Weijia Cui, Jian Chen, Bin Yan:
Adversarial defense method based on ensemble learning for modulation signal intelligent recognition. 2967-2980 - Xingkun Xu, Jerry Chun-Wei Lin
:
Abnormal nodes sensing model in regional wireless networks based on convolutional neural network. 2981-2992 - Mingrui Xin, Zhuoran Cai
:
A feature fusion-based communication jamming recognition method. 2993-3004 - Huang Bo, Zhiming Sun:
Construction of heart rate monitoring platform for college physical training based on wireless network. 3005-3016 - Hao Liu, Ting Yang:
Remote video detection algorithm of sports wrong actions under wireless network. 3017-3026 - Chang Liu
, Zhuo Chen, Yonghao Wu, Ruslan Antypenko
:
A target behavior pattern mining and abnormal behavior monitoring based on multidimensional similarity metric. 3027-3037 - Gelan Yang
, Yiyi Xu, Li Tu:
An intelligent box office predictor based on aspect-level sentiment analysis of movie review. 3039-3049 - Long Gao, Congan Xu, Fengqin Wang, Junfeng Wu, Hang Su:
Flight data outlier detection by constrained LSTM-autoencoder. 3051-3061 - Prabakar Dakshinamoorthy
, Saminadan Vaitilingam, Ramesh Sundar
:
Multivariate clustering for maximizing the small cell users' performance based on the dynamic interference alignment. 3063-3074 - Qian Liu, Wanning Yang, Ming Li
, Rang Liu
:
A novel channel estimation strategy for practical RIS-aided wideband OFDMA communications. 3075-3089 - I. Jayasukumari, G. Themozhi, C. Amali:
Design of rectangular microstrip patch antenna using hybrid group teaching optimization algorithm and volcano Eruption algorithm. 3091-3103 - D. Rosy Salomi Victoria
, Princy Magdaline P, Glory Ratna Mary D:
Intelligent resource allocation decision using deep learning and optimization techniques for HetNets. 3105-3119 - Naresh Kumar Yadav:
A novel hybridized algorithm for rescheduling based congestion management. 3121-3136 - Mohammad Lari
:
Matched-filter design to improve self-interference cancellation in full-duplex communication systems. 3137-3150 - O. Sugel Anandh, Tina Elizabeth Mathew, K. V. Pradeep, S. Rajarajeswari:
Novel STD-ACP for detecting energy and threshold value in the network. 3151-3161 - Muhammad Asim
, Junhong Chen, Ammar Muthanna, Liu Wenyin, Siraj Khan
, Ahmed A. Abd El-Latif
:
A novel simulated annealing trajectory optimization algorithm in an autonomous UAVs-empowered MFC system for medical internet of things devices. 3163-3176 - Emy Mariam George
, Lillykutty Jacob:
Multi-channel NOMA random access for inter-WBAN communication. 3177-3185 - Shivanand V. Manjaragi, S. V. Saboji:
Fast user authentication in 5G heterogeneous networks using RLAC-FNN and blockchain technology for handoff delay reduction. 3187-3205 - Jinhuan Zhang, Xiangwei Chen, Junxian Wang, Hao Zhang
:
A geodesic distance-based routing scheme for sensor networks with irregular terrain structure. 3207-3221 - Juan Hui
, Qingmei Tan:
Dynamic evaluation of regional economic resilience under major public emergencies: based on an improved dynamic evaluation model of grey incidence projection-fuzzy matter element. 3223-3238 - Amin Nazari
, Mojtaba Kordabadi, Reza Mohammadi, Chhagan Lal:
EQRSRL: an energy-aware and QoS-based routing schema using reinforcement learning in IoMT. 3239-3253 - Baris Gurcan Hakanoglu
, Veli Tayfun Kilic
, Fatih Altindis, Mustafa Türkmen:
Crown shaped edge multiband antenna design for 5G and X-Band applications. 3255-3270 - Felipe da Rocha Henriques
, Lisandro Lovisolo, Eduardo Antônio Barros da Silva:
On the design of KLT-based maximally incoherent deterministic sensing matrices for compressive sensing applied to wireless sensor networks data. 3271-3284 - Wu Pan, Na Lyu, Jingcheng Miao, Mengyuan Zhu, Ying Pan, Qi Gao:
Outage probability optimization of UAV relay system based on elliptical trajectory. 3285-3294 - Mohit Kumar Srivastava, Manoj Kumar Shukla, Arun Kumar Singh:
Effect of block size on BER performance of inverse filtering based MIMO FBMC. 3295-3309 - Ayesha Hasan
, Bilal Muhammad Khan
:
Deep learning aided wireless interference identification for coexistence management in the ISM bands. 3311-3331
Volume 29, Number 8, November 2023
- Tathababu Addepalli, Jagadeesh Babu Kamili, Subba Rao Boddu, Rajasekhar Manda, Anveshkumar Nella
, Bandi Kiran Kumar
:
A 4-element crescent shaped two-sided MIMO antenna for UWB, X and Ku band wireless applications. 3333-3348 - Kavitha Dhanushkodi
, Ravikumar Sethuraman
, Premalatha Mariappan, Anusooya Govindarajan:
An efficient cat hunting optimization-biased ReLU neural network for healthcare monitoring system. 3349-3365 - Minal K. Pawar, Suhas S. Patil:
An optimization-driven model for a hybrid beam forming for massive multiple-input multiple-output. 3367-3382 - Xiaoxue Ma, Yun Li, Yan Gao
:
Decision model of intrusion response based on markov game in fog computing environment. 3383-3392 - Rayees Ahamad, Kamta Nath Mishra
:
Knowledge discovery of suspicious objects using hybrid approach with video clips and UAV images in distributed environments: a novel approach. 3393-3416 - Xiao Ming Wu, Zhan Xin Guo, Xiao Mei Chu, Yoo Seungeok:
Designing a demand forecasting model for human resources cloud data centres using fuzzy theory. 3417-3433 - Allam Balaram
, Shaik Abdul Nabi, Koppula Srinivas Rao, Neeraja Koppula:
Highly accurate sybil attack detection in vanet using extreme learning machine with preserved location. 3435-3443 - Monisha Devi
, Nityananda Sarma, Sanjib Kumar Deka:
Single-sided truthful auction mechanism for heterogeneous channel allocation in cognitive radio networks. 3445-3467 - Peiyan Yuan
, Saike Shao, Junna Zhang, Xiaoyan Zhao:
Cooperative edge offloading strategy for sensory data with delay and energy constraints. 3469-3478 - Parmila Devi
, Manoranjan Rai Bharti:
Physical layer security for IoT over Nakagami-m and mixed Rayleigh-Nakagami-m fading channels. 3479-3491 - Yuxiao Cao
, Ying Qian, Zhen Wang:
DV-Hop based localization algorithm using node negotiation and multiple communication radii for wireless sensor network. 3493-3513 - Yafeng Zhang, Yongzheng Gan, Chunlin Li, Chunping Deng
, Youlong Luo:
Primary node selection based on node reputation evaluation for PBFT in UAV-assisted MEC environment. 3515-3539 - S. Tamizharasi, Arunadevi Baladhandapani, S. N. Deepa:
Bio-inspired deep residual neural network learning model for QoS routing enhancement in mobile ad-hoc networks. 3541-3565 - Libin Sun, Minqiang Xu, Yilun Gao, Haiyang Kou:
Evaluating the application of using biological pulse sensor in aerobics. 3567-3582 - Lekshmi R. Nair
, Sakuntala S. Pillai:
A novel SLM-based approach for reducing PAPR in LFDMA systems. 3583-3597 - Maolin Yang, Shubing Zhang:
Analysis of sports psychological obstacles based on mobile intelligent information system in the era of wireless communication. 3599-3615 - Chen Shuai
, Cheng Qing, Wang Jian:
Wireless sensor network relay transmitting using dual buffer pools. 3617-3623 - Yang Jie:
Multi-modal interaction using time division long-term evolution (TD-LTE) for space designing exhibition. 3625-3636 - Chunlin Li, Zewu Ke, Qiang Liu, Cong Hu, Chengwei Lu, Youlong Luo:
Energy-latency tradeoffs edge server selection and DQN-based resource allocation schemes in MEC. 3637-3663 - Leiming Yang:
Data monitoring for a physical health system of elderly people using smart sensing technology. 3665-3678 - Wenting Zhou, Biao Guo, Feng Cao:
Hybrid neural network-based exploration on the influence of continuous sensor data for the balancing ability of aerobics students. 3679-3692 - Jingjing Xue:
A wireless network-enabled online english subjective assignment evaluation system using micro cloud environment. 3693-3706 - Anil Kumar Yerrola
, Ravi Kumar Arya, Maifuz Ali, Lakhindar Murmu, Ashwani Kumar:
THz quad-beam holographic antenna with independent beam control and low sidelobe levels. 3707-3716 - Levente Márk Maller
, Péter Suskovics, László Bokor:
Edge computing in the loop simulation framework for automotive use cases evaluation. 3717-3735 - Yuhua Qin, Yanhong Sun, Haoran Liu, Rongrong Yin, Mingru Dong, Liyue Zhang:
Joint time synchronization and localization of underwater mobile node. 3737-3746 - Evgeny Bobrov
, Boris Chinyaev, Viktor Kuznetsov, Dmitrii Minenkov, Daniil Yudakov:
Power allocation algorithms for massive MIMO systems with multi-antenna users. 3747-3768 - P. Anusha, Mary Amala Bai V:
Online computation offloading via deep convolutional feature map attention reinforcement learning and adaptive rewarding policy. 3769-3779 - Daniel Escanez-Exposito
, Pino Caballero-Gil, Francisco Martín-Fernández:
Interactive simulation of quantum key distribution protocols and application in Wi-Fi networks. 3781-3792 - Arti Gupta
, Vijay Kumar Chaurasiya:
QoS supported redundancy balanced data transmission scheme for wireless body area network based H-IoT. 3793-3808 - Peeyush Tiwari, Sundeep Raj
, Nitin Chhimwal:
Community detection in network using chronological gorilla troops optimization algorithm with deep learning based weighted convexity. 3809-3828 - Jiaxin Zhang, Xiaogang Qi, Ying Cai, Chengxiao Chen:
Secure transmission performance analysis of multi-hop cognitive relay radio networks with energy harvesting and artificial noise aided. 3829-3837 - Toi Le-Thanh, Khuong Ho-Van
:
Performance analysis of overlay-based cognitive radio networks with MRC/SC and DT/AF/DF. 3839-3860
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.