Stop the war!
Остановите войну!
for scientists:
default search action
Wireless Networks, Volume 30
Volume 30, Number 1, January 2024
- Du Junfang, Xiaomin Chen, Dou Yuguang:
Evaluating the practical effectiveness of college counselors' ideological and political education using big data video streaming. 1-15 - D. Minola Davids, A. Arul Edwin Raj, C. Seldev Christopher:
Hybrid multi scale hard switch YOLOv4 network for cricket video summarization. 17-35 - Zhen-ji Zhu:
Indoor evaluation algorithm for ecological environment design materials based on cloud data processing and wireless communication. 37-50 - Jie Jia, Haowen Guan, Jian Chen, Leyou Yang, An Du, Xingwei Wang:
Compressive sensing based indoor localization fingerprint collection and construction. 51-65 - P. Jeyakumar, S. Vishwa, V. Prakash, P. Dinesh, P. Rajesh Ram, P. Muthuchidambaranathan:
Long-short term memory based wideband beam tracking scheme for massive mimo systems. 67-76 - Naween Kumar, Damodar Reddy Edla, Dinesh Dash, Gandharba Swain, T. N. Shankar:
Energy-efficient and delay-sensitive-based data gathering technique for multi-hop WSN using path-constraint mobile element. 77-95 - Osama H. Elgazzar, Imbaby I. Mahmoud:
Energy consumption reduction in OFDMA wireless sensor networks in existence of interference hazards. 97-137 - Swetaleena Sahoo, Manidipa Sarkar, Harish Kumar Sahoo, Sarita Nanda:
Multiuser hybrid precoder design using logarithmic hyperbolic filtering for millimeter wave communication systems. 139-150 - S. Jayashree, Sripathi Venkata Naga Santhosh Kumar:
LAPEP - Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc network. 151-178 - Mingxia Wan:
Designing an online vocal learning based on ZigBee-enabled wireless platform. 179-192 - Xinrui Duan, Yajun Guo, Yimin Guo:
Design of anonymous authentication scheme for vehicle fog services using blockchain. 193-207 - Rajasoundaran Soundararajan, Sripathi Venkata Naga Santhosh Kumar, Munuswamy Selvi, K. Thangaramya, Kannan Arputharaj:
Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks. 209-231 - Shukun He, Qinlin Li, Mohammad Khishe, Amin Salih Mohammed, Hassan Mohammadi, Mokhtar Mohammadi:
The optimization of nodes clustering and multi-hop routing protocol using hierarchical chimp optimization for sustainable energy efficient underwater wireless sensor networks. 233-252 - Deqing Zhu, Genmei Pan:
Analytical model considering varying numbers of RA-RUs to determine how to allocate the RA-RUs in practice. 253-265 - Dingwen Chi, Jun Tao, Yulai Hu, Haotian Wang, Zuyan Wang, Yifan Xu:
AUV-assisted information collection scheme with energy balance and low delay of underwater things. 267-283 - Ajay Kaushik, Hamed S. Al-Raweshidy:
A novel intrusion detection system for internet of things devices and data. 285-294 - Ahmed El. Gouda, Yasmine Abouelseoud, Ahmed H. Abd El-Malek, Radwa Ahmed Osman:
Enhanced DV-Hop using shuffled shepherd algorithm for localizing sensor nodes in 3-D space. 295-307 - Mofan Luo, Baoyi Xu, Jian Chen, Long Yang, Yuchen Zhou, Mengmeng Ren, Bingtao He:
Distributed control for semi-grant-free non-orthogonal multiple access. 309-320 - K. Rajkumar, U. Hariharan, V. Dhanakoti, N. Muthukumaran:
A secure framework for managing data in cloud storage using rapid asymmetric maximum based dynamic size chunking and fuzzy logic for deduplication. 321-334 - Y. Rajkumar, Sripathi Venkata Naga Santhosh Kumar:
An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks. 335-362 - Khaled Ramadan Mohamed:
Walsh transform-based non-linear equalization algorithm for enhancing the efficiency of MIMO-OFDM communication system. 363-385 - Pedro Cumino, Miguel Luís, Denis Rosário, Eduardo Cerqueira, Susana Sargento:
On the usefulness of flying base stations in 5G and beyond scenarios. 387-403 - Rajarshi Roy Chowdhury, Azam Che-Idris, Pg Emeroylariffion Abas:
Identifying SH-IoT devices from network traffic characteristics using random forest classifier. 405-419 - Newsha Nowrozian, Farzad Tashtarian, Yahya Forghani:
On optimizing the charging trajectory of mobile chargers in wireless sensor networks: a deep reinforcement learning approach. 421-436 - Meng-Shiuan Pan, Ming-Yang Wu:
A genetic algorithm based flow control scheme for LTE-NR dual connectivity networks. 437-452 - Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed:
Towards an efficient model for network intrusion detection system (IDS): systematic literature review. 453-482 - Serghini Elaage, Mohammed El Ghzaoui, Nabil Mrani, Rachid El Alami:
Implementation and analysis of recombination techniques within the receiver for IoT based applications. 483-493 - Ayman Abdulhadi Althuwayb, Nasr Rashid, Khaled Kaaniche, Ahmed Ben Atitallah, Osama I. Elhamrawy, Vishal Sorathiya, Sunil P. Lavadiya:
Broadband, high gain 2 × 2 spiral shaped resonator based and graphene assisted terahertz MIMO antenna for biomedical and WBAN communication. 495-515 - Zhibin Liu, Jindong Wang:
Power control algorithm for wireless sensor nodes based on energy prediction. 517-532 - Omid Rahimi, Alireza Shafieinejad:
Minimizing age of information in multi-UAV-assisted IoT networks: a graph theoretical approach. 533-555 - Shuo Sun, Qi Zhu:
Joint optimization algorithm of offloading decision and resource allocation based on integrated sensing, communication, and computation. 557-576 - Khwairakpam Chaoba Singh, Ngangkham Peter Singh:
An optimized estimation techniques for enhancing the efficiency of power demand in smart grid application. 577-591 - Prabakar Dakshinamoorthy, Saminadan Vaitilingam, Ramesh Sundar:
Correction: Multivariate clustering for maximizing the small cell users' performance based on the dynamic interference alignment. 593
Volume 30, Number 2, February 2024
- Pavan Kumar Pandey, Vineet Kansal, Abhishek Swaroop:
PKI-SMR: PKI based secure multipath routing for unmanned military vehicles (UMV) in VANETs. 595-615 - A. Maria Christina Blessy, S. Brindha:
Energy-efficient fuzzy management system using tri-parametric methodology in vanet. 617-635 - Xiang Ma, Kexuan Zong, Amin Rezaeipanah:
Auto-scaling and computation offloading in edge/cloud computing: a fuzzy Q-learning-based approach. 637-648 - Tan N. Nguyen, Nguyen Van Vinh, Ba Cao Nguyen, Minh Bui Vu:
On performance of RIS-aided bidirectional full-duplex systems with combining of imperfect conditions. 649-660 - P. Mohanraj, S. Anbu Karuppusamy:
Efficient security framework against sybil attack in mobile adhoc network using EE-OLSR protocol scheme. 661-669 - Amjad Aldweesh, Sarangam Kodati, Mohammad Alauthman, Ibrahim Aqeel, Ibrahim Mohsen Khormi, M. Dhasaratham, R. Lakshmana Kumar:
Mlora-CBF: efficient cluster-based routing protocol against resource allocation using modified location routing algorithm with cluster-based flooding. 671-693 - Reza Molaei, Kheirollah Rahsepar Fard, Asgarali Bouyer:
Time and cost-effective online advertising in social Internet of Things using influence maximization problem. 695-710 - R. Aruna, Virendra Singh Kushwah, S. Phani Praveen, Rahul Pradhan, Amit Jaykumar Chinchawade, Renas Rajab Asaad, R. Lakshmana Kumar:
Coalescing novel QoS routing with fault tolerance for improving QoS parameters in wireless Ad-Hoc network using craft protocol. 711-735 - Xiuwu Yu, Yinhao Liu, Yong Liu:
WSN routing algorithm based on node classification and multi-layer transport. 737-747 - Areeb Ahmed Bhutta, Mehr-Un-Nisa, Adnan Noor Mian:
Lightweight real-time WiFi-based intrusion detection system using LightGBM. 749-761 - Amjad Aldweesh:
The impact of blockchain on digital content distribution: a systematic review. 763-779 - Syed Adil Abbas Kazmi, Muhammad Shahid Iqbal, Sinem Coleri:
Resource allocation for full-duplex MIMO relaying system with self-energy recycling. 781-797 - Lei Du, Ru Huo, Chuang Sun, Shuo Wang, Tao Huang:
Adaptive joint placement of edge intelligence services in mobile edge computing. 799-817 - Manoj Kumar Beuria, Sudhansu Sekhar Singh:
Performance analysis of cooperative NOMA with optimized power allocation using deep learning approach. 819-834 - Shun-Chieh Chang:
The Monte Carlo tree search based bandwidth slicing allocation algorithm. 835-844 - Mohamad Hossein Ashouri, Saeed Fakhte, Mohamad Mahdi Taskhiri:
A broadband high gain circularly polarized magneto-electric dipole antenna with chiral metamaterial for 5G/WIMAX wireless network. 845-855 - Abbas Rezaei, Salah I. Yahya, Leila Nouri:
An ultra-compact diplexer based on simple microstrip coupled lines for GSM and wideband wireless applications. 857-865 - María Elena de Cos Gómez, Humberto Fernández Álvarez, Fernando Las-Heras Andrés:
PP-based 24 GHz wearable antenna. 867-882 - Azath Mubarakali, Salomi Samsudeen, Ahmed Alkhayyat, Badria Sulaiman Alfurhood, D. Haritha, Deevi Radha Rani, M. Karthick:
Optimized flexible network architecture creation against 5G communication-based IoT using information-centric wireless computing. 883-907 - Shaogang Dai, Huaji Zhou:
An electromagnetic signal classification method inspired by the visual characteristics of biological dual-channel. 909-921 - Haitao Li, Xin Lv, Hao Zhang, Jiawei Huang:
Anti-jamming transmission in softwarization UAV network: a federated deep reinforcement learning approach. 923-937 - Liyakathunisa Syed, P. Sathyaprakash, A. Shobanadevi, Ha Huy Cuong Nguyen, Mohammad Alauthman, M. Vedaraj, R. Premalatha:
Deep learning-based route reconfigurability for intelligent vehicle networks to improve power-constrained using energy-efficient geographic routing protocol. 939-960 - Saeed Iqbal, Aadil Raza, Mohammad Kaleem, Muhammad Iqbal, Muhammad Adeel, Salman Ghafoor:
A full duplex LG modes enabled millimeter-wave based FSO communication system for disaster zone. 961-971 - Shiguo Wang, Hongdong Liu, Rukhsana Ruby, Xiukai Ruan, Yongjian Zhang:
Pilot spoofing detection based on pilot random block encryption. 973-985 - Bakri Hossain Awaji, M. M. Kamruzzaman, Ahmad Althuniabt, Ibrahim Aqeel, Ibrahim Mohsen Khormi, Mani Gopalsamy, Udayakumar Allimuthu:
Novel multiple access protocols against Q-learning-based tunnel monitoring using flying ad hoc networks. 987-1011 - Mohammad Reza Ghaderi, Nasrin Amiri:
LoRaWAN sensor: energy analysis and modeling. 1013-1036 - Tathababu Addepalli, Manish Sharma, M. Satish Kumar, Gollamudi Naveen Kumar, Prabhakara Rao Kapula, Ch. Manohar Kumar:
Self-isolated miniaturized four-port multiband 5G sub 6 GHz MIMO antenna exclusively for n77/n78 & n79 wireless band applications. 1037-1053 - Jiali Zheng, Zihan Lin, Xiaode Xie:
Improved multi-objective brain storm optimization algorithm for RFID network planning. 1055-1068 - Shiwen He:
An endogenous intelligent architecture for wireless communication networks. 1069-1084 - A. Poobalan, P. Shanthakumar, M. Robinson Joel:
Hybrid optimization enabled VM scaling based load distribution and optimal switching strategy in cloud data center. 1085-1105 - Xue Li:
A wireless network-based machine intelligence model for green tourism satisfaction analysis. 1107-1120 - Mohsen Azizi, Ebadollah Zohrehvandi:
A hybrid approach of multi-cast routing and clustering in underwater sensor networks. 1121-1132
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.