


default search action
Wireless Networks, Volume 29
Volume 29, Number 1, January 2023
- Yuhao Chai

, Yong Zhang, Tengteng Ma
, Da Guo, Yinglei Teng:
Research on multi-service slice resource allocation over licensed and unlicensed bands. 1-17 - Huating Tao

, Jie Yang, Jin Tao:
Research on linear frequency modulation detection technology based on fractional fourier transform. 19-27 - Ganesan Sangeetha

, M. Vijayalakshmi:
Weighted high priority packet transmission using ozmos bio-inspired mechanism for traffic load distribution (WH-DTO) in WSNs. 29-45 - Yuting Wang

, Xiaofan Han
, Shunfu Jin
:
MAP based modeling method and performance study of a task offloading scheme with time-correlated traffic and VM repair in MEC systems. 47-68 - Hassan Jradi

, Fabienne Nouvel, Abed Ellatif Samhat
, Jean-Christophe Prévotet, Mohamad Mroué
:
Secure proxy MIPv6-based mobility solution for LPWAN. 69-85 - Ting Wu, Peng Wen

, Shengda Tang
:
Optimal scheduling strategy of AUV based on importance and age of information. 87-95 - Nafiseh Golihaghighi, Mehrzad Biguesh

:
A node selection method for cooperative location estimation in high density wireless networks. 97-108 - Asyraf Wahi Anuar

, Azri Azmi, Nazri Kama, Hazlifah Mohd Rusli, Nur Azaliah Abu Bakar
, Norliza Mohamed:
Integrating user experience assessment in Re-CRUD console framework development. 109-127 - Ricardo Chaves

, Carlos R. Senna
, Miguel Luís
, Susana Sargento
, Ricardo Matos, Diogo Recharte:
Content distribution in a VANET using InterPlanetary file system. 129-146 - Changbo Hou, Dingyi Fu, Lijie Hua, Yun Lin

, Guowei Liu, Zhichao Zhou
:
The recognition of multi-components signals based on semantic segmentation. 147-160 - Yizhi Chen, Kaiyan Ye:

A wireless network based technical and tactical analysis of volleyball game based on data mining techniques. 161-172 - Yanglong Sun, Lintao Zhang, Yuliang Tang

, Jianxin Zhang:
PASS: power allocation and SIC order selection of cache-aided NOMA in vehicular networks. 173-187 - Djamila Zamouche, Sofiane Aissani

, Mawloud Omar, Mohamed Mohammedi
:
Highly efficient approach for discordant BSMs detection in connected vehicles environment. 189-207 - Kiril Danilchenko, Zeev Nutov, Michael Segal

:
Doing their best: How to provide service by limited number of drones? 209-220 - Khuong Ho-Van

, Thiem Do-Dac:
Joint effects of non-linear energy harvesting, primary interference, and full-duplex destination-assisted jamming on spectrum sharing networks. 221-234 - Fatih Özkan Alkurt

, Emin Unal
, Merih Palandoken
, Yadgar I. Abdulkarim, Ugur Cem Hasar
, Muharrem Karaaslan:
Radiation pattern reconfigurable cubical antenna array for 2.45 GHz wireless communication applications. 235-246 - Kalyan Kumar Jena, Sourav Kumar Bhoi, Debasis Mohapatra, Chittaranjan Mallick, Kshira Sagar Sahoo, Anand Nayyar

:
A fuzzy rule based machine intelligence model for cherry red spot disease detection of human eyes in IoMT. 247-265 - Xinchen Wang, Zengwei Lyu, Zhenchun Wei

, Liangliang Wang, Yang Lu, Lei Shi:
Multi-objective path planning algorithm for mobile charger in wireless rechargeable sensor networks. 267-283 - Menghui Wu, Jingjing Guo, Chunlin Li, Youlong Luo:

Cost-efficient edge caching and Q-learning-based service selection policies in MEC. 285-301 - Haiming Liu, Bo Xu, Bin Liu:

A novel predictive localization algorithm for underwater wireless sensor networks. 303-319 - Yinjun Zhang, Mengji Chen:

An IoT-enabled energy-efficient approach for the detection of leaf curl disease in tomato crops. 321-329 - Yu Wang, Qinyin Ni, Junjiang Yu, Enfu Jia, Xiaorong Zhu:

An intelligent access algorithm for large scale multihop wireless networks based on mean field game. 331-344 - Xuemin Zhao:

A network security algorithm using SVC and sliding window. 345-351 - Zhiyuan Mai

, Yueyun Chen
, Yating Xie, Guang Chen:
An energy efficiency optimization jointing resource allocation for delay-aware traffic in fronthaul constrained C-RAN. 353-368 - Bhaskar Kantapalli, Babu Rao Markapudi

:
SSPO-DQN spark: shuffled student psychology optimization based deep Q network with spark architecture for big data classification. 369-385 - Ya-Pei Tuan, Lo-An Chen, Ting-Yen Lin, Ting-Yu Lin, Yu-Ting Wang, Sok-Ian Sou, Meng-Hsun Tsai

:
Improving QoS mechanisms for IEEE 802.11ax with overlapping basic service sets. 387-401 - Chan Dai Truyen Thai

, Thanh T. Tran
, De-Thu Huynh:
Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers. 403-412 - Ubaid Ullah

, Slawomir Koziel, Anna Pietrenko-Dabrowska:
Circularly polarized antenna array design with the potential of gain-size trade-off and omnidirectional radiation for millimeter-wave small base station applications. 413-422 - Karim H. Moussa

, Shawki Shaaban, Ahmed H. El-Sakka
:
Secured polar code derived from random hopped frozen-bits. 423-435 - Yuhao Huang, Run Ye

, Bin Yan, Cheng Zhang, Xiaojia Zhou:
QSFDEW: a fingerprint positioning method based on quadtree search and fractal direction entropy weighting. 437-448 - Feng Li, Zhongming Sun, Kwok-Yan Lam, Songbo Zhang

, Lianzhong Sun, Li Wang:
Reputation-based power allocation for NOMA cognitive radio networks. 449-457 - Tong Tang, Linfeng Cui, Zhiyang Yin, Shun Hu, Lei Fu

:
Spatiotemporal characteristic aware task allocation strategy using sparse user data in mobile crowdsensing. 459-474
Volume 29, Number 2, February 2023
- Deepaa Selva, K. P. Sridhar, K. B. Mythili:

Scheduling model for task loading in cloud data centres. 475-487 - Ishita Banerjee, P. Madhumathy:

QoS enhanced energy efficient cluster based routing protocol realized using stochastic modeling to increase lifetime of green wireless sensor network. 489-507 - Belmien Carlos Konlack Talla

, Olivier Videme Bossou, Cyrille Feudjio, Joseph Ngimbog Mbogue, Gédéon Ghislain Nkwewo Ngoufo, Roger Tchuidjan:
A new approach of successive interference cancellation decoder in power domain non-orthogonal multiple access transmission. 509-521 - Venkatachalam Balamurugan, Ramamoorthy Karthikeyan, B. Sundaravadivazhagan, Robin Cyriac

:
Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security. 523-537 - Mahmoud A. M. Albreem, Abdul Manan Sheikh

, Mohammed J. K. Bashir
, Ayman A. El-Saleh
:
Towards green Internet of Things (IoT) for a sustainable future in Gulf Cooperation Council countries: current practices, challenges and future prospective. 539-567 - Manoj Kumar Somesula

, Sai Krishna Mothku
, Anusha Kotte:
Deep reinforcement learning mechanism for deadline-aware cache placement in device-to-device mobile edge networks. 569-588 - Rajib Kumar Dash

, Puspendu Bikash Saha, Dibyendu Ghoshal, Gopinath Palai:
Fractal slot loaded compact wearable button antenna for IOT and X-band applications. 589-605 - Tao Li, Anjia Yang

, Jian Weng
, Yao Tong, Qingfu Pei:
Concurrent and efficient IoT data trading based on probabilistic micropayments. 607-622 - Seda Üstünbas Gavas

, Ümit Aygölü:
A coordinate interleaved orthogonal design NOMA protocol for two cell-edge users. 623-636 - Lu-Lu Liang, Shu-Chuan Chu

, Zhi-Gang Du, Jeng-Shyang Pan
:
Surrogate-assisted Phasmatodea population evolution algorithm applied to wireless sensor networks. 637-655 - Jonghoek Kim

:
Suppression of NLOS errors in TDOA-AOA hybrid localization. 657-667 - Yi Yang, Zhixin Liu

, Heng Zhu, Xinping Guan, Kit Yan Chan:
Energy minimization by dynamic base station switching in heterogeneous cellular network. 669-684 - Rui Ma, Xuefeng Chen:

Intelligent education evaluation mechanism on ideology and politics with 5G: PSO-driven edge computing approach. 685-696 - Chaduvula Kavitha, Babu Rao Markapudi

, B. Srikanth, A. Srinivasa Rao, A. Sri Nagesh, K. Kranthi Kumar
:
Zero shot image classification system using an optimized generalized adversarial network. 697-712 - Qingzhe Zhang, Chunlin Li, Tianyu Du, Youlong Luo:

Multi-level caching and data verification based on ethereum blockchain. 713-727 - Mintu Singh, Maheshwari Prasad Singh:

Congestion avoidance with source location privacy using octopus-based dynamic routing protocol in WSN. 729-748 - Qiang Wang

, Hongbin Zhou, Qiuhan Liu:
Denoising method for terahertz signal using RBF neural network with adaptive projection learning algorithm. 749-759 - Ba Cao Nguyen

, Xuan Nam Tran, Tran Manh Hoang, Thi Thanh Huyen Le, Pham Thanh Hiep
:
Performance analysis for multi-RIS UAV NOMA mmWave communication systems. 761-773 - Xin Tian

, Guoliang Wei
, Yan Song, Derui Ding
:
Cooperative localization based on semidefinite relaxation in wireless sensor networks under non-line-of-sight propagation. 775-785 - Michaël Mahamat

, Ghada Jaber, Abdelmadjid Bouabdallah:
Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challenges. 787-808 - Minsu Shin, Tahira Mahboob

, Danish Mehmood Mughal
, Min Young Chung
:
Deep reinforcement learning-based multi-channel spectrum sharing technology for next generation multi-operator cellular networks. 809-820 - Anandhu Mohan

, Vidya Sagar Thalapala
, Koppala Guravaiah, M. V. Dhanyamol
:
FMGNR: fuzzy median graph for network routing applications. 821-832 - Lina Huo:

The global path planning for vehicular communication using ant colony algorithm in emerging wireless cloud computing. 833-842 - Vu-Duc Ngo, Thien Van Luong

, Nguyen Cong Luong, Minh-Tuan Le, Thi Thanh Huyen Le, Xuan-Nam Tran:
Generalized BER of MCIK-OFDM with imperfect CSI: selection combining GD versus ML receivers. 843-855 - Anil Kumar Rangisetti, Rishabh Dwivedi, Sudhakar Modem:

Fairness and Applications' transport protocol aware frame aggregation using programmable WLANs. 857-876 - Langtao Hu

, Songjiao Bi, Quanjin Liu, Yu'e Jiang, Chunsheng Chen:
Intelligent reflecting surface aided covert wireless communication exploiting deep reinforcement learning. 877-889 - Caihong Kai, Xiaowei Meng, Linsheng Mei, Wei Huang

:
Multi-agent reinforcement learning based joint uplink-downlink subcarrier assignment and power allocation for D2D underlay networks. 891-907 - Jingfeng Zang, Pengxiang You:

An industrial IoT-enabled smart healthcare system using big data mining and machine learning. 909-918 - S. Vimala, Madhusudhana Rao T. V.

, A. Balaji
, Balajee Maram
:
Taylor-student psychology based optimization integrated deep learning in IoT application for plant disease classification. 919-939 - Hui Qi, Junrui Si, Jiahui Hou, Zhe Tian, Aowei Zhang, Jing Chen

, Weiwu Ren, Shiwei Zhang, Xiaoqiang Di:
Subflow scheduling strategy for multipath transmission in SDN-based spatial network. 941-953 - Peizhen Xing, Hui Zhang, Mohamed Elsayed Ghoneim, Meshal Shutaywi

:
UAV flight path design using multi-objective grasshopper with harmony search for cluster head selection in wireless sensor networks. 955-967 - Tayebeh Sahraneshin, Razieh Malekhosseini

, Farhad Rad, S. Hadi Yaghoubyan:
Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem. 969-983
Volume 29, Number 3, April 2023
- Longzhi Yang, Varadarajan Vijayakumar, Tossapon Boongoen, Nitin Naik:

Special issue on emerging trends, challenges and applications in cloud computing. 985-987 - Kevin Naik

, Supriya Patel:
An open source smart home management system based on IOT. 989-995 - Elie Chicha, Bechara al Bouna, Mohamed Nassar

, Richard Chbeir:
Cloud-based differentially private image classification. 997-1004 - Noe Elisa, Longzhi Yang, Fei Chao, Yi Cao:

A framework of blockchain-based secure and privacy-preserving E-government system. 1005-1015 - Simone Patonico

, An Braeken
, Kris Steenhaut
:
Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti-Krawczyk security model. 1017-1029 - Ahmed Al-Mansoori, Jemal H. Abawajy, Morshed U. Chowdhury:

SDN enabled BDSP in public cloud for resource optimization. 1031-1041 - Deepal Tennakoon

, Morshed Chowdhury, Tom H. Luan
:
Cloud-based load balancing using double Q-learning for improved Quality of Service. 1043-1050 - Wadii Boulila

, Muhib Al-kmali, Mohammed Farid, Hamzah Mugahed:
A business intelligence based solution to support academic affairs: case of Taibah University. 1051-1058 - M. Traore, Alphousseyni Ndiaye

, Senghane Mbodji, Mactar Faye, Daouda Gueye, M. T. Tankari, G. Lefebvre, L. Thiaw:
Supervision of a PV system with storage connected to the power line and design of a battery protection system. 1059-1067 - Jeremy Ellman

, Nathan Lee, Nanlin Jin
:
Cloud computing deployment: a cost-modelling case-study. 1069-1076 - Yewan Wang

, David Nörtershäuser, Stéphane Le Masson, Jean-Marc Menaud:
Potential effects on server power metering and modeling. 1077-1084 - Arezou Naghib

, Nima Jafari Navimipour, Mehdi Hosseinzadeh
, Arash Sharifi:
A comprehensive and systematic literature review on the big data management techniques in the internet of things. 1085-1144 - Anveshkumar Nella

, Anitha Vulugundam
, Sumathi Kumarasamy, Sandeep Kiran Vattiprolu:
A 12-element 360° azimuth plane scanning circular antenna array for THz wireless devices. 1145-1159 - Dipak Kumar Sah, Suyash Srivastava, Ramesh Kumar

, Tarachand Amgoth
:
An energy efficient coverage aware algorithm in energy harvesting wireless sensor networks. 1175-1195 - S. Zehtabchi, Negin Daneshpour

, Masoumeh Safkhani:
A new method for privacy preserving association rule mining using homomorphic encryption with a secure communication protocol. 1197-1212 - Jingya Zhang

:
Designing an intelligent image detection and transmission system for the Internet of Things. 1213-1222 - Min Peng

, Qiqi Yin, Kai Zhang, Caihong Kai:
Adaptive multi-user uplink resource allocation based on access delay analysis in IEEE 802.11ax. 1223-1235 - Chaima Zoghlami

, Rahim Kacimi
, Riadh Dhaou:
5G-enabled V2X communications for vulnerable road users safety applications: a review. 1237-1267 - Sheng-Tzong Cheng, Chang Yu He, Ya-Jin Lyu

, Der-Jiunn Deng
:
On self-adaptive 5G network slice QoS management system: a deep reinforcement learning approach. 1269-1279 - Debajyoti Biswas

, Suvankar Barai, Buddhadeb Sau:
New RSSI-fingerprinting-based smartphone localization system for indoor environments. 1281-1297 - Damodar Reddy Edla

, Amruta Lipare, Saidi Reddy Parne
:
Load balanced cluster formation to avoid energy hole problem in WSN using fuzzy rule-based system. 1299-1310 - Sami Ullah

, Ghulam Abbas, Muhammad Waqas
, Ziaul Haq Abbas
, Abd Ullah Khan
:
RSU assisted reliable relay selection for emergency message routing in intermittently connected VANETs. 1311-1332 - Sirisha Uppuluri, G. Lakshmeeswari:

Secure user authentication and key agreement scheme for IoT device access control based smart home communications. 1333-1354 - Sagar Kavaiya

, Dhaval K. Patel:
Restricting passive attacks in 6G vehicular networks: a physical layer security perspective. 1355-1365 - Pejman Abdollahzadeh Karegar

, Adnan Al-Anbuky:
UAV-assisted data gathering from a sparse wireless sensor adaptive networks. 1367-1384 - Hiral S. Trivedi

, Sankita J. Patel:
Dynamically scalable privacy-preserving authentication protocol for distributed IoT based healthcare service providers. 1385-1409 - Changliang Huang, Yuting Xu:

Psychological factors of sports injury caused by wireless communication of embedded microprocessor in social sports teaching and training. 1411-1419 - Susmita Mandal

:
Provably secure certificateless protocol for wireless body area network. 1421-1438 - Khalid A. Darabkh, Batool R. Awawdeh, Ramzi R. Saifan, Ala' F. Khalifeh, Sharhabeel H. Alnabelsi, Haythem Bany Salameh:

Routing in cognitive radio networks using adaptive full-duplex communications over IoT environment. 1439-1463 - Kristina Wheatman

, Fidan Mehmeti, Mark Mahon, Thomas F. La Porta, Guohong Cao:
EQMS: An improved energy-aware and QoE-aware video streaming policy across multiple competitive mobile devices. 1465-1484 - Nithya Dorairajan

, Chitra M. Perumal, Swetha Vedhagiri:
A low profile triband coupled resonator filtering antenna for wireless applications. 1485-1503
Volume 29, Number 4, May 2023
- Xiaoxian Yang, Li Kuang:

Deep learning to mobile hypermedia and multimedia. 1505-1506 - Junsheng Xiao

, Huahu Xu, Dikai Fang, Chen Cheng
, Honghao Gao:
Boosting and rectifying few-shot learning prototype network for skin lesion classification based on the internet of medical things. 1507-1521 - Kai Wang, Yuqi Liu, Bin Cao, Jing Fan:

TkTC: A framework for top-k text classification of multimedia computing in wireless networks. 1523-1534 - Yangjie Qin

, Ming Li
, Jia Zhu
:
Privacy-preserving federated learning framework in multimedia courses recommendation. 1535-1544 - Zhe Bing, Xing Wang, Zhenliang Dong, Luobing Dong

, Tao He:
A novel edge computing architecture for intelligent coal mining system. 1545-1554 - Pengcheng Zhao, Yuanhao Huang

, De-Xin Zhang, Ling Xing
, Honghai Wu, Jianping Gao:
CCP-federated deep learning based on user trust chain in social IoV. 1555-1566 - Yueshen Xu

, Yunpeng Ding, Zhiping Jiang, Yuyu Yin, Lei Hei, Shaoyuan Zhang:
Web APIs recommendation with neural content embedding for mobile multimedia computing. 1567-1576 - Zheng Wan

, Xiaogang Dong
, Changshou Deng:
Optimizing computation offloading under heterogeneous delay requirements for wireless powered mobile edge computing. 1577-1607 - Zheng Wan, Xiaogang Dong, Changshou Deng:

Correction to: Optimizing computation offloading under heterogeneous delay requirements for wireless powered mobile edge computing. 1609-1610 - Tiantian Cao:

Analysis of aerobic training posture using machine vision for body area networks. 1611-1620 - Mehdi Askari, Rezvan Dastanian:

An optimized spectrum sharing scheme for cognitive radio. 1621-1627 - Mohammed Abd-Elnaby, Germien G. Sedhom, El-Sayed M. El-Rabaie, Mohamed Elwekeil

:
NOMA for 5G and beyond: literature review and novel trends. 1629-1653 - Mohammed Abd-Elnaby, Germien G. Sedhom, El-Sayed M. El-Rabaie, Mohamed Elwekeil

:
Correction to: NOMA for 5G and beyond: literature review and novel trends. 1655 - Devarshi Shukla

, Santosh Kumar Gupta, Vijaya Bhadauria, Rajeev Tripathi:
An ultra-wide band IIP3 of 38.2 dBm and conversion gain of 17.95 dB down conversion Gilbert mixer for 5G internet of things applications. 1657-1669 - P. C. Senthil Mahesh, K. Muthumanickam:

Secure and novel authentication model for protecting data centers in fog environment. 1671-1683 - Deepa Jeyaraj, Ahamed Ali Samsu Aliar

, Selvamani Hemamalini
:
Intelligent energy efficient vehicle automation system with sensible edge processing protocol in Internet of Vehicles using hybrid optimization strategy. 1685-1701 - Gopinathan Rajeswari

, M. K. Sandhya
, Krishnan Murugan:
Obstacle-aware connectivity restoration for the partitioned wireless sensor networks using mobile data carriers. 1703-1720 - Meet Kumari

:
Performance analysis of high speed hybrid PON-VLC for long-reach land-to-underwater applications. 1721-1735 - Sifeng Zhu, Jiang-hao Cai

, En-lin Sun
:
Mobile edge computing offloading scheme based on improved multi-objective immune cloning algorithm. 1737-1750 - D. Kishore Babu, C. Ravindra Raman, D. Venkata Divakara Rao:

Deep residual network-based data streaming approach for soil type application under IoT-based big data environment. 1751-1769 - Kuang-Hao Lin

, Fu-Chi Chen:
Implementation of iterative error detection and correction for BAN transceiver systems. 1771-1786 - D. Prabhu

, Alageswaran Ramaiah, S. Miruna Joe Amali:
Multiple agent based reinforcement learning for energy efficient routing in WSN. 1787-1797 - Nurzaman Ahmed

, Md. Iftekhar Hussain:
A QoS-aware scheduling with node grouping for IEEE 802.11ah. 1799-1814 - Sanjai Prasada Rao Banoth, Praveen Kumar Donta

, Tarachand Amgoth
:
Target-aware distributed coverage and connectivity algorithm for wireless sensor networks. 1815-1830 - Ugaitz Amozarrain, Mikel Larrea

:
Using publish/subscribe for message routing in mobile environments. 1831-1842 - Steffi Jayakumar, S. Nandakumar

:
Reinforcement learning based distributed resource allocation technique in device-to-device (D2D) communication. 1843-1858 - Mohamed Amine Ouamri, Daljeet Singh

, Mohammed Saleh Ali Muthanna, Ahcène Bounceur, Xingwang Li:
Performance analysis of UAV multiple antenna-assisted small cell network with clustered users. 1859-1872 - Jiagao Wu

, Shenlei Cai, Hongyu Jin, Linfeng Liu:
Vehicular delay tolerant network routing algorithm based on trajectory clustering and dynamic Bayesian network. 1873-1889 - Tejodbhav Koduru

, Manjula Raja
:
Source location privacy in wireless sensor networks: What is the right choice of privacy metric? 1891-1898 - Zhichao Zheng

, Shengming Jiang, Ruoyu Feng, Lige Ge, Chongchong Gu:
An adaptive backoff selection scheme based on Q-learning for CSMA/CA. 1899-1909 - Maheshwari Niranjan, Swechchha Gupta

, Buddha Singh:
Sensor node localization with improved hop-size using PSODESA optimization. 1911-1934 - Ranjit Kumar, Sachin Tripathi, Rajeev Agrawal:

Correction to: Trust-based energy-aware routing using GEOSR protocol for Ad-Hoc sensor networks. 1935
Volume 29, Number 5, July 2023
- Hardik K. Molia

, Amit D. Kothari:
TCP-RLLD: TCP with reinforcement learning based loss differentiation for mobile adhoc networks. 1937-1948 - S. Balaji, S. Sankara Narayanan:

Dynamic distributed generative adversarial network for intrusion detection system over internet of things. 1949-1967 - M. Rathika, P. Sivakumar

:
Machine learning-optimized relay selection method for mitigating interference in next generation communication networks. 1969-1981 - Mehdi Monemi

, Omid Yazdani:
Transmit antenna selection and resource allocation for sequential D2D registration in mmWave networks. 1983-1994 - Rahim Umar, Fengfan Yang, Hongjun Xu, Shoaib Mughal:

Distributed turbo coded spatial modulation based on code matched interleaver for MIMO system. 1995-2013 - M. Kanthi, Ravilla Dilli

:
Smart streetlight system using mobile applications: secured fault detection and diagnosis with optimal powers. 2015-2028 - Ruchi Garg, Tarun Gulati

, Sumit Kumar:
Range free localization in WSN against wormhole attack using Farkas' Lemma. 2029-2043 - Ruchi Garg, Tarun Gulati

, Sumit Kumar:
Correction to: Range free localization in WSN against wormhole attack using Farkas' Lemma. 2045 - Fadoua Debbabi

, Rui Luis Andrade Aguiar
, Rihab Jmal, Lamia Chaari Fourati:
Game theory for B5G upper-tier resource allocation using network slicing. 2047-2059 - Dilip Mandloi

, Rajeev Arya
:
FRAT: a fuzzy rule based adaptive technique for intelligent placement of UAV-mounted base station. 2061-2077 - S. Sumathi

, T. K. Ramesh, Zhiguo Ding:
PSO based power allocation in multiuser hybrid beamforming mmWave NOMA. 2079-2091 - Xiaoya Li

, Wei Zhou, Jinye Peng, HengSheng Shan:
Joint beamwidth and resource optimization in ultra-dense MmWave D2D communications. 2093-2104 - Sanjeev Kumar, Haider Banka, Baijnath Kaushik:

Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing. 2105-2126 - P. V. Pravija Raj, Zaher Al Aghbari

, Ahmed M. Khedr:
ETP-CED: efficient trajectory planning method for coverage enhanced data collection in WSN. 2127-2142 - Tania Taami, Sadoon Azizi

, Ramin Yarinezhad:
Unequal sized cells based on cross shapes for data collection in green Internet of Things (IoT) networks. 2143-2160 - Bandana Mallick

, Priyadarsan Parida
, Chittaranjan Nayak
, Pritam Keshari Sahoo, Gopinath Palai:
Quantum key distribution over FSO channel using error reconciliation protocol. 2161-2169 - Chunlin Li, Zhiqiang Yu, Xinyong Li, Libin Zhang, Yong Zhang, Youlong Luo:

Low-latency AP handover protocol and heterogeneous resource scheduling in SDN-enabled edge computing. 2171-2187 - Can Altay

, Mutlu Koca:
Interference mitigation for non-orthogonal multiple access in heterogeneous networks. 2189-2202 - C. Sureshkumar

, S. Sabena
:
Design of an adaptive framework with compressive sensing for spatial data in wireless sensor networks. 2203-2216 - Haci Bayram Karakurt

, Cemal Koçak:
Increasing quality of service in wireless local area networks through fuzzy logic based feedback control method. 2217-2233 - Pablo Adasme

, Abdel Lisser:
A stochastic geometric programming approach for power allocation in wireless networks. 2235-2250 - Arpan Desai

, Yi-Fan Tsao, Heng-Tung Hsu
:
High gain substrate integrated waveguide antenna with enhanced bandwidth for millimeter-wave wireless network applications. 2251-2260 - Rong Xie, Mengting Jiang, Yuchen Wang:

Synchronization for dynamic complex networks combining degree distribution and eigenvector criteria. 2261-2278 - Sanjeev Kumar

, Richa Agrawal:
A hybrid C-GSA optimization routing algorithm for energy-efficient wireless sensor network. 2279-2292 - Radhika Kavra

, Anjana Gupta, Sangita Kansal:
Optimization of energy and delay on interval data based graph model of wireless sensor networks. 2293-2311 - Haitao Zhao

, Zhiyuan Chen, Wenchao Xia
, Kun Guo
, Yiyang Ni
, Kunlun He
:
Deep unfolding based optimization framework of fractional programming for wireless communication systems. 2313-2320 - Shunzhi Wang, Zhanyou Ma, Xinying Niu, Yilin Liu:

Performance analysis of a Queueing system based on vacation with fault repairable and spare servers in the MP2P network. 2321-2336 - Rasmita Kumari Mohanty

, Satya Prakash Sahoo
, Manas Ranjan Kabat:
Sustainable remote patient monitoring in wireless body area network with Multi-hop routing and scheduling: a four-fold objective based optimization approach. 2337-2351 - Manuel Jesús-Azabal

, Javier Berrocal, Vasco N. G. J. Soares
, José García-Alonso
, Jaime Galán-Jiménez:
A self-sustainable opportunistic solution for emergency detection in ageing people living in rural areas. 2353-2370 - Eduardo Santos Escriche

, Stavroula Vassaki, Gunnar Peters:
A comparative study of cellular traffic prediction mechanisms. 2371-2389 - Cheng Zhou

, Congshan Ma, Qian Lin, Xin Man, Tao Ying:
Intelligent bandit learning for jamming strategy generation. 2391-2403 - Kaveh Vaezi, Nail Akar

, Ezhan Karasan
:
Modeling age of information in a cooperative slotted Aloha network. 2405-2417
Volume 29, Number 6, August 2023
- Wenjun Shi

, Jigang Wu, Long Chen, Xinxiang Zhang, Huaiguang Wu:
Energy-efficient cooperative offloading for mobile edge computing. 2419-2435 - Komal Arora, Jaswinder Singh, Yogeshwar Singh Randhawa:

Performance evaluation of energy optimized precoded - LDPC encoded system. 2437-2445 - Ruiyan Du, Tiangui Li, Xiaoyu Li, Fulai Liu

:
CNN-DPC algorithm for hybrid precoding in millimeter-wave massive MIMO systems. 2447-2456 - Avinash Nanasaheb Pawar

, Shankar B. Deosarkar:
IoT-based smart agriculture: an exhaustive study. 2457-2470 - Kiyas Kayaalp, Sedat Metlek

, Abdullah Genç
, Habib Dogan
, Ibrahim Bahadir Basyigit
:
Prediction of path loss in coastal and vegetative environments with deep learning at 5G sub-6 GHz. 2471-2480 - G. M. Karthik

, A. S. Kalyana Kumar, Aruna Bhaskar Karri, Naga Padmaja Jagini:
Deep intelligent blockchain technology for securing IoT-based healthcare multimedia data. 2481-2493 - Danyu Diao, Buhong Wang

, Kunrui Cao:
Secure SWIPT-powered UAV communication against full-duplex active eavesdropper. 2495-2504 - Can Zhang, Miao Cui, Guangchi Zhang

:
Throughput optimization for IRS-assisted multi-user NOMA URLLC systems. 2505-2517 - Muhammed Samir Al-Ali, Elias Yaacoub

:
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks. 2519-2538 - Özlem Sabuncu

, Bülent Bilgehan
:
Statistical RMS delay spread representation in 5G mm-Wave analysis using real-time measurements. 2539-2549 - Kuldeep Narayan Tripathi

, Ashish Mohan Yadav
, Surendra Nagar, S. C. Sharma:
ReTrust: reliability and recommendation trust-based scheme for secure data sharing among internet of vehicles (IoV). 2551-2575 - Anubhav Shivhare

, Vishal Krishna Singh
, Manish Kumar:
Event detection using the user context in sensor based IoT. 2577-2589 - Gulshan Kumar

, Rajkumar Singh Rathore
, Kutub Thakur, Ahmad S. Almadhor, Sardar Asad Ali Biabani
, Subhash Chander:
Dynamic routing approach for enhancing source location privacy in wireless sensor networks. 2591-2607 - Atiqa Kayani

, Graeme K. Woodward
, Zubair Khalid, Ijaz Haider Naqvi:
On the performance of hybrid beamforming for closely-spaced and randomly located users. 2609-2617 - Abhijit Bhowmick, Binod Prasad

, Srinivas Nallagonda
:
Throughput and harvesting time trade-off in a energy harvesting cognitive radio network. 2619-2633 - Ashish Singh Parihar

, Swarnendu Kumar Chakraborty, Anupama Sharma
, Mehak Saini:
A comparative study and proposal of a novel distributed mutual exclusion in UAV assisted flying ad hoc network using density-based clustering scheme. 2635-2648 - S. Jeen Shene, W. R. Sam Emmanuel, K. Vimal Kumar Stephen:

Review on energy conservation and congestion mechanism in mobile WSN: taxonomy, software programs, challenges, and future trends. 2649-2669 - Lubna Ansari, M. Afshar Alam, Mohd Abdul Ahad, Mohd Tabrez Nafis:

Cloud sans server architecture for sustainable development in smart cities: Indian perspective. 2671-2684 - Rami Halloush

, Haythem Bany Salameh, Mariam Al-Tamimi, Ahmed Musa:
A Jamming-resilient opportunistic QoS-constrained multi-channel routing for green IoT networking. 2685-2701 - S. Tamizharasu

, P. Kalpana:
An intelligent AODV routing with energy efficient weight based clustering algorithm (EEWCA) in wireless Ad hoc network (WANET). 2703-2716 - Biplab Bag

, Kalyan Mondal, Snehasish Saha
, Partha Pratim Sarkar:
Wideband monopole antenna: enhanced gain and circular polarization for satellite communication. 2717-2731 - Ali Reza Hazeri

:
Novel Ku/K-Band low-power LNAs with simultaneous input impedance and noise matching. 2733-2746 - Sudipta Mallick

, Susmita Das, Arun Kumar Ray:
A modified three-event energy detection scheme using decision threshold optimization for sensing performance improvement in a cognitive radio system. 2747-2758 - Srinivas Nallagonda

:
Energy-efficiency performance of wireless cognitive radio sensor network with hard-decision fusion over generalized α -μ fading channels. 2759-2771 - Vellaichamy Rajavel

, Dibyendu Ghoshal:
A compact triband antenna using artificial magnetic conductor for wireless body area network communicationsFront. 2773-2795 - Xinpeng Fang

, Zhihao He, Ranjun Shi:
Optimality analysis of range sensor placement under constrained deployment region. 2797-2812 - Hossein Akbari, Farshad Eshghi

, Manoochehr Kelarestaghi
, Mostafa Abdollahi:
Roam on the fly (ROTF): a complementary roaming policy. 2813-2823 - Feng Li

, Songbo Zhang, Kwok-Yan Lam, Xin Liu, Li Wang:
Dynamic spectrum optimization for Internet-of-Things with social distance model. 2825-2832 - Xiangrong Li:

A novel technique with overhead in Multi-Path Network Aggregation by Machine Learning Framework (MPAA-MLF). 2833-2844 - Richard Wandell, Md. Shafaeat Hossain

, Ishtiaque Hussain:
A cost-effective Wi-Fi-based indoor positioning system for mobile phones. 2845-2862 - D. Raghunatha Rao

, T. Jayachandra Prasad, M. N. Giri Prasad:
Gannet optimization algorithm enabled framework for spectrum sensing in OFDM based CR network. 2863-2872 - Shuailiang Zhang, Xiujuan Du

, Xin Liu:
A novel and quantum-resistant handover authentication protocol in IoT environment. 2873-2890
Volume 29, Number 7, October 2023
- Weina Fu, Zeshi Chen, Shuai Liu

:
Key problem on mobile intelligent multimedia system. 2891-2895 - Jian-zhao Sun, Kun Yang, Marcin Wozniak

:
Nonlinear dimensionality reduction method of scheduling frequent information in wireless networks based on multilevel mapping. 2897-2907 - Sen Wang, Yun Lin, Ming Hao, Huaitao Xu, Jiangzhi Fu

:
Assessment of speech communication interference effects under small sample conditions. 2909-2923 - Tianzhu Guan, Gautam Srivastava:

A multi-frequency communication routing protocol for mobile devices in the Internet of things. 2925-2934 - Meiyu Wang, Yun Lin, Chang Liu, Qiao Tian, Haoran Zha, Jiangzhi Fu

:
TESPOSDA-SEI: tensor embedding substructure preserving open set domain adaptation for specific emitter identification. 2935-2951 - Jingchao Li, YuLong Ying

, Shenhua Wang, Bin Zhang:
Slice combination convolutional neural network based radio frequency fingerprint identification for Internet of Things. 2953-2966 - Chao Han

, Ruoxi Qin, Linyuan Wang, Weijia Cui, Jian Chen, Bin Yan:
Adversarial defense method based on ensemble learning for modulation signal intelligent recognition. 2967-2980 - Xingkun Xu, Jerry Chun-Wei Lin

:
Abnormal nodes sensing model in regional wireless networks based on convolutional neural network. 2981-2992 - Mingrui Xin, Zhuoran Cai

:
A feature fusion-based communication jamming recognition method. 2993-3004 - Huang Bo, Zhiming Sun:

Construction of heart rate monitoring platform for college physical training based on wireless network. 3005-3016 - Hao Liu, Ting Yang:

Remote video detection algorithm of sports wrong actions under wireless network. 3017-3026 - Chang Liu

, Zhuo Chen, Yonghao Wu, Ruslan Antypenko
:
A target behavior pattern mining and abnormal behavior monitoring based on multidimensional similarity metric. 3027-3037 - Gelan Yang

, Yiyi Xu, Li Tu:
An intelligent box office predictor based on aspect-level sentiment analysis of movie review. 3039-3049 - Long Gao, Congan Xu, Fengqin Wang, Junfeng Wu, Hang Su:

Flight data outlier detection by constrained LSTM-autoencoder. 3051-3061 - Prabakar Dakshinamoorthy

, Saminadan Vaitilingam, Ramesh Sundar
:
Multivariate clustering for maximizing the small cell users' performance based on the dynamic interference alignment. 3063-3074 - Qian Liu, Wanning Yang, Ming Li

, Rang Liu
:
A novel channel estimation strategy for practical RIS-aided wideband OFDMA communications. 3075-3089 - I. Jayasukumari, G. Themozhi, C. Amali:

Design of rectangular microstrip patch antenna using hybrid group teaching optimization algorithm and volcano Eruption algorithm. 3091-3103 - D. Rosy Salomi Victoria

, Princy Magdaline P, Glory Ratna Mary D:
Intelligent resource allocation decision using deep learning and optimization techniques for HetNets. 3105-3119 - Naresh Kumar Yadav:

A novel hybridized algorithm for rescheduling based congestion management. 3121-3136 - Mohammad Lari

:
Matched-filter design to improve self-interference cancellation in full-duplex communication systems. 3137-3150 - O. Sugel Anandh

, Tina Elizabeth Mathew, K. V. Pradeep, S. Rajarajeswari:
Novel STD-ACP for detecting energy and threshold value in the network. 3151-3161 - Muhammad Asim

, Junhong Chen, Ammar Muthanna, Liu Wenyin, Siraj Khan
, Ahmed A. Abd El-Latif
:
A novel simulated annealing trajectory optimization algorithm in an autonomous UAVs-empowered MFC system for medical internet of things devices. 3163-3176 - Emy Mariam George

, Lillykutty Jacob:
Multi-channel NOMA random access for inter-WBAN communication. 3177-3185 - Shivanand V. Manjaragi, S. V. Saboji:

Fast user authentication in 5G heterogeneous networks using RLAC-FNN and blockchain technology for handoff delay reduction. 3187-3205 - Jinhuan Zhang, Xiangwei Chen, Junxian Wang, Hao Zhang

:
A geodesic distance-based routing scheme for sensor networks with irregular terrain structure. 3207-3221 - Juan Hui

, Qingmei Tan
:
Dynamic evaluation of regional economic resilience under major public emergencies: based on an improved dynamic evaluation model of grey incidence projection-fuzzy matter element. 3223-3238 - Amin Nazari

, Mojtaba Kordabadi, Reza Mohammadi, Chhagan Lal:
EQRSRL: an energy-aware and QoS-based routing schema using reinforcement learning in IoMT. 3239-3253 - Baris Gurcan Hakanoglu

, Veli Tayfun Kilic
, Fatih Altindis, Mustafa Türkmen:
Crown shaped edge multiband antenna design for 5G and X-Band applications. 3255-3270 - Felipe da Rocha Henriques

, Lisandro Lovisolo, Eduardo Antônio Barros da Silva:
On the design of KLT-based maximally incoherent deterministic sensing matrices for compressive sensing applied to wireless sensor networks data. 3271-3284 - Wu Pan, Na Lyu, Jingcheng Miao, Mengyuan Zhu, Ying Pan, Qi Gao:

Outage probability optimization of UAV relay system based on elliptical trajectory. 3285-3294 - Mohit Kumar Srivastava, Manoj Kumar Shukla, Arun Kumar Singh:

Effect of block size on BER performance of inverse filtering based MIMO FBMC. 3295-3309 - Ayesha Hasan

, Bilal Muhammad Khan
:
Deep learning aided wireless interference identification for coexistence management in the ISM bands. 3311-3331
Volume 29, Number 8, November 2023
- Tathababu Addepalli, Jagadeesh Babu Kamili, Subba Rao Boddu, Rajasekhar Manda, Anveshkumar Nella

, Bandi Kiran Kumar
:
A 4-element crescent shaped two-sided MIMO antenna for UWB, X and Ku band wireless applications. 3333-3348 - Kavitha Dhanushkodi

, Ravikumar Sethuraman
, Premalatha Mariappan, Anusooya Govindarajan:
An efficient cat hunting optimization-biased ReLU neural network for healthcare monitoring system. 3349-3365 - Minal K. Pawar, Suhas S. Patil:

An optimization-driven model for a hybrid beam forming for massive multiple-input multiple-output. 3367-3382 - Xiaoxue Ma, Yun Li, Yan Gao

:
Decision model of intrusion response based on markov game in fog computing environment. 3383-3392 - Rayees Ahamad, Kamta Nath Mishra

:
Knowledge discovery of suspicious objects using hybrid approach with video clips and UAV images in distributed environments: a novel approach. 3393-3416 - Xiao Ming Wu, Zhan Xin Guo, Xiao Mei Chu, Yoo Seungeok:

Designing a demand forecasting model for human resources cloud data centres using fuzzy theory. 3417-3433 - Allam Balaram

, Shaik Abdul Nabi, Koppula Srinivas Rao, Neeraja Koppula:
Highly accurate sybil attack detection in vanet using extreme learning machine with preserved location. 3435-3443 - Monisha Devi

, Nityananda Sarma, Sanjib Kumar Deka:
Single-sided truthful auction mechanism for heterogeneous channel allocation in cognitive radio networks. 3445-3467 - Peiyan Yuan

, Saike Shao, Junna Zhang, Xiaoyan Zhao:
Cooperative edge offloading strategy for sensory data with delay and energy constraints. 3469-3478 - Parmila Devi

, Manoranjan Rai Bharti:
Physical layer security for IoT over Nakagami-m and mixed Rayleigh-Nakagami-m fading channels. 3479-3491 - Yuxiao Cao

, Ying Qian, Zhen Wang:
DV-Hop based localization algorithm using node negotiation and multiple communication radii for wireless sensor network. 3493-3513 - Yafeng Zhang, Yongzheng Gan, Chunlin Li, Chunping Deng

, Youlong Luo:
Primary node selection based on node reputation evaluation for PBFT in UAV-assisted MEC environment. 3515-3539 - S. Tamizharasi, Arunadevi Baladhandapani

, S. N. Deepa:
Bio-inspired deep residual neural network learning model for QoS routing enhancement in mobile ad-hoc networks. 3541-3565 - Libin Sun, Minqiang Xu, Yilun Gao, Haiyang Kou:

Evaluating the application of using biological pulse sensor in aerobics. 3567-3582 - Lekshmi R. Nair

, Sakuntala S. Pillai:
A novel SLM-based approach for reducing PAPR in LFDMA systems. 3583-3597 - Maolin Yang, Shubing Zhang:

Analysis of sports psychological obstacles based on mobile intelligent information system in the era of wireless communication. 3599-3615 - Chen Shuai

, Cheng Qing, Wang Jian:
Wireless sensor network relay transmitting using dual buffer pools. 3617-3623 - Yang Jie:

Multi-modal interaction using time division long-term evolution (TD-LTE) for space designing exhibition. 3625-3636 - Chunlin Li, Zewu Ke, Qiang Liu, Cong Hu, Chengwei Lu, Youlong Luo:

Energy-latency tradeoffs edge server selection and DQN-based resource allocation schemes in MEC. 3637-3663 - Leiming Yang:

Data monitoring for a physical health system of elderly people using smart sensing technology. 3665-3678 - Wenting Zhou, Biao Guo

, Feng Cao:
Hybrid neural network-based exploration on the influence of continuous sensor data for the balancing ability of aerobics students. 3679-3692 - Jingjing Xue:

A wireless network-enabled online english subjective assignment evaluation system using micro cloud environment. 3693-3706 - Anil Kumar Yerrola

, Ravi Kumar Arya, Maifuz Ali, Lakhindar Murmu, Ashwani Kumar:
THz quad-beam holographic antenna with independent beam control and low sidelobe levels. 3707-3716 - Levente Márk Maller

, Péter Suskovics, László Bokor:
Edge computing in the loop simulation framework for automotive use cases evaluation. 3717-3735 - Yuhua Qin, Yanhong Sun, Haoran Liu

, Rongrong Yin, Mingru Dong, Liyue Zhang:
Joint time synchronization and localization of underwater mobile node. 3737-3746 - Evgeny Bobrov

, Boris Chinyaev, Viktor Kuznetsov, Dmitrii Minenkov, Daniil Yudakov
:
Power allocation algorithms for massive MIMO systems with multi-antenna users. 3747-3768 - P. Anusha

, Mary Amala Bai V:
Online computation offloading via deep convolutional feature map attention reinforcement learning and adaptive rewarding policy. 3769-3779 - Daniel Escanez-Exposito

, Pino Caballero-Gil, Francisco Martín-Fernández:
Interactive simulation of quantum key distribution protocols and application in Wi-Fi networks. 3781-3792 - Arti Gupta

, Vijay Kumar Chaurasiya:
QoS supported redundancy balanced data transmission scheme for wireless body area network based H-IoT. 3793-3808 - Peeyush Tiwari, Sundeep Raj

, Nitin Chhimwal:
Community detection in network using chronological gorilla troops optimization algorithm with deep learning based weighted convexity. 3809-3828 - Jiaxin Zhang, Xiaogang Qi, Ying Cai, Chengxiao Chen:

Secure transmission performance analysis of multi-hop cognitive relay radio networks with energy harvesting and artificial noise aided. 3829-3837 - Toi Le-Thanh, Khuong Ho-Van

:
Performance analysis of overlay-based cognitive radio networks with MRC/SC and DT/AF/DF. 3839-3860

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














