


default search action
International Journal of Communication Systems, Volume 32
Volume 32, Number 1, January 2019
- Diego Cruz Abrahão
, Flávio Henrique Teles Vieira
:
Adaptive envelope process and minimum service curve applied to resource block allocation in the LTE downlink. - Tayyab Mehmood
, Salman Ghafoor
:
Millimeter-wave signal generation and transmission to multiple radio access units by employing nonlinearity of the optical link. - V. S. Lakshmi
, P. P. Deepthi:
A secure channel code-based scheme for privacy preserving data aggregation in wireless sensor networks. - Jie Han
, Tao Zhang, Zhaoyang Qiu, Xiaoyu Zheng:
Communication emitter individual identification via 3D-Hilbert energy spectrum-based multiscale segmentation features. - Ömer Faruk Gemici
, Fatih Kara, Ibrahim Hökelek, Hakan Ali Çirpan
:
User scheduling and power allocation for nonfull buffer traffic in NOMA downlink systems. - Ali Assarian
, Ahmad Khademzadeh, Mehdi Hosseinzadeh, Saeed Setayeshi
:
An efficient resource allocation scheme in a dense RFID network based on cellular learning automata. - Ramin Bakhshi
, Erhan AliRiza Ince
:
Hybrid blind interference alignment in homogeneous cellular networks with limited coherence time. - K. V. Shahnaz
, C. K. Ali:
A signal power adaptive regularized sphere decoding algorithm based multiuser detection technique for underdetermined OFDM/SDMA uplink system. - Sharmistha Adhikari, Sangram Ray
, Gosta Pada Biswas, Mohammad S. Obaidat:
Efficient and secure business model for content centric network using elliptic curve cryptography. - Wilson Prakash S
, Deepalakshmi P
:
DServ-LB: Dynamic server load balancing algorithm. - Kaouther Hedhly, Mohamed Laaraiedh
, Fatma Abdelkefi, Mohamed Siala:
Cooperative localization and tracking in wireless sensor networks. - Yao-Chun Wang
, Ying-Dar Lin, Guey-Yun Chang:
SDN-based dynamic multipath forwarding for inter-data center networking.
Volume 32, Number 2, January 2019
- Sidi Ahmed Ezzahidi, Essaid Sabir
, Mounir Ghogho:
Satisfactory content delivery scheme for QoS provisioning in delay tolerant networks. - Tsui-Tsai Lin, Fuh-Hsin Hwang
:
Analysis and design of joint CFO/channel estimate techniques for a cooperative STBC-OFDM system. - Archiman Lahiry
:
Antenna array techniques for nonuniform cell zooming and adaptive frequency planning. - Ritwik Haldar
, Ashraf Hossain
, Kirtan Gopal Panda:
Performance evaluation of low-power wireless sensor node with hybrid energy storage. - Richa Bhatia
, Saurabh Prakash, Ekta Saini:
Performance improvement of 60-GHz wireless optical systems with reverse-parallel hybrid modulation scheme. - Lylia Alouache
, Nga Nguyen
, Makhlouf Aliouat
, Rachid Chelouah
:
Survey on IoV routing protocols: Security and network architecture. - Roshni Rajkumari
, Ningrinla Marchang
:
Mitigating spectrum sensing data falsification attack in ad hoc cognitive radio networks. - Iftikhar Ahmad
, Rafidah Md Noor
, Muhammad Reza Z'aba:
LTE efficiency when used in traffic information systems: A stable interest aware clustering. - Nam Minh Pham
, Tran Trung Duy
, Phan Van Ca:
End-to-end security-reliability analysis of multi-hop cognitive relaying protocol with TAS/SC-based primary communication, total interference constraint and asymmetric fading channels. - Rakeshkumar Vanzara, Priyanka Sharma, Haresh S. Bhatt, Sudeep Tanwar
, Sudhanshu Tyagi
, Neeraj Kumar
, Mohammad S. Obaidat:
ADYTIA: Adaptive and Dynamic TCP Interface Architecture for heterogeneous networks. - Elham Ghazizadeh
, Dariush Abbasi-Moghadam
, Hossein Nezamabadi-pour:
An enhanced two-phase SVM algorithm for cooperative spectrum sensing in cognitive radio networks. - Wei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, Tzungher Chen
:
Secure and efficient protection for HTTP cookies with self-verification. - Sameer Abdul Kadhim Alrufaiaat, Awwab Qasim Jumaah Althahab
:
A new DOA estimation approach for QPSK Alamouti STBC using ICA technique-based PSO algorithm.
Volume 32, Number 3, February 2019
- Seyed Farhad Aghili
, Hamid Mala
:
Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce. - Alieh Moradi
, Hamid Farrokhi, Reza Ghazizadeh:
Throughput optimization using simultaneous sensing and transmission in energy harvesting cognitive radio networks. - Jin Cao
, Maode Ma, Hui Li:
LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks. - Ridhima Mehta
, Daya Krishan Lobiyal:
Performance modeling and optimization of multiple-objective cross-layer design in multi-flow ad-hoc networks. - Yang Lu
, Jiguo Li
:
Constructing designated server public key encryption with keyword search schemes withstanding keyword guessing attacks. - Narges Arastouie
, Masoud Sabaei
, Bahador Bakhshi
:
Near-optimal online routing in opportunistic networks. - Gul Boztok Algin
, Emrullah Turhan Tunali:
A comparative path establishment study on routing performance of MLR WDM optical networks. - Faguo Wu
, Wang Yao, Xiao Zhang, Wenhua Wang, Zhiming Zheng:
Identity-based proxy signature over NTRU lattice. - Ta-Te Lu
:
Novel method for transferring access control list rules to synchronize security protection in a locator/identifier separation protocol environment with cross-segment host mobility. - Manisha Chahal
, Sandeep Harit:
A stable and reliable data dissemination scheme based on intelligent forwarding in VANETs. - Mehran Tarahomi
, Mohammad Izadi:
A prediction-based and power-aware virtual machine allocation algorithm in three-tier cloud data centers. - Papa Ndiaga Ba, Joel J. P. C. Rodrigues, Valery Korotaev, Jalal Al-Muhtadi
, Samuel Ouya
, Amadou Seidou Maiga
:
Performance evaluation of Wi-Fi and WiMAX over OFDM physical layer. - Humaira Ijaz
, Michael Welzl
, Bushra Jamil
:
A survey and comparison on overlay-underlay mapping techniques in peer-to-peer overlay networks. - Kehinde Oluwasesan Odeyemi
, Pius A. Owolawi:
Impact of transmission techniques in asymmetric RF/FSO system over Nakagami-m and gamma-gamma fading channels with pointing errors. - Anirban Bhowal, Rakhesh Singh Kshetrimayum
:
Outage probability bound of decode and forward two-way full-duplex relay employing spatial modulation over cascaded α - μ channels. - Mushtaq Ahmad
, Qingchun Chen
, Zahid Khan
, Muqeet Ahmad
, Faisal Khurshid
:
Infrastructure-based vehicular congestion detection scheme for V2I. - Firas Zawaideh
, Muhammed Salamah:
An efficient weighted trust-based malicious node detection scheme for wireless sensor networks. - Pawan Singh Mehra
, Mohammad Najmud Doja, Bashir Alam
:
Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN. - Shashibhushan Sharma
, Sanjay Dhar Roy
, Sumit Kundu:
Secrecy Performance of CCRN with an EHAF Relay under Source and Destination Jamming.
Volume 32, Number 4, March 2019
- Laszlo Gyongyosi
, Sándor Imre
:
Secret key rate proof of multicarrier continuous-variable quantum key distribution. - Ali Akbar Neghabi
, Nima Jafari Navimipour
, Mehdi Hosseinzadeh
, Ali Rezaee
:
Nature-inspired meta-heuristic algorithms for solving the load balancing problem in the software-defined network. - Montajab Ghanem
, Masoud Sabaei
, Mehdi Dehghan:
A Stackelberg game for relay selection and power allocation in an active cooperative model involving primary users and secondary users. - Charilaos Stais, George Xylomenos
:
Error and congestion control for wireless sensor networks. - Satyendra Singh Yadav
, Paulo Alexandre Crisóstomo Lopes, Aleksandar Ilic
, Sarat Kumar Patra:
Hungarian algorithm for subcarrier assignment problem using GPU and CUDA. - Mozafar Roshani
, Siavash Khorsandi
:
Performance analysis of the internet-protocol multimedia-subsystem's control layer using a detailed queueing Petri-net model. - Sonika Singh, Sahadeo Padhye
:
MaTRU-KE: A key exchange protocol based on MaTRU cryptosystem. - Sangeetha U.
, Anchare V. Babu
:
Performance analysis of IEEE 802.11ah wireless local area network under the restricted access window-based mechanism.
Volume 32, Number 5, March 2019
- Hyun Seob Oh
, Dong Geun Jeong, Wha Sook Jeon:
Energy-efficient relay deployment in cellular systems using fractional frequency reuse and transmit antenna selection techniques. - Bimal Chandra Das
, Satoshi Takahashi, Eiji Oki, Masakazu Muramatsu:
Approach to problem of minimizing network power consumption based on robust optimization. - Yi-Ning Liu
, Song-Zhan Lv, Ming Xie, Zu-Bin Chen, Peng Wang:
Dynamic anonymous identity authentication (DAIA) scheme for VANET. - Behrouz Pourghebleh
, Nima Jafari Navimipour
:
Towards efficient data collection mechanisms in the vehicular ad hoc networks. - Yunchong Guan
, Weimin Lei
, Wei Zhang
, Hao Li, Songyang Zhang:
SGMR: A spatial geometry-based multipath routing method on overlay networks. - Haitao Li
, Changjun Liu:
Cross-layer optimization for full-duplex cognitive radio network with cooperative spectrum sensing. - Kanniga Devi Rangaswamy
, Murugaboopathi Gurusamy:
An efficient clustering and load balancing of distributed cloud data centers using graph theory. - Saliha Benkerdagh
, Claude Duvallet:
Cluster-based emergency message dissemination strategy for VANET using V2V communication. - Arezou Ostad-Sharif
, Abolfazl Babamohammadi, Dariush Abbasinezhad-Mood
, Morteza Nikooghadam
:
Efficient privacy-preserving authentication scheme for roaming consumer in global mobility networks. - Arezou Ostad-Sharif
, Dariush Abbasinezhad-Mood
, Morteza Nikooghadam
:
An enhanced anonymous and unlinkable user authentication and key agreement protocol for TMIS by utilization of ECC.
Volume 32, Number 6, April 2019
- Shang-Juh Kao, Sin-Yu Luo, Ming-Tsung Kao, Fu-Min Chang
:
D2D communications with subchannel reusing for throughput-guaranteed relay selection in LTE. - Sara H. Kamel
, Mina B. Abd-el-Malek, Said E. El-Khamy:
Compressive spectrum sensing using chaotic matrices for cognitive radio networks. - Qi Jiang
, Yuanyuan Qian
, Jianfeng Ma, XinDi Ma, Qingfeng Cheng, Fushan Wei:
User centric three-factor authentication protocol for cloud-assisted wearable devices. - Mohammed Alnahhal
, Tawfik Ismail
, Mohamed E. Nasr
:
Spectral efficiency improvement with SISO and SIMO in M-QAM over millimeter-wave links. - Shivani Gupta, Vandana Gupta
:
Analytical modeling of RLC protocol of LTE using stochastic reward nets. - Ramesh R. Subbaraman
:
Rate limitable and efficient discovery of path maximum transmission units. - Ishfaq Bashir Sofi
, Akhil Gupta
, Rakesh Kumar Jha
:
Power and energy optimization with reduced complexity in different deployment scenarios of massive MIMO network. - Marco Milanesio, Christian Callegari
, Pietro Michiardi:
Network level perspective in web sessions troubleshooting. - Segun Oladoyinbo
, Narushan Pillay
, Hongjun Xu
:
Media-based single-symbol generalized spatial modulation. - Rafal Leszczyna
:
Standards with cybersecurity controls for smart grid - A systematic analysis. - André Luis Meneses Silva
, José de Jesús Pérez Alcázar, Sergio Takeo Kofuji
:
Interoperability in semantic Web of Things: Design issues and solutions. - Mohamed Haji Dahir, Hadi Alizadeh
, Didem Gözüpek
:
Energy efficient virtual network embedding for federated software-defined networks. - Li Li
, Zhaorong Zhou, Sanshan Sun, Menghan Wei:
Distributed optimization of enhanced intercell interference coordination and resource allocation in heterogeneous networks.
Volume 32, Number 7, May 2019
- Yves-François Rivard
, Ling Cheng
:
Time diversity scheme and adaptive signal clipping with blanking applied to G3 systems for narrowband power-line communications. - Bharti Saneja
, Rinkle Rani:
A scalable correlation-based approach for outlier detection in wireless body sensor networks. - Shashibhushan Sharma
, Sanjay Dhar Roy
, Sumit Kundu:
Secure communication in cognitive radio networks with untrusted AF relays. - Velusamy Rajakumareswaran
, Subramaniam Nithiyanandam:
Box counting-based multifractal analysis of network to detect Domain Name Server attack. - Hanifa Nabuuma, Emad Alsusa, Mohammed W. Baidas
:
AID-based backoff for throughput enhancement in 802.11ah networks. - Huseyin Ugur Yildiz
:
Investigation of maximum lifetime and minimum delay trade-off in underwater sensor networks. - Guowei Wu, Jinlei Wang
, Mohammad S. Obaidat, Lin Yao, Kuei-Fang Hsiao:
Dynamic switch migration with noncooperative game towards control plane scalability in SDN. - Xiaogang Wu
, Weiheng Jiang
, Yu Zhang, Wanxin Yu:
Online combinatorial based mechanism for MEC network resource allocation. - Arnab Ghosh
, Niladri Chakraborty:
A novel residual energy-based distributed clustering and routing approach for performance study of wireless sensor network. - YoHan Park
, KiSung Park
, YoungHo Park:
Secure user authentication scheme with novel server mutual verification for multiserver environments. - John Paul Martin
, A. Kandasamy, K. Chandrasekaran
, Christina Terese Joseph
:
Elucidating the challenges for the praxis of fog computing: An aspect-based study. - Samira Mesmoudi, Belkacem Benadda
, Amin Mesmoudi:
SKWN: Smart and dynamic key management scheme for wireless sensor networks.
Volume 32, Number 8, May 2019
- Shubham Gupta
, Balu L. Parne, Narendra S. Chaudhari:
SRGH: A secure and robust group-based handover AKA protocol for MTC in LTE-A networks. - Muhammad Waqar Ashraf
, Sevia M. Idrus
, Rizwan Aslam Butt
, Farabi Iqbal
:
Post-Disaster least loaded lightpath routing in elastic optical networks. - Elham Azhir, Nima Jafari Navimipour
, Mehdi Hosseinzadeh
, Arash Sharifi
, Aso Mohammad Darwesh:
Query optimization mechanisms in the cloud environments: A systematic study. - Soodeh Hosseini
, Ramin Vakili:
Game theory approach for detecting vulnerable data centers in cloud computing network. - Mohammad Hassan Ameri
, Mahshid Delavar, Javad Mohajeri
:
Provably secure and efficient PUF-based broadcast authentication schemes for smart grid applications. - Samuel Baraldi Mafra
, Evelio M. G. Fernández
, Samuel Montejo Sánchez
, Richard D. Souza
, Ohara Kerusauskas Rayel
, João Luiz Rebelatto:
On the performance of two-user full-duplex network-coded cooperation. - Jie Jin
, Meihao Chen, Xiaoxiao Jiang, Baoli Ai, Enkai Wu:
Iterative channel estimation and pilot design rules for high-mobility comb-pilot OFDM system. - Sahil Vashisht
, Sushma Jain:
Software-defined network-enabled opportunistic offloading and charging scheme in multi-unmanned aerial vehicle ecosystem. - Xiao Wang, Aiqing Zhang
, Xiaojuan Xie, Xinrong Ye:
Secure-aware and privacy-preserving electronic health record searching in cloud environment. - Pimmy Gandotra, Rakesh Kumar Jha
:
Energy-efficient device-to-device communication using adaptive resource-block allocation.
Volume 32, Number 9, June 2019
- Chien-Ching Chiu
, Yi-Xiang Tong, Yu-Ting Cheng:
Comparison of self-adaptive dynamic differential evolution and particle swarm optimization for smart antennas in wireless communication. - Mohammed Alnahhal
, Tawfik Ismail
:
Enhancing spectral efficiency of FSO system using adaptive SIM/M-PSK and SIMO in the presence of atmospheric turbulence and pointing errors. - Mehdi Sepahkar, Mohammad Reza Khayyambashi
:
Improving energy efficiency in information-centric mobile ad-hoc networks using places of interest while respecting privacy. - Ui-Seok Jeong, Gi-Hoon Ryu, Dong-Sun Jang, Kyunbyoung Ko
:
Exact SEP and performance bounds for orthogonal space-time block codes in cooperative multiantenna AF relaying networks. - Tanmoy Maitra
, Sarbani Roy
:
XMSN: An efficient cross-layer protocol for mixed wireless sensor networks. - V. S. Lakshmi
, P. P. Deepthi:
A secure regenerating code-based cloud storage with efficient integrity verification. - Vishal Kumar Arora
, Vishal Sharma
, Monika Sachdeva
:
A distributed, multi-hop, adaptive, tree-based energy-balanced routing approach. - Prasannavenkatesan Theerthagiri
, Menakadevi Thangavelu
:
Futuristic speed prediction using auto-regression and neural networks for mobile ad hoc networks. - Nargis Bibi
, Muhammad Nazeer
, Barry M. G. Cheetham:
Investigation of the distortion factor for Bussgang noise cancellation iterative receivers.
Volume 32, Number 10, July 2019
- Xu Lu
, Yujing Zhang, Jun Liu, Fei Yuan, Lianglun Cheng:
Mobile target tracking algorithm for wireless camera sensor networks with adjustable monitoring direction of nodes. - Lingling Zhang
, Jianhui Lv
:
Intelligent Information-Centric Networking routing scheme under imprecise information. - Shoukath Ali K
, Sampath Palaniswami:
Particle swarm optimization-based power allocation for Alamouti amplify and forward relaying protocol. - Tariq Benahmed
, Khelifa Benahmed:
Optimal barrier coverage for critical area surveillance using wireless sensor networks. - Nídia G. S. Campos
, Atslands Rego da Rocha
, Danielo Goncalves Gomes
:
Towards a better sensor data accuracy via quality of monitoring and semantic clustering. - Pilar Manzanares-Lopez
, Juan Pedro Muñoz-Gea
, Josemaria Malgosa-Sanahuja
, Adrián Flores De La Cruz
:
A virtualized infrastructure to offer network mapping functionality in SDN networks. - Hongjun Xu
, Narushan Pillay
:
Golden codeword-based modulation schemes for single-input multiple-output systems. - Sampa Sahoo
, Bibhudatta Sahoo
, Ashok Kumar Turuk:
An eigenvalue-based edge infrastructure for cloud-based CDN. - Rasha M. Al-Makhlasawy
, Alaa A. Hefnawy, Mustafa M. Abd-Elnaby, Fathi E. Abd El-Samie:
Blind coding classification in the presence of interference in MIMO systems using ML algorithm.
- Retraction Statement: Search me if you can: Multiple mix zones with location privacy protection for mapping services.
Volume 32, Number 11, July 2019
- Rajiv Senapati
, Hemanta Kumar Pati
:
VoLTE cell capacity estimation using AMR-WB codecs and considering VAF, SID, packet bundling, and TTI bundling. - Hugerles S. Silva
, Marcelo S. Alencar
, Wamberto J. L. Queiroz
, Danilo Brito Teixeira de Almeida, Francisco Madeiro
:
Bit error probability of the M-QAM scheme under η-μ fading and impulsive noise in a communication system using spatial diversity. - Mojtaba Simruni
, Shahrokh Jam:
Radiation performance improvement of wideband microstrip antenna array using wideband AMC structure. - P. M. Shemi
, M. G. Jibukumar, M. A. Ali:
Nelder-Mead-based power optimization for secrecy enhancement in amplify-and-forward cooperative relay networks. - Hongfeng Zhu
:
A simplified deniable authentication scheme in cloud-based pay-TV system with privacy protection. - Bülent Bilgehan
, Amr Abdelbari
:
Fast detection and DOA estimation of the unknown wideband signal sources. - Hemanta Kumar Sahu
, Pravas R. Sahu:
Quadrature space shift keying performance with dual-hop AF relay over mixed fading. - Ibrahim Beram Jasim
, Oguz Bayat, Osman N. Uçan:
Concatenation of polar codes with three-dimensional parity check (3D-PC) codes to improve error performance over fading channels. - Sid Ahmed Hichame Belkhira
, Sofiane Boukli Hacene
, Pascal Lorenz
, Mohamed Belkheir
, Marc Gilg
, Merahi Bouziani:
WRE-OLSR, a new scheme for enhancing the lifetime within ad hoc and wireless sensor networks. - Suchi Kumari
, Anurag Singh
:
Fair end-to-end window-based congestion control in time-varying data communication networks. - Mahmoud Atashbar
, Vahideh Vahidinia:
CPM modulation index estimation using LS and BLUE methods.
Volume 32, Number 12, August 2019
- Alejandro Canovas
, Miran Taha
, Jaime Lloret
, Jesús Tomás:
A cognitive network management system to improve QoE in stereoscopic IPTV service. - Hoang Thi Huong Giang
, Tran Nhut Khai Hoan, Pham-Duy Thanh
, Insoo Koo
:
A POMDP-based long-term transmission rate maximization for cognitive radio networks with wireless-powered ambient backscatter. - Arezou Ostad-Sharif
, Morteza Nikooghadam
, Dariush Abbasinezhad-Mood
:
Design of a lightweight and anonymous authenticated key agreement protocol for wireless body area networks. - Sundaravanan Jothiprakasam
, Chandrasekaran Muthial:
A lifetime enhancement protocol in cluster-based wireless sensor networks with guaranteed delay. - Jiasheng Cao
, Jinghan Wang:
Stock price forecasting model based on modified convolution neural network and financial time series analysis. - Mehmet Bilim
, Nuri Kapucu:
On the analysis of achievable rate for NOMA networks with cooperative users over κ-μ shadowed fading channels. - Djima Kassegne
, Simranjit Singh
, S. Sanoussi Ouro-Djobo, Barerem-Melgueba Mao:
Influence of nonlinear effects on 6.4 Tb/s dual polarization quadrature phase shift keying modulated dense wavelength division multiplexed system. - Fatemeh Zadehparizi
, Shahrokh Jam
:
An improved teaching-learning-based optimization for design of frequency reconfigurable antennas. - Farideh Ghasemi, Ali Rezaee
, Amir Masoud Rahmani
:
Structural and behavioral reference model for IoT-based elderly health-care systems in smart home. - Chalee Thammarat
, Werasak Kurutach
:
A lightweight and secure NFC-base mobile payment protocol ensuring fair exchange based on a hybrid encryption algorithm with formal verification. - K. P. Vijayakumar
, P. Ganeshkumar:
Jamming detection approach based on fuzzy assisted multicriteria decision-making system for wireless sensor networks. - Rasool Esmaeilyfard
, Faramarz Hendessi, Mohammad Hossein Manshaei, Jens Grossklags:
A game-theoretic model for users' participation in ephemeral social vehicular networks. - Jitendra Bhatia
, Yash Modi
, Sudeep Tanwar
, Madhuri Bhavsar
:
Software defined vehicular networks: A comprehensive review. - Nitin Khanna
, Monika Sachdeva
:
Study of trust-based mechanism and its component model in MANET: Current research state, issues, and future recommendation. - Rejab Hajlaoui
, Eesa Alsolami, Tarek Moulahi
, Hervé Guyennet:
An adjusted K-medoids clustering algorithm for effective stability in vehicular ad hoc networks. - Ali Mohammad Khodadoust
, Javad Khodadoust
, Azeem Irshad
, Shehzad Ashraf Chaudhry
:
Performance analysis of secure communications over correlated slow-fading additive white Gaussian noise channels. - Liting Lei
, Wenfang Zhang, Yu Wang, Xiaomin Wang:
A pairing-free identity-based handover AKE protocol with anonymity in the heterogeneous wireless networks. - Ahmed M. Benaya, Maha Elsabrouty:
Opportunistic interference alignment for three-tier partially connected heterogeneous networks.
Volume 32, Number 13, September 2019
- Syed Adeel Ali Shah
, Ejaz Ahmed, Muhammad Ahsan Qureshi, Sadeeq Jan, Rafidah Md Noor
:
An effective back-off selection technique for reliable beacon reception in VANETs. - Mohammed Jouhari
, Khalil Ibrahimi
, Hamidou Tembine
, Mohammed Benattou
, Jalel Ben-Othman
:
Signaling game approach to improve the MAC protocol in the underwater wireless sensor networks. - Aswathi V.
, Anchare V. Babu
:
Performance analysis of nonorthogonal multiple access-based underlay cognitive relay network. - Md Yeakub Hassan, Faisal Hussain, Md. Sakhawat Hossen
, Salimur Choudhury
:
An online resource allocation algorithm to minimize system interference for inband underlay D2D communications. - Mian Muhammad Mubasher
, Syed Waqar Jaffry
, Muhammad Murtaza Yousaf
, Imran Sarwar Bajwa
, Shahzad Sarwar
, Laeeq Aslam
:
A smart integrated environment for vehicular traffic simulation. - Maryam Najimi
:
Energy harvesting, cooperative spectrum sensing, and data transmission improvement in energy-efficient multichannel cognitive sensor networks. - Asma Ben Letaifa
:
WBQoEMS: Web browsing QoE monitoring system based on prediction algorithms. - Manisha Adiwal
, Niraj Pratap Singh:
RAT selection for a low battery mobile device for future 5G networks. - Yanli Li, Xiaonan Wang
:
A novel and efficient address configuration for MANET. - Zahraa Abdel Hamid
, Emad S. Hassan
, Abd-El Halim Zekry
, Salah S. Elagooz, Moataz Shoukry Samir, Fathi E. Abd El-Samie:
Effects of imperfect channel sensing and estimation on the performance of cognitive radio systems. - Mehtab Afzal
, Nadir Shah
, Tufail Muhammad:
Web video classification with visual and contextual semantics. - Jyoti Bhola
, Surender Kumar Soni, Jagadeesh Kakarla:
A scalable and energy-efficient MAC protocol for sensor and actor networks. - Ardiansyah Musa Efendi
, I Gde Dharma Nugraha
, Hyojeong Han, Deokjai Choi, Seongho Seo, Juseok Kim:
A decision tree-based NLOS detection method for the UWB indoor location tracking accuracy improvement. - Puspraj Singh Chauhan
, Vidhi Rana, Sandeep Kumar
, Sanjay Kumar Soni
, Diwaker Pant
:
Performance analysis of wireless communication system over nonidentical cascaded generalised gamma fading channels. - Anbalagan Karthikeyan, Venkatasubramanian Srividhya
, Souvik Kundu
:
Guided joint spectrum sensing and resource allocation using a novel random walk grey wolf optimization for frequency hopping cognitive radio networks. - Laszlo Gyongyosi
, Sándor Imre
:
Diversity space of multicarrier continuous-variable quantum key distribution. - Wamolambo Lucky Ramasila
, Hongjun Xu
:
Improved error performance of a 3/4-Sezginer space-time block codes. - R. Baby Shalini
, S. Lenty Stuwart
:
Power domain cyclic spread multiple access: An interference-resistant mixed NOMA strategy. - Luiz Oliveira, Joel J. P. C. Rodrigues
, Sergei A. Kozlov, Ricardo A. L. Rabêlo, Vasco Furtado:
Performance assessment of long-range and Sigfox protocols with mobility support. - Fatemeh Faraji Daneshgar, Maghsoud Abbaspour
:
On the resilience of P2P botnet footprints in the presence of legitimate P2P traffic.
Volume 32, Number 14, September 2019
- Dinh-Thuan Do
, Chi-Bao Le
:
Impact of fixed power allocation in wireless energy harvesting NOMA networks. - Azeem Irshad
, Shehzad Ashraf Chaudhry
, Muhammad Shafiq
, Muhammad Usman
, Muhammad Asif
, Anwar Ghani
:
A provable and secure mobile user authentication scheme for mobile cloud computing services. - Hurmat Ali Shah
, Insoo Koo
:
Improving physical layer security via cooperative diversity in energy-constrained cognitive radio networks with multiple eavesdroppers. - Nasim Donyagard Vahed, Mostafa Ghobaei-Arani
, Alireza Souri
:
Multiobjective virtual machine placement mechanisms using nature-inspired metaheuristic algorithms in cloud environments: A comprehensive review. - V. M. Vishnu
, P. Manjunath:
SeC-SDWSN: Secure cluster-based SDWSN environment for QoS guaranteed routing in three-tier architecture. - Xiaoping Yang, Mengjie Li
, Ping Wang
, Yunfeng Hu:
An adaptive-aware energy and queue improvement of AOMDV. - Oran Sharon
, Yaron Alpert:
Advanced IEEE 802.11ax TCP aware scheduling under unreliable channels. - Nenad Dragun
, Nikola Bogunovic:
Extending a communication service provider's operations management based on knowledge granules and aspects derived from imperfect information. - Behnaz Mohammadi, Nima Jafari Navimipour
:
Data replication mechanisms in the peer-to-peer networks. - Ying-Dar Lin, Te-Lung Liu
, Shun-Hsien Wang, Yuan-Cheng Lai:
Proactive multipath routing with a predictive mechanism in software-defined networks. - Rajesh Gupta
, Sudeep Tanwar
, Sudhanshu Tyagi
, Neeraj Kumar
:
Tactile internet and its applications in 5G era: A comprehensive review. - Ai Sun
, Yueh-Min Huang:
A traffic balance scheme of group emotion recognition by using the service function chain. - Arshad Iqbal
, Yunmin Kim, Tae-Jin Lee
:
Learning AP in wireless powered communication networks. - Yu Guo
, Zhenqiang Mi
, Yang Yang, Jiangbao Yan, Mohammad S. Obaidat:
An energy sensitive system framework for cloud robotic network. - Necmi Taspinar, Sakir Simsir
:
Dual symbol optimization-based partial transmit sequence technique for PAPR reduction in WOLA-OFDM waveform. - Qi Shao, Yujing Zhao, Yuanyuan Chen, Chaoqin Gan
:
High-reliability grid architecture supporting discretionary and efficient communication between ONUs in metro-access optical network. - Milad HajMirzaei
:
Novel tag estimation method by use of Manchester coding in RFID systems. - Ke Li
, Pingzhi Fan:
A generalized service deployment framework for OSPF networks using multi-topology routing: Modeling and methodology. - Muhammad Ahmad, Asim Ali Khan
, Muhammad Amin, Hafiz M. Asif
, Sobia Baig
:
Ground plane impact on quadrifilar helix antenna performance with respect to deployment heights. - Zouhair Al-qudah
, Ahmed Musa:
On the capacity of the state-dependent interference relay channel. - Shu-Ming Tseng
, Wen-Da Tsai, Hao-Sheng Suo:
Cross-layer 1 and 5 user grouping/power allocation/subcarrier allocations for downlink OFDMA/NOMA video communications. - Mohammad Sadegh Aslanpour
, Mostafa Ghobaei-Arani
, Morteza Heydari, Nader Mahmoudi:
LARPA: A learning automata-based resource provisioning approach for massively multiplayer online games in cloud environments. - Gaolei Fei
, Tianbo Li, Guangmin Hu:
Time-varying network link loss rate tracking from unicast end-to-end measurements. - Dan Tao
, Pengchen Ma, Mohammad S. Obaidat:
Anonymous identity authentication mechanism for hybrid architecture in mobile crowd sensing networks. - Igor Moreira
, Cecilio Pimentel
:
Markov modeling of discrete fading channels using birth-death channels.
Volume 32, Number 15, October 2019
- Teklu Merhawit Berhane, Wei-Xiao Meng
, Cheng Li, Lei Chen:
Spectral efficiency evaluation of full-duplex mode of communications based on SLNR approach. - Mohammad Wazid, Poonam Reshma Dsouza, Ashok Kumar Das
, Vivekananda Bhat K.
, Neeraj Kumar
, Joel J. P. C. Rodrigues
:
RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment. - Wassim Fassi Fihri
, Hassan El Ghazi, Badr Abou El Majd, Faissal El Bouanani
:
A decision-making approach for detecting the primary user emulation attack in cognitive radio networks. - Sadanand Yadav, Vinay Kumar
:
Energy-efficient design of 3D UWSNs leveraging compressive sensing and principal component analysis: A communication techniques perspective. - Imran Ashraf
, Soojung Hur, Muhammad Shafiq
, Saru Kumari
, Yongwan Park:
GUIDE: Smartphone sensors-based pedestrian indoor localization with heterogeneous devices. - Osman Gokhan Uyan, Vehbi Cagri Gungor
:
QoS-aware LTE-A downlink scheduling algorithm: A case study on edge users. - Ilija Basicevic
, Stanislav Ocovaj:
Application of entropy formulas in detection of denial-of-service attacks. - Jianhong Zhang
, Zhengtao Jiang:
Identity-and-data privacy forward security public auditing protocol in the standard model. - Deepnarayan Tiwari
, Gayatri K. Chaturvedi, G. R. Gangadharan
:
ACDAS: Authenticated controlled data access and sharing scheme for cloud storage. - Saleem Raza
, Muhammad Faheem
, Mesut Günes
:
Industrial wireless sensor and actuator networks in industry 4.0: Exploring requirements, protocols, and challenges - A MAC survey. - Parwinder Kaur Dhillon
, Sheetal Kalra
:
A secure multifactor remote user authentication scheme for Internet of Multimedia Things environment. - Lian Pan, Hanwu Wang
, Weijia Jia:
A distributed Newton algorithm for network utility maximization in wireless ad hoc networks. - Pankaj Pal
, Sachin Tripathi, Chiranjeev Kumar
:
Bandwidth estimation in high mobility scenarios of IEEE 802.11 infrastructure-less mobile ad hoc networks. - Carlos Figuera, Eduardo Morgado
, Esteban Municio
, Javier Simó-Reigadas
:
A low complexity mechanism for congestion notification in rural IPSec-enabled heterogeneous backhaul networks. - Arijit Datta
, Manish Mandloi
, Vimal Bhatia
:
Reliability feedback-aided low-complexity detection in uplink massive MIMO systems. - Shang-Juh Kao, Kuo-Chan Hsiao, Fu-Min Chang
:
Radio resource allocation using genetic algorithm in heterogeneous networks. - Xiaolong Li
, Jianrong Wang, Ningning Zhu, Zhu Jin, Wei Zheng:
A switch-controlled multimode narrowband receiver RF front-end. - Farzana Noor, Ahthasham Sajid
, Syed Bilal Hussain Shah, Mehwish Zaman, Mehdi Gheisari
, Vinayagam Mariappan:
Bayesian estimation and prediction for Burr-Rayleigh mixture model using censored data. - Phidahunlang Chyne
, Debdatta Kandar
:
LTE-DSRC hybrid vehicular communication system using DFT-spread OFDM in uplink. - Emad Aqeeli
, Hashim A. Hashim
, Anwar Haque
, Abdallah Shami
:
Optimal location management in LTE networks using evolutionary techniques. - Iman Al-Kindi, Dawood Al-Abri
, Ahmed Al-Maashri, Fahad Bait Shiginah:
Analysis of malware propagation behavior in Social Internet of Things. - Shao-I Chu
, Bing-Hong Liu, Ngoc-Tu Nguyen
:
Secure AF relaying with efficient partial relay selection scheme. - Hua Zhao
, Sheng Wang, Lemin Li:
A directly seeking spectrum holes algorithm by compressive sampling. - Sanika K. Wijayasekara
, Suvit Nakpeerayuth, Robithoh Annur, Hung-Yun Hsieh, Teerapat Sanguankotchakorn, Kumbesan Sandrasegaran, Warakorn Srichavengsup, Tharathorn Phromsa-ard, Lunchakorn Wuttisittikulkij:
A fast tag identification anti-collision algorithm for RFID systems. - Fereshte Dehghani
, Naser Movahhedinia
:
Energy-delay-aware caching strategy in green CCN using markov approximation. - Dinh-Thuan Do
, Minh-Sang Van Nguyen
, Thi-Anh Hoang:
Exploiting secure performance in power domain-based multiple access: Impacts of relay link/direct link and secure analysis. - Rajeev Kumar
, Dilip Kumar
, Dinesh Kumar
:
Performance enhancement of traffic information gathering (PEnTInG) algorithm for vehicular ad-hoc networks. - Kalaiselvi Kaliannan
, G. R. Suresh
, V. Ravi:
An efficient approach for the detection of link failures in WBAN system for health care applications. - Roohallah Alizadeh
:
A pessimistic method in web service composition by view on execution states. - Sanjeev Patel
:
Comparative analysis of cumulative distribution function for TCP congestion window size and triple-duplicate period.
Volume 32, Number 16, November 2019
- Mohamed El-Mahallawy
, Adly S. Tag Eldien:
Performance enhancement of UWA-OFDM communication systems based on FWHT. - Tao Yu, Hongyan Cui, Yilong Nian, Yuchen Hong
, Jilong Wang, Honggang Zhang:
Behavior predictability and consistency of mobile users' traffic usage between different years based on entropy theory. - Diwaker Pant
, Puspraj Singh Chauhan
, Sanjay Kumar Soni
:
Error probability and channel capacity analysis of wireless system over inverse gamma shadowed fading channel with selection diversity. - China Venkaiah Vadlamudi
, Sesha Phani Deepika Vadlamudi:
A novel self-healing key distribution scheme based on vector space access structure and MDS codes. - Martin Jacobsson
, Christian Rohner:
Link quality estimation for arbitrary packet sizes over wireless links using packet reception events. - Muhammad Tahir
, Piao Yan
, Mohsin Raza Jafri
:
Nonlinear least square approach for range estimation based on attenuation of EM waves in seawater using world ocean data from 1955 to 2012. - Dolly Sharma
, Rabinder Singh, Himanshu Katiyar:
SLLR-MDIC: Spatial log-likelihood multiuser detection and interference cancelation scheme for OFDM-IDMA. - Satish R. Jondhale
, Rajkumar S. Deshpande
:
Efficient localization of target in large scale farmland using generalized regression neural network. - Nitin Kumar Jain
, Dharmendra Singh Yadav
, Ajay Verma
:
A fuzzy decision scheme for relay selection in cooperative wireless sensor network. - Vikas Goel
, Deepali Gautam, Amit Gupta, Sachin Kumar
:
An improvised indexing technique for XML data over multiple channels in wireless environment: (1, Xm) method. - Wenxiang Zhu, Pingping Xu, Huilin Jiang, Ying He:
A resource allocation and cell association algorithm for energy efficiency in HetNets. - Ankit Soni
, Raksha Upadhyay
, Abhay Kumar
:
Performance improvement of wireless secret key generation with colored noise for IoT. - Mohammad Reza Mesbahi
, Amir Masoud Rahmani
, Mehdi Hosseinzadeh
:
Dependability analysis for characterizing Google cluster reliability. - Yao-Chun Wang
, Ying-Dar Lin:
Circuit-based logical layer 2 bridging in software-defined data center networking. - Noureddine Moussa
, Abdelbaki El Belrhiti El Alaoui
:
A cluster-based fault-tolerant routing protocol for wireless sensor networks. - Khalid Mahmood
, Jehangir Arshad
, Shehzad Ashraf Chaudhry
, Saru Kumari
:
An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure. - Santoshinee Mohapatra
, Pabitra Mohan Khilar
, Rakesh Ranjan Swain
:
Fault diagnosis in wireless sensor network using clonal selection principle and probabilistic neural network approach. - Anwar Ghani
, Khwaja Mansoor, Shahid Mehmood, Shehzad Ashraf Chaudhry
, Arif Ur Rahman
, Malik Najmus Saqib
:
Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key. - Mahsa Nazemi Gelian, Hoda Mashayekhi
, Yoosof Mashayekhi
:
A self-learning stream classifier for flow-based botnet detection. - Asmaa Ibrahim
, Tawfik Ismail
, Khaled El-Sayed, M. Saeed Darweesh
:
Odd clipping optical orthogonal frequency division multiplexing for VLC system.
Volume 32, Number 17, November 2019
Editorial
- Nadir Shah
, Paolo Giaccone
, Danda B. Rawat
, Ammar Rayes, Nan Zhao:
Solutions for adopting software defined network in practice.
- Mohammed Al-Hubaishi
, Celal Çeken
, Ali Burhan Al-Shaikhli:
A novel energy-aware routing mechanism for SDN-enabled WSAN. - Ajay Nehra, Meenakshi Tripathi
, Manoj Singh Gaur, Ramesh Babu Battula
, Chhagan Lal
:
TILAK: A token-based prevention approach for topology discovery threats in SDN. - Ahmed Alioua
, Sidi-Mohammed Senouci
, Hichem Sedjelmaci, Samira Moussaoui:
Incentive edge caching in software-defined internet of vehicles: A Stackelberg game approach. - Souhir Feki
, Ahlem Masmoudi, Aymen Belghith
, Faouzi Zarai
, Mohammad S. Obaidat:
Swarm intelligence-based radio resource management for V2V-based D2D communication. - Amina Gharsallah
, Faouzi Zarai
, Mahmoud Neji:
SDN/NFV-based handover management approach for ultradense 5G mobile networks. - Hatim Gasmelseed
, Ramalakshmi Ramar
:
Traffic pattern-based load-balancing algorithm in software-defined network using distributed controllers. - Chun-Chao Yeh
, Jun-Wei Qiu, Shi-Jia Chang:
SEAL2: An SDN-enabled all-Layer2 packet forwarding network architecture for multitenant datacenter networks. - Gabriele Castellano, Ivano Cerrato, Molka Gharbaoui
, Silvia Fichera
, Barbara Martini, Fulvio Risso
, Piero Castoldi:
A model-based abstraction layer for heterogeneous SDN applications. - Reza Mohammadi
, Mauro Conti, Chhagan Lal
, Satish C. Kulhari:
SYN-Guard: An effective counter for SYN flooding attack in software-defined networking. - Rodrygo Torres Cordova
, Paulo R. L. Gondim
, Yarisley Peña Llerena
, Jaime Lloret
:
SDN-DMM for intelligent mobility management in heterogeneous mobile IP networks.
- Senthil Prabakaran
, Ramalakshmi Ramar
:
Stateful firewall-enabled software-defined network with distributed controllers: A network performance study.
Volume 32, Number 18, December 2019
- JinWoo Yoo, JaeWook Shin, PooGyeon Park:
Cover Image.
- Rahim Khan, Muhammad Zakarya
, Zhiyuan Tan, Muhammad Usman
, Mian Ahmad Jan
, Mukhtaj Khan:
PFARS: Enhancing throughput and lifetime of heterogeneous WSNs through power-aware fusion, aggregation, and routing scheme. - Salman A. AlQahtani
:
Performance evaluation of a priority-based resource allocation scheme for multiclass services in IoT. - Laszlo Gyongyosi
, Sándor Imre
:
Secret key rates of free-space optical continuous-variable quantum key distribution. - Seyyed Naser Seyyed Hashemi
, Ali Bohlooli
:
Analytical characterization of cache replacement policy impact on content delivery time in information-centric networks. - Saumya Das
, Tanushree Bose
, Hashinur Islam
:
Design and acceptance test of compact planar monopole antenna for LTE smartphone considering SAR, TRP, and HAC values. - Omar Sami Oubbati
, Mohammad Mozaffari
, Noureddine Chaib, Pascal Lorenz
, Mohammed Atiquzzaman
, Abbas Jamalipour:
ECaD: Energy-efficient routing in flying ad hoc networks. - Majid Shakhsi Dastgahian
, Mohammad Naseri Tehrani:
Frequency selective millimeter-wave channel estimation based on subspace enhancement algorithms. - Victor Croisfelt Rodrigues
, José Carlos Marinello Filho
, Taufik Abrão
:
Randomized Kaczmarz algorithm for massive MIMO systems with channel estimation and spatial correlation. - Ahmed Moumena
:
Quickest physical-layer MGD anomaly detection for jamming attacks in centralized modulated wideband converter-based ROC curve. - Mingzhe Li
, Xiaojiang Li, Shen Wang:
A bias-reduced solution for target localization with illuminator of opportunity passive radar. - Supriya Aggarwal
:
Closed-form solutions to SEP integrals over generalized fading distributions η-μ and κ-μ using approximate computing. - Manar Mohaisen
:
Constellation design and performance analysis of the parallel spatial modulation. - Sathian. D
:
ABC algorithm-based trustworthy energy-efficient MIMO routing protocol. - JinWoo Yoo
, JaeWook Shin
, PooGyeon Park
:
A bias-compensated proportionate NLMS algorithm with noisy input signals.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.