default search action
Transactions on Emerging Telecommunications Technologies, Volume 33
Volume 33, Number 1, January 2022
- Dimpal Janu, Kuldeep Singh, Sandeep Kumar:
Machine learning for cooperative spectrum sensing and sharing: A survey. - Monzir Babiker Mohamed, Olasunkanmi Matthew Alofe, Muhammad Ajmal Azad, Harjinder Singh Lallie, Kaniz Fatema, Tahir Sharif:
A comprehensive survey on secure software-defined network for the Internet of Things.
- Eshita Rastogi, Mukesh Kumar Maheshwari, Abhishek Roy, Navrati Saxena, Dong Ryeol Shin:
Energy efficiency analysis of narrowband Internet of Things with auxiliary active cycles for small data transmission. - Gang Zhao, Bingbing Di, Hui He:
A novel decentralized cross-domain identity authentication protocol based on blockchain. - Rajat Gupta, Mona Aggarwal, Swaran Ahuja:
Preservation of shared backup path in k-node content based elastic optical datacenter networks. - Ping Zhang, Long Zhao, Binyao Cheng, Pengzun Gao:
Optimization of the quality-to-power ratio of scalable video code video transmission in millimeter-wave massive multiple-input multiple-output systems. - Jintian Lu, Yunyi Zhang, Likun Yang, Shuyuan Jin:
Inter-cloud secure data sharing and its formal verification. - V. R. Balaji, Tathababu Addepalli, Arpan Desai, Anveshkumar Nella, Truong Khang Nguyen:
An inverted L-strip loaded ground with hollow semi-hexagonal four-element polarization diversity UWB-MIMO antenna. - Sudipta Dey, Iti Saha Misra:
Quality ensured non-orthogonal multiple access based downlink scalable video coding multicasting over cognitive radio network. - S. Allwin Devaraj, T. Aruna, N. Muthukumaran, A. Andrew Roobert:
Adaptive cluster-based heuristic approach in cognitive radio networks for 5G applications. - Issam Jabri, Kaouther Mansour, Ibrahim Al-Oqily, Tahar Ezzedine:
Enhanced characterization and modeling of A-MPDU aggregation for IEEE 802.11n WLANs. - Marjo Heikkilä, Pekka Koskela, Jani Suomalainen, Kalle Lähetkangas, Tero Kippola, Pentti Eteläaho, Juha Erkkilä, Ari Pouttu:
Field trial with tactical bubbles for mission critical communications. - Wen Zhao, Zhipeng Huang, Fuchun Huang, Yiju Zhan:
Double generalized spatial modulation. - Ying Wang, Fengyin Li, Pei Ren, Siqi Yu, Yuhong Sun:
A secure aggregation routing protocol with authentication and energy conservation. - Huanlai Xing, Haoxiang Qin, Shouxi Luo, Penglin Dai, Lexi Xu, Xinzhou Cheng:
Spectrum sensing in cognitive radio: A deep learning based model. - Jingwen Luo, Jia Wu, Weiyu Yang:
A relationship matrix resolving model for identifying vital nodes based on community in opportunistic social networks. - Priyadharshini Kaliyamoorthy, Aroul Canessane Ramalingam:
Enhancing data security using global mutation based novel artificial immune network optimization in public cloud storage system. - Ankush Manocha:
IoT-assisted irregular environmental event determination for health analysis of pregnant females. - Meng Wang, Dian-Wu Yue, Ha H. Nguyen, Si-Nian Jin:
Massive MIMO relaying with imperfect RF chains and coarse ADC/DAC in beyond 5G networks. - Sandeep Gulia, Anwar Ahmad, Manish Kumar Singh:
A resource efficient scheme for backhaul-constrained coordinated multipoint cellular networks. - Xiangyong Liu, Guojun Wang, Md. Zakirul Alam Bhuiyan:
Re-ranking with multiple objective optimization in recommender system. - Nellore Kapileswar, P. Phani Kumar:
Energy efficient routing in IOT based UWSN using bald eagle search algorithm. - Saeid Pakravan, Ghosheh Abed Hodtani:
Analysis of side information impact on the physical layer security performances in wireless wiretap channel. - A. Balamurugan, Sengathir Janakiraman, Maruthakutty Deva Priya:
Modified African buffalo and group teaching optimization algorithm-based clustering scheme for sustaining energy stability and network lifetime in wireless sensor networks. - Mesut Togaçar:
Detecting attacks on IoT devices with probabilistic Bayesian neural networks and hunger games search optimization approaches.
Volume 33, Number 2, February 2022
Editorial
- Changqiao Xu:
Designing and planning of energy efficient sustainable cities and societies: A smart energy.
- Mahmood Khan, Javed Iqbal, Muhammad Ali, Muhammad Afaq, Ali Zahir, Nadir Ali:
Designing and implementation of energy-efficient wireless photovoltaic monitoring system. - Muhammad Amin, Babar Shah, Aizaz Sharif, Tamleek Ali, Ki-Il Kim, Sajid Anwar:
Android malware detection through generative adversarial networks. - Affaq Qamar, Javed Iqbal, Saim Saher, Arif Ali Shah, Abdul Basit:
Design of optimized energy system based on active energy-saving technologies in very low-energy smart buildings. - Naveed Jan, Sarmad Ullah Khan:
Energy-efficient source location privacy protection for network lifetime maximization against local eavesdropper in wireless sensor network (EeSP). - Adil Sheraz, Javed Iqbal Bangash, Abdul Waheed Khan, Muhammad Imran, Asfandyar Khan, Abdul Khan, Muhammad Ishaq, Wajid Ullah Khan:
A dynamic swift association scheme for wireless body area networks. - Mohamad Alhaddad, Enver Ever, Murat Fahrioglu, Fadi M. Al-Turjman:
Aiming for smart wind energy: A comparison analysis between wind speed forecasting techniques. - Yue Wang, Linfang Hu, Jianwei Chen, Yueqing Ren:
Health status diagnosis of distribution transformers based on big data mining. - Zahid Halim, Aqsa Khan, Muhammad Sulaiman, Sajid Anwar, Muhammad Nawaz:
On finding optimum commuting path in a road network: A computational approach for smart city traveling. - Fazli Subhan, Asfandyar Khan, Sajid Saleem, Shakeel Ahmed, Muhammad Imran, Muhammad Zubair Asghar, Javed Iqbal Bangash:
Experimental analysis of received signals strength in Bluetooth Low Energy (BLE) and its effect on distance and position estimation. - Mahmood Khan, Muhammad Afaq, Ihtesham Ul Islam, Javed Iqbal, Muhammad Shoaib:
Energy loss prediction in nonoriented materials using machine learning techniques: A novel approach. - Ahmed S. Alfakeeh, Ali H. Al-Bayatti, François Siewe, Thar Baker:
Agent-based negotiation approach for feature interactions in smart home systems using calculus of the context-aware ambient. - Fakhri Alam Khan, Mona Jamjoom, Awais Ahmad, Muhammad Asif:
An analytic study of architecture, security, privacy, query processing, and performance evaluation of database-as-a-service. - Muhammad Babar, Sabeen Javaid, Akmal Saeed Khattak, Amjad Ali:
Toward energy-efficient data management design for sustainable cities and societies. - Shalli Rani:
Analytic vision on fog computing for effective load balancing in smart grids. - Faizan Mehmood, Nouman Ashraf, Lourdes Alvarez, Tahir Nadeem Malik, Hassaan Khaliq Qureshi, Tariq Kamal:
Grid integrated photovoltaic system with fuzzy based maximum power point tracking control along with harmonic elimination. - Bashir Hayat, Seonah Lee, Kyong Hoon Kim:
Resource allocation through logistic regression and multicriteria decision making method in IoT fog computing. - Bhagya Nathali Silva, Kyuchang Lee, Yongtak Yoon, Jihun Han, Zhenbo Cao, Kijun Han:
Cost- and comfort-aware aggregated modified least slack time-based domestic power scheduling for residential communities. - Khursheed Aurangzeb, Sheraz Aslam, Syed Irtaza Haider, Syed Muhammad Mohsin, Saif ul Islam, Hasan Ali Khattak, Sajid Shah:
Energy forecasting using multiheaded convolutional neural networks in efficient renewable energy resources equipped with energy storage system. - Adnan Fida, Adnan Iftikhar, Muhammad Azfar Yaqub, Dongkyun Kim:
Coordinated throughput optimization for mobile sensor networks under heterogeneous fading conditions. - Ze Chen, Xiaojun Zuo, Na Dong, Botao Hou:
Application of network security penetration technology in power internet of things security vulnerability detection. - Rohul Amin, Shah Nazir, Iván García-Magariño:
Efficient sustainable algorithm for numerical solution of nonlinear delay Fredholm-Volterra integral equations via Haar wavelet for dense sensor networks in emerging telecommunications. - Abizar, Haleem Farman, Bilal Jan, Zahid Khan, Anis Koubaa:
A smart energy-based source location privacy preservation model for Internet of Things-based vehicular ad hoc networks. - Saleem Iqbal, Kashif Naseer Qureshi, Nabeela Kanwal, Gwanggil Jeon:
Collaborative energy efficient zone-based routing protocol for multihop Internet of Things. - Muhammad Diyan, Bhagya Nathali Silva, Jihun Han, Zhenbo Cao, Kijun Han:
Intelligent Internet of Things gateway supporting heterogeneous energy data management and processing. - Maryam Bashir, Jawad Ashraf, Asad Habib, Muhammad Muzammil:
An intelligent linear time trajectory data compression framework for smart planning of sustainable metropolitan cities.
Volume 33, Number 3, March 2022
Editorial
- Changqiao Xu:
Enabling technologies for future mobile and edge networks.
- Fadi Al-Turjman:
A novel approach for drones positioning in mission critical applications. - Tarik Chanyour, Mohamed El Ghmary, Youssef Hmimz, Mohammed Ouçamah Cherkaoui Malki:
Energy-efficient and delay-aware multitask offloading for mobile edge computing networks. - Muhammad Shakil, Alaelddin Fuad Yousif Mohammed, Rajakumar Arul, Ali Kashif Bashir, Jun Kyun Choi:
A novel dynamic framework to detect DDoS in SDN using metaheuristic clustering. - Di Zhou, Bin Qiu, Yuanfang Chen, Hailin Xiao, Muhammad Alam:
Power allocation for multisource, multidestination cooperative vehicular networks under an outage probability constraint.
- Changqiao Xu:
Enabling AI technologies for Internet of Energy.
- Mostefa Zafer, Mustapha Réda Senouci, Mohamed Aissani:
Fault-tolerant data transport backbone for 3D wireless sensor networks. - Rashid Abbasi, Nawab Muhammad Faseeh Qureshi, Haseeb Hassan, Tanzila Saba, Amjad Rehman, Bin Luo, Ali Kashif Bashir:
Generalized PVO-based dynamic block reversible data hiding for secure transmission using firefly algorithm. - Atul Malhotra, Sanmeet Kaur:
A comprehensive review on recent advancements in routing protocols for flying ad hoc networks. - Ahcène Bounceur, Madani Bezoui, Mohammad Hammoudeh, Loïc Lagadec, Reinhardt Euler:
Finding the polygon hull of a network without conditions on the starting vertex. - Abeer Abdullah Alsadhan, Abir Hussain, Panos Liatsis, Mohammed M. Alani, Hissam Tawfik, Phillip Kendrick, Hulya Francis:
Locally weighted classifiers for detection of neighbor discovery protocol distributed denial-of-service and replayed attacks. - Pouria Paymard, Nader Mokari:
Resource allocation in PD-NOMA-based mobile edge computing system: Multiuser and multitask priority. - Ravi Tiwari, Siddharth Deshmukh:
Analysis and design of an efficient handoff management strategy via velocity estimation in HetNets. - Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh:
Analysis of attribute-based cryptographic techniques and their application to protect cloud services. - Adil Adeel, Mazhar Ali, Abdul Nasir Khan, Tauqeer Khalid, Faisal Rehman, Yaser Jararweh, Junaid Shuja:
A multi-attack resilient lightweight IoT authentication scheme. - Fadi M. Al-Turjman, Hadi Zahmatkesh, Ramiz Shahroze:
An overview of security and privacy in smart cities' IoT communications. - Muhammad Mohtasim Sajjad, Dhammika Jayalath, Carlos J. Bernardos:
A flexible IPv6 mobility management architecture for SDN-based 5G mobile networks. - Monther Aldwairi, Duaa Alansari:
n-Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems. - Nida Riaz, Saad B. Qaisar, Mudassar Ali, Muhammad Naeem:
Node selection and utility maximization for mobile edge computing-driven IoT. - Morghan Hartmann, Umair Sajid Hashmi, Ali Imran:
Edge computing in smart health care systems: Review, challenges, and research directions. - Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
A machine learning based framework for IoT device identification and abnormal traffic detection. - Hafiza Syeda Zainab Kazmi, Nadeem Javaid, Muhammad Awais, Muhammad Tahir, Seong-O Shim, Yousaf Bin Zikria:
Congestion avoidance and fault detection in WSNs using data science techniques. - Hamid Mehdi, Zahra Pooranian, Paola Gabriela Vinueza Naranjo:
Cloud traffic prediction based on fuzzy ARIMA model with low dependence on historical data. - Yousef-Awwad Daraghmi, Eman Yasser Daraghmi, Samer Alsaadi, Derar Eleyan:
Accurate and time-efficient negative binomial linear model for electric load forecasting in IoE. - Alireza Souri, Aseel Hussien, Mahdi Hoseyninezhad, Monire Norouzi:
A systematic review of IoT communication strategies for an efficient smart environment. - Yazan Otoum, Dandan Liu, Amiya Nayak:
DL-IDS: a deep learning-based intrusion detection framework for securing IoT. - Muhammad Faisal Aziz, Abdul Nasir Khan, Junaid Shuja, Iftikhar Ahmed Khan, Fiaz Gul Khan, Atta ur Rehman Khan:
A lightweight and compromise-resilient authentication scheme for IoTs. - Khalid Mahmood Awan, Hafiz Husnain Raza Sherazi, Ahmad Ali, Razi Iqbal, Zuhaib Ashfaq Khan, Mithun Mukherjee:
Energy-aware cluster-based routing optimization for WSNs in the livestock industry. - Mohammad Bany Taha, Chamseddine Talhi, Hakima Ould-Slimane, Saed Alrabaee:
TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network. - Mohammad W. Elbes, Thamer A. Alrawashdeh, Eyad K. Almaita, Shadi AlZu'bi, Yaser Jararweh:
A platform for power management based on indoor localization in smart buildings using long short-term neural networks. - Hanlin Zhu, Yongxin Zhu, Hui Wang, Shihui Wang, Ziwei Liu, Balamurugan Balusamy, Pandi Vijayakumar, Ming Xia:
Multiscale deep network based multistep prediction of high-dimensional time series from power transmission systems. - Jedsada Phengsuwan, Tejal Shah, Rui Sun, Philip James, Dhavalkumar Thakker, Rajiv Ranjan:
An ontology-based system for discovering landslide-induced emergencies in electrical grid. - Mohamed Aissa, Badia Bouhdid, Adel Ben Mnaouer, Abdelfettah Belghith, Saad A. Al-Ahmadi:
SOFCluster: Safety-oriented, fuzzy logic-based clustering scheme for vehicular ad hoc networks. - Noura Aljeri, Azzedine Boukerche:
Smart and Green Mobility Management for 5G-enabled Vehicular Networks. - Pejman Hosseinioun, Maryam Kheirabadi, Seyed Reza Kamel Tabbakh, Reza Ghaemi:
aTask scheduling approaches in fog computing: A survey. - Tianyang Liu, Yongxin Zhu, Hui Wang, Balamurugan Balusamy, Pandi Vijayakumar, Jingtong Peng:
Transformer anomaly detection based on time-frequency domain software-hardware cooperative analysis.
Volume 33, Number 4, April 2022
Editorial
- Xiaochun Cheng, Zheli Liu, Yongsheng Ning:
Editorial: Security of cloud service for the manufacturing industry.
- Jamal N. Al-Karaki, Amjad Gawanmeh, Islam T. Almalkawi, Omar Alfandi:
Probabilistic analysis of security attacks in cloud environment using hidden Markov models. - Ganesh Gopal Deverajan, V. Muthukumaran, Ching-Hsien Hsu, Marimuthu Karuppiah, Yeh-Ching Chung, Ying-Huei Chen:
Public key encryption with equality test for Industrial Internet of Things system in cloud computing. - Ajay Kumar, Kumar Abhishek, Pranav Nerurkar, Muhammad Rukunuddin Ghalib, Achyut Shankar, Xiaochun Cheng:
Secure smart contracts for cloud-based manufacturing using Ethereum blockchain. - Bijeta Seth, Surjeet Dalal, Vivek Jaglan, Dac-Nhuong Le, Senthilkumar Mohan, Gautam Srivastava:
Integrating encryption techniques for secure data storage in the cloud. - Jinsu Kim, Namje Park:
Role-based Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment. - Fei Ye, Yunzhi Zheng, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
TamForen: A tamper-proof cloud forensic framework. - Qikun Zhang, Yongjiao Li, Zheng Chuanyang, Liang Zhu, Junling Yuan, Sikang Hu:
A permission-combination scalable access control model for Internet of things. - Xiao Zhang, Jiqiang Liu, Zhongjie Ba, Yaodong Tao, Xiaochun Cheng:
MobiScan: An enhanced invisible screen-camera communication system for IoT applications. - Rakesh Kumar Sakthivel, Gayathri Nagasubramanian, Fadi M. Al-Turjman, Muthuramalingam Sankayya:
Core-level cybersecurity assurance using cloud-based adaptive machine learning techniques for manufacturing industry. - Farrukh Mahmood, Farrukh Zeeshan Khan, Muneer Ahmed, Iftikhar Ahmad, Brij B. Gupta:
GreenCloudNet++: Simulation framework for energy efficient and secure, green job scheduling in geographically distributed data centers. - Oladayo Olufemi Olakanmi, Kehinde Oluwasesan Odeyemi:
A certificateless keyword searchable encryption scheme in multi-user setting for fog-enhanced Industrial Internet of Things. - Ahmad Ali, Abid Khan, Mansoor Ahmed, Gwanggil Jeon:
BCALS: Blockchain-based secure log management system for cloud computing. - Appu Alfred Raja Melvin, G. Jaspher W. Kathrine, S. Sudhakar Ilango, S. Vimal, Seungmin Rho, Neal N. Xiong, Yunyoung Nam:
Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud.
- Khizar Abbas, Muhammad Afaq, Talha Ahmed Khan, Adeel Rafiq, Javed Iqbal, Ihtesham Ul Islam, Wang-Cheol Song:
An efficient SDN-based LTE-WiFi spectrum aggregation system for heterogeneous 5G networks. - Daming Li, Lianbing Deng, Zhiming Cai, Alireza Souri:
Blockchain as a service models in the Internet of Things management: Systematic review. - Arman Azizi, Nader Mokari:
Multiple input single output aerial base station-assisted networks: Joint 3D beam-forming, aerial base station assignment, 3D placement, and radio resource allocation. - Liuwei Huo, Dingde Jiang, Zhihan Lv:
A software-defined networks-based measurement method of network traffic for 6G technologies. - Chunzhi Hou, Zhensen Wu, Jiaji Wu, Chang-Sheng Lu, Rui Zhang, Leke Lin, Qiang Zhao, Yunhua Cao:
Measurement and analysis of the scattering properties of cement surfaces of urban environment in the millimeter waveband. - Sumit Kumar, Shrawan Kumar, Daya Krishan Lobiyal:
MWLP-DP: Mobile war-fighters location prediction for dark phase in Internet of Battlefield Things. - Zeinab Askari, Avid Avokh:
IRDB: Towards enjoying spatial, rate, and beam-channel diversity in wireless networks for multimedia applications. - Hossein Amin Sadrabadi, Nahid Ardalani, Hamidreza Bakhshi:
An enhanced LTE handover scheme for high-speed railway application. - Zaheer Ahmad, Jawad Mirza, Abdulah Jeza Aljohani, Ahmad Salman, Salman Ghafoor:
A Mach-Zehnder modulator based novel regenerator for employment in relays used in free space optical communication. - Abdelfettah Belhabib, Abdelouhab Zeroual, Moha M'Rabet Hassani:
Ant colony-based strategy to mitigate the pilot contamination problem in multicell massive multiple-input multiple-output systems. - Kennedy Chinedu Okafor, Michael Chukwudi Ndinechi, Sanjay Misra:
Cyber-physical network architecture for data stream provisioning in complex ecosystems. - Serdar Özyurt, Oguz Kucur:
Power permutation modulation in multiple-input multiple-output systems. - Pratyashi Satapathy, Judhistir Mahapatro:
An efficient multicriteria-based vertical handover decision-making algorithm for heterogeneous networks. - Yi Zhang, Lujie Zhong, Shujie Yang, Gabriel-Miro Muntean:
Distributed data backup and recovery for software-defined wide area network controllers. - Yihua Zhou, Songshou Dong, Yu-Guang Yang:
A unidirectional certificateless proxy re-signature scheme based on lattice. - Abdelouahab Bentrcia:
Projected Kaczmarz successive interference cancellation detection. - Zehao Chen, Jun Wu, Jipeng Gan, Ze Chen, Jia Zhang, Jiangtao He:
Robust and efficient cooperative spectrum sensing against probabilistic hard Byzantine attack. - Galymzhan Nauryzbayev, Orken Omarov, Sultangali Arzykulov, Khaled M. Rabie, Xingwang Li, Ahmed M. Eltawil:
Performance limits of wireless powered cooperative NOMA over generalized fading. - Shufeng Li, Baoxin Su, Yao Sun, Sanshan Sun, Libiao Jin:
Uplink grant-free pattern division multiple access transmission scheme by exploiting poly complementary sequence. - Amjad Iqbal, Mau-Luen Tham, Yoong Choon Chang:
Resource allocation for joint energy and spectral efficiency in cloud radio access network based on deep reinforcement learning. - Jiuyun Xu, Shan Sun, Miao Li:
An optimal strategy with various QoS requirement for data fusion for Internet of Things. - Iran M. Braga Jr., Francisco Rafael Marques Lima, Tarcisio F. Maciel, Roberto P. Antonioli, Francisco Rodrigo Porto Cavalcanti:
Rate maximization in full-duplex systems: Gains and complexity of employing adaptive power allocation in downlink and/or uplink. - Mohammad Wazid, Ashok Kumar Das, Youngho Park:
Blockchain-enabled secure communication mechanism for IoT-driven personal health records. - Vipul Dixit, Atul Kumar:
BER performance of MIMO based NOMA-VLC system with imperfect SIC. - Surbhi Kalsotra, Ashutosh Kumar Singh, Hem Dutt Joshi:
Performance analysis of space time coded generalized frequency division multiplexing system over generalized fading channels. - Abdul Rehman Qureshi, Ali A. Nasir, Mudassir Masood, Saeed Abdallah:
Resource allocation for a multi-device URLLC network. - Juan Rendon Schneir, Julie Bradford, Konstantinos Konstantinou, Abhaya Sumanasena, Gerd Zimmermann, Marco Gramaglia:
Cost assessment of elasticity for a 5G broadband network. - Tapan Nahar, Sanyog Rawat:
Millimeter-wave planar antennas for 5G-based remote monitoring and treatment of COVID-19 patients. - Ganesh Chennimala Sankaran, Krishna M. Sivalingam:
A minimal resource high-speed routing lookup mechanism for servers with NetFPGAs. - Shujie Yang, Jialu Hu, Ke Jiang, Han Xiao, Mu Wang:
Hybrid-360: An adaptive bitrate algorithm for tile-based 360 video streaming. - Shaheen Solwa:
An ordered crossover based approach to designing labeling diversity mappers. - Subhankar Ghosh, Anuradha Banerjee, Abu Sufian, Sachin Kumar Gupta:
Autoregressive moving average based anycast with support vector machine clustering in mobile ad-hoc networks. - Rupali Sachin Vairagade, Brahmananda Savadatti Hanumantha:
Enabling machine learning-based side-chaining for improving QoS in blockchain-powered IoT networks. - Romera Joan Sparjan, Manimekalai Thirunavukkarasu, Laxmikandan Thangavelu:
Reconfigurable intelligent surface aided coordinated multipoint transmission for the simultaneous wireless information and power transfer non-orthogonal multiple access network. - Shaheen Solwa:
A performance study of a genetic algorithm based mapper design for uncoded space-time labeling diversity. - Saeid Pakravan, Ghosheh Abed Hodtani:
Copula based analysis of impact of wireless channels correlation on the physical layer security performances in a wireless wiretap channel with artificial noise.
- Iraj Lohrasbinasab, Amin Shahraki, Amir Taherkordi, Anca Delia Jurcut:
From statistical- to machine learning-based network traffic prediction. - Hichem Mrabet, Elias G. Giacoumidis, Iyad Dayoub, Aymen Belghith:
A survey of applied machine learning techniques for optical orthogonal frequency division multiplexing based networks. - Tingting Yuan, Wilson da Rocha Neto, Christian Esteve Rothenberg, Katia Obraczka, Chadi Barakat, Thierry Turletti:
Machine learning for next-generation intelligent transportation systems: A survey. - Partha Pratim Ray:
A review on tactile IoT: Architecture, requirements, prospects, and future directions.
Volume 33, Number 5, May 2022
Editorial
- Changqiao Xu:
Designing and planning of energy efficient sustainable cities and societies: A smart energy.
- Yi Yang, Debiao He, Huaqun Wang, Lu Zhou:
An efficient blockchain-based batch verification scheme for vehicular ad hoc networks. - Yang Zhao, Xing Zhang, Xin Xie, Yi Ding, Sachin Kumar:
A verifiable hidden policy CP-ABE with decryption testing scheme and its application in VANET. - Tao Wang, Haiqing Zhang, Antoine Duclos, Cécile Payet, Daiwei Li:
Prediction of hospital length of stay to achieve flexible healthcare in the field of Internet of Vehicles. - Ting Li, Wei Liu, Tian Wang, Ming Zhao, Xiong Li, Ming Ma:
Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things. - Yanan Zhao, Yingzhe Hou, Yanan Chen, Sachin Kumar, Fuhu Deng:
An efficient certificateless public key encryption with equality test toward Internet of Vehicles. - Abubaker Wahaballa, Zhiguang Qin, Hisham Abdalla, Majdi Abdellatief, Mohamed Ahmed Elfaki:
Oblivious transfer with hidden access control and outsourced decryption from deterministic finite automata-based functional encryption for an in-vehicle sensor database system. - Ouyang Zhao, Xuchong Liu, Xiong Li, Pitam Singh, Fan Wu:
Privacy-preserving data aggregation scheme for edge computing supported vehicular ad hoc networks. - Nyamsuren Vaanchig, Zhiguang Qin, Batjargal Ragchaasuren:
Constructing secure-channel free identity-based encryption with equality test for vehicle-data sharing in cloud computing. - Bin Zhang, Xi Xiao, Weizhe Zhang, Arun Kumar Sangaiah, Ying Zhou, Xinyu Liu:
A co-occurrence matrix based masquerade detection method in in-vehicle network.
- Shanshan Yu, Chao Zhai, Xiaoqing Zhang, Ju Liu:
NOMA-enabled D2D adaptive relaying and transmission in cellular networks. - Jamal Amadid, Abdelfettah Belhabib, Asma Khabba, Abdelouhab Zeroual, Moha M'Rabet Hassani:
On channel estimation and spectral efficiency for cell-free massive MIMO with multi-antenna access points considering spatially correlated channels. - Jiawei Huang, Haitao Zhu, Mingyue Liu, Tao Zhang, Jianxin Wang:
Achieving fast page load for websites across multiple domains. - Jun Wu, Jia Zhang:
Quick cooperative spectrum sensing in cognitive unmanned aerial vehicles networks. - Mert Yagcioglu:
Dynamic resource allocation and interference coordination for millimeter wave communications in dense urban environment. - Wenwen Sun, Shaopeng Guan, Peng Wang, Qingyu Wu:
A hybrid deep learning model based low-rate DoS attack detection method for software defined network. - Raed T. Al-Zubi, Khalid A. Darabkh, Yazid M. Khattabi, Mohannad T. Abu Issa:
Markov-based analysis for cooperative HARQ-aided NOMA transmission scheme in 5G and beyond. - Kubilay Muhammed Sünnetci, Mehmet Sönmez:
Variable pulse position modulation receivers for visible light communication systems without the knowledge of dimming level. - K. Anish Pon Yamini, Jesmitha Stephy, K. Suthendran, Vinayakumar Ravi:
Improving routing disruption attack detection in MANETs using efficient trust establishment. - Xiaolei Huo, Wenbo Guo, Ying Liu, Hongzhi Zhao, Youxi Tang:
Adjacent channel interference suppression based on spectral extrapolation to enhance electromagnetic compatibility of co-site radio devices. - Abrar Mohammed Alajlan, Marwah Mohammad Almasri:
Malicious behavior detection in cloud using self-optimized dynamic kernel convolutional neural network. - Jianhang Liu, Jingshuai Xu, Shibao Li, Xuerong Cui, Yucheng Zhang:
A secure multi-path transmission algorithm based on fountain codes. - Nishant Sharma, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi:
Secure authentication and session key management scheme for Internet of Vehicles. - Franz Kuntke, Vladimir Romanenko, Sebastian Linsner, Enno Steinbrink, Christian Reuter:
LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios. - Fei Xu, Zhuoya Zhang, Jianqiang Feng, Zengshi Qin, Yue Xie:
Efficient deployment of multi-UAV assisted mobile edge computing: A cost and energy perspective. - Deepak Sahu, Shikha Maurya, Matadeen Bansal, Dinesh Kumar V.:
Data-driven approach to design energy-efficient joint precoders at source and relay using deep learning in MIMO-CRNs. - Fengyin Li, Xueqing Sun, Peiyu Liu, Xiao Li, Yang Cui, Xiaojiao Wang:
A traceable privacy-aware data publishing platform on permissioned blockchain. - Rakesh Kumar Godi, Sengathir Janakiraman:
Border Collie optimization algorithm-based node clustering technique in vehicular ad hoc networks. - Mohamed A. Abdel-Moneim, Rasha M. Al-Makhlasawy, Nariman Abdel-Salam Bauomy, El-Sayed M. El-Rabaie, Walid El Shafai, Ahmed E. A. Farghal, Fathi E. Abd El-Samie:
An efficient modulation classification method using signal constellation diagrams with convolutional neural networks, Gabor filtering, and thresholding. - Syed Noman Ali Sherazi, Ehtesham Zahoor, Sabina Akhtar, Olivier Perrin:
A blockchain based approach for the authorization policies delegation in emergency situations. - Uma Jothi, P. Vivekanandan, Subramaniam Shankar:
Optimized intellectual resource scheduling using deep reinforcement Q-learning in cloud computing. - Juhi Agrawal, Monit Kapoor, Ravi Tomar:
A novel unmanned aerial vehicle-sink enabled mobility model for military operations in sparse flying ad-hoc network.
- Mili Dhar, Arindam Debnath, Bidyut K. Bhattacharyya, Mrinal Kanti Debbarma, Swapan Debbarma:
A comprehensive study of different objectives and solutions of controller placement problem in software-defined networks. - P. Salma Khatoon, Muqeem Ahmed:
Importance of semantic interoperability in smart agriculture systems.
Volume 33, Number 6, June 2022
Editorial
- Gwanggil Jeon, Valerio Bellandi, Abdellah Chehri, Marcelo Keese Albertini:
Potential of sixth-generation technologies for emerging future wireless networks.
- Mohamed Mounir, Mohamed Bakry El-Mashade, Ashraf Mohamed Aboshosha:
On The Selection of Power Allocation Strategy in Power Domain Non-Orthogonal Multiple Access (PD-NOMA) for 6G and Beyond. - Yusuf Acar:
Orthogonal frequency division multiplexing with index modulation by using multiple constellation sets. - Yuqing Chen, Junpeng Yu, Hongtao Zhang:
Spatial correlation modeling and ergodic capacity analysis of networks with overlapping conflict. - Subhra Sankha Sarma, Pratap Khuntia, Ranjay Hazra:
Power control scheme for device-to-device communication using uplink channel in 5G mm-Wave network. - Zheng Guan, Yang Hu, Zhijun Yang, Min He, Marco Anisetti:
A fairness-aware distributed dual-hop heterogeneous half and full-duplex link scheduling for 6G network.
- Li Shan Cang, Ahmed Al-Dubai, Houbing Song, Shahid Mumtaz:
Trusted computing and advanced security in edge computing and Internet of Things.
- Waqas Tariq Toor, Abdul Basit, Naeem Maroof, Saqib Ali Khan, Muhammad Saadi:
Evolution of random access process: From Legacy networks to 5G and beyond. - Farhan Ullah, Hamad Naeem, Muhammad Rashid Naeem, Sohail Jabbar, Shehazad Khalid, Fadi Al-Turjman, Abdelrahman Abuarqoub:
Detection of clone scammers in Android markets using IoT-based edge computing. - Tao Qin, Bo Wang, Zhaoli Liu, Zhouguo Chen, Jianwei Ding:
High-quality tweet generation for online behavior security management based on semantics measurement. - Wenhao Xie, Xianghua Fu, Xi Zhang, Yu Lu, Yanzhi Wei, Jingying Yang:
Topic sentiment analysis using words embeddings dependency in edge social system. - Hongsheng Tang, Xing Zhang, Shucun Fu, Xihua Liu, Qi Wu, Lianyong Qi:
Resource management for meteorological service in cloud-edge computing: A survey. - Yimin Qiao, Qindong Sun, Han Cao, Jiamin Wang, Tingting Hao:
Privacy-preserving dish-recommendation for food nutrition through edging computing. - Bo Liu, Qing Meng, Hengyuan Zhang, Kun Xu, Jiuxin Cao:
VGMF: Visual contents and geographical influence enhanced point-of-interest recommendation in location-based social network. - Tao Li, Yanqing Wang, Yongjun Ren, Yongzhen Ren, Qi Qian, Xi Gong:
Nonnegative matrix factorization-based privacy-preserving collaborative filtering on cloud computing. - Ziqing Zhu, Tao Zhou, Chenghao Jia, Weijia Liu, Bo Liu, Jiuxin Cao:
Community detection across multiple social networks based on overlapping users. - Samundra Deep, Xi Zheng, Alireza Jolfaei, Dongjin Yu, Pouya Ostovari, Ali Kashif Bashir:
A survey of security and privacy issues in the Internet of Things from the layered context. - Haiyan Jin, Yang Yu, Yumeng Li, Zhaolin Xiao:
Network video summarization based on key frame extraction via superpixel segmentation. - Bo Jiang, Guosheng Huang, Tian Wang, Jinsong Gui, Xiaoyu Zhu:
Trust based energy efficient data collection with unmanned aerial vehicle in edge network. - Zhiguo Qu, Xinzhu Liu, Shengyao Wu:
Quantum identity authentication protocol based on three-photon quantum error avoidance code in edge computing. - Usman Sikandar, Muhammad Taha, Sohail Sarwar, Muhammad Safyan, Zia Ul-Qayyum, Amjad Ali, Muddesar Iqbal:
A context-aware and intelligent framework for the secure mission critical systems. - Gang Liu, Ziwen Tang, Bo Wan, Yanfei Li, Yan Liu:
Differential privacy location data release based on quadtree in mobile edge computing. - Saqib Hakak, Amirrudin Kamsin, Wazir Zada Khan, Abubakar Zakari, Muhammad Imran, Khadher bin Ahmad, Gulshan Amin Gilkar:
Digital Hadith authentication: Recent advances, open challenges, and future directions. - Maria Papaioannou, Marina Karageorgou, Georgios Mantas, Victor Sucasas, Ismael Essop, Jonathan Rodriguez, Dimitrios K. Lymberopoulos:
A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT). - Mariusz Gajewski, Jordi Mongay Batalla, George Mastorakis, Constandinos X. Mavromoustakis:
Anomaly traffic detection and correlation in Smart Home automation IoT systems. - Zhen Li, Feng Yuan, Lingyu Ma:
A load balancing algorithm for solving multi-objective virtual network embedding. - Wenyao Yan, Zhixiao Wang, Hao Wang, Wendong Wang, Junhuai Li, Xiaolin Gui:
Survey on recent smart gateways for smart home: Systems, technologies, and challenges. - Binbin Yong, Wei Wei, Kuan-Ching Li, Jun Shen, Qingguo Zhou, Marcin Wozniak, Dawid Polap, Robertas Damasevicius:
Ensemble machine learning approaches for webshell detection in Internet of things environments. - Iqra Manzoor, Sadia Murawwat, Muhammad Majid Gulzar, Ahlam Jameel, Muhammad Saadi:
Secure indoor traffic modeling in long-term evolution femtocell networks using efficient Markov decision process. - Lei Wang, Boyi Xu, Hongming Cai, Pengzhu Zhang:
Context-aware emergency detection method for edge computing-based healthcare monitoring system. - Razaullah Khan, Xiaofeng Tao, Adeel Anjum, Saif Ur Rehman Malik, Shui Yu, Abid Khan, Waheed ur Rehman, Hassan Malik:
(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility.
Volume 33, Number 7, July 2022
- Debaditya Shome, Omer Waqar, Wali Ullah Khan:
Federated learning and next generation wireless communications: A survey on bidirectional relationship. - Mehak Basharat, Muhammad Naeem, Zakria Qadir, Alagan Anpalagan:
Resource optimization in UAV-assisted wireless networks - A comprehensive survey. - Morteza Rahimi, Nima Jafari Navimipour, Mehdi Hosseinzadeh, Mohammad Hossein Moattar, Aso Mohammad Darwesh:
Cloud healthcare services: A comprehensive and systematic literature review.
- Maryam Najafi, Lyes Khoukhi, Marc Lemercier:
Decentralized prediction and reputation approach in vehicular networks. - K. Shahina, T. S. Pradeep Kumar:
Similarity-based clustering and data aggregation with independent component analysis in wireless sensor networks. - Sina Pirnia, Hamidreza Bakhshi, Mohamad Dosaranian Moghadam, Ramin Khosravi:
Handoff optimization for joint base station association and power control in uplink non-orthogonal multiple access small cell networks. - Maryam Shabani, Neda Faraji, Mina Baghani:
Altitude and density optimization over UAV-enabled massive IoT wireless communications. - Fadlallah Chbib, Lyes Khoukhi, Walid Fahs, Jamal Haydar, Rida Khatoun:
A cross-layered scheme for multichannel and reactive routing in vehicular ad hoc networks. - Vibha Jain, Bijendra Kumar:
Auction based cost-efficient resource allocation by utilizing blockchain in fog computing. - Zahra Taheri Hanjani, Abbas Mohammadi, Mohamad Dosaranian Moghadam, Mohammad Kazemi:
Machine learning for power control in device-to-device communications with full-duplex relays using ITLinQ spectrum sharing scheme. - T. R. Tejasvi, D. H. Manjaiah:
Energy and spectral efficient resource allocation in 5G HetNet using optimized deep bi-BRLSTM model. - Yaping Cui, Lijuan Du, Peng He, Dapeng Wu, Ruyan Wang:
Cooperative vehicles-assisted task offloading in vehicular networks. - Ruiyan Du, Huajing Liu, Zhiqing Guan, Fulai Liu:
HP-SPC algorithm with dynamic partially connected structure for mmWave MIMO systems. - Taissir Y. Elganimi, Ammar M. Abu-Hudrouss, Khaled M. Rabie:
Multiuser steered signed quadrature spatial modulation for millimeter-wave massive multiple-input multiple-output with hybrid beamforming. - Sumina Sidiq, Javaid A. Sheikh, Farhana Mustafa, Bilal Ahmad Malik:
A new method of hybrid optimization of small cell range development and density for energy efficient ultra-dense networks. - Rahul Makkar, Sandhya Soni, Divyang Rawal, Nikhil Sharma, Parul Garg:
Performance analysis of non-orthogonal multiple access assisted cooperative maritime communication system over two-wave with diffuse power fading. - T. Perarasi, G. Nagarajan, R. Gayathri, M. Leeban Moses:
Evaluation of cooperative spectrum sensing with filtered bank multi carrier utilized for detecting in cognitive radio network. - Reza Sarabi Miyanaji, Sam Jabbehdari, Nasser Modiri:
Continuous lightweight authentication according group priority and key agreement for Internet of Things. - Shaopeng Guan, Juan Li, Yi Li, Zhenqi Wang:
A multi-controller placement method for software defined network based on improved firefly algorithm. - Yuan Liu, Pinyi Ren, Qinghe Du, Dongyang Xu:
Performance enhancement for differential energy signal detection of ambient backscatter communications. - Karima Khettabi, Zineddine Kouahla, Brahim Farou, Hamid Seridi, Mohamed Amine Ferrag:
Clustering and parallel indexing of big IoT data in the fog-cloud computing level. - Enfang Cui, Dong Yang, Hongchao Wang, Weiting Zhang:
Learning-based deep neural network inference task offloading in multi-device and multi-server collaborative edge computing. - A. Andrew Roobert, P. Sherly Arunodhayamary, D. Gracia Nirmala Rani, M. Venkatesh, L. Jerart Julus:
Design and analysis of 28 GHz CMOS low power LNA with 6.4 dB gain variability for 5G applications. - Volkan Özduran, Nurul Huda Mahmood, Nikolaos Nomikos:
Performance analysis of power-domain non-orthogonal multiple access for full-duplex two-way relaying. - Mahdi Shirmohamadi, Hamidreza Bakhshi, Mohamad Dosaranian Moghadam:
User relay-aided energy-efficient resource allocation in heterogeneous cloud radio access network. - Sundus Ali, Muhammad Imran Aslam, Irfan Ahmed:
Impact of fractional power control on downlink uplink decoupled-based HetNets in varying path loss exponent environment. - Afzal Badshah, Anwar Ghani, Ali Daud, Anthony Theodore Chronopoulos, Ateeqa Jalal:
Revenue maximization approaches in IaaS clouds: Research challenges and opportunities. - Samir M. Hameed, Sinan M. Abdulsatar, Atheer A. Sabri:
Visible light communication performance using MIMO-ADO-OFDM system. - Yue Xie, Yongyong Sun, Fei Xu, Zhuoya Zhang, Zengshi Qin:
The offloading algorithm of mobile edge computing considering mobility in the intelligent inspection scenario. - Osama S. Faragallah, Hala S. El-sayed, Mohamed G. El-Mashed:
High mobility transmission system under intelligent reflecting surface. - Sourav Chakraborty, Nirmalendu Bikas Sinha, Monojit Mitra:
Dynamic branch pruning aided low switching fixed complexity sphere decoding for small scale and massive MIMO detection. - Ravi Kumar Suggala, M. Vamsi Krishna, Sangram Keshari Swain:
Health monitoring jeopardy prophylaxis model based on machine learning in fog computing. - Ravula Arun Kumar, Kambalapally Vinuthna:
Multi-channel attack detection based on lightweight message authentication code access control using Internet of Things design. - Ming Mao, Peng Yi, Jianhui Zhang, Liang Wang, Yuan Gu, Guanying Zhang:
Roadside units plane optimization scheme in software-defined vehicular networks. - Jipeng Gan, Jun Wu, Pei Li, Ze Chen, Jia Zhang, Zehao Chen, Jiangtao He, Shiyao Fan:
Joint spectrum sensing and resource allocation against byzantine attack in overlay cognitive radio networks. - Liqing Shan, Michael Mao Wang, Fenghui Zhang, Shuaishuai Chen, Jingjing Zhang:
Resource allocation for cellular device-to-device-aided vehicle-to-everything networks with partial channel state information. - D. Palanivel Rajan, J. Premalatha, S. Velliangiri, P. Karthikeyan:
Blockchain enabled joint trust (MF-WWO-WO) algorithm for clustered-based energy efficient routing protocol in wireless sensor network. - Fan Jia, Yueyi Yang, Junyi Zhang, Yong Yang:
A hybrid attention mechanism for blind automatic modulation classification. - Hongwen Ding, Li Li:
Proportional rate constrained resource allocation in multicarrier nonorthogonal multiple access systems. - Changju Zhu, Maozhong Song, Xiaoyu Dang, Qiuming Zhu:
Position-sensitivity security transmission with orbital angular momentum directional modulation based on frequency diverse array.
Volume 33, Number 8, August 2022
Featured Cover Editorial
- Changqiao Xu:
Context aware mobility in Internet of Things enabling technologies, applications, and challenges.
- Ansif Arooj, Muhammad Shoaib Farooq, Tariq Umer, Rafi Us Shan:
Cognitive Internet of Vehicles and disaster management: A proposed architecture and future direction. - Muhammad Ajmal Azad, Junaid Arshad, Shazia Mahmoud, Khaled Salah, Muhammad Imran:
A privacy-preserving framework for smart context-aware healthcare applications. - Fadi Al-Turjman, Ilyes Baali:
Machine learning for wearable IoT-based applications: A survey. - Sarra Hammoudi, Zibouda Aliouat, Saad Harous:
Enhanced time-slotted channel hopping. - Talal Ashraf Butt:
Context-aware cognitive disaster management using fog-based Internet of Things. - Riyaz Ahamed Ariyaluran Habeeb, Fariza Nasaruddin, Abdullah Gani, Mohamed Ahzam Amanullah, Ibrahim Abaker Targio Hashem, Ejaz Ahmed, Muhammad Imran:
Clustering-based real-time anomaly detection - A breakthrough in big data technologies. - Ashutosh Sharma, Rajiv Kumar:
A constrained framework for context-aware remote E-healthcare (CARE) services. - Ayesha Qamar, Muhammad Asim, Zakaria Maamar, Saad Saeed, Thar Baker:
A Quality-of-Things model for assessing the Internet-of-Things' nonfunctional properties. - Shariq Aziz Butt, Tauseef Jamal, Muhammad Ajmal Azad, Arshad Ali, Nader Sohrabi Safa:
A multivariant secure framework for smart mobile health application. - Ezedin Barka, Chaker Abdelaziz Kerrache, Hadjer Benkraouda, Khaled Shuaib, Farhan Ahmad, Fatih Kurugollu:
Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure. - Fadi Al-Turjman:
Smart-city medium access for smart mobility applications in Internet of Things. - Sohail Sarwar, Saad Zia, Zia Ul-Qayyum, Muddesar Iqbal, Muhammad Safyan, Shahid Mumtaz, Raúl García-Castro, Konstantin Igorevich Kostromitin:
Context aware ontology-based hybrid intelligent framework for vehicle driver categorization. - Muhammad Saqib Nawaz, Meng Sun, Basit Shahzad, Muhammad Ikram Ullah Lali, Tariq Umer, Shaohua Wan:
Quality of service in IoT protocol as designs and its verification in PVS. - Nadeem Javaid:
NADEEM: Neighbor node approaching distinct energy-efficient mates for reliable data delivery in underwater WSNs.
- Changqiao Xu:
Intelligent resource management in cloud computing and networking.
- Dingding Li, Ronghua Lin, Lijie Tang, Hai Liu, Yong Tang:
SGXPool: Improving the performance of enclave creation in the cloud. - Shengli Pan, Yan Wang, Ziming Bai, Muzhou Xiong, Lin Gu:
Detection of multipath routing with passive delay measurements: Hypothesis testing approaches. - Yueping Cai, Zongchen Yao, Tianchi Li, Sen Luo, Li Zhou:
SD-MAC: Design and evaluation of a software-defined passive optical intrarack network in data centers. - Tengfei Cao, Lujie Zhong, Han Xiao, Chengru Song, Shujie Yang, Changqiao Xu:
Credible and economic multimedia service optimization based on game theoretic in hybrid cloud networks. - Li-Zhuang Tan, Wei Su, Shuai Gao, Jingying Miao, Yuan Cheng, Peng Cheng:
Path-flow matching: Two-sided matching and multiobjective evolutionary algorithm for traffic scheduling in cloud data* center network. - Muhammad Usman, JongWon Kim:
SmartX Multi-View Visibility Framework for unified monitoring of SDN-enabled multisite clouds. - Saadia Ghribi, Amel Meddeb-Makhlouf, Faouzi Zarai, Mohsen Guizani:
Fog-cloud distributed intrusion detection and cooperation. - Mostefa Zafer, Mustapha Réda Senouci, Mohamed Aissani:
Load balancing approach for heterogeneous 2-tiered wireless sensor networks. - Bo Li, Peng Hou, Keyue Wang, Ziyi Peng, Shicheng Jin, Li Niu:
Deployment of edge servers in 5G cellular networks.
Volume 33, Number 9, September 2022
- Jeyashree G, S. Padmavathi:
IHAR - A fog-driven interpretable human activity recognition system. - Jasleen Kaur, Rinkle Rani, Nidhi Kalra:
A Blockchain-based Framework for Privacy Preservation of Electronic Health Records (EHRs). - Etinosa Noma-Osaghae, Sanjay Misra, Ravin Ahuja, Murat Koyuncu:
Particle swarm optimization of the spectral and energy efficiency of an SCMA-based heterogeneous cellular network. - Giovanni Maciel Ferreira Silva, Taufik Abrão:
Multipower-level Q-learning algorithm for random access in nonorthogonal multiple access massive machine-type communications systems. - Jiahao Chen, Xinchun Yin, Jianting Ning:
A fine-grained and secure health data sharing scheme based on blockchain. - Yukinobu Fukushima, Tatsuya Suda, Tutomu Murase, Yuya Tarutani, Tokumi Yokohira:
Minimizing the monetary penalty and energy cost of server migration service. - Safwan Hafeedh Younus:
Interference mitigation in multiuser WDM VLC systems using differential receiver. - A. S. Namitha:
Simultaneous minimization of side-band power and PAPR in OFDM based cognitive radio without additional bandwidth requirement for sending SI. - Prashant Jawade, Gautam M. Borkar, S. Ramachandram:
Confinement forest-based enhanced min-min and max-min technique for secure multicloud task scheduling. - Rasool Esmaeilyfard, Reyhaneh Esmaili:
A privacy-preserving mechanism for social mobile crowdsensing using game theory. - Makhlouf Benazi, Bilal Lounnas, Rabah Mokhtari:
A complex network community detection algorithm based on random walk and label propagation. - Shibao Li, PengHao Wang, Shuqi Wang, Yujie Cong, Jianhang Liu, Xuerong Cui:
Doppler estimation based on linear interpolation for underwater acoustic communication. - Peristera A. Baziana:
i-WABA: An efficient wavelengths arrangement and bandwidth allocation WDMA protocol for passive optical intra-rack data center networks. - Yu-Guang Yang, Hong-Mei Fu, Shang Gao, Yi-Hua Zhou, Wei-Min Shi:
Intrusion detection: A model based on the improved vision transformer. - Areen M. Abidrabbu, Mamoun F. Al-Mistarihi:
Performance analysis of 5G heterogeneous networks under the impact of aggregate interference over Nakagami-m fading channels. - Kirti Bala, Pankaj Deep Kaur:
A novel game theory based reliable proof-of-stake consensus mechanism for blockchain. - Sercan Yalçin:
An improved genetic algorithm approach to spectrum sensing for long range based cognitive radio networks. - Munish Bhatia:
Energy efficient IoT-based informative analysis for edge computing environment. - Vincent Omollo Nyangaresi, Mohammed Abd-Elnaby, Mahmoud M. A. Eid, Ahmed Nabih Zaki Rashed:
Trusted authority based session key agreement and authentication algorithm for smart grid networks. - Na Wang, Amjad Osmani, Siamak Mirzaei:
Dynamic placement of virtual machines using an improved multi-objective teaching-learning based optimization algorithm in cloud. - Nitin Agarwal, Manish Gupta, Manish Kumar:
Low noise amplifier design with enhanced noise and gain performance using transformer boosting method for millimeter-wave applications. - Sipra Swain, Pabitra Mohan Khilar, Biswa Ranjan Senapati:
An effective data routing for dynamic area coverage using multidrone network. - Juhi Agrawal, Monit Kapoor, Ravi Tomar:
A ferry mobility based direction and time-aware greedy delay-tolerant routing (FM-DT-GDR) protocol for sparse flying ad-hoc network. - Naziya Aslam, Shashank Srivastava, M. M. Gore:
ONOS Flood Defender: An Intelligent Approach to Mitigate DDoS Attack in SDN. - Richa Verma, Shalini Chandra:
FogBus3: A scalable and reliable framework for integrated IoT and fog computing scenario. - M. Leeban Moses, M. Ramkumarraja:
An integrated AHP-ELECTRE and deep reinforcement learning methods for handover performance optimization in an LTE-A networks. - M. Hemanta Kumar, Sanjeev Sharma, M. Thottappan, Kuntal Deka:
Reconfigurable intelligent surface assisted downlink INOMA system. - P. S. Shiju Kumar, A. Ramesh Babu:
Dolphin echolocation optimized sailfish algorithm for energy efficient and secured routing based on trust management in ZigBee wireless sensor network. - Dharminder Dharminder, Uddeshaya Kumar, Ashok Kumar Das, Basudeb Bera, Debasis Giri, Sajjad Shaukat Jamal, Joel J. P. C. Rodrigues:
Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications. - P. Hari Kumar, G. S. Anandha Mala:
H2RUN: An efficient vendor lock-in solution for multi-cloud environment using horse herd Runge Kutta based data placement optimization. - Yulei Chen, Jianhua Chen:
An efficient two-factor authentication protocol based on elliptic curve cryptosystem with provable security. - Shibao Li, Quanyu Li, Jianhang Liu, Xuerong Cui:
Non-orthogonal multiple access in backscatter communication system under the scene of the moving reader. - Samir Berrani, Ali Yachir, Badis Djamaa, Saïd Mahmoudi, Mohamed Aissani:
Towards a new semantic middleware for service description, discovery, selection, and composition in the Internet of Things. - L. Raji, S. Thanga Ramya:
Secure forensic data transmission system in cloud database using fuzzy based butterfly optimization and modified ECC. - Gjorgji Ilievski, Pero Latkoski:
Analytical modeling of distributed network functions virtualization architectures and the impact of the distribution on the packet sojourn time. - Nellore Kapileswar, Phani Kumar Polasi:
An improved underwater wireless sensor network communication using Internet of Things and signal to noise ratio analysis. - K. Devi, Balaubramanian Muthusenthil:
Intrusion detection framework for securing privacy attack in cloud computing environment using DCCGAN-RFOA. - Sayhia Tidjani, Zoheir Hammoudi, Mohammed Essayah Moad:
Low complexity multichannel spectrum prediction algorithm based on optimized neural network for spectrum allocation in cognitive radio internet of things. - Kiran Gunde, Anuradha Sundru:
Performance of modified generalized quadrature spatial modulation over correlated fading channels with imperfect channel information. - Arunachalam Rajesh, Esther Rani Perumal:
Bipolar fuzzy information-based PROMETHEE-based outranking scheme for mitigating vampire attack in wireless sensor networks. - Muhammad Basit Shahab, Sarah J. Johnson, Mahyar Shirvanimoghaddam, Mischa Dohler:
Enabling transmission status detection in grant-free power domain non-orthogonal multiple access for massive Internet of Things. - Imran A. Khoso, Xiaofei Zhang, Xiaoming Dai, Adeel Ahmed, Zaheer Ahmed Dayo:
Joint steepest descent and non-stationary Richardson method for low-complexity detection in massive MIMO systems. - Sepideh Adabi, Ali Mohammadifar, Mohammad Mahdi Ebrahimi Nezhad:
An energy-aware and lightweight routing algorithm using clustering and mobile sinks in wireless sensor networks. - Justin Jose, Anirudh Agarwal, Vimal Bhatia, Ondrej Krejcar:
Outage probability minimization based power control and channel allocation in underlay D2D-NOMA for IoT networks. - Aswathi V., Anchare V. Babu:
Optimal power allocation for non-orthogonal multiple access enabled full-duplex underlay cognitive relay networks under partial relay selection. - Mahdi Shirmohamadi, Hamidreza Bakhshi, Mohamad Dosaranian Moghadam:
Optimizing resources allocation in a heterogeneous cloud radio access network using machine learning.
- Sumit Bansal, Himanshu Aggarwal, Mayank Aggarwal:
A systematic review of task scheduling approaches in fog computing. - Tapan Nahar, Sanyog Rawat:
Efficiency enhancement techniques of microwave and millimeter-wave antennas for 5G communication: A survey. - Xuefeng Ding, Qihong Gan, Sara Bahrami:
A systematic survey of data mining and big data in human behavior analysis: Current datasets and models. - Lida Kouhalvandi, Ibraheem Shayea, Serdar Özoguz, Hafizal Mohamad:
Overview of evolutionary algorithms and neural networks for modern mobile communication.
Volume 33, Number 10, October 2022
- Changqiao Xu:
Expert systems and computational intelligence paradigms for ubiquitous computing in E-health systems.
- Wenchao Li, Chuanjie Jin, Saru Kumari, Hu Xiong, Sachin Kumar:
Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems. - Yueshen Xu, Yan Jiang, Rui Li, Honghao Gao, Jin Guo, Yaning Liu, Lei Hei, Yihao Wang:
A healthcare-oriented mobile question-and-answering system for smart cities. - Xuanming Wang, Gautam Srivastava:
The security of vulnerable senior citizens through dynamically sensed signal acquisition. - Umesh Bodkhe, Sudeep Tanwar, Pronaya Bhattacharya, Neeraj Kumar:
Blockchain for precision irrigation: Opportunities and challenges. - Sertan Serte, Ali Serener, Fadi M. Al-Turjman:
Deep learning in medical imaging: A brief review. - Ailan Fu, Huifang Han:
Sensor application of mobile nursing integrated workstation measurement system based on SOA architecture model in nursing information management. - Ajay Kumar, Kumar Abhishek, Muhammad Rukunuddin Ghalib, Pranav Nerurkar, Kunjal Shah, Madhav Chandane, Sunil Bhirud, Dhiren R. Patel, Yann Busnel:
Towards cough sound analysis using the Internet of things and deep learning for pulmonary disease prediction. - Kanchan Jha, Sriparna Saha, Muhammad Tanveer:
Prediction of protein-protein interactions using stacked auto-encoder. - Raheleh Khanduzi, Abdolmotalleb Rastegar:
An efficient and robust hybrid metaheuristic method to solve a hierarchical bi-level protection-interdiction problem on real healthcare system.
- Changqiao Xu:
Recent advances in the emerging technologies for connected vehicles in smart cities.
- Hichem Sedjelmaci:
Attacks detection and decision framework based on generative adversarial network approach: Case of vehicular edge computing network. - Abdul Rehman Javed, Zunera Jalil, Syed Atif Moqurrab, Sidra Abbas, Xuan Liu:
Ensemble Adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles. - Yesin Sahraoui, Ahmed Korichi, Chaker Abdelaziz Kerrache, Muhammad Bilal, Marica Amadeo:
Remote sensing to control respiratory viral diseases outbreaks using Internet of Vehicles. - A. Justin Gopinath, Nithya Balasubramanian:
Performance analysis of randomized arbitration interframe space tuning algorithm for enhanced distributed channel access in IEEE 802.11p based vehicular network. - M. Najmul Islam Farooqui, Muhammad Mubashir Khan, Junaid Arshad, Omair Shafiq:
An empirical investigation of performance challenges within context-aware content sharing for vehicular ad hoc networks. - Jimmy Ming-Tai Wu, Min Wei, Gautam Srivastava, Chien-Ming Chen, Jerry Chun-Wei Lin:
Mining large-scale high utility patterns in vehicular ad hoc network environments. - Nader Sohrabi Safa, Faye Rona Mitchell, Carsten Maple, Muhammad Ajmal Azad, Mohammad Dabbagh:
Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities. - Mohammed Laroui, Hatem Ibn-Khedher, Moussa Ali Cherif, Hassine Moungla, Hossam Afifi, Ahmed Kamel:
SO-VMEC: Service offloading in virtual mobile edge computing using deep reinforcement learning. - Leila Benarous, Benamar Kadri, Ahmed Bouridane, Elhadj Benkhelifa:
Blockchain-based forgery resilient vehicle registration system. - Tesnim Mekki, Issam Jabri, Abderrezak Rachedi, Lamia Chaari:
Software-defined networking in vehicular networks: A survey.
- Changqiao Xu:
5G for drone networking.
- Akshita Gupta, Sachin Kumar Gupta, Mamoon Rashid, Amina Khan, Manisha Manjul:
Unmanned aerial vehicles integrated HetNet for smart dense urban area. - Gopal Singh Rawat, Karan Singh:
Joint beacon frequency and beacon transmission power adaptation for internet of vehicles. - Abhinesh Kaushik, D. K. Lobiyal:
Localization in mobile wireless sensor networks using drones.
- Changqiao Xu:
Drone-enabled Internet of Vehicles.
- Zhao Zhang, Yong Zhang, Jie Niu, Da Guo:
Unknown network attack detection based on open-set recognition and active learning in drone network.
- Changqiao Xu:
Natural and bioinspired algorithm for future communication networks.
- I. Sumaiya Thaseen, Arun Krishna Chitturi, Fadi M. Al-Turjman, Achyut Shankar, Muhammad Rukunuddin Ghalib, Kumar Abhishek:
An intelligent ensemble of long-short-term memory with genetic algorithm for network anomaly identification. - M. Divyapushpalakshmi, Ramalakshmi Ramar:
Hybrid machine learning approach for community and overlapping community detection in social network. - Haiyun Yu, Xincun Yang, Liang Wang:
Network security situation prediction based on combining associated entropy and deep recurrent neural network. - C. Rajesh Babu, B. Amutha:
Blockchain and extreme learning machine based spectrum management in cognitive radio networks. - Yonghong Qiu, Gaicheng Liu, Bala Anand Muthu, C. B. Sivaparthipan:
Design of an energy-efficient IoT device with optimized data management in sports person health monitoring application.
Volume 33, Number 11, November 2022
- Manni Kumar, Nitin Goyal, Ramy Mohammed Aiesh Qaisi, Mohd Najim, Sachin Kumar Gupta:
Game theory based hybrid localization technique for underwater wireless sensor networks. - Rathin Chandra Shit, Suraj Sharma:
Ray-tracing assisted fingerprinting for localization in IoT Health 4.0. - Payal Mittal, Santosh Shah, Anirudh Agarwal:
A novel multi-hop routing structure for throughput maximization in unmanned aerial vehicle assisted flying ad-hoc networks. - Shervin Amirsoleimani, Ali Olfat:
Performance analysis of subspace-based spatio-temporal spectral estimator. - Pramod Kumar Aylapogu, Kiran Kumar Gurrala:
A novel high gain dual band ear bud shaped patch antenna for under water communications. - George Sugitha, A. Solairaj, J. Suresh:
Block chain fostered cycle-consistent generative adversarial network framework espoused intrusion detection for protecting IoT network. - Shaheen Solwa, Dauda Ayanda:
A modified global neighborhood algorithm for designing labeling diversity mappers. - Ayan Kumar Das, Sabana Afroz, Shivangi Chandra, Ditipriya Sinha:
MACP: Multifactor Authentication using Physical Unclonable Function and Fuzzy Extractor based Chebyshev Polynomial for Industrial Internet of Things devices. - Nooshin Garakyaragh, Kamal Shahtalebi:
Adaptive FRESH filter with vicarious reference for interference rejection: An application to signal detection in NOMA system. - Donghai Tian, Runze Zhao, Rui Ma, Xiaoqi Jia, Qi Shen, Changzhen Hu, Wenmao Liu:
MDCD: A malware detection approach in cloud using deep learning. - Fatemeh Asghari Azhiri, Behzad Mozaffari Tazehkand, Reza Abdolee:
Millimeter-wave non-orthogonal multiple access systems with sparse antenna arrays. - Xiangdong Jia, Yixuan Guo, Zhenchao Hao, Shengnan Cao:
Age of information and energy efficiency of amplify-and-forward relay-assisted Internet of Things with nonlinear energy harvesting and imperfect channel state information over Nakagami- fading channels. - Vibha Jain, Bijendra Kumar:
Blockchain enabled trusted task offloading scheme for fog computing: A deep reinforcement learning approach. - Ananya Paul, Sulata Mitra:
Deep reinforcement learning based cooperative control of traffic signal for multi-intersection network in intelligent transportation system using edge computing. - Gangasandra Mahadevaiah Kiran, Narasimhaiah Nalini:
Ontology-based data access control model supported with grid computing for improving security in healthcare data. - J. Jaisooraj, S. D. Madhu Kumar:
Energy-efficient routing in low power and lossy networks with concurrent overlapping RPL instances. - Junyan Wang, Xiangdong Jia, Zhi Chen, Xin Zhang:
Optimization on information freshness for multi-access users with energy harvesting cognitive radio networks. - Mina Rady, Quentin Lampin, Dominique Barthel, Thomas Watteyne:
Bringing life out of diversity: Boosting network lifetime using multi-PHY routing in RPL. - Roya Khanzadeh, Mahmoud Ferdosizade Naeiny:
Blind detection for spatial modulation uplink multi-user massive MIMO communications: A sparse Bayesian learning-expectation maximization approach. - Monica Murlidhar Jagtap, Renuka Devi Saravanan:
Intelligent software defined networking: Long short term memory-graded rated unit enabled block-attack model to tackle distributed denial of service attacks. - Anupam Das:
Designing green IoT communication by adaptive spotted hyena tunicate swarm optimization-based cluster head selection. - Vetrivel Chelian Thirumavalavan, Ajay Babu Ruppa Hariharan, Sundarrajan Jayaraman Thiruvengadam:
BER analysis of tightly packed planar RIS system using the level of spatial correlation and discrete phase shifter. - Marco Gramaglia, Marton Kajo, Christian Mannweiler, Ömer Bulakci, Qing Wei:
A unified service-based capability exposure framework for closed-loop network automation. - Osama S. Faragallah, Ahmed I. Sallam, Masoud Alajmi, Hala S. El-sayed:
Low-latency selective encryption scheme for scalable extension of high-efficiency video coding. - Rolando Herrero:
Hybrid error correction in fragmented IoT media streams. - Tamanna Yasrab, Rajalekshmi Kishore, Sanjeev Gurugopinath:
Non-orthogonal multiple access-aided MIMO cognitive radio networks with selective reporting. - Haythem Bany Salameh, Haitham Moffaqq Al-Obiedollah, Themar Arabiat, Ahmad F. Al-Ajlouni, Yaser Jararweh:
Joint bandwidth and power resource allocation technique in multi-carrier non-orthogonal multiple access-based cognitive Internet of Things networks. - Tamizhselvan C.:
A novel communication-aware adaptive key management approach for ensuring security in IoT networks.
- Akshita Gupta, Sachin Kumar Gupta:
A survey on green unmanned aerial vehicles-based fog computing: Challenges and future perspective. - Rania A. Ahmed, Ezz El-Din Hemdan, Walid El Shafai, Zeinab A. Ahmed, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie:
Climate-smart agriculture using intelligent techniques, blockchain and Internet of Things: Concepts, challenges, and opportunities.
Volume 33, Number 12, December 2022
SURVEY ARTICLES
- Thankaraja Raja Sree:
Role of fog-assisted Industrial Internet of Things: A systematic review. - Suprakash Mukherjee, Shashank Gupta, Oshin Rawlley, Siddhant Jain:
Leveraging big data analytics in 5G-enabled IoT and industrial IoT for the development of sustainable smart cities.
RESEARCH ARTICLES
- Weipeng Wang, Jihong Zhao, Hua Qu, Yanpeng Zhang, Gongye Ren:
Joint optimization algorithm of user association and power control based on spatial traffic distribution. - M. Shobana, C. Shanmuganathan, Nagendra Panini Challa, S. Ramya:
An optimized hybrid deep neural network architecture for intrusion detection in real-time IoT networks. - D. Kavitha, A. Vidhya, V. Prema, M. Priyadharshini, G. Kumaresan, G. Sangeetha:
An efficient IoMT based health monitoring using complex valued deep CNN and political optimizer. - Vipin Kumar Upaddhyay, Sanjay Kumar Soni, Naveen Kumar Tiwari:
Reliability analysis of cascaded η - μ fading channels. - Rahman Zandi, Mohammad Javad Dehghani, Vali Kavoosi:
Underwater sound speed profile parameters estimation in asynchronous network. - R. Eswaramoorthi, M. Leeban Moses, Jennathu Beevi Sahul Hameed, Basanti Ghanti:
Deep graph neural network optimized with fertile field algorithm based detection model for uplink multiuser massive multiple-input and multiple-output system. - Bo Li, Kun Li, Shicheng Jin, Rongrong Qian, Hongwei Ding:
Reliability-based offloading strategy for deadline-constrained taskflows in vehicular edge computing environments. - Mohd Javed Khan, Ram Chandra Singh Chauhan, Indrasen Singh:
Outage probability and throughput of cooperative non-orthogonal multiple access with moving relay in heterogeneous network. - Xiao Tong, Xin Li, Fuwang Dong, Wei Wang, Ang Li:
Secrecy rate optimization for dual-functional radar-communication system with energy receiver. - Raghavendra Karanam, Deepti Kakkar:
Artificial neural network optimized ultra wide band fractal antenna for vehicular communication applications. - T. Prem Jacob, Albert Pravin, R. Raja Kumar:
A secure IoT based healthcare framework using modified RSA algorithm using an artificial hummingbird based CNN. - Hanan S. Ghanem, Mohamed R. Shoaib, Safaa El-Gazar, Heba M. Emara, Walid El Shafai, Samia Abd El-Moneim, Adel S. El-Fishawy, Taha E. Taha, Hesham F. A. Hamed, Ghada M. El Banby, Maha Elsabrouty, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Gerges M. Salama:
Automatic modulation classification with 2D transforms and convolutional neural network. - Umar Ghafoor, Mudassar Ali, Humayun Zubair Khan, Adil Masood Siddiqui, Muhammad Naeem:
Efficient resource allocation for hybrid nonorthogonal multiple access based heterogeneous networks beyond fifth-generation. - Bijan Pourghorbani Dinachali, Sam Jabbehdari, Hamid Haj Seyyed Javadi:
A cost-aware approach for cloud federation formation. - Mahmoud Raeisi, Mehdi Mahdavi, Ali Mohammad Doost-Hoseini:
A novel hybrid backscatter and conventional algorithm for multi-hop Internet of Things networks. - Vikas Rao Vadi, Shafiqul Abidin, Azimuddin Khan, Mohd Izhar:
Enhanced Elman spike neural network fostered blockchain framework espoused intrusion detection for securing Internet of Things network. - Luis Fernando Arias Roman, Paulo Roberto de Lira Gondim:
Cloud-based authentication and key management protocol for advanced metering infrastructure in smart grid. - Xue-rong Cui, Peihao Yan, Juan Li, Hao Zhang, Shibao Li, Jianhang Liu:
Timing estimation of multiple hyperbolic frequency-modulated signals based on multicarrier underwater acoustic communication. - Jamal Amadid, Asma Khabba, Zakaria El Ouadi, Abdelouhab Zeroual:
Impacts of three-dimensional array over channel estimation for cell-free massive MIMO considering spatially correlated channels. - Amirhossein Molazadeh, Mehrdad Ardebilipour, Zahra Maroufi:
Sensing matrix design for wideband channel estimation in millimeter-wave hybrid multiple-input multiple-output system. - Ajitha Subhadra Sarngadharan, Rashmi Narasimhamurthy, Balasubramaniam Sankaramoorthy, Suryabhan Pratap Singh, Charanjeet Singh:
Hybrid optimization model for design and optimization of microstrip patch antenna. - M. R. Suma, P. Madhumathy:
Brakerski-Gentry-Vaikuntanathan fully homomorphic encryption cryptography for privacy preserved data access in cloud assisted Internet of Things services using glow-worm swarm optimization. - Yicheng Xu, Hongyun Chu, Pingping Xu:
Cascaded line-of-sight channel estimation for reconfigurable intelligent surface aided multi-user uplink transmissions. - Vijaya Durga Chintala, Subba Rao Suddapalli, Anuradha Sundru:
Performance evaluation of hybrid transform for universal filtered multi-carrier system. - Madhumitha Jayaram, Bhagyaveni Marchala Anjaneyulu:
Spatial time index non-orthogonal multiple access for beyond 5G wireless networks. - Parisa Goudarzi, Amir Masoud Rahmani, Mohammad Mosleh:
A mathematical optimization model using red deer algorithm for resource discovery in CloudIoT. - Mir Salim Ul Islam, Ashok Kumar:
CaPTS scheduler: A context-aware priority tuple scheduling for Fog computing paradigm.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.