


default search action
Digital Communications and Networks, Volume 5
Volume 5, Number 1, February 2019
- Quang Duy La, Mao V. Ngo

, Thinh Quang Dinh, Tony Q. S. Quek
, Hyundong Shin:
Enabling intelligence in fog computing to achieve energy and latency reduction. 3-9 - Liang Huang

, Xu Feng, Cheng Zhang, Liping Qian
, Yuan Wu:
Deep reinforcement learning-based joint task offloading and bandwidth allocation for multi-user mobile edge computing. 10-17 - Qiang Li, Changlong Lu, Bin Cao, Qinyu Zhang

:
Caching resource management of mobile edge network based on Stackelberg game. 18-23 - Chao Xu, Xijun Wang

:
Transient content caching and updating with modified harmony search for Internet of Things. 24-33 - Ping Yang, Jing Zhu

, Yue Xiao, Zhi Chen:
Antenna selection for MIMO system based on pattern recognition. 34-39 - Nahina Islam

, Kandeepan Sithamparanathan
, Karina Gomez Chavez
, James R. Scott, Hamid Eltom:
Energy efficient and delay aware ternary-state transceivers for aerial base stations. 40-50 - Chengye Lu, Sheng Wu, Chunxiao Jiang, Jinfeng Hu:

Weak harmonic signal detection method in chaotic interference based on extended Kalman filter. 51-55 - Yanqing Wu

, Cunlai Pu, Lunbo Li, Gongxuan Zhang:
Traffic-driven epidemic spreading and its control strategies. 56-61
Volume 5, Number 2, May 2019
- Rolando Herrero

:
Analytical model of IoT CoAP traffic. 63-68 - Hang Liu, Koorosh Azhandeh, Xavier de Foy, Robert Gazda:

A comparative study of name resolution and routing mechanisms in information-centric networks. 69-75 - Jinjin Huang, Yisheng Zhao, Zhixiang Dong, Mengjia Chen, Zhonghui Chen:

High mobility channel estimation method based on improved basis expansion model. 76-83 - Md Nashid Anjum, Honggang Wang

, Hua Fang
:
Percolation analysis of large-scale wireless balloon networks. 84-93 - Jin-Kyu Choi

, Van Duc Nguyen
, Hai Nam Nguyen, Vinh Van Duong, Tien Hoa Nguyen
, Hanbyeog Cho, Hyun-Kyun Choi, Seonggyoon Park:
A time-domain estimation method of rapidly time-varying channels for OFDM-based LTE-R systems. 94-101 - Sabyasachi Bhattacharyya, Aradhana Misra

, Kandarpa Kumar Sarma
:
A BCH code assisted modified NCO based LSPF-DPLL topology for Nakagami-m, Rayleigh and Rician fading channels. 102-110 - Raja Muthalagu

:
Application of cognitive radio and interference cancellation in the L-Band based on future air-to-ground communication systems. 111-120 - Javaid A. Sheikh

, Mehboob ul-Amin
, Shabir A. Parah
, Ghulam Mohiuddin Bhat
:
Impact of antenna and beam-selection-based sectored relay planning for performance evaluation of 4G LTE-A tri-sectored cell. 121-130 - Xianhui Che, Barry Ip

, Zhuge Yan:
Field test of multi-hop image sensing network prototype on a city-wide scale. 131-137
Volume 5, Number 3, August 2019
- Justin Tharp, Sang C. Suh, Hyeonkoo Cho, Jinoh Kim:

Improving signature quality for network application identification. 139-146 - Matthew L. Hale

, Kerolos Lotfy, Rose F. Gamble, Charles Walter, Jessica Lin:
Developing a platform to evaluate and assess the security of wearable devices. 147-159 - Pyari Mohan Pradhan

, Ganapati Panda:
S-transformation based integrated approach for spectrum estimation, storage, and sensing in cognitive radio. 160-169 - Yousheng Zhou, Xiaofeng Zhao, Siling Liu, Xingwang Long, Wenjun Luo:

A time-aware searchable encryption scheme for EHRs. 170-175 - Viswanathan Ramachandran

:
Gaussian broadcast channel with lossy state reconstruction. 176-182 - Sherif K. El Dyasti, Esam A. A. Hagras, Hadia M. El-Hennawy

:
QSM-IDM - A novel quadrature spatial modulation based on interleaving division multiplexing for multiple antenna system. 183-188 - Ahmed El-Mahdy, MennaTullah Seraj-Eldin:

Design of multi-antenna relaying for OFDM in impulsive noise environment. 189-195 - Zufan Zhang, Honghui Yu:

Beam interference suppression in multi-cell millimeter wave communications. 196-202
Volume 5, Number 4, November 2019
- Lei Chen, Guofei Gu, Wenjia Li, Rami J. Haddad

:
Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud". 203-204 - Abdulaziz Alzubaidi

, Swarup Roy
, Jugal Kalita:
A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking. 205-213 - Yaira K. Rivera Sánchez, Steven A. Demurjian, Mohammed S. Baihan:

A service-based RBAC & MAC approach incorporated into the FHIR standard. 214-225 - Mu Zhou

, Yiyao Liu, Yong Wang, Zengshan Tian:
Anonymous crowdsourcing-based WLAN indoor localization. 226-236 - Kishan Neupane, Rami J. Haddad

:
Secrecy sum-rate analysis of massive MIMO systems under dual-threat attacks using normalization methods. 237-244 - Louma Chaddad, Ali Chehab

, Imad H. Elhajj
, Ayman I. Kayssi:
AdaptiveMutate: a technique for privacy preservation. 245-255 - Emmanuel Abba, Abiodun Musa Aibinu

, John K. Alhassan:
Development of multiple mobile networks call detailed records and its forensic analysis. 256-265 - Gunasekaran Raja

, Ali Kashif Bashir, Anwer Al-Dulaimi
, Thamarai Selvi Somasundaram, Shahid Mumtaz
:
Editorial: special issue on "Evolution of information and communication technology towards 5G: New Emerging Areas, technologies, protocols, and applications". 266-267 - Sudha Anbalagan

, Dhananjay Kumar
, Gunasekaran Raja
, Alkondan Balaji:
SDN assisted Stackelberg Game model for LTE-WiFi offloading in 5G networks. 268-275 - Shajina Anand

, Varalakshmi Perumal:
EECDH to prevent MITM attack in cloud computing. 276-287 - Shahram Jamali, Amin Badirzadeh, Mina Soltani Siapoush:

On the use of the genetic programming for balanced load distribution in software-defined networks. 288-296 - Mohamed Lahby

, Ayoub Essouiri
, Abderrahim Sekkaki
:
A novel modeling approach for vertical handover based on dynamic k-partite graph in heterogeneous networks. 297-307 - Byomakesh Mahapatra, Rahul Kumar, Ashok K. Turuk

, Sarat Kumar Patra:
CLB: a multilevel co-operative load balancing algorithm for C-RAN architecture. 308-316

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














