![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Telecommunication Systems, Volume 81
Volume 81, Number 1, September 2022
- Huaying Yin, Hongmei Yang
, Saeid Shahmoradi:
EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks. 1-19 - Huaying Yin, Hongmei Yang
, Saeid Shahmoradi:
Correction to: EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks. 21 - Pooja Chaudhary
, Brij B. Gupta
, Awadhesh Kumar Singh:
Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks. 23-39 - Ming Lei
, Bin Yu, Xingjun Zhang, Scott Fowler
, Bocheng Yu, Peng Wang:
Joint power control and user scheduling for backbone-assisted industrial wireless networks with successive interference cancellation. 41-52 - Fatemeh Zardosht, Mostafa Derakhtian
, Ali Jamshidi, Hossein Eshaghi:
Recognition and elimination of SSDF attackers in cognitive radio networks. 53-66 - Maryam Chinipardaz
, Seyed Majid Noorhosseini, Ahmad Sarlak:
Inter-cell interference in multi-tier heterogeneous cellular networks: modeling and constraints. 67-81 - Akber Ali Khan, Vinod Kumar
, Jangirala Srinivas, Saru Kumari, Mridul Kumar Gupta
:
RAKS: robust authentication and key agreement scheme for satellite infrastructure. 83-98 - Dengao Li, Yongxin Wen, Shuang Xu, Qiang Wang, Ruiqin Bai, Jumin Zhao
:
EDChannel: channel prediction of backscatter communication network based on encoder-decoder. 99-114 - Ming Zhao, Zhipeng Liu, Ling Zhao:
Finite field construction for quasi-cyclic LDPC convolutional codes with cyclic 2-D MDS codes. 115-123 - Palak Bagga, Ashok Kumar Das
, Vinay Chamola, Mohsen Guizani:
Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions. 125-173
Volume 81, Number 2, October 2022
- Jiabei He, Xuchong Liu, Fan Wu, Chaoyang Chen, Xiong Li
:
A mutual authentication scheme in VANET providing vehicular anonymity and tracking. 175-190 - Qikun Zhang, Liang Zhu, Kunyuan Zhao, Yimeng Wu, Baohua Jin, Jianyong Li
, Yinghui Meng, Sikang Hu
:
Dynamic permission access control model based on privacy protection. 191-205 - Xiaohu Huang, Dezhi Han, Tien-Hsiung Weng, Zhongdai Wu, Bing Han, Junxiang Wang, Mingming Cui, Kuan-Ching Li
:
A localization algorithm for DV-Hop wireless sensor networks based on manhattan distance. 207-224 - Afsaneh Allahvirdi, Saleh Yousefi, Asghar Asgharian-Sardroud
:
Placement of dynamic service function chains in partially VNF-enabled networks. 225-240 - Muhammad Usman Younus
, Rabia Shafi, Sultan S. Alshamrani:
A model for a practical evaluation of a DASH-based rate adaptive algorithm over HTTP. 241-251 - Fabio Cocchi da Silva Eiras
, Wagner L. Zucchi:
Measuring synchronization precision in mobile sensor networks. 253-267 - Haidar Taki
, Chadi Abou-Rjeily:
Spectrally efficient IR-UWB pulse designs based on linear combinations of Gaussian Derivatives. 269-288 - Mingxin Liu, Wei Xue, Jincheng Gao, Yidong Xu
, Peisong Jia, Wenjian Chen:
Optimized baseband Nyquist pulse-based PAPR reduction method for SEFDM systems. 289-306 - Jianbin Xue, Junpeng Li
, Qingchun Hu:
Joint downlink user power allocation and rate maximization in UAV relay assisted SWIPT-NOMA network. 307-321 - Rana Sedghi, Masoumeh Azghani
:
Interference suppression in heterogeneous massive MIMO systems with imperfect CSI. 323-332
Volume 81, Number 3, November 2022
- Weimin Kang
:
A novel shaping pulse in faster-than-Nyquist system. 333-340 - Daniel Kariuki Waweru
, Fengfan Yang, Chunli Zhao, Lawrence Muthama Paul, Hongjun Xu:
Design of optimized distributed Goppa codes and joint decoding at the destination. 341-355 - Abdullah Ali Bahattab
:
Designing ROACM routing protocol along with bandwidth allocation using seagull optimization for ad hoc wireless network. 357-372 - Vivek Sethi
, Sujata Pal
, Avani Vyas
, Shweta Jain, Kshirasagar Naik:
Energy-and-delay-aware scheduling and load balancing in vehicular fog networks. 373-387 - Rupayan Das
, Dinesh Dash
, Chandra Bhushan Kumar Yadav
:
An efficient charging scheme using battery constrained mobile charger in wireless rechargeable sensor networks. 389-415 - Tasnuva Mahjabin, Yang Xiao
, Tieshan Li
, Mohsen Guizani:
Hotlist and stale content update mitigation in local databases for DNS flooding attacks. 417-430 - Maryam Najimi
:
Altitude and power optimization for vertical heterogeneous networks. 431-439 - S. Jeevanantham
, Rebekka B.
:
Energy-aware neuro-fuzzy routing model for WSN based-IoT. 441-459 - Ke Zhang, Guang Zhang, Xiuwu Yu
, Shaohua Hu, Youcui Yuan:
WSNs node localization algorithm based on multi-hop distance vector and error correction. 461-474 - Ramin Mohammadi, Sedat Akleylek, Ali Ghaffari
, Alireza Shirmarz
:
Taxonomy of traffic engineering mechanisms in software-defined networks: a survey. 475-502
Volume 81, Number 4, December 2022
- Yongbo Sui
, Hui Gao:
Adaptive echo state network based-channel prediction algorithm for the internet of things based on the IEEE 802.11ah standard. 503-526 - Yanzhi Hu
, Tian Tian, Fengbin Zhang, Shiwei Zhang:
Improving inadequate coverage of an unmanned aerial vehicle base station: mobility strategies and delay-tolerant service requests. 527-537 - Jesus Cruz-Garza
, Alberto Reyna, Luz Idalia Balderas
, Marco A. Panduro, Lourdes Y. García:
Dual-band virtual antenna array with time modulation in presence of position perturbations. 539-547 - Gelaye Geresu Gaytare, Ayodeji Olalekan Salau
, Berhan Oumer Adame:
Interference mitigation technique for self optimizing Picocell indoor LTE-A networks. 549-560 - Weijia Lei, Mengting Zou
, Weihan Zhang, Yue Zhang, Hongjiang Lei
:
Optimization of pre-equalized time reversal security transmission systems assisted with artificial noise. 561-573 - Armin Farhadi Zavleh, Hamidreza Bakhshi
:
Downlink resource allocation to total system transmit power minimization in SCMA-based systems for cloud-RAN in 5G networks. 575-590 - Noor S. Baqer, Ahmed Shihab Albahri
, Hussein A. Mohammed, A. A. Zaidan
, Rula A. Amjed, Abbas M. Al-Bakry, Osamah Shihab Albahri, Hassan A. AlSattar
, Alhamzah Alnoor, Abdullah Hussein Alamoodi, B. B. Zaidan, Rami Qays Malik, Zahraa Hashim Kareem:
Indoor air quality pollutants predicting approach using unified labelling process-based multi-criteria decision making and machine learning techniques. 591-613 - Sadegh Mohammadvaliei, Mohammadali Sebghati
, Hassan Zareian:
Adaptive modulation and coding using deep recurrent neural network. 615-623 - Angshuman Khan
, Rupayan Das
:
Security aspects of device-to-device (D2D) networks in wireless communication: a comprehensive survey. 625-642 - Tae-Yeun Kim, A. K. Singh, Hoon Ko:
Retraction Note to: Modeling for small cell networks in 5G communication environment. 643 - (Withdrawn) Retraction Note to: Performance analysis of power series based gamma-gamma fading M-ary PSK MIMO/FSO link with atmospheric turbulence and pointing errors. 645
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.