default search action
Digital Communications and Networks, Volume 5
Volume 5, Number 1, February 2019
- Quang Duy La, Mao V. Ngo, Thinh Quang Dinh, Tony Q. S. Quek, Hyundong Shin:
Enabling intelligence in fog computing to achieve energy and latency reduction. 3-9 - Liang Huang, Xu Feng, Cheng Zhang, Liping Qian, Yuan Wu:
Deep reinforcement learning-based joint task offloading and bandwidth allocation for multi-user mobile edge computing. 10-17 - Qiang Li, Changlong Lu, Bin Cao, Qinyu Zhang:
Caching resource management of mobile edge network based on Stackelberg game. 18-23 - Chao Xu, Xijun Wang:
Transient content caching and updating with modified harmony search for Internet of Things. 24-33 - Ping Yang, Jing Zhu, Yue Xiao, Zhi Chen:
Antenna selection for MIMO system based on pattern recognition. 34-39 - Nahina Islam, Kandeepan Sithamparanathan, Karina Gomez Chavez, James R. Scott, Hamid Eltom:
Energy efficient and delay aware ternary-state transceivers for aerial base stations. 40-50 - Chengye Lu, Sheng Wu, Chunxiao Jiang, Jinfeng Hu:
Weak harmonic signal detection method in chaotic interference based on extended Kalman filter. 51-55 - Yanqing Wu, Cunlai Pu, Lunbo Li, Gongxuan Zhang:
Traffic-driven epidemic spreading and its control strategies. 56-61
Volume 5, Number 2, May 2019
- Rolando Herrero:
Analytical model of IoT CoAP traffic. 63-68 - Hang Liu, Koorosh Azhandeh, Xavier de Foy, Robert Gazda:
A comparative study of name resolution and routing mechanisms in information-centric networks. 69-75 - Jinjin Huang, Yisheng Zhao, Zhixiang Dong, Mengjia Chen, Zhonghui Chen:
High mobility channel estimation method based on improved basis expansion model. 76-83 - Md Nashid Anjum, Honggang Wang, Hua Fang:
Percolation analysis of large-scale wireless balloon networks. 84-93 - Jin-Kyu Choi, Van Duc Nguyen, Hai Nam Nguyen, Vinh Van Duong, Tien Hoa Nguyen, Hanbyeog Cho, Hyun-Kyun Choi, Seonggyoon Park:
A time-domain estimation method of rapidly time-varying channels for OFDM-based LTE-R systems. 94-101 - Sabyasachi Bhattacharyya, Aradhana Misra, Kandarpa Kumar Sarma:
A BCH code assisted modified NCO based LSPF-DPLL topology for Nakagami-m, Rayleigh and Rician fading channels. 102-110 - Raja Muthalagu:
Application of cognitive radio and interference cancellation in the L-Band based on future air-to-ground communication systems. 111-120 - Javaid A. Sheikh, Mehboob ul-Amin, Shabir A. Parah, Ghulam Mohiuddin Bhat:
Impact of antenna and beam-selection-based sectored relay planning for performance evaluation of 4G LTE-A tri-sectored cell. 121-130 - Xianhui Che, Barry Ip, Zhuge Yan:
Field test of multi-hop image sensing network prototype on a city-wide scale. 131-137
Volume 5, Number 3, August 2019
- Justin Tharp, Sang C. Suh, Hyeonkoo Cho, Jinoh Kim:
Improving signature quality for network application identification. 139-146 - Matthew L. Hale, Kerolos Lotfy, Rose F. Gamble, Charles Walter, Jessica Lin:
Developing a platform to evaluate and assess the security of wearable devices. 147-159 - Pyari Mohan Pradhan, Ganapati Panda:
S-transformation based integrated approach for spectrum estimation, storage, and sensing in cognitive radio. 160-169 - Yousheng Zhou, Xiaofeng Zhao, Siling Liu, Xingwang Long, Wenjun Luo:
A time-aware searchable encryption scheme for EHRs. 170-175 - Viswanathan Ramachandran:
Gaussian broadcast channel with lossy state reconstruction. 176-182 - Sherif K. El Dyasti, Esam A. A. Hagras, Hadia M. El-Hennawy:
QSM-IDM - A novel quadrature spatial modulation based on interleaving division multiplexing for multiple antenna system. 183-188 - Ahmed El-Mahdy, MennaTullah Seraj-Eldin:
Design of multi-antenna relaying for OFDM in impulsive noise environment. 189-195 - Zufan Zhang, Honghui Yu:
Beam interference suppression in multi-cell millimeter wave communications. 196-202
Volume 5, Number 4, November 2019
- Lei Chen, Guofei Gu, Wenjia Li, Rami J. Haddad:
Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud". 203-204 - Abdulaziz Alzubaidi, Swarup Roy, Jugal Kalita:
A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking. 205-213 - Yaira K. Rivera Sánchez, Steven A. Demurjian, Mohammed S. Baihan:
A service-based RBAC & MAC approach incorporated into the FHIR standard. 214-225 - Mu Zhou, Yiyao Liu, Yong Wang, Zengshan Tian:
Anonymous crowdsourcing-based WLAN indoor localization. 226-236 - Kishan Neupane, Rami J. Haddad:
Secrecy sum-rate analysis of massive MIMO systems under dual-threat attacks using normalization methods. 237-244 - Louma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
AdaptiveMutate: a technique for privacy preservation. 245-255 - Emmanuel Abba, Abiodun Musa Aibinu, John K. Alhassan:
Development of multiple mobile networks call detailed records and its forensic analysis. 256-265 - Gunasekaran Raja, Ali Kashif Bashir, Anwer Al-Dulaimi, Thamarai Selvi Somasundaram, Shahid Mumtaz:
Editorial: special issue on "Evolution of information and communication technology towards 5G: New Emerging Areas, technologies, protocols, and applications". 266-267 - Sudha Anbalagan, Dhananjay Kumar, Gunasekaran Raja, Alkondan Balaji:
SDN assisted Stackelberg Game model for LTE-WiFi offloading in 5G networks. 268-275 - Shajina Anand, Varalakshmi Perumal:
EECDH to prevent MITM attack in cloud computing. 276-287 - Shahram Jamali, Amin Badirzadeh, Mina Soltani Siapoush:
On the use of the genetic programming for balanced load distribution in software-defined networks. 288-296 - Mohamed Lahby, Ayoub Essouiri, Abderrahim Sekkaki:
A novel modeling approach for vertical handover based on dynamic k-partite graph in heterogeneous networks. 297-307 - Byomakesh Mahapatra, Rahul Kumar, Ashok K. Turuk, Sarat Kumar Patra:
CLB: a multilevel co-operative load balancing algorithm for C-RAN architecture. 308-316
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.