


default search action
EURASIP Journal on Wireless Communications and Networking, Volume 2023
Volume 2023, Number 1, December 2023
- Chunli Zhao

, Fengfan Yang, Waheed Ullah, Pengcheng Guo:
Jointly optimized design of distributed RS-coded spatial modulation by appropriate selection at the relay. 1 - Retraction Note: Research on personal credit evaluation of internet finance based on blockchain and decision tree algorithm. 2

- Retraction Note: Practical application of wireless communication network multimedia courseware in college basketball teaching. 3

- Retraction Note: Research on English teaching system based on artificial intelligence and WBIETS wireless network system. 4

- Retraction Note: Evaluation of the value of basketball players based on wireless network and improved Bayesian algorithm. 5

- Retraction Note: The construction of hierarchical network model and wireless activation diffusion optimization model in English teaching. 6

- Retraction Note: Parameter estimation of network signal normal distribution applied to carbonization depth in wireless networks. 7

- Retraction Note: Application research of perception data fusion system of agricultural product supply chain based on Internet of things. 8

- Umar Ajaib Khan

, Rong Chai, Shabeer Ahmad, Waleed Almughalles:
Joint computation offloading and resource allocation strategy for D2D-assisted and NOMA-empowered MEC systems. 9 - Retraction Note: Research on intelligent medical big data system based on Hadoop and blockchain. 10

- Retraction Note: A smart position optimization scheme for badminton doubles based on human-computer interactive training in wireless sensor networks. 11

- Retraction Note: The effect of foreign direct investment based on wireless network technology on China's regional economic growth. 12

- Yongxin Huang, Xuejun Sha, Xiaojie Fang

, Ge Song:
Secure spatial modulation based on two-dimensional generalized weighted fractional Fourier transform encryption. 13 - Retraction Note: Research on the construction of regional electronic commerce large data analysis platform. 14

- Retraction Note: Data cleansing method of talent management data in wireless sensor network based on data mining technology. 15

- Retraction Note: The sustainable development information management of Winter Olympics based on Internet-based wireless sensor network. 16

- Retraction Note: Research on the perfection of the countermeasures of the judicial execution scheme in the administrative law system based on annealing algorithm. 17

- Retraction Note: An empirical study on the relationship between China's financial development and economic growth based on sensor technology. 18

- Retraction Note: Investigation of the evaluation system of SMEs' industrial cluster management performance based on wireless network development. 19

- Retraction Note: P2P net loan default risk based on Spark and complex network analysis based on wireless network element data environment. 20

- Guanghua He, Yahui Xu, Jinlong Qi, Jun Xu, Ke Sun:

Study on optimization of communication network for multi-unmanned aerial vehicles. 21 - Mohammad Abdul Matin, Sotirios K. Goudos, Shaohua Wan, Panagiotis G. Sarigiannidis, Emmanouil M. Tentzeris:

Artificial intelligence (AI) and machine learning (ML) for beyond 5G/6G communications. 22 - Eduard E. Bahingayi

, Kyungchun Lee
:
Joint hybrid-precoding design for MU-MISO systems with a subconnected architecture. 23 - Tianyu Yang, Mahdi Barzegar Khalilsarai, Saeid Haghighatshoar, Giuseppe Caire

:
Structured channel covariance estimation from limited samples for large antenna arrays. 24 - Junwei Yan, Tao Jiang, Liwei Lin

, Zhengyu Wu, Xiucai Ye, Mengke Tian, Yong Wang:
A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing. 25 - Yushuang Zhai, Jilong Li

, Haihong Feng, Feng Hong:
Application research of polar coded OFDM underwater acoustic communications. 26 - Kailash V. Karad

, Vaibhav S. Hendre:
A flower bud-shaped flexible UWB antenna for healthcare applications. 27 - Xun Wang, Hongbin Chen, Shichao Li

:
A reinforcement learning-based sleep scheduling algorithm for compressive data gathering in wireless sensor networks. 28 - Xing Zhang

, Ashutosh Sabharwal:
Analysis of scalable channel estimation in FDD massive MIMO. 29 - Zhonghua Ma

, Jiaxiang Chen, Chen Li, Yanfeng Jiang
:
A monopole broadband circularly polarized antenna with coupled disc and folded microstrip stub lines. 30 - Diego Barragán Guerrero

, Minh Au, Ghyslain Gagnon, François Gagnon, Pascal Giard:
Early-detection scheme based on sequential tests for low-latency communications. 31 - Arthur Louchart

, Ehsan Tohidi, Philippe Ciblat, David Gesbert, Eva Lagunas
, Charly Poulliat:
Some power allocation algorithms for cognitive uplink satellite systems. 32 - Majed Saad

, Ali Chamas Al Ghouwayel, Hussein Hijazi, Faouzi Bader, Jacques Palicot:
In-phase and quadrature filter shape index modulation. 33 - Ying Wei, Lili Bo, Xiaojun Wu, Yue Li, Zhenlei Ye, Xiaobing Sun, Bin Li:

VulRep: vulnerability repair based on inducing commits and fixing commits. 34 - Chonghao Zhao, Gang Wu

:
On potential challenges of V2X sidelink relaying under interference: link-level and system-level simulation with neural network assisted. 35 - Tsu-Yang Wu, Fangfang Kong, Qian Meng, Saru Kumari, Chien-Ming Chen

:
Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture. 36 - Huanqing Cui

, Sen Wang, Chuanai Zhou:
A high-accuracy and low-energy range-free localization algorithm for wireless sensor networks. 37 - Tian Jin

, Fangchi Li, Yafei Tian, Dongmei Liu:
Utilization of non-coherent accumulation for LTE TOA estimation in weak LOS signal environments. 38 - Zhuang Wang, Qun Kong, Bingcai Wei, Liye Zhang

, Aikui Tian:
Radio map construction based on BERT for fingerprint-based indoor positioning system. 39 - Chin-Ling Chen, Haishuai Wang, Abel C. H. Chen

, Chunjia Han, Yu-Chih Wei, Xiaoyan Li:
Machine learning for trust, security, and privacy in computing and communications. 40 - Junghyun An, Zhan Wang

, Inwhee Joe
:
A CNN-based automatic vulnerability detection. 41 - Rui Campos

, Manuel Ricardo
, Ari Pouttu, Luís M. Correia:
Wireless technologies towards 6G. 42 - Xin Tong

, Xu Li, FuZhuang Ding, Ying Liu:
Network consensus analysis and optimization of distributed FANETs based on multi-agent consensus theory. 43 - Chengchen Mao, Qilian Liang

, Chenyun Pan, Ioannis D. Schizas:
A statistical approach for neural network pruning with application to internet of things. 44 - Tiantian Du, Gongyi Xiao, Jing Chen

, ChuanFu Zhang, Hao Sun, Wen Li, Yudong Geng:
A combined priority scheduling method for distributed machine learning. 45 - Xiaolong Yang, Jinglong Cheng, Xinxing Tang, Liangbo Xie:

CSI-based human behavior segmentation and recognition using commodity Wi-Fi. 46 - Rajeev Shukla

, Abhishek Narayan Sarkar, Aniruddha Chandra
, Jan M. Kelner
, Cezary Ziólkowski
, Tomas Mikulasek, Ales Prokes:
A simple ANN-MLP model for estimating 60-GHz PDP inside public and private vehicles. 47 - Robbe Van Rompaey

, Marc Moonen:
Distributed MMSE-based uplink receive combining, downlink transmit precoding and optimal power allocation in cell-free massive MIMO systems. 48 - Md. Motaharul Islam

, Mahmudul Hasan, Zaheed Ahmed Bhuiyan
:
An analytical approach to error detection and correction for onboard nanosatellites. 49 - Wided Ben Daoud, Salwa Othmen, Monia Hamdi, Radhia Khdhir, Habib Hamam:

Fog computing network security based on resources management. 50 - Ali Al Khansa

, Stefan Cerovic, Raphaël Visoz, Yezekael Hayel, Samson Lasaulce:
Dynamic rate and channel use allocation for cooperative wireless networks. 51 - Amiraslan Haghrah

, Mehran Pourmohammad Abdollahi, Hosein Azarhava, Javad Musevi Niya:
A survey on the handover management in 5G-NR cellular networks: aspects, approaches and challenges. 52 - Xinjun Zhang, Guopeng Zhang

, Kezhi Wang, Kun Yang:
Device association and trajectory planning for UAV-assisted MEC in IoT: a matching theory-based approach. 53 - Zijian Liu

, Weilong Ding
, Tao Chen, Maoxiang Sun, Hongmin Cai, Chen Liu:
A electricity theft detection method through contrastive learning in smart grid. 54 - Sara M. M. Abo Hashish

, Rawya Y. Rizk, E. I. Elsedimy:
Trajectory optimization for UAV-assisted relay over 5G networks based on reinforcement learning framework. 55 - Hamdy H. El-Sayed

, Zainab Mostafa Hashem
:
Comparison of the new version of DEEC protocol to extend WSN lifetime. 56 - Hossein Ghavami

, Bahareh Akhbari
:
Secrecy performance analysis of IRS-NOMA systems. 57 - Liangwei Qi

, Jingke Zhang, Zong-Feng Qi, Lu Kong, Yu Tang:
Measurement and evaluation method of radar anti-jamming effectiveness based on principal component analysis and machine learning. 58 - (Withdrawn) A novel energy-efficient scheduling method for three-dimensional heterogeneous wireless sensor networks based on improved memetic algorithm and node cooperation strategy. 59

- Yan Wang

, Huikang Yang, Yuxin Gong:
A positioning algorithm based on improved robust extended Kalman filter with NLOS identification and mitigation. 60 - Amany A. Megahed, Ehab H. Abdelhay

, Mohamed Abdelazim, Heba Y. M. Soliman:
5G millimeter wave wideband MIMO antenna arrays with high isolation. 61 - Yang Gao, Zihan Jiao

, Qiang Wu, Xiaoyuan Dou, Jiancun Fan:
Single-base station hybrid positioning algorithm based on LOS identification. 62 - (Withdrawn) Support attack detection algorithm for recommendation system based on deep learning. 63

- Jiahui Zhang, Zesong Fei, Xinyi Wang

, Peng Liu
, Jingxuan Huang, Zhong Zheng:
Joint resource allocation and user association for multi-cell integrated sensing and communication systems. 64 - Chunhua Zhu, Qinwen Ji, Xinying Guo, Jiankang Zhang:

Mmwave massive MIMO: one joint beam selection combining cuckoo search and ant colony optimization. 65 - Siqi Sun, Yongyu Wang

:
A novel deep learning automatic modulation classifier with fusion of multichannel information using GRU. 66 - Massimo Battaglioni

, Franco Chiaraluce, Marco Baldi, Michele Pacenti, David G. M. Mitchell:
Optimizing quasi-cyclic spatially coupled LDPC codes by eliminating harmful objects. 67 - Heping Shi

, Zi-Kai Yang, Jin Shi:
An improved real-time detection algorithm based on frequency interpolation. 68 - Haohui Jia, Na Chen, Taisei Urakami

, Hui Gao, Minoru Okada:
Spatial attention and quantization-based contrastive learning framework for mmWave massive MIMO beam training. 69 - (Withdrawn) An abnormal traffic detection method using GCN-BiLSTM-Attention in the internet of vehicles environment. 70

- (Withdrawn) Fusion of transformer and ML-CNN-BiLSTM for network intrusion detection. 71

- Alessandro Pin, Roberto Rinaldo

, Andrea M. Tonello, Chris Marshall, Marco Driusso, Alessandro Biason, Andrea Dalla Torre:
Opportunistic channel estimation with LTE signals of limited bandwidth for positioning applications. 72 - Yumeng Su, Hongyuan Gao

, Shibo Zhang:
Secure massive MIMO system with two-way relay cooperative transmission in 6G networks. 73 - Mina Malekzadeh

:
Performance prediction and enhancement of 5G networks based on linear regression machine learning. 74 - (Withdrawn) Intelligent monitoring methodology for large-scale logistics transport vehicles based on parallel Internet of Vehicles. 75

- Nagi H. Al-Ashwal

, Khaled A. M. Al Soufy
, Faisal S. Al-Kamali, Mohamed A. Swillam
:
Performance analysis of wireless compressed-image transmission over DST-based OFDMA systems. 76 - Chien-Min Wu

, Yu-Hsiu Chang, Cheng-Tai Tsai, Cheng-Chun Hou:
A Q-learning-based distributed queuing Mac protocol for Internet-of-Things networks. 77 - Albashir Adel Youssef

:
Bootstrapped low complex iterative LDPC decoding algorithms for free-space optical communication links. 78 - Yong Tian

, Ying Li, Jiaxin Li, Fangting Gao, Chuanzhen Zhuang, Xuejun Ding:
Texture features-based lightweight passive multi-state crowd counting algorithm. 79 - Qiang Li, Ming-Tuo Zhou

, Tian-Feng Ren, Cheng-Bin Jiang, Yong Chen:
Partitioning multi-layer edge network for neural network collaborative computing. 80 - (Withdrawn) Features optimization selection in hidden layers of deep learning based on graph clustering. 81

- (Withdrawn) Privacy-preserving routing using jointly established protocol in IoT network environment. 82

- Vinoth Babu Kumaravelu

, Poongundran Selvaprabhu
, Dong Seog Han
, Md. Abdul Latif Sarker, Velmurugan Periyakarupan Gurusamy Sivabalan, Thiruvengadam Sundarajan Jayaraman, Arthi Murugadass
, C. Suganthi Evangeline
:
Blind reconfigurable intelligent surface-aided fixed non-orthogonal multiple access for intelligent vehicular networks. 83 - (Withdrawn) Hybrid extreme learning machine-based approach for IDS in smart Ad Hoc networks. 84

- Heping Shi

, Guanghui Yan, Haijing Hou, Xiaoheng Jiang:
A novel adaptive beamforming scheme for array signal data processing. 85 - Moustafa Rahal

, Benoît Denis, Kamran Keykhosravi, Musa Furkan Keskin, Bernard Uguen, George C. Alexandropoulos, Henk Wymeersch:
Performance of RIS-aided near-field localization under beams approximation from real hardware characterization. 86 - (Withdrawn) Collaborative communication and computational design for energy-efficient edge based learning network. 87

- Haolin Zhang, Tao Yang

, Xiaofeng Wu, Ziyu Guo, Bo Hu:
Robust beamforming design for UAV communications based on integrated sensing and communication. 88 - Samaneh Bidabadi

, Messaoud Ahmed Ouameur, Miloud Bagaa, Daniel Massicotte:
Energy efficient resource allocation for re-configurable intelligent surface-assisted wireless networks. 89 - (Withdrawn) Application of deep learning in Mandarin Chinese lip-reading recognition. 90

- Lili Guo, Shibing Zhang, Xiaodong Ji

, Senyi Shi:
Energy efficiency maximization for UAV-enabled amplify-and-forward relaying via joint power and trajectory optimization. 91 - Yu Du

, Yijun Guo, Jianjun Hao, Hao Zhu:
Residual energy maximization for NOMA-enabled UAV-assisted data collection network: trajectory optimization and resource allocation. 92 - Mostafa M. Abdelhakam

, Mahmoud M. Elmesalawy
, Ibrahim I. Ibrahim, Samir G. Sayed:
Joint trajectory and CoMP clustering optimization in UAV-assisted cellular systems: a coalition formation game approach. 93 - Hyunjin You, Doochan Ko

, Daniel Kim, Richard Wong
, Inwhee Joe
:
Dynamic access control method for SDP-based network environments. 94 - Amr M. Mahfouz

, Ahmed S. Ismail, Wageda Ibrahim El Sobky, Hany Nasry Zaky
:
A novel model for representing a plane target and finding the worst-case coverage in wireless sensor network based on Clifford algebra. 95 - Yonggue Han, Dongkyu Sim

:
The optimization of the number of deployed antennas in large-scale CL-DAS for energy efficiency. 96 - (Withdrawn) A novel machine learning-based framework for channel bandwidth allocation and optimization in distributed computing environments. 97

- Evelyn Ezhilarasi I, J. Christopher Clement

, Joseph M. Arul:
A survey on cognitive radio network attack mitigation using machine learning and blockchain. 98 - (Withdrawn) Switching mode allocation in planning paths for vehicular network communication. 99

- (Withdrawn) Blockchain managed federated learning for a secure IoT framework. 100

- (Withdrawn) Enhancing throughput using channel access priorities in frequency hopping network using federated learning. 101

- (Withdrawn) Auto scheduling through distributed reinforcement learning in SDN based IoT environment. 102

- George C. Alexandropoulos

, Dinh-Thuy Phan-Huy, Konstantinos D. Katsanos, Maurizio Crozzoli, Henk Wymeersch
, Petar Popovski
, Philippe Ratajczak, Yohann Bénédic, Marie-Hélène Hamon, Sebastien Herraiz Gonzalez, Placido Mursia, Marco Rossanese, Vincenzo Sciancalepore, Jean-Baptiste Gros, Sergio Terranova, Gabriele Gradoni, Paolo Di Lorenzo, Moustafa Rahal, Benoît Denis, Raffaele D'Errico
, Antonio Clemente, Emilio Calvanese Strinati:
RIS-enabled smart wireless environments: deployment scenarios, network architecture, bandwidth and area of influence. 103 - Amruta A. Nikam

, Rupali B. Patil:
Design and development of multiband PIFA antenna for vehicular LTE/5G and V2X communication. 104 - Si-Phu Le

, Hong-Nhu Nguyen
, Nhat-Tien Nguyen, Cuu Ho Van, Anh-Tu Le, Miroslav Voznák:
Physical layer security analysis of IRS-based downlink and uplink NOMA networks. 105 - (Withdrawn) Hybrid traffic security shaping scheme combining TAS and CQSF of time-sensitive networks in smart grid. 106

- (Withdrawn) Optimized design and application research of smart interactive screen for wireless networks based on federated learning. 107

- Wided Ben Daoud, Salwa Othmen, Monia Hamdi, Radhia Khdhir, Habib Hamam:

Correction: Fog computing network security based on resources management. 108 - Rania H. El-abd

, Amr H. Hussein:
Efficient design of a wideband tunable microstrip filtenna for spectrum sensing in cognitive radio systems. 109 - Rania H. El-abd

:
Compact dual-port MIMO filtenna-based DMS with high isolation for C-band and X-band applications. 110 - Riccardo Tuninato

, Daniel Gaetano Riviello
, Roberto Garello
, Bruno Melis, Roberto Fantini:
A comprehensive study on the synchronization procedure in 5G NR with 3GPP-compliant link-level simulator. 111 - S. Manoj

, C. Valliyammai:
Drone network for early warning of forest fire and dynamic fire quenching plan generation. 112 - Jianli Xie

, Binhan Zhu, Cuiran Li:
Research of 5G HUDN network selection algorithm based on Dueling-DDQN. 113 - Yunbing Hu, Ao Peng, Shenghong Li, Biyu Tang, Wei Ni, Xianzhi Lu, Jianguo Tang:

Channel state information-based wireless localization by signal reconstruction. 114 - Mohamed A. Mohamed

, Hassan A. Hassan, Mohamed H. Essai, Hamada Esmaiel
, Ahmed S. Mubarak, Osama A. Omer:
Modified state activation functions of deep learning-based SC-FDMA channel equalization system. 115 - Chao Chen, Zhengyang Wu, Xiaohan Yu, Bo Ma, Chuanhuang Li:

Intelligent deep reinforcement learning-based scheduling in relay-based HetNets. 116 - Ghida Jubran Alqahtani, Fatma Bouabdallah

:
Routing protocols based on node selection for freely floating underwater wireless sensor networks: a survey. 117

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














