


default search action
Telecommunication Systems, Volume 82
Volume 82, Number 1, January 2023
- Muhammad Khurram Khan

:
AI-enabled transformations in telecommunications industry. 1-2 - Sivaraman Eswaran

, Prasad B. Honnavalli:
Private 5G networks: a survey on enabling technologies, deployment models, use cases and research directions. 3-26 - Hajar Kavusi, Keivan Maghooli

, Siamak Haghipour:
A novel and smarter model to authenticate and identify people intelligently for security purposes. 27-43 - Michaelraj Kingston Roberts

, Poonkodi Ramasamy:
An improved high performance clustering based routing protocol for wireless sensor networks in IoT. 45-59 - Ritesh Sur Chowdhury

, Jayant Kumar Sadhu, Chandrima Thakur, Sudipta Chattopadhyay:
Performance analysis and optimization of a hybrid TSR-PSR protocol for AF, DF and hybrid AF-DF relaying under Weibull fading. 61-90 - Mushtaq Ahmad, Muhammad Awais, Muhammad Naeem

, Muhammad Altaf, Muhammad Iqbal, Muhammad Abrar:
Radio resource management for device to device communication using S and V shaped transfer functions. 91-100 - Achour Achroufene

:
RSSI-based Hybrid Centroid-K-Nearest Neighbors localization method. 101-114 - Fatma Rouissi

, A. J. Han Vinck, Adel Ghazel:
Statistical analysis of the Middleton Class-A noise effects on multi-carrier OFDM-based communication system. 115-123 - Qiu-yu Zhang

, Fu-jiu Xu
:
Encrypted speech authentication and recovery scheme based on fragile watermarking. 125-140 - Rohit Kumar Gupta

, Saubhik Kumar, Rajiv Misra:
Resource allocation for UAV-assisted 5G mMTC slicing networks using deep reinforcement learning. 141-159 - Yousef Ali Abohamra

, M. Reza Soleymani, Yousef R. Shayan, Jalal Abdulsayed Srar:
Beamforming based algorithm for 5G applications. 161-174
Volume 82, Number 2, February 2023
- Chol Jong

, Yong Chun Kim, Jun Ho So, Kumchol Ri:
QoS and energy-efficiency aware scheduling and resource allocation scheme in LTE-A uplink systems. 175-191 - Ramin Ramazanzadeh, Nahideh Derakhshanfard

:
Fuzzy assisted dynamic message replication and routing in delay tolerant networks. 193-209 - Angelos Skoufis, Georgios Chatzithanasis, Georgia Dede

, Evangelia Filiopoulou
, Thomas Kamalakis, Christos Michalakelis:
Technoeconomic assessment of an FTTH network investment in the Greek telecommunications market. 211-227 - Anupama Mishra, Neena Gupta, Brij B. Gupta

:
Defensive mechanism against DDoS attack based on feature selection and multi-classifier algorithms. 229-244 - Tamer Ahmed Farrag

, M. A. Farag
, Rizk Masoud Rizk-Allah
, Aboul Ella Hassanien
, Mostafa A. Elhosseini
:
An improved parallel processing-based strawberry optimization algorithm for drone placement. 245-275 - Shilpi

, Arvind Kumar:
A localization algorithm using reliable anchor pair selection and Jaya algorithm for wireless sensor networks. 277-289 - Narathep Phruksahiran

:
Improvement of source localization via cellular network using machine learning approach. 291-299 - Ching-Chun Chang

, Xu Wang, Sisheng Chen, Hitoshi Kiya, Isao Echizen:
On the predictability in reversible steganography. 301-313 - Kumar Prateek

, Nitish Kumar Ojha
, Fahiem Altaf, Soumyadev Maity:
Quantum secured 6G technology-based applications in Internet of Everything. 315-344
Volume 82, Number 3, March 2023
- Zahra Rashidi, Vesal Hakami

:
Distributed content placement in cache-enabled small cell networks in the presence of malicious users. 345-362 - Dalia N. Elsheakh

, Soha A. Alsherif, Angie R. Eldamak
:
Textile monopole sensors for breast cancer detection. 363-379 - V. Deepa

, M. Haridass, Selvamuthu Dharmaraja, Priyanka Kalita:
Analysis of energy efficiency of small cell base station in 4G/5G networks. 381-401 - Haibin Sun, Dong Wang

, Hongxing Li, Ziran Meng:
An improved DV-Hop algorithm based on PSO and Modified DE algorithm. 403-418 - Zhaosen Shi, Zeyu Yang, Alzubair Hassan, Fagen Li, Xuyang Ding

:
A privacy preserving federated learning scheme using homomorphic encryption and secret sharing. 419-433
Volume 82, Number 4, April 2023
- Kang Liu, Guanghui Zhang, Xue Chen

, Qing Liu, Linyu Peng, Liu Yurui:
Android malware detection based on sensitive patterns. 435-449 - Kai-Sheng Hsu, Chung-An Shen

:
The design of a configurable and low-latency packet parsing system for communication networks. 451-463 - Zainab Hassan Ali

, Hesham Arafat Ali:
Energy-efficient routing protocol on public roads using real-time traffic information. 465-486 - Yiwen Zhang, Ruixia Cheng:

Joint trajectory and power design for UAV-enabled cooperative jamming in two-way secure communication. 487-498 - Tianwei Han, Meiyu Fu, Meiling Zhang, Guijun Hu

:
Puncturing scheme for polar codes based on channel reliability estimation. 499-508 - Adam Raja Basha

:
Reconfigurable design of hybrid MIMO detection scheme for spatially multiplexed MIMO system. 509-526

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














