


default search action
Wireless Networks, Volume 30
Volume 30, Number 1, January 2024
- Du Junfang, Xiaomin Chen, Dou Yuguang:

Evaluating the practical effectiveness of college counselors' ideological and political education using big data video streaming. 1-15 - D. Minola Davids, A. Arul Edwin Raj

, C. Seldev Christopher:
Hybrid multi scale hard switch YOLOv4 network for cricket video summarization. 17-35 - Zhen-ji Zhu:

Indoor evaluation algorithm for ecological environment design materials based on cloud data processing and wireless communication. 37-50 - Jie Jia

, Haowen Guan, Jian Chen, Leyou Yang, An Du, Xingwei Wang:
Compressive sensing based indoor localization fingerprint collection and construction. 51-65 - P. Jeyakumar, S. Vishwa, V. Prakash, P. Dinesh, P. Rajesh Ram, P. Muthuchidambaranathan

:
Long-short term memory based wideband beam tracking scheme for massive mimo systems. 67-76 - Naween Kumar

, Damodar Reddy Edla, Dinesh Dash, Gandharba Swain, T. N. Shankar:
Energy-efficient and delay-sensitive-based data gathering technique for multi-hop WSN using path-constraint mobile element. 77-95 - Osama H. Elgazzar

, Imbaby I. Mahmoud:
Energy consumption reduction in OFDMA wireless sensor networks in existence of interference hazards. 97-137 - Swetaleena Sahoo, Manidipa Sarkar, Harish Kumar Sahoo, Sarita Nanda

:
Multiuser hybrid precoder design using logarithmic hyperbolic filtering for millimeter wave communication systems. 139-150 - S. Jayashree, Sripathi Venkata Naga Santhosh Kumar

:
LAPEP - Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc network. 151-178 - Mingxia Wan:

Designing an online vocal learning based on ZigBee-enabled wireless platform. 179-192 - Xinrui Duan, Yajun Guo, Yimin Guo:

Design of anonymous authentication scheme for vehicle fog services using blockchain. 193-207 - Rajasoundaran Soundararajan, Sripathi Venkata Naga Santhosh Kumar, Munuswamy Selvi, K. Thangaramya, Kannan Arputharaj:

Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks. 209-231 - Shukun He, Qinlin Li, Mohammad Khishe

, Amin Salih Mohammed, Hassan Mohammadi, Mokhtar Mohammadi:
The optimization of nodes clustering and multi-hop routing protocol using hierarchical chimp optimization for sustainable energy efficient underwater wireless sensor networks. 233-252 - Deqing Zhu

, Genmei Pan:
Analytical model considering varying numbers of RA-RUs to determine how to allocate the RA-RUs in practice. 253-265 - Dingwen Chi

, Jun Tao
, Yulai Hu, Haotian Wang, Zuyan Wang, Yifan Xu:
AUV-assisted information collection scheme with energy balance and low delay of underwater things. 267-283 - Ajay Kaushik

, Hamed S. Al-Raweshidy:
A novel intrusion detection system for internet of things devices and data. 285-294 - Ahmed El. Gouda

, Yasmine Abouelseoud, Ahmed H. Abd El-Malek
, Radwa Ahmed Osman:
Enhanced DV-Hop using shuffled shepherd algorithm for localizing sensor nodes in 3-D space. 295-307 - Mofan Luo, Baoyi Xu, Jian Chen, Long Yang, Yuchen Zhou, Mengmeng Ren, Bingtao He:

Distributed control for semi-grant-free non-orthogonal multiple access. 309-320 - K. Rajkumar

, U. Hariharan
, V. Dhanakoti, N. Muthukumaran:
A secure framework for managing data in cloud storage using rapid asymmetric maximum based dynamic size chunking and fuzzy logic for deduplication. 321-334 - Yesuraj Rajkumar

, Sripathi Venkata Naga Santhosh Kumar
:
An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks. 335-362 - Khaled Ramadan Mohamed

:
Walsh transform-based non-linear equalization algorithm for enhancing the efficiency of MIMO-OFDM communication system. 363-385 - Pedro Cumino

, Miguel Luís
, Denis Rosário, Eduardo Cerqueira, Susana Sargento
:
On the usefulness of flying base stations in 5G and beyond scenarios. 387-403 - Rajarshi Roy Chowdhury

, Azam Che-Idris, Pg Emeroylariffion Abas
:
Identifying SH-IoT devices from network traffic characteristics using random forest classifier. 405-419 - Newsha Nowrozian

, Farzad Tashtarian, Yahya Forghani:
On optimizing the charging trajectory of mobile chargers in wireless sensor networks: a deep reinforcement learning approach. 421-436 - Meng-Shiuan Pan

, Ming-Yang Wu:
A genetic algorithm based flow control scheme for LTE-NR dual connectivity networks. 437-452 - (Withdrawn) Towards an efficient model for network intrusion detection system (IDS): systematic literature review. 453-482

- Serghini Elaage

, Mohammed El Ghzaoui
, Nabil Mrani, Rachid El Alami
:
Implementation and analysis of recombination techniques within the receiver for IoT based applications. 483-493 - Ayman Abdulhadi Althuwayb

, Nasr Rashid
, Khaled Kaaniche
, Ahmed Ben Atitallah
, Osama I. Elhamrawy
, Vishal Sorathiya
, Sunil P. Lavadiya:
Broadband, high gain 2 × 2 spiral shaped resonator based and graphene assisted terahertz MIMO antenna for biomedical and WBAN communication. 495-515 - Zhibin Liu

, Jindong Wang:
Power control algorithm for wireless sensor nodes based on energy prediction. 517-532 - Omid Rahimi, Alireza Shafieinejad

:
Minimizing age of information in multi-UAV-assisted IoT networks: a graph theoretical approach. 533-555 - Shuo Sun

, Qi Zhu
:
Joint optimization algorithm of offloading decision and resource allocation based on integrated sensing, communication, and computation. 557-576 - Khwairakpam Chaoba Singh

, Ngangkham Peter Singh:
An optimized estimation techniques for enhancing the efficiency of power demand in smart grid application. 577-591 - Prabakar Dakshinamoorthy, Saminadan Vaitilingam, Ramesh Sundar

:
Correction: Multivariate clustering for maximizing the small cell users' performance based on the dynamic interference alignment. 593
Volume 30, Number 2, February 2024
- Pavan Kumar Pandey, Vineet Kansal, Abhishek Swaroop:

PKI-SMR: PKI based secure multipath routing for unmanned military vehicles (UMV) in VANETs. 595-615 - A. Maria Christina Blessy

, S. Brindha:
Energy-efficient fuzzy management system using tri-parametric methodology in vanet. 617-635 - Xiang Ma, Kexuan Zong, Amin Rezaeipanah:

Auto-scaling and computation offloading in edge/cloud computing: a fuzzy Q-learning-based approach. 637-648 - Tan N. Nguyen

, Nguyen Van Vinh
, Ba Cao Nguyen
, Minh Bui Vu
:
On performance of RIS-aided bidirectional full-duplex systems with combining of imperfect conditions. 649-660 - P. Mohanraj, S. Anbu Karuppusamy:

Efficient security framework against sybil attack in mobile adhoc network using EE-OLSR protocol scheme. 661-669 - Amjad Aldweesh, Sarangam Kodati

, Mohammad Alauthman
, Ibrahim Aqeel
, Ibrahim Mohsen Khormi, M. Dhasaratham, R. Lakshmana Kumar
:
Mlora-CBF: efficient cluster-based routing protocol against resource allocation using modified location routing algorithm with cluster-based flooding. 671-693 - Reza Molaei, Kheirollah Rahsepar Fard, Asgarali Bouyer:

Time and cost-effective online advertising in social Internet of Things using influence maximization problem. 695-710 - R. Aruna, Virendra Singh Kushwah

, Surapaneni Phani Praveen, Rahul Pradhan, Amit Jaykumar Chinchawade, Renas Rajab Asaad, R. Lakshmana Kumar
:
Coalescing novel QoS routing with fault tolerance for improving QoS parameters in wireless Ad-Hoc network using craft protocol. 711-735 - Xiuwu Yu, Yinhao Liu

, Yong Liu:
WSN routing algorithm based on node classification and multi-layer transport. 737-747 - Areeb Ahmed Bhutta

, Mehr-Un-Nisa
, Adnan Noor Mian:
Lightweight real-time WiFi-based intrusion detection system using LightGBM. 749-761 - Amjad Aldweesh:

The impact of blockchain on digital content distribution: a systematic review. 763-779 - Syed Adil Abbas Kazmi

, Muhammad Shahid Iqbal, Sinem Coleri
:
Resource allocation for full-duplex MIMO relaying system with self-energy recycling. 781-797 - Lei Du, Ru Huo

, Chuang Sun, Shuo Wang, Tao Huang
:
Adaptive joint placement of edge intelligence services in mobile edge computing. 799-817 - Manoj Kumar Beuria, Sudhansu Sekhar Singh

:
Performance analysis of cooperative NOMA with optimized power allocation using deep learning approach. 819-834 - Shun-Chieh Chang

:
The Monte Carlo tree search based bandwidth slicing allocation algorithm. 835-844 - Mohamad Hossein Ashouri

, Saeed Fakhte
, Mohamad Mahdi Taskhiri:
A broadband high gain circularly polarized magneto-electric dipole antenna with chiral metamaterial for 5G/WIMAX wireless network. 845-855 - Abbas Rezaei

, Salah I. Yahya
, Leila Nouri
:
An ultra-compact diplexer based on simple microstrip coupled lines for GSM and wideband wireless applications. 857-865 - María Elena de Cos Gómez

, Humberto Fernández Álvarez, Fernando Las-Heras Andrés:
PP-based 24 GHz wearable antenna. 867-882 - Azath Mubarakali

, Salomi Samsudeen, Ahmed Alkhayyat, Badria Sulaiman Alfurhood
, D. Haritha, Deevi Radha Rani, M. Karthick
:
Optimized flexible network architecture creation against 5G communication-based IoT using information-centric wireless computing. 883-907 - Shaogang Dai, Huaji Zhou:

An electromagnetic signal classification method inspired by the visual characteristics of biological dual-channel. 909-921 - Haitao Li

, Xin Lv, Hao Zhang, Jiawei Huang:
Anti-jamming transmission in softwarization UAV network: a federated deep reinforcement learning approach. 923-937 - Liyakathunisa Syed

, P. Sathyaprakash
, A. Shobanadevi, Ha Huy Cuong Nguyen, Mohammad Alauthman
, M. Vedaraj
, R. Premalatha:
Deep learning-based route reconfigurability for intelligent vehicle networks to improve power-constrained using energy-efficient geographic routing protocol. 939-960 - Saeed Iqbal, Aadil Raza, Mohammad Kaleem, Muhammad Iqbal, Muhammad Adeel, Salman Ghafoor:

A full duplex LG modes enabled millimeter-wave based FSO communication system for disaster zone. 961-971 - Shiguo Wang, Hongdong Liu, Rukhsana Ruby, Xiukai Ruan, Yongjian Zhang:

Pilot spoofing detection based on pilot random block encryption. 973-985 - Bakri Hossain Awaji, M. M. Kamruzzaman, Ahmad Althuniabt, Ibrahim Aqeel

, Ibrahim Mohsen Khormi, Mani Gopalsamy
, Udayakumar Allimuthu
:
Novel multiple access protocols against Q-learning-based tunnel monitoring using flying ad hoc networks. 987-1011 - Mohammad Reza Ghaderi

, Nasrin Amiri
:
LoRaWAN sensor: energy analysis and modeling. 1013-1036 - Tathababu Addepalli, Manish Sharma

, M. Satish Kumar, Gollamudi Naveen Kumar, Prabhakara Rao Kapula
, Ch. Manohar Kumar
:
Self-isolated miniaturized four-port multiband 5G sub 6 GHz MIMO antenna exclusively for n77/n78 & n79 wireless band applications. 1037-1053 - Jiali Zheng

, Zihan Lin, Xiaode Xie:
Improved multi-objective brain storm optimization algorithm for RFID network planning. 1055-1068 - Shiwen He

:
An endogenous intelligent architecture for wireless communication networks. 1069-1084 - A. Poobalan

, P. Shanthakumar, M. Robinson Joel
:
Hybrid optimization enabled VM scaling based load distribution and optimal switching strategy in cloud data center. 1085-1105 - Xue Li:

A wireless network-based machine intelligence model for green tourism satisfaction analysis. 1107-1120 - Mohsen Azizi

, Ebadollah Zohrehvandi:
A hybrid approach of multi-cast routing and clustering in underwater sensor networks. 1121-1132
Volume 30, Number 3, April 2024
- Alireza Ahadipour, Alireza Keshavarz-Haddad:

Network selection in heterogeneous dense networks based on user clustering. 1133-1148 - Alireza Ahadipour, Alireza Keshavarz-Haddad:

Correction to: Network selection in heterogeneous dense networks based on user clustering. 1149 - M. Indrasena Reddy, M. Purushotham Reddy, R. Obulakonda Reddy, A. Praveen:

Improved elliptical curve cryptography and chaotic mapping with fruitfly optimization algorithm for secure data transmission. 1151-1164 - S. Porkodi

, D. Kesavaraja:
Scammer identification using CatBoost in smart contract for enhancing security in blockchain network. 1165-1186 - A. Mani

, G. Kavya
, B. R. Tapas Bapu:
A proficient resource allocation using hybrid optimization algorithm for massive internet of health things devices contemplating privacy fortification in cloud edge computing environment. 1187-1199 - Jing Zhang, Jingpan Bai

:
Dijkstra algorithm based cooperative caching strategy for UAV-assisted edge computing system. 1201-1219 - Santosh Kumar Yadav, Rakesh Kumar:

ASME-SKYR framework: a comprehensive task scheduling framework for mobile cloud computing. 1221-1244 - Piyu Sarcar, Arindam Giri, Mrutyunjay Rout:

Secured DV-Hop localization scheme for WSN in environmental monitoring. 1245-1253 - Fereshte Dehghani

, Naser Movahhedinia:
On the energy-delay trade-off in CCN caching strategy: a multi-objective optimization problem. 1255-1269 - Pablo Torío

, Manuel García Sánchez
, Luis A. López-Valcárcel
:
Interference free multiuser modulation for mmWave radio links. 1271-1276 - Rahul Kumar

, Surender Kumar Soni, Shweta Singh
, Nithin Varma:
New statistics on FTR fading over dynamic scenario and energy detector performance. 1277-1284 - S. Porkodi

, D. Kesavaraja:
Smart contract: a survey towards extortionate vulnerability detection and security enhancement. 1285-1304 - Lixia Lin

, Zhicheng Yang, Zhihong Dong:
Modeling and analysis of computation offloading in NOMA-based fog radio access networks. 1305-1319 - Ju-Hung Jon, Chol Jong, Kwuang-Sik Ryu, Won Kim:

Enhanced uplink handover scheme for improvement of energy efficiency and QoS in LTE-A/5G HetNet with ultra-dense small cells. 1321-1338 - Lovish Matta

, Bhanu Sharma, Manish Sharma
:
A review on bandwidth enhancement techniques and band-notched characteristics of MIMO-ultra wide band antennas. 1339-1382 - G. Senthilkumar

, K. Tamilarasi, J. K. Periasamy:
Cloud intrusion detection framework using variational auto encoder Wasserstein generative adversarial network optimized with archerfish hunting optimization algorithm. 1383-1400 - N. R. Rejin Paul, G. Arunkumar, Abhay Chaturvedi, Upendra Singh

:
LCO-EGC: levy chaotic optimization-based enhanced graph convolutional network for monitoring health of sports athletes. 1401-1422 - Kabeer Ahmed Bhatti

, Sohail Asghar
, Bilal Rauf
, Imran Ali Qureshi
:
A multi-objective integrated PID controller combined with NSGA-III for minimizing congestion in WSNs. 1423-1439 - Hassan A. Hassan, Mohamed A. Mohamed, Mohamed N. Shaaban, Mohamed Hassan Essai Ali, Osama A. Omer:

An efficient deep neural network channel state estimator for OFDM wireless systems. 1441-1451 - Zahra Ezzati Khatab, Abbas Mohammadi

, Vahid Pourahmadi, Ali Kuhestani:
A machine learning multi-hop physical layer authentication with hardware impairments. 1453-1464 - Xiang-Li Fan, Xiujun Hao:

Multimodal sensing and decision-making for evaluating the physical fitness of university students using body area network. 1465-1478 - Changqing Ye

, Hong Jiang, Hongliang Xu, Haoxin Shi, Liping Deng:
Joint active and passive beamforming optimization for IRS-assisted downlink MISO-URLLC in max-min fairness. 1479-1491 - Harun Bangali, Paul Rodrigues, V. Pandimurugan

, Rajasoundaran Soundararajan, Sripathi Venkata Naga Santhosh Kumar
, Munuswamy Selvi, Arputharaj Kannan:
Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural network. 1493-1511 - Donghun Lee

:
Secrecy capacity of scheduled TAS scheme over non-identical nakagami fading channels. 1513-1526 - Hemanta Kumar Sahu

, Prakash Kumar Panda, Simhadri Vadrevu, Milan Biswal:
Performance analysis of SWIPT based dynamic smart grid neighbourhood area network with space shift keying modulation. 1527-1538 - Radhika Kavra

, Anjana Gupta, Sangita Kansal:
Dual-interference minimization routing techniques in wireless sensor networks. 1539-1551 - J. Uma Maheswari, Somasundaram S. K, P. Sivakumar

:
Hybrid optimization enabled secure privacy preserved data sharing based on blockchain. 1553-1574 - Abdulkarem Hussein Mohammed Almawgani

:
RNN-LSTM model for reliable optical transmission in flexible switching network systems. 1575-1589 - Gabriel Santos Luz, Nildo dos Santos Ribeiro Júnior, Luiz Filipe M. Vieira

, Marcos A. M. Vieira, Omprakash Gnawali
:
Latency minimizing in two paths dual radio networks. 1591-1600 - Madhvi Saxena

, Subrata Dutta
, Binod Kumar Singh
:
Optimal routing using whale optimization and lion optimization algorithm in WSN. 1601-1618 - Zhiguo Liu, Yingru Jiang

, Yuxiao Yan, Xiaobo Ren:
Research on spectrum sensing method of space-ground integrated networks based on two-level cooperative cognition. 1619-1632 - Xiaoming Li

, Shuai Wang, Wantong An:
Design of tri-band dual-polarized base station antenna for 2G/3G/4G/5G. 1633-1642 - Alok Kumar Baranwal, Shashibhushan Sharma

, Sanjay Dhar Roy
, Sumit Kundu:
On performance of a full duplex SWIPT enabled cooperative NOMA network. 1643-1656 - Ruizhong Du, Guangwen Yang

, Mingyue Li:
A collaborative offloading framework for multiple UAV considering service caching. 1657-1670 - Jukka Lempiäinen, Muhammad Usman Sheikh, Ari Asp, Riku Jäntti:

Polarization adaptation to improve cell border area bitrates and system capacity in small cells. 1671-1681 - Vishakha Thakur, Naveen Jaglan

:
A T-shaped compact dual-band MIMO antenna system for 5G smartphone applications. 1683-1695 - J. Suresh, J. Martin Sahayaraj, B. Rajakumar, N. Jayapandian

:
Hybrid Bayesian and modified grey PROMETHEE-AL model-based trust estimation technique for thwarting malicious and selfish nodes in MANETs. 1697-1718 - Abdullah Saleh Alqahtani, Saravanan Pandiaraj

, Sami Alshmrany, Ali Jaber Almalki, Sandeep Prabhu
, U. Arun Kumar:
Enhancing MIMO-OFDM channel estimation in 5G and beyond with conditional self-attention generative adversarial networks. 1719-1736 - Shao-Yu Lien, Cheng-Hao Yeh, Der-Jiunn Deng

:
Optimum splitting computing for DNN training through next generation smart networks: a multi-tier deep reinforcement learning approach. 1737-1751 - Jiai He, Weijia Zhu

, Lili Qiu, Qin Zhang, Chanfei Wang:
An indoor fall detection system based on WiFi signals and genetic algorithm optimized random forest. 1753-1771 - Ramalingam Shanmugam, S. Dhanasekaran, Sathya Selvaraj Sinnasamy, Ayodeji Olalekan Salau

, Manjunathan Alagarsamy:
Performance enhancement of efficient clustering and routing protocol for wireless sensor networks using improved elephant herd optimization algorithm. 1773-1789 - Toloo Analooei, S. Mohammad Saberali

, Mahdi Majidi:
Maximum likelihood based detector for PD-NOMA with statistical CSI: more efficient and lower complexity compared to SIC. 1791-1798 - Zhihui Weng, Zhibin Xie

:
AP selection game in dense IEEE 802.11 WLANs. 1799-1814 - Manish Sharma

, Ashwni Kumar, Vaishali Kikan, Gaurika Jaitly, Siddhi Bhardwaj, Neha, Takhshish Bano:
Conformal ultra-compact narrowband 60.0 GHz four-port millimeter wave MIMO antenna for wearable short-range 5G application. 1815-1831 - A. A. Periola

:
Stratospheric platform applications: reduced cognitive load for multimedia and education. 1833-1856 - Anushkannan Nedumaran Kalavathy, A. H. M. Almawgani

, U. Arun Kumar, Ayman Taher Hindi:
CSRR backed compact two-port, dual-band MIMO antenna for mm-wave applications. 1857-1867 - Nourredine Oukas

, Menouar Boulif
, Karima Arab:
A novel fluid-based modeling approach using extended Hybrid Petri nets for power consumption monitoring in wireless autonomous IoT devices, with energy harvesting capability and triple sleeping strategy. 1869-1892 - Volkan Özduran

, Nikolaos Nomikos:
Performance analysis of inverse successive interference cancellation in NOMA-based communications. 1893-1907 - Volkan Özduran

, Nikolaos Nomikos:
Correction to: Performance analysis of inverse successive interference cancellation in NOMA-based communications. 1909 - Guang-Hui Li

, Dian-Wu Yue
, Si-Nian Jin:
Performance analysis of multiple RISs aided multi-user mmWave MIMO systems. 1911-1924 - Min Zhang, Xinjie Wang, Enyu Li, Guang Yang, Xuhu Wang:

Secure 5G downlink NOMA cognitive relay network: joint the impact of imperfect spectrum sensing and outdated CSI. 1925-1937 - Dahlia Asyiqin Ahmad Zainaddin, Zurina Mohd Hanapi, Mohamed Othman, Zuriati Ahmad Zukarnain, Muhammad Daniel Hafiz Abdullah:

Recent trends and future directions of congestion management strategies for routing in IoT-based wireless sensor network: a thematic review. 1939-1983 - Michal Holubcik

, Jozef Jandacka, Miriam Nicolanská:
Correction: Design of a wireless monitoring system with emission analysis integration for solid-fuel based heating devices in households of SmartCity. 1985
Volume 30, Number 4, May 2024
- Biroju Papachary, Rajeev Arya

, Bhasker Dappuri:
Optimum resource allocation for D2D-assisted wireless network in industrial internet of things: a hypergraph-based clique algorithm. 1987-1999 - Elahe Javadi, Zolfa Zeinalpour-Yazdi

, Farzad Parvaresh:
Hierarchical coded caching with heterogeneous cache sizes. 2001-2016 - Ruobin Wang

, Rui-Bin Hu
, Fang-Dong Geng
, Lin Xu
:
Improved DV-Hop based on parallel compact Willow Catkin Optimization algorithm for 3D nodes localization in WSN. 2017-2039 - Chunyang Wang, Guannan Tan, Yong Fang, Zhichao Sheng, Hongwen Yu

:
Joint design of hybrid beamforming and reflection coefficients for reconfigurable intelligent surface aided mmWave communication systems. 2041-2059 - Divya Jegatheesan

, Chandrasekar Arumugam
:
SIoV-FTFSA-CAOA: a fuzzy trust-based approach for enhancing security and energy efficiency in social internet of vehicles. 2061-2080 - Xiaojun Zhu

, Hao Han:
Quest: instant questionnaire collection from handshake messages using WLAN. 2081-2098 - C. Tamizshelvan, V. Vijayalakshmi:

Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures. 2099-2114 - Ahmed Elsheikh, Ahmed S. Ibrahim

, Mahmoud H. Ismail:
Density-based anti-clustering for scheduling D2D communications. 2115-2125 - Minh-Sang Van Nguyen

, Dinh-Thuan Do, Phu Tran Tin
, Agbotiname Lucky Imoize
, Vinoth Babu Kumaravelu:
Full duplex reconfigurable intelligent surfaces system relying on NOMA and wireless power transfer. 2127-2142 - Chengqiang Zhao, Jiashu Zhang, Fan Ni:

Modulation recognition network compression based on a randomly perturbation convolutional kernel activation mapping method. 2143-2157 - Sumithra Alagarsamy, Vijayalakshmi Nagarajan, M. M. Yamuna Devi:

OMIBC: optimal modified identity-based cryptography for signcryption and private key extraction using fuzzy model. 2159-2172 - Hamed Ghasemi, Shahram Babaie

:
A new intrusion detection system based on SVM-GWO algorithms for Internet of Things. 2173-2185 - Changyong Shin

:
Multi-cluster MIMO non-orthogonal multiple access for multi-cell systems. 2187-2201 - Raghad Zuhair Yousif

, Sirwan Kareem Jalal
, Firas H. Al-Mukhtar:
Enhanced passive optical network system-based VCSEL and PSK electrical modulator for 5th generation. 2203-2217 - Illapu Sankara Srinivasa Rao

, N. R. Rajalakshmi:
Energy efficient optimal parent selection with Chameleon Swarm algorithm and non-overlapping backoff algorithm based dynamic slot allocation in wireless body area network. 2219-2234 - Ivan Kedzo

, Ante Kristic
, Vesna Pekic
, Ivana Zulim:
High priority space protection (HPP): countdown space-based MAC protocol with enhanced lockdown effect. 2235-2255 - Reyhaneh Allahyari, Zolfa Zeinalpour-Yazdi

, Aliakbar Tadaion:
Outage analysis of downlink communications in heterogeneous networks under backhaul constraint. 2257-2273 - Rishabh Jain, Sunita Dhingra

, Kamaldeep Joshi
, Amit Grover:
An adaptive model of optimal traffic flow prediction using adaptive wildfire optimization and spatial pattern super learning. 2275-2283 - Farjam Mohammadi Baghnoi, Jasem Jamali

, Mehdi Taghizadeh, Mohammah Hossein Fatehi:
Multi-agent based optimal UAV deployment for throughput maximization in 5 G communications. 2285-2296 - Mai Ha Thi, Tran Tuan Toan, Nguyen Tran Quoc Vinh, Dang Thanh Hai, Tran Manh Tuan, Le Hoang Son:

An energy efficient routing algorithm in wireless underground sensor networks. 2297-2311 - Arooba Saeed, Muhammad Umar Javed

, Ahmad Almogren, Nadeem Javaid, Mohsin Jamil:
Employing blockchain and IPFS in WSNs for malicious node detection and efficient data storage. 2313-2328 - Vignesh Thangaraj, Srie Vidhya Janani Elangeswaran, Bhuvaneshwari Subburaman, Jayshri S. Kulkarni

:
Modeling of a high gain two stage pHEMT LNA using ANN with Bayesian regularization algorithm. 2329-2342 - Ketavath Kumar Naik

:
Asymmetric CPW-fed patch antenna with slits at terahertz applications for 6G wireless communications. 2343-2351 - Tolulope T. Oladimeji

, Pradeep Kumar, Mohamed K. Elmezughi:
An improved path loss model for 5G wireless networks in an enclosed hallway. 2353-2364 - Jun Xu

, Dejun Yang:
Optimizing resource allocation for D2D communications with incomplete CSI. 2365-2379 - Mahrukh Liaqat, Kamarul Ariffin Noordin

, Tarik Abdul Latef, Kaharudin Dimyati, Talha Younas, Faizan Qamar, Zhiguo Ding:
Performance evaluation of multiple relay SWIPT enabled cooperative NOMA network in the presence of interference. 2381-2394 - P. Golda Jeyasheeli

, V. Nahshon Vanahpeter, M. Dhanush Holla:
Link failure handling and controller memory overhead elimination in SDN through source path routing model technique. 2395-2409 - Xiaoyan Zhang, Chao Tang, Yueyun Chen:

A weighted cooperative spectrum sensing strategy for NGSO-GSO downlink communication. 2411-2422 - Arunkumar Ramakrishnan

, Thanasekhar Balaiah:
Heterogeneous Lifi-Wifi with multipath transmission protocol for effective access point selection and load balancing. 2423-2437 - S. Soundararajan, B. Nithya, N. Nithya, T. Vignesh:

Block chain espoused adaptive multi-scale dual attention network with quaternion fractional order meixner moments encryption for cyber security in wireless communication network. 2439-2455 - Pablo Avila-Campos

, Jetmir Haxhibeqiri
, Ingrid Moerman, Xianjun Jiao, Jeroen Hoebeke:
Impactless association methods for wi-fi based time-sensitive networks. 2457-2475 - Jaganathan Logeshwaran, R. N. Shanmugasundaram, Jaime Lloret

:
Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN. 2477-2509 - Jumin Zhao, Jiajian Song, Deng-ao Li, Yajun Li, Jie Cheng

:
Dual-band RF energy harvesting for low-power IoT devices. 2511-2527 - Yu Zeng

, Hongwei Ding
, Haifeng Wu
:
Fast monte-carlo clustering for signal separation of RFID collision tags at physical layer. 2529-2539 - Yamna Ghoul, Omar Naifar

:
A healthcare application based on IoT devices. 2541-2556 - Gayatri Tangirala

, Srinivasu Garikipati
, Manoj Kumar Meshram, Manikya Krishna Chaitanya Durbhakula, Virendra Kumar Sharma:
Quad element luna-shaped UWB-MIMO antenna with improved isolation and gain using novel decoupling networks. 2557-2569 - Anh Tuan Giang

, Anthony Busson
:
Performance evaluation of OFDMA and aggregation downlink stateless service disciplines in Wi-Fi networks. 2571-2587 - Ahmed Saidi

:
An adaptive trust system for misbehavior detection in wireless sensor networks. 2589-2615 - Atul B. Wani, Anupama A. Deshpande, Suhas H. Patil:

MH-SIA: multi-objective handover using swarm intelligence algorithm for future wireless communication system. 2617-2632 - Jingjing Guo, Jiacong Sun

:
Secure shortest distance queries over encrypted graph in cloud computing. 2633-2646 - Rahul Priyadarshi

:
Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: a comprehensive review. 2647-2673 - Shu-Chuan Chu

, Xu Yuan, Jeng-Shyang Pan
, Tsu-Yang Wu, Fengting Yan:
An efficient surrogate-assisted Taguchi salp swarm algorithm and its application for intrusion detection. 2675-2696 - Juteng Fu, Xiang Ma, Hang Yu, Keren Dai

:
Distributed energy-efficient wireless sensing and information fusion via event-driven and state-rank activation. 2697-2711 - Rishabh Jain, Sunita Dhingra

, Kamaldeep Joshi
, Amit Grover:
Correction to: An adaptive model of optimal traffic flow prediction using adaptive wildfire optimization and spatial pattern super learning. 2713 - Madhav Singh, Laxmi Shrivastava:

Multi-objective optimized multi-path and multi-hop routing based on hybrid optimization algorithm in wireless sensor networks. 2715-2731 - Shanvendra Rai

, Rituparna Paul, Subhasish Banerjee
, Preetisudha Meher:
An anonymous mutual authentication and key agreement scheme in WMSN using physiological data. 2733-2752 - Shatakshi Singh

, Aditya Trivedi, Divya Saxena:
Generative channel estimation for intelligent reflecting surface-aided wireless communication. 2753-2765 - Alireza Zarghami, Mohsen Hayati

, Sepehr Zarghami:
Design of miniaturized ultra-wide stopband lowpass-bandpass diplexer using hexagon-shaped resonators. 2767-2779 - Walid Osamy, Ahmed M. Khedr, Ahmed A. Elsawy, P. V. Pravija Raj, Ahmed Aziz

:
SEACDSC: secure and energy-aware clustering based on discrete sand cat swarm optimization for IoT-enabled WSN applications. 2781-2800 - Minghua Wang

, Chang Huang:
Mobile anchor node assisted node collaborative localization based on light reflection in WSN. 2801-2818 - A. Anju, M. Krishnamurthy:

M-EOS: modified-equilibrium optimization-based stacked CNN for insider threat detection. 2819-2838 - Yimin Wang, Yuhong Du, Changyun Miao, Di Miao, Yao Zheng, Dengjie Yang:

Longitudinal tear detection method for conveyor belt based on multi-mode fusion. 2839-2854 - Tao Chen, Yu Lei, Limin Guo, Boyi Yang:

Multi-component signal separation based on ALSAE. 2855-2862 - Yonghao Chen, Weigang Wang

, Hao Wu, Qijian Liu, Pengcheng Gao, Chen Zhang:
NLOS error mitigation in TOA systems. 2863-2872 - Yonas Abate Debalki

, Jin Hou
, Baye Yemataw Adane
, Vittor Gift Mawutor, Hui Dang:
A distributed relay selection using a fuzzy-BCM based decision making strategy for multi-hop data dissemination in VANETs. 2873-2894 - Sakir Simsir

:
Symbol detection based on a novel discrete harmony search algorithm in MIMO-FBMC/OQAM system. 2895-2916 - Debajyoti Biswas

, Suvankar Barai:
Reliable positioning-based human activity recognition based on indoor RSSI changes. 2917-2937 - Jie Jia

, Leyou Yang, Jian Chen, Lidao Ma, Xingwei Wang:
Online delay optimization for MEC and RIS-assisted wireless VR networks. 2939-2959 - B. S. Liya, R. Krishnamoorthy, S. Arun:

An enhanced deep learning-based disease detection model in wireless body area network with energy efficient routing protocol. 2961-2986 - Shraiyash Pandey

, Bharat Bhushan
:
Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks. 2987-3026
Volume 30, Number 5, July 2024
- Raed Alhamad

, Hatem Boujemaa:
Reconfigurable intelligent surfaces with solar energy harvesting. 3027-3038 - Vanishree R. Nawati, B. K. Sujatha, G. S. Karthikeya

, Arpan Desai
, Heng-Tung Hsu, Merih Palandoken
:
A Compact Dual-polarized Probe-fed UWB Antenna System for Breast Cancer Detection Applications. 3039-3050 - Emilio Gómez-Déniz

, Luís Gómez Déniz
:
A new derivation of the Nakagami-m distribution as a composite of the Rayleigh distribution. 3051-3060 - Jielin Chen, Niansheng Chen, Songlin Cheng

, Guangyu Fan, Lei Rao, Xiaoyong Song, Wenjing Lv, Dingyu Yang:
Performance analysis of UAV-assisted DF relaying network with hardware impairments and energy harvesting. 3061-3073 - Rakhee Kulshrestha

, Shruti Goel, Pooja Balhara:
Transient analysis of enhanced hybrid spectrum access for QoS provisioning in multi-class cognitive radio networks. 3075-3099 - Rakhee Kulshrestha

, Shruti Goel, Pooja Balhara:
Correction: Transient analysis of enhanced hybrid spectrum access for QoS provisioning in multi-class cognitive radio networks. 3101 - Leila Ghanbari

, Asghar Keshtkar, Saughar Jarchi:
Characteristic mode analysis of a flexible circularly polarized UWB antenna for wireless body area networks. 3103-3117 - Abdelhadi Eloudrhiri Hassani

, Aicha Sahel, Abdelmajid Badri, Ilham El Mourabit:
Multiple channel access techniques in industrial IoT: evaluation case of time-slotted channel hopping. 3119-3133 - C. Ambhika

:
Discrimination of primary user emulation attack on cognitive radio networks using machine learning based spectrum sensing scheme. 3135-3147 - A. D. C. Navin Dhinnesh

, T. Sabapathi:
Multi-objective Grey Wolf Optimization based self configuring wireless sensor network. 3149-3160 - Radwan S. Abujassar

:
A highly effective algorithm for mitigating and identifying congestion through continuous monitoring of IoT networks, improving energy consumption. 3161-3180 - Madhuri Malakar

, Judhistir Mahapatro
, Timam Ghosh:
A survey on routing and load-balancing mechanisms in software-defined vehicular networks. 3181-3197 - Wenyu Luo, Huajun Cui, Xuefeng Xian, Xiaoming He:

Intelligent reflecting surface-aided computation offloading in UAV-enabled edge networks. 3199-3210 - N. R. Rejin Paul, P. Purnendu Shekhar, Charanjeet Singh

, P. Rajesh Kumar:
SAIF-Cnet: self-attention improved faster convolutional neural network for decentralized blockchain-based key management protocol. 3211-3228 - Ting Yang, Jiabao Sun, Amin Mohajer:

Queue stability and dynamic throughput maximization in multi-agent heterogeneous wireless networks. 3229-3255 - Sunanda Bose

, Akash Chowdhury, Nandini Mukherjee
:
Scheduling periodic sensors for instantaneous aggregated traffic minimization. 3257-3268 - S. Jayashree, Sripathi Venkata Naga Santhosh Kumar

:
An efficient group signature based certificate less verification scheme for vehicular ad-hoc network. 3269-3298 - Eugene Casmin, Enver Ever

:
An analytical approach for modelling unmanned aerial vehicles and base station interaction for disaster recovery scenarios. 3299-3319 - Valmik Tilwari

, Taewon Song, Usha Nandini, V. Sivasankaran, Sangheon Pack:
A multi-criteria aware integrated decision making routing protocol for IoT communication toward 6G networks. 3321-3335 - Almir Maric

, Pamela Njemcevic
:
Performance analysis of M-ary RQAM and M-ary DPSK receivers over the channels with TWDP fading. 3337-3347 - Shaochuan Wu

, Yuming Wei, Yulong Gao, Wenbin Zhang:
Probabilistic quantization of unbiased broadcast gossip algorithms for consensus in distributed networks. 3349-3355 - Xujie Li

, Ying Sun, Lingjie Zhou, Yanli Xu, Siyuan Zhou:
A resource allocation scheme based on predatory search algorithm for ultra-dense D2D communications. 3357-3365 - Xiaolin Jiang

, Ming Diao:
A new type double-threshold signal detection algorithm for satellite communication systems based on stochastic resonance technology. 3367-3374 - Xiaolong Yang, Shuai Lu

, Mu Zhou, Zengshan Tian, Weiqiang Tan:
GPS attitude measurement with baseline constrained optimization algorithm for unpiloted car. 3375-3386 - Bo Li

, Junyi Yang, Hongjuan Yang
, Gongliang Liu, Ruofei Ma, Xiyuan Peng:
Decode-and-forward cooperative transmission in wireless sensor networks based on physical-layer network coding. 3387-3393 - Yong Wang, Xiuqian Jia

, Mu Zhou, Liangbo Xie, Zengshan Tian:
A novel F-RCNN based hand gesture detection approach for FMCW systems. 3395-3408 - Liangbo Xie

, Mu Zhou, Yong Wang, Wei Nie, Xiaolong Yang, Xin Liu:
A low power clock generator with self-calibration for UHF RFID tags in intelligent terrestrial sensor networks. 3409-3417 - Zhen Zhang, Yibing Li

, Lin Qi
:
Research on multifractal dimension and improved gray relation theory for intelligent satellite signal recognition. 3419-3427 - Xianfeng Liu, Xiaoqian Chen, Kanglian Zhao

, Lei Yang, Yong Zhao, Chengguang Fan:
Energy-efficiently collaborative data downloading in optical satellite networks. 3429-3441 - Li Wang, Kwok-Yan Lam

, Jiangxin Zhang, Feng Li:
Spectrum optimization in cognitive satellite networks with graph coloring method. 3443-3452 - Wenmin Lin, Xiaochun Yin, Shoujin Wang

, Mohammad Reza Khosravi:
A Blockchain-enabled decentralized settlement model for IoT data exchange services. 3453-3467 - Jiaxin Deng, Weihua Ou

, Jianping Gou
, Heping Song
, Anzhi Wang, Xing Xu:
Representation separation adversarial networks for cross-modal retrieval. 3469-3481 - Weijia Huang, Qianmu Li, Shunmei Meng

:
KG2Rec: LSH-CF recommendation method based on knowledge graph for cloud services. 3483-3494 - Kai Peng

, Hualong Huang, Shaohua Wan
, Victor C. M. Leung:
End-edge-cloud collaborative computation offloading for multiple mobile users in heterogeneous edge-server environment. 3495-3506 - Fei Dai

, Qi Mo, Tong Li, Bi Huang, Yongji Yang, Youjie Zhao:
Refactoring business process models with process fragments substitution. 3507-3521 - Ziyuan Li, Xing Xu

, Fumin Shen, Hua Chen:
CR-FPN: channel relation feature pyramid network for object detection. 3523-3532 - Qi Liu, Ruichao Mo

, Xiaolong Xu
, Xu Ma:
Multi-objective resource allocation in mobile edge computing using PAES for Internet of Things. 3533-3545 - Lingling Xu, Zhiwei Sun

, Wanhua Li, Hongyang Yan:
Delegatable searchable encryption with specified keywords for EHR systems. 3547-3559 - Jianru Li, Chunyan Ma, Huimin Lu:

Deep-sea visual dataset of the South China sea. 3561-3570 - Qianmu Li, Shuo Wang

, Yaozong Liu, Huaqiu Long
, Jian Jiang:
Traffic self-similarity analysis and application of industrial internet. 3571-3585 - Hui Qi, Xiaofang Mu, Ying Shi:

A task unloading strategy of IoT devices using deep reinforcement learning based on mobile cloud computing environment. 3587-3597 - Tohlu Matsushima

, Hiroyuki Okumura, Nobuo Kuwabara, Yuki Fukumoto:
Imbalance difference model for prediction of unintentional radiated emission from 10-wire power cable using for power line communication. 3599-3606 - Chen Li, Zhuotong Liu, Sijie Li, Ziniu Lin, Lihua Tian:

Variable length deep cross-modal hashing based on Cauchy probability function. 3607-3617 - Congshi Jiang, Yihong Li

, Junlong Su, Quan Chen:
Research on new edge computing network architecture and task offloading strategy for Internet of Things. 3619-3631 - Xiaoli Li

, Gen Li, Zhenlong Du:
High fidelity single image blind deblur via GAN. 3633-3642 - Mengmeng Cui, Haochen Zhang, Yong Huang, Zhanyang Xu, Qingzhan Zhao:

A Fountain-Coding Based Cooperative Jamming Strategy for Secure Service Migration in Edge Computing. 3643-3656 - Huihui Wang

, Mingfei Xiao, Changsheng Wu, Jing Zhang:
Distributed classification for imbalanced big data in distributed environments. 3657-3668 - Jingpu Wang

, Xin Song, Li Dong, Xiuwei Han:
Power allocation for D2D aided cooperative NOMA system with imperfect CSI. 3669-3682 - Yongtao Liu, Ruizhi Sun, Xiangnan Zhang, Li Li, Guoqing Shi:

An autonomous positioning method for fire robots with multi-source sensors. 3683-3695 - Mohammad R. Khosravi:

ACI: a bar chart index for non-linear visualization of data embedding and aggregation capacity in IoMT multi-source compression. 3697-3705 - Sunyue Xu, Jing Zhang

, Shunmei Meng, Jian Xu:
Task allocation for unmanned aerial vehicles in mobile crowdsensing. 3707-3719 - Zijie Fang

, Xiaolong Xu
, Muhammad Bilal
, Alireza Jolfaei
:
Renewable prediction-driven service offloading for IoT-enabled energy systems with edge computing. 3721-3733 - Biao Zhang, Qilin Fan

, Xu Zhang, Zhihan Fu, Sen Wang, Jian Li, Qingyu Xiong:
A survey of VNF forwarding graph embedding in B5G/6G networks. 3735-3758 - Chia-Hui Liu, Tzer-Long Chen

, Chien-Yun Chang, Zhen-Yu Wu
:
A reliable authentication scheme of personal health records in cloud computing. 3759-3769 - Chenkai Li, Weidang Lu

, Xiaohan Xu, Hong Peng, Guoxing Huang, Huimei Han:
Power optimization in UAV-based wireless power transmission and collaborative MEC IoT networks. 3771-3779 - Runzhou Zhang, Lei Ning

, Mengkun Li
, Chengcai Wang, Wei Li, Yongjian Wang:
Feature extraction of trajectories for mobility modeling in 5G NB-IoT networks. 3781-3793 - Lingfei Zhang, Liang Hua, Mingqian Liu

, Bodong Shang, Yarui Zhang:
Modulation recognition with alpha-stable noise over fading channels. 3795-3804 - Qihe Huang

, Xiaolong Xu
, Jinhui Chen:
Learning-aided fine grained offloading for real-time applications in edge-cloud computing. 3805-3820 - Wenjie Kang

, Qiang Liu, Peidong Zhu, Wei Zhao, Xuchong Liu, Gang Hu:
Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids. 3821-3836 - He Zhang, Jianxun Zhang

, Rui Wang
, Yazhe Huang, Mengxiao Zhang, Xuefeng Shang, Chang Gao:
Smart carbon monitoring platform under IoT-Cloud architecture for small cities in B5G. 3837-3853 - Yuanfang Chi, Wei Dai, Yuan Fan, Jun Ruan, Kai Hwang, Wei Cai:

Total cost ownership optimization of private clouds: a rack minimization perspective. 3855-3869 - Tianyu Wang, Wei Gu

:
UAV deployment with grid modeling and adaptive multiple pruning search in complex forest scenarios. 3871-3883 - Zhenyu Na, Yi Wang, Mudi Xiong:

Joint trajectory and power optimization for NOMA-based high altitude platform relaying system. 3885-3896 - Jianji Ren, Tingting Hou, Haichao Wang, Huanhuan Tian, Huihui Wei, Hongxiao Zheng, Xiao-hong Zhang

:
Collaborative task offloading and resource scheduling framework for heterogeneous edge computing. 3897-3909 - Mingchuan Yang

, Xinye Shao, Guanchang Xue, Bingyu Xie:
Big data theory based spectrum sensing algorithm for the satellite cognitive radio network. 3911-3919 - Shuo Shi

, Meng Wang, Shushi Gu, Zhong Zheng:
Energy-efficient UAV-enabled computation offloading for industrial internet of things: a deep reinforcement learning approach. 3921-3934 - Wangli Hao

, Meng Han
, Shancang Li, Fuzhong Li:
Dancing with the sound in edge computing environments. 3935-3945 - Kai Mao

, Benzhe Ning, Qiuming Zhu
, Xijuan Ye, Hanpeng Li, Maozhong Song, Boyu Hua:
ML-based delay-angle-joint path loss prediction for UAV mmWave channels. 3947-3959 - Tong Liu, Yuchen Li, Meng Wang, Shuo Shi

, Xuemai Gu:
An optimized mobile similarity and link transmission quality routing protocol for urban VANETs. 3961-3971 - Tianming Feng

, Shuo Shi
, Shuo Zhang
, Xuemai Gu
, Zhenyu Xu:
Random caching design for multi-tier IoT networks with cross-tier base station cooperation. 3973-3988 - Naghmeh Farhangkhah, Sadegh Samadi, Mohammad R. Khosravi, Reza Mohseni:

Overcomplete pre-learned dictionary for incomplete data SAR imaging towards pervasive aerial and satellite vision. 3989-4001 - Jingjing Chen, Lingling Guo, Yulun Shi, Yao Shi

, Yi Ruan
:
An edge computing oriented unified cryptographic key management service for financial context. 4003-4016 - Zhou Wu, Mingxiang Guan, Ming Liu, Linzhong Xia, Changwei Lv, Xuemei Cao, Hanying Chen:

Research on intelligent scheduling algorithm of high altitude platform system for wide area internet of things. 4017-4023 - Chaopeng Guo

, Gujun Lu, Chao Xu, Jie Song:
A periodic requests dispatcher for energy optimization of hybrid powered data centers. 4025-4042 - Tomás Holota

, Mária Holotová
, Ludmila Nagyová
, Dagmar Cagánová
:
Sustainable mobility in urban conditions- multimodal approach for greener cities: insights from Slovakia. 4043-4053 - Michal Holubcik

, Jozef Jandacka, Miriam Nicolanská
:
Design of a wireless monitoring system with emission analysis integration for solid-fuel based heating devices in households of SmartCity. 4055-4064 - Mingxiang Guan, Zhou Wu

, WeiGuo Yang, Bin Guo, Xuemei Cao, Hanying Chen:
Research on anti-interference based on particle swarm optimization algorithm in high altitude platform stations. 4065-4072 - Xin He

, Jiaqi Zheng, Qiang He, Haipeng Dai
, Bowen Liu, Wanchun Dou, Guihai Chen:
Online computation offloading for deadline-aware tasks in edge computing. 4073-4092 - Danial Farashaei, Amin Honarbakhsh

, Seyed Mojtaba Movahedifar, Eghbal Shakeri:
Individual flexibility and workplace conflict: cloud-based data collection and fusion of neural networks. 4093-4108 - Baoqing Tai, Xindong Li, Lifang Yang, Ying Miao, Wenmin Lin, Chao Yan:

Cloud Computing-aided Multi-type Data Fusion with Correlation for Education. 4109-4120 - Lei Fang:

The deployment of smart sharing stadium based on 5G and mobile edge computing. 4121-4131 - Guihua Wu

:
Deep reinforcement learning based multi-layered traffic scheduling scheme in data center networks. 4133-4144 - Hongyu Guo, Xiaoyan Jiang:

English teaching evaluation based on reinforcement learning in content centric data center network. 4145-4155 - Bai Wang:

A financial risk identification model based on artificial intelligence. 4157-4165 - Xin Ke

:
English synchronous real-time translation method based on reinforcement learning. 4167-4179 - Emirhan Özgün

, Ümit Aygölü:
Energy harvesting in ARQ-based cooperative broadcast and NOMA networks. 4181-4194 - Dongdong Cheng

, Jinlong Huang, Sulan Zhang, Quanwang Wu:
A robust method based on locality sensitive hashing for K-nearest neighbors searching. 4195-4208 - Weijia Hong, Zhiyu You:

Dynamic shared parking for private vehicles in central business districts. 4209-4220 - R. Monika, Samiappan Dhanalakshmi

, R. Kumar, R. Narayanamoorthi
, Khin Wee Lai
:
An efficient adaptive compressive sensing technique for underwater image compression in IoUT. 4221-4235 - Aneeqa Ahmed, Kashif Naseer Qureshi

, Muhammad Anwar
, Farhan Masud, Junaid Imtiaz, Gwanggil Jeon
:
Link-based penalized trust management scheme for preemptive measures to secure the edge-based internet of things networks. 4237-4259 - Zhongjian Liu, Xiaolong Xu:

Latency-aware service migration with decision theory for Internet of Vehicles in mobile edge computing. 4261-4273 - Zhenguo Ding, Yuejin Wang:

Multi-step attack threat recognition algorithm based on attribute association in internet of things security. 4275-4286 - Hanrui Zhang, Qianmu Li

, Shunmei Meng, Zhuoran Xu, Chaoxian Lv, Cangqi Zhou:
A safety fault diagnosis method on industrial intelligent control equipment. 4287-4299 - Shiyu Chen, Jun Hou, Qianmu Li, Shunmei Meng, Jing Zhang:

Temporal-aware influence maximization solution in artificial intelligent edge application. 4301-4313 - Shuo Yang, Xianxin Zhou:

An evolutionary game for governance of Internet audiovisual space. 4315-4327 - Rui Lian

, Anxin Zhou
, Yifeng Zheng
:
Towards secure and trustworthy crowdsourcing: challenges, existing landscape, and future directions. 4329-4341 - Hongyi Li, Chunhai Cui, Shuai Jiang:

Strategy for improving the football teaching quality by AI and metaverse-empowered in mobile internet environment. 4343-4352 - Tao He

, Zhong Zhang, Pengfei Shen, Min Wei, Yu Zhang:
AI-based MOA fault diagnosis mechanism in wireless networks. 4353-4364 - Himanshu Mittal, Ashish K. Tripathi, Avinash Chandra Pandey, Venu P

, Varun G. Menon
, Raju Pal
:
A novel fuzzy clustering-based method for human activity recognition in cloud-based industrial IoT environment. 4365-4377 - Hong Zhao:

Smart preschool education live streaming: VR-driven optimization strategy. 4379-4387 - Xianxian Li, Jiahui Peng, Shiqi Gao

, Zhenkui Shi
, Chunpei Li:
Achieving fair and accountable data trading for educational multimedia data based on blockchain. 4389-4401 - Admir Barolli

, Kevin Bylykbashi
, Ermioni Qafzezi, Shinji Sakamoto, Leonard Barolli:
A hybrid intelligent system based on particle swarm optimization and distributed genetic algorithm for WMNs: a comparison study of boulevard and stadium distributions considering different router replacement methods and load balancing. 4403-4412 - Bo Zheng, Kun Zhuo, Hengyang Zhang, Huaxin Wu:

A novel airborne greedy geographic routing protocol for flying Ad hoc networks. 4413-4427 - Youssra Cheriguene, Fatima Zohra Bousbaa, Chaker Abdelaziz Kerrache

, Soumia Djellikh
, Nasreddine Lagraa, Mohamed Lahby, Abderrahmane Lakas
:
COCOMA: a resource-optimized cooperative UAVs communication protocol for surveillance and monitoring applications. 4429-4445 - Ashu Taneja

, Nitin Saluja
, Shalli Rani
:
An energy efficient dynamic framework for resource control in massive IoT network for smart cities. 4447-4458 - Michel Barbeau

, Stéphane Blouin, Ahmad Traboulsi
:
Adaptable design for long range underwater communications. 4459-4475 - Lin Mei, Chungen Xu

, Lei Xu:
Conjunctive searchable encryption with efficient authorization for group sharing. 4477-4494 - Hao Hu, Yulin Chen

, Bao Peng, Zhenjun Li, Qibao Wu, ZiRan Lin, Xiaolei Wang:
Cooperative positioning of UAV internet of things based on optimization algorithm. 4495-4505 - Linqiang Huang, Miao Ye

, Xingsi Xue, Yong Wang, Hongbing Qiu, Xiaofang Deng:
Intelligent routing method based on Dueling DQN reinforcement learning and network traffic state prediction in SDN. 4507-4525 - S. M. Zia Ur Rashid

, Ashfaqul Haq, Sayed Tanimun Hasan, Md. Hasan Furhad, Mohiuddin Ahmed, Abu S. S. M. Barkat Ullah:
Faking smart industry: exploring cyber-threat landscape deploying cloud-based honeypot. 4527-4541 - Usman Ahmed, Jerry Chun-Wei Lin

, Gautam Srivastava:
Multi-aspect detection and classification with multi-feed dynamic frame skipping in vehicle of internet things. 4543-4554 - Pin Lyu

, Wandong Cai, Yao Wang:
Collusive attack that exploits biometric similarity difference and basic countermeasures. 4555-4567 - Chengxiang Chen

, Caizhong Li, Yucong Duan:
Mobile healthcare data mining for sport item recommendation in edge-cloud collaboration. 4569-4579 - Yang Xu

, Fadi Farha
, Yueliang Wan, Jiabo Xu, Hong Liu
, Huansheng Ning
:
Improving completeness and consistency of co-reference annotation standard. 4581-4590 - Seunghyun Park

, Hyunhee Park
:
PIER: cyber-resilient risk assessment model for connected and autonomous vehicles. 4591-4605 - Ahmed BinSahaq

, Tarek R. Sheltami, Ashraf S. Mahmoud, Nidal Nasser
:
Fast and efficient algorithm for delay-sensitive QoS provisioning in SDN networks. 4607-4628 - Lei Xu

, Chengzhi Xu, Jianghua Liu, Bennian Dou, Xiaocan Jin:
Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search. 4629-4642
Volume 30, Number 6, August 2024
- Long Li, Soh Kim Geok, Hu Li, Othman Talib, He Sun, Soh Kim Lam:

A comprehensive study on physical fitness of Wushu routine athletes based on video-driven core strength training mechanism in wireless network. 4643-4654 - Boqi Zhang, Xuyang Feng, Chen Qiu

, Bin Guo, Helei Cui, Zhiwen Yu:
SFSN: smart frame selection network for multi-task human synthesis on mobile devices. 4655-4668 - Xianxian Li, Mei Huang, Shiqi Gao

, Zhenkui Shi
:
A fair and verifiable federated learning profit-sharing scheme. 4669-4684 - Jialin Zhang, Xianxian Li, Zhenkui Shi

, Cong Zhu:
A reputation-based and privacy-preserving incentive scheme for mobile crowd sensing: a deep reinforcement learning approach. 4685-4698 - Yilan Li, Yantao Lu, Helei Cui

, Senem Velipasalar:
Improving robustness and efficiency of edge computing models. 4699-4711 - Jihyeon Ryu

, Yifeng Zheng
, Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
Can differential privacy practically protect collaborative deep learning inference for IoT? 4713-4733 - Chungen Xu

, Pan Zhang
, Lin Mei, Yu Zhao, Lei Xu:
Ranked searchable encryption based on differential privacy and blockchain. 4735-4748 - Xuechao Yang

, Andrei Kelarev, Xun Yi:
Privacy-enhancing data aggregation and data analytics in wireless networks for a large class of distributed queries. 4749-4759 - Kaleem Arshid

, Zhang Jianbiao, Iftikhar Hussain
, Gebrehiwet Gebrekrstos Lema
, Muhammad Yaqub, Rizwan Munir
:
Support vector machine approach of malicious user identification in cognitive radio networks. 4761-4772 - Kheng Leong Tan

, Chi-Hung Chi, Kwok-Yan Lam:
Secure and privacy-preserving sharing of personal health records with multi-party pre-authorization verification. 4773-4795 - Sina Dogmechi, Zeinab Torabi

, Negin Daneshpour:
An outlier detection method based on the hidden Markov model and copula for wireless sensor networks. 4797-4810 - Jinwei Jia, Limin Liu, Yuying Liang, Zhuangzhi Han:

Anti-sorting signal design for radio frequency stealth radar based on cosine-exponential nonlinear chaotic mapping. 4811-4824 - V. Jyothi, M. V. Subramanyam:

An energy efficient fuzzy clustering-based congestion control algorithm for cognitive radio sensor networks. 4825-4840 - Davinder Kaur, Suleyman Uslu, Mimoza Durresi, Arjan Durresi

:
A geo-location and trust-based framework with community detection algorithms to filter attackers in 5G social networks. 4841-4849 - S. Kanthimathi, Prathuri Jhansi Rani

:
An efficient packet dropping attack detection mechanism in wireless ad-hoc networks using ECC based AODV-ACO protocol. 4851-4863 - Zhang Yi-shu, Yang Jie-yuan:

Research on near field sound pressure of circular piston source based on angular spectrum method. 4865-4873 - Luong Thai Ngoc, Anh Q. Nguyen, Doan Hoang:

FAPDRP: a flooding attacks prevention and detection routing protocol in vehicular ad hoc network using behavior history and nonlinear median filter transformation. 4875-4902 - Dong Wang, Qing Ji

, Dan Li:
Cloud computing-driven resource allocation method for global tennis training: a performance optimization with game theory consideration. 4903-4912 - Maryam Maleki, Amir-Massoud Bidgoli

:
Heterogeneous load balancing improvement on an energy-aware distributed unequal clustering protocol using BBO algorithms. 4913-4933 - Liyong Qiao

, Shuang Zhang
, Chungang Liu, Huilong Jin, Hua Zhao, Jian Yao, Lingru Cao, Yujia Ji:
Workpiece classification based on transfer component analysis. 4935-4947 - Junwei Luo

, Xun Yi, Fengling Han, Xuechao Yang
:
An efficient privacy-preserving recommender system in wireless networks. 4949-4960 - Shuang Zhang

, Huilong Jin, Liyong Qiao, Jia Zhao, Xiaozi Jin, Yucong Zhou:
User association for EE maximization in uplink HetNets with NOMA. 4961-4973 - Mustafa Musa Jaber, Mohammed Hasan Ali, Sura Khalil Abd, Mustafa Mohammed Jassim, Ahmed Alkhayyat, Rusul S. Bader, Ahmed Rashid Alkhuwaylidee:

Application of image encryption based improved chaotic sequence complexity algorithm in the area of ubiquitous wireless technologies. 4975-4988 - Mustafa Musa Jaber, Mohammed Hassan Ali, Sura Khalil Abd, Mustafa Mohammed Jassim, Ahmed Alkhayyat, Mohammed Jassim, Ahmed Rashid Alkhuwaylidee, Lahib Nidhal:

Q-learning based task scheduling and energy-saving MAC protocol for wireless sensor networkss. 4989-5005 - Yue Zhang, Zhenyu Na

, Yi Wang, Chenglan Ji:
Joint power allocation and deployment optimization for HAP-assisted NOMA-MEC system. 5007-5019 - Likun Li, Yinsheng Fu, Kun Yu, Ahmed Mahmoud Alwakeel

, Lubna Abdulaziz Alharbi
:
Optimal trajectory UAV path design based on bezier curves with multi-hop cluster selection in wireless networks. 5021-5032 - Noemí DeCastro-García

, David Escudero García, Miguel V. Carriegos:
A mathematical analysis about the geo-temporal characterization of the multi-class maliciousness of an IP address. 5033-5048 - Xinxin Tian, Chungang Liu

, Yuting Gu, Meng Wang, Gang Wang, Qianbo Zhang:
Channel estimation of GFDM system based on pilot frequency in doubly selective channel. 5049-5057 - Ines Ortega-Fernandez

, Marta Sestelo
, Juan C. Burguillo
, Camilo Piñón-Blanco:
Network intrusion detection system for DDoS attacks in ICS using deep autoencoders. 5059-5075 - Xabier Etxezarreta

, Iñaki Garitano
, Mikel Iturbe
, Urko Zurutuza
:
Low delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systems. 5077-5091 - Hsing-Chung Chen

, Agung Mulyo Widodo, Jerry Chun-Wei Lin
, Chien-Erh Weng, Dinh-Thuan Do:
Outage behavior of the downlink reconfigurable intelligent surfaces-aided cooperative non-orthogonal multiple access network over Nakagami-m fading channels. 5093-5110 - Meshal Alharbi, S. Neelakandan

, Sachi Gupta, R. Saravanakumar
, Siripuri Kiran
, A. Mohan
:
Mobility aware load balancing using Kho-Kho optimization algorithm for hybrid Li-Fi and Wi-Fi network. 5111-5125 - José Roldán Gómez

, Jesús Martínez del Rincón
, Juan Boubeta-Puig
, José Luis Martínez
:
An automatic unsupervised complex event processing rules generation architecture for real-time IoT attacks detection. 5127-5144 - Nagavalli Vegesna

, G. Yamuna, Sudheer Kumar Terlapu
:
A multiband hook shaped flexible microstrip array antenna with DGS for 5G communication applications. 5145-5155 - Qing Yao

, Kaiwen Xu, Taotao Li, Yichao Zhou, Mingsheng Wang:
A secure image evidence management framework using multi-bits watermark and blockchain in IoT environments. 5157-5169 - Ali Yousefi

, Kambiz Badie, Mohammad Mehdi Ebadzadeh, Arash Sharifi:
Improving the efficiency of the XCS learning classifier system using evolutionary memory. 5171-5186 - Arghyadeep Pal

, Dilshad Ahmad, Srikanta Pal, Abu Nasar Ghazali:
Efficient and low SAR dual functional wearable antenna in RFID ISM and GPS L1 bands for positioning applications. 5187-5199 - Fulai Liu

, Dongbao Qin, Shuo Yang, Ruiyan Du:
WS-ICNN algorithm for robust adaptive beamforming. 5201-5210 - Surapaneni Phani Praveen, Mohammed Hasan Ali, Muhammad Aslam Jarwar, Chander Prakash

, Chavva Ravi Kishore Reddy
, L. Malliga, C. Chandru Vignesh:
6G assisted federated learning for continuous monitoring in wireless sensor network using game theory. 5211-5237 - B. Rajarajeswarie, R. Sandanalakshmi

:
Intelligent based hybrid precoder for millimetre wave massive MIMO system. 5239-5246 - Khalid K. Almuzaini, Shubham Joshi, Stephen Ojo

, Mansi Aggarwal, Preetam Suman
, Piyush Kumar Pareek, Prashant Kumar Shukla:
Optimization of the operational state's routing for mobile wireless sensor networks. 5247-5261 - Minghui Chen, Shancang Li

, Zheng Chang, Muddesar Iqbal
, Dhafer Al-Makhles:
Data anonymization evaluation against re-identification attacks in edge storage. 5263-5277 - Mingchuan Yang, Botao Liu

, Yupu Yang, Guanchang Xue:
Channel capacity limit of multi-beam satellite system. 5279-5287 - Tao Song, Xiuhua Li

, Yingheng Yu, Yaping Cui, Kai Chen, Luxi Cheng, Jinlong Hao, Chunmao Cai:
Low-power secure caching strategy for Internet of vehicles. 5289-5303 - Chongke Bi, Jiayang Li, Qing Feng, Chun-Cheng Lin

, Wen-Chieh Su:
Optimal deployment of vehicular cloud computing systems with remote microclouds. 5305-5317 - Zhantao Zhang:

Analysis of the application of modern mobile wireless network terminal in the tutoring design of college physical education course teaching. 5319-5331 - Ao Li, Yutong Niu, Zening Wang, Zhiwei Liu, Hailu Yang

:
Inception-Det: large aspect ratio rotating object detector for remote sensing images. 5333-5345 - Xi Wang

, Shuo Shi
, Jiayin Xue, Chenyu Wu:
Controller placement in software defined FANET. 5347-5360 - Cong Zhou

, Shuo Shi
, Chenyu Wu, Shouming Wei:
Energy efficient UAV-assisted communication with joint resource allocation and trajectory optimization in NOMA-based internet of remote things. 5361-5374 - Jian He, Shuo Shi

, Zhenyu Xu:
User grouping and power allocation in NOMA-based internet of things. 5375-5387 - Wei Wang, Xianmin Wang

, Mingliang Zhou, Xuekai Wei, Jing Li, Xiaojun Ren, Xuemei Zong:
A spatiotemporal and motion information extraction network for action recognition. 5389-5405 - Fulong Xu, Zhenyu Yin

, Guangjie Han
, Yue Li, Feiqing Zhang, Yuanguo Bi:
Multi-objective fog node placement strategy based on heuristic algorithms for smart factories. 5407-5424 - Bo Xiao

, Wei Qu, Lei Qiu, Hongfeng Pang, Gang Yao:
OFDM integrated waveform design for joint radar and communication. 5425-5436 - Jaime Fúster

, Sonia Solera-Cotanilla
, Jaime Pérez
, Mario Vega-Barbas
, Rafael Palacios
, Manuel Alvarez-Campana
, Gregorio López
:
Analysis of security and privacy issues in wearables for minors. 5437-5453 - Jian Cheng, Quanyuan Feng, Chao Li

, Wenxiu Yang:
Securing FPGAs in IoT: a new run-time monitoring technique against hardware Trojan. 5455-5463 - Shakir Mahmood Al Janabi, Sefer Kurnaz:

A new localization mechanism in IoT using grasshopper optimization algorithm and DVHOP algorithm. 5465-5485 - Zhenzhen Yan, Li Bo, Mao Yang, Zhongjiang Yan:

Downlink AP coordination based OFDMA and NOMA protocols for the next-generation WLANs. 5487-5501 - Rahma Mani

, Antonio Rios-Navarro
, José Luis Sevillano-Ramos, Noureddine Liouane:
Improved 3D localization algorithm for large scale wireless sensor networks. 5503-5518 - Junnan Li, Zhengyi Yang

, Kai Chen, Zhao Ming
, Xiuhua Li, Qilin Fan, Jinlong Hao, Luxi Cheng:
Dependency-aware task offloading based on deep reinforcement learning in mobile edge computing networks. 5519-5531 - Mohammed S. Alzaidi, Piyush Kumar Shukla, V. Sangeetha

, Karuna Nidhi Pandagre
, Vinodh Kumar Minchula, Sachin Sharma
, Arfat Ahmad Khan
, V. Prashanth:
Applying machine learning enabled myriad fragment empirical modes in 5G communications to detect profile injection attacks. 5533-5546 - Ruisong Wang, Weichen Zhu, Ruofei Ma

, Yang Zhang, Gongliang Liu, Wenjing Kang:
Inter-satellite link scheduling and power allocation method for satellite networks. 5547-5558 - Ao Li, Cong Feng, Zhuo Wang

, Yuegong Sun, Zizhen Wang, Ling Sun:
Anchor-based sparse subspace incomplete multi-view clustering. 5559-5570 - Keshetti Sreekala

, N. Nijil Raj, Sachi Gupta, G. Anitha, Ashok Kumar Nanda, Abhay Chaturvedi:
Deep convolutional neural network with Kalman filter based objected tracking and detection in underwater communications. 5571-5588 - Mingqian Liu

, Shenghan Yu, Yunfei Chen, Shuo Chen:
Blind parameter estimation for co-channel digital communication signals. 5589-5599 - Zhen Gao, Lu Shi, Pedro Reviriego

:
Enhancing data protection with a distributed storage system based on the redundant residue number system. 5601-5612 - M. Revanesh, Sheetal S. Gundal, J. R. Arunkumar, P. Joel Josephson, S. Suhasini

, T. Kalavathi Devi:
Artificial neural networks-based improved Levenberg-Marquardt neural network for energy efficiency and anomaly detection in WSN. 5613-5628 - Caifeng Wang

:
Research and implementation of network communication based on embedded monitoring system. 5629-5641 - Wei Yu:

Distributed determination method of redundant nodes in wireless communication networks based on Bezier function. 5643-5654 - Qihang Cao, Wenjing Kang

, Ruofei Ma, Gongliang Liu, Liang Chang:
DDQN path planning for unmanned aerial underwater vehicle (UAUV) in underwater acoustic sensor network. 5655-5667 - Weihua Zhao, Zhiying Chang

:
Construction and implementation of mobile learning system for higher education based on modern wireless network mobile communication terminal technology. 5669-5681 - Liyan Yin

, Xin Xiang, Yuan Liang, Kun Liu:
Modulation classification with data augmentation based on a semi-supervised generative model. 5683-5696 - Yuehong Chen, Rong Xie, Haotong Zhang, Dongdong Li

, Weiwei Lin
:
Generation of high-order random key matrix for Hill Cipher encryption using the modular multiplicative inverse of triangular matrices. 5697-5707 - GuoYan Li, Yi Yang:

Smart vision for quality apple classification using SURF-Harris optimizing techniques. 5709-5721 - P. V. Venkateswara Rao, M. Anand, J. Alfred Daniel

, C. B. Sivaparthipan
, S. Stewart Kirubakaran
, Lydia J. Gnanasigamani, P. Punitha:
Millimeter assisted wave technologies in 6G assisted wireless communication systems: a new paradigm for 6G collaborative learning. 5723-5742 - Zhongmin Wang, Yichi Zhou

, Xiaomin Jin, Yanping Chen, Chen Lu:
An edge server deployment approach for delay reduction and reliability enhancement in the industrial internet. 5743-5757 - Candelaria Hernández-Goya

, Ricardo Aguasca-Colomo
, Cándido Caballero-Gil:
BLE-based secure tracking system proposal. 5759-5770 - Bashar Igried, Ayoub Alsarhan, Ahmad Sawalmeh, Muhammad Anan, Igried Alkhawaldeh:

A novel game theoretic approach for market-driven dynamic spectrum access in cognitive radio networks. 5771-5786 - N. Meenakshi, Mustafa Musa Jaber, Rahul Pradhan, M. M. Kamruzzaman, T. Maragatham, Jaya Subalakshmi Ramamoorthi

, Mohanraj Murugesan:
Design systematic wireless inventory trackers with prolonged lifetime and low energy consumption in future 6G network. 5787-5808 - Mandli Rami Reddy

, M. L. Ravi Chandra
:
An enhanced 3D-DV-hop localisation algorithm for 3D wireless sensor networks. 5809-5821 - Jezabel Molina-Gil

, Óscar Cigala Álvarez, Yanira González González, Irene Marquez Corbella:
Improving the lightweight implementation of SNOW-V. 5823-5835 - Kaige Zhu, Zhenjiang Zhang

, Feng Sun:
Toward intelligent cooperation at the edge: improving the QoS of workflow scheduling with the competitive cooperation of edge servers. 5837-5849 - Abdullah Alghamdi, Ali M. Al Shahrani, Sultan Sughair AlYami, Ihtiram Raza Khan

, P. S. G. Aruna Sri
, Papiya Dutta
, Ali Rizwan, Prashanth Venkatareddy:
Security and energy efficient cyber-physical systems using predictive modeling approaches in wireless sensor network. 5851-5866 - Benaicha Mehdi

, Samira Moussaoui, Mohamed Guerroumi
:
A geographic routing based on local traffic density and multi-hop intersections in VANETs for intelligent traffic system in smart cities (GRBLTD-MI). 5867-5886 - Borja Bordel

, Ramón Alcarria
, Tomás Robles:
A blockchain ledger for securing isolated ambient intelligence deployments using reputation and information theory metrics. 5887-5903 - Cándido Caballero-Gil

, Rafael Álvarez, Candelaria Hernández-Goya
, Jezabel Molina-Gil:
Research on smart-locks cybersecurity and vulnerabilities. 5905-5917 - Jingchun Zhang, Gang Wang, Hongjuan Yang

, Xiuhong Wang, Bo Li:
Joint waveform design for multi-user maritime integrated sensing and communication. 5919-5930 - Ahmad A. Ababneh, Yaser Jararweh, Mahmoud Al-Ayyoub

:
A novel technique for any-cast transmission scheduling in underwater acoustic sensor networks. 5931-5949 - Yifan Zhang, Jintao Wu

, Hao Yang, Chengjian Zhang, Yutao Tang:
A hierarchical growth method for extracting 3D phenotypic trait of apple tree branch in edge computing. 5951-5966 - Changqing Zhang, Lingfei Zhang, Bingbing Li, Jin Li:

Similarity measure-based spectrum sensing algorithm under impulsive noise. 5967-5975 - Khalid K. Almuzaini, Rachana Dubey, Charu Gandhi, Manish Taram, Anita Soni, Seema Sharma, Manuel Sánchez-Chero, Gilberto Carrión-Barco:

Secured wireless sensor networks using hybrid Rivest Shamir Adleman with ant lion optimization algorithm. 5977-5995 - Zili Chen, Yanyan Pan

:
Improvement and application of information communication technology in wireless routing protocol based on adaptive K-means clustering algorithm. 5997-6009 - Bohang Chen, Jun Ma, Lingfei Zhang, Zhuang Xiong, Jinyu Fan, Haiming Lan:

An improved weighted KNN fingerprint positioning algorithm. 6011-6022 - Xianhong Zhang, Yongzhen Li:

Improved mutimodulus blind equalization algorithm for multi-level QAM signals with impulsive noise. 6023-6028 - Junfang Li

, Yangmei Zhang, Kun Liu, Jie Liu, Fei Song, Qi Zhang:
Interference analysis of anti micro and small unmanned aerial vehicles and mobile communication systems uplink. 6029-6039 - Mingyi Qiu, Donghong Cai

, Jing Zhao, Zhicheng Dong, Weixi Zhou:
Joint activity and channel estimation for asynchronous grant-Free NOMA with chaos sequence. 6041-6053 - Tianyi Tu, Ye Su

, Yayuan Tang
, Guoqiang Guo, Wenxue Tan, Sheng Ren:
SHFW: second-order hybrid fusion weight-median algorithm based on machining learning for advanced IoT data analytics. 6055-6067 - Khalid K. Almuzaini

, Shubham Joshi
, Stephen Ojo
, Manish Agrawal, Preetam Suman
, Piyush Kumar Pareek
, Prashant Kumar Shukla
:
Survelliance monitoring based routing optimization for wireless sensor networks. 6069-6087 - Pengnian Zhang, Le Xu:

Design and implementation of mobile e-commerce application built on WAP mobile payment system. 6089-6104 - Zhenqi He:

Research on UAV flight control and communication method based on fuzzy adaptive. 6105-6113 - Gao Han, Wei Yuan, Yanming Liu, Qian Li, Fang Chen:

Analysis of electromagnetic force on wireless charging structure. 6115-6124 - Shanji Chen, Pengyu Liu, Yue Zhang, Lingfei Zhang, Sirong Wang, Jing Yuan:

Compressed video quality enhancement algorithm based on 3D-CNNs. 6125-6133 - Ruizhi Wang

, Difei Zhang:
A resource pre-allocation method for cognitive analytics-based social media service in edge computing. 6135-6150 - Fangwei Lu

, Gongliang Liu, Yuezhe Zhan, Yu Ding, Weidang Lu, Yuan Gao:
Resource allocation and offloading decision for secure UAV-based MEC wireless-powered System. 6151-6159 - Gang Zeng, Kun Wang

:
CCSO: a dynamic collaborative scheduling scheme for wireless rechargeable sensor networks with obstacles. 6161-6176 - Farhan Ullah

, Shamsher Ullah
, Gautam Srivastava
, Jerry Chun-Wei Lin
, Yue Zhao:
NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble. 6177-6198
Volume 30, Number 7, October 2024
- Noor Munir, Majid Khan

, Zhouchao Wei, Akif Akgul, Muhammad Amin
, Iqtadar Hussain:
Circuit implementation of 3D chaotic self-exciting single-disk homopolar dynamo and its application in digital image confidentiality. 6199-6216 - Abdullah Alghafis

, Hafiz Muhammad Waseem
, Majid Khan
, Sajjad Shaukat Jamal, Muhammad Amin
, Syeda Iram Batool:
A novel digital contents privacy scheme based on quantum harmonic oscillator and schrodinger paradox. 6217-6236 - Wuyungerile Li, Na Zong, Kaifeng Liu, Pengyu Li, Xuebin Ma:

A privacy-preserving group decision making expert system for medical diagnosis based on dynamic knowledge base. 6237-6247 - Hui Tian

, Jia Wang, Chin-Chen Chang, Hanyu Quan:
Public auditing of log integrity for shared cloud storage systems via blockchain. 6249-6264 - Turki Ali Alghamdi

:
Route optimization to improve QoS in multi-hop wireless sensor networks. 6265-6271 - Hassan N. Noura

, Reem Melki, Mohammad M. Mansour, Ali Chehab
:
Lightweight and secure cipher scheme for multi-homed systems. 6273-6290 - Hassan N. Noura

, Reem Melki, Ali Chehab
, Javier Hernandez Fernandez
:
Efficient and secure message authentication algorithm at the physical layer. 6291-6305 - Li Zhou, Xiaxia Niu, Shengli Zhao, Xiaoqing Zhao, Ning Cao, Jianrui Ding, Ruichao Wang:

Research on congestion rate of classified storage narrow channel picking system for IoT security. 6307-6323 - Cipai Xing, Zhuorong Chen, Lexin Chen, Xiaojie Guo, Zibin Zheng

, Jin Li:
A new scheme of vulnerability analysis in smart contract with machine learning. 6325-6334 - Jothi Prabha Appadurai, Prabaharan Sengodan

, Natesan Venkateswaran
, S. Abijah Roseline, B. Rama:
Radial basis function networks-based resource-aware offloading video analytics in mobile edge computing. 6335-6353 - Yuchen Li, Shuo Shi

, Jiayin Xue:
Time allocation and power control in multi-UAV energy harvesting network. 6355-6369 - Liang Hua

:
Comprehensive early warning of power quality in distribution network based on deep learning. 6371-6384 - Jingyuan Miao, Yuqi Zhang, Nan Jiang

, Jie Wen, Kanglu Pei, Yue Wan, Tao Wan, Honglong Chen:
Towards unifying pre-trained language models for semantic text exchange. 6385-6398 - Asif Iqbal, Siffat Ullah Khan, Mahmood Niazi, Mamoona Humayun, Najm Us Sama

, Arif Ali Khan, Aakash Ahmad
:
Advancing database security: a comprehensive systematic mapping study of potential challenges. 6399-6426 - Fuxin Hong, Lishui Wang, Cheng Zhao Li:

Adaptive mobile cloud computing on college physical training education based on virtual reality. 6427-6450 - Amador Aparicio

, M. Mercedes Martínez-González
, Valentín Cardeñoso-Payo:
App-based detection of vulnerable implementations of OTP SMS APIs in the banking sector. 6451-6464 - Jie Li, Yang Pan, Yichao Xia, Zhiming Fan, Xingwei Wang, Jianhui Lv:

Optimizing dag scheduling and deployment for Iot data analysis services in the multi-UAV mobile edge computing system. 6465-6479 - Wei Yu, Yang Guo, Di Lin

, He Chang:
Spatial refinement based method for small-sized target detection. 6481-6492 - Bohai Zhao, Xinchun Shen, Kai Peng

, Jiabin Wang, Victor C. M. Leung:
Adaptive computation offloading for latency-sensitive tasks in heterogeneous edge-cloud-enabled smart warehouses using Gau-Angle FIS and AGE-MOEA-II. 6493-6506 - Francisco Moya

, Francisco J. Quesada
, Luis Martínez-López
, Francisco Javier Estrella
:
Phonendo: a platform for publishing wearable data on distributed ledger technologies. 6507-6521 - Chien-Liang Chen, Shih-Chun Chiang, Lun-Ping Hung

, Syu-Jhih Jhang
:
Applying AIoT image recognition for prognosis of wound healing in long-term care residential facility. 6523-6536 - L. V. R. Chaitanya Prasad, Yedukondalu Kamatham

, Dhiraj Sunehra
:
A modified energy efficient relay selection for cognitive radio sensor networks. 6537-6554 - Chia-Ling Ho, Wei-Lin Chen, Chia-Ho Ou:

Constructing a personalized travel itinerary recommender system with the Internet of Things. 6555-6567 - D. Bhanu, R. Santhosh:

Fuzzy enhanced location aware secure multicast routing protocol for balancing energy and security in wireless sensor network. 6569-6588 - Zhifeng Jiang:

Patent competition and value for wireless technologies: in case of intelligent media. 6589-6602 - Zhifei Chen

, Chiheng Jia, Lin Chen:
Evaluating test quality of Python libraries for IoT applications at the network edge. 6603-6618 - Mesfer Alrizq, Shalini Stalin

, Sultan Alyami, Vandana Roy, Anuprita Mishra, Amit Kumar Chandanan, Nancy Awadallah Awad
, Prashanth Venkatesh:
Optimization of sensor node location utilizing artificial intelligence for mobile wireless sensor network. 6619-6631 - Lijun Han, Ling weay Ang, Sellappan Palaniappan:

Linear digital precoding technology in massive multiple input multiple output wireless communication system. 6633-6639 - Hongyuan Wang:

Machine learning-based centralized link coding attack detection in software-defined network. 6641-6655 - Gaoxian Peng

, Yiping Wen
, Tiancai Li, Aimin Chen, Yijiang Zhao:
Planning city-wide delivery paths for periodical logistics tasks in smart supply chains. 6657-6674 - Jin Lu

, Bo Wu, Xiaoting Wan, Meifen Chen:
Deep network expression recognition with transfer learning in UAV-enabled B5G/6G networks. 6675-6685 - Jinyong Xu:

Efficient trajectory optimization and resource allocation in UAV 5G networks using dueling-Deep-Q-Networks. 6687-6697
Volume 30, Number 8, November 2024
- Jinna Lin, Hao Zhang, Hao Cui, Chengzhu Li, Wenwen Zhang:

Analysis of the influencing factors of English short video teaching in wireless network virtualization. 6699-6708 - Gaojie Zhang:

6G enabled UAV traffic management models using deep learning algorithms. 6709-6719 - Zewei Sun, Zining Wang, Yanwei Xu:

Privacy protection in cross-platform recommender systems: techniques and challenges. 6721-6730 - Hyunjin Chun:

A study on the design education method using metaverse by wireless communication with computing for UAV-enabled B5G/6G network. 6731-6738 - Chun-Cheng Lin, Hui-Hsin Chin

, Zhen-Yin Annie Chen
, Jung-Chao Wu:
A one-stage memetic algorithm for jointly detecting hierarchical and overlapping community structures in dynamic social networks. 6739-6759 - Chuiju You, Guanjun Lin, Lili Sun, Shaoyu Zhao:

Multi-theme hierarchical monitoring method for wireless sensor networks. 6761-6771 - Peng Wang:

Collaborative innovation of wireless communication in logistics: evolution of network structure and knowledge domain. 6773-6783 - Talha Younas, Yanlei Zhao, Gwanggil Jeon, Ghulam Farid

, Sohaib Tahir
, Muluneh Mekonnen, Jin Shen, Mingliang Gao
:
A framework to connect IoT edge networks through 3D Massive MIMO. 6785-6795 - Xixing Li, Qiang Wei, Zehui Wu, Wei Guo, Linhao He:

Harden-IoT: hardening the EoL devices by intercepting the attack vector for future B5G/6G IoT. 6797-6808 - Hongfei Zhang, Zhaowei Ding, Liyue Zhou, Degang Wang:

Particle Filtering SLAM algorithm for urban pipe leakage detection and localization. 6809-6820 - Qianqian Yu, Yan-Kai Fu, Jiawei Zhang, Xiang Huang:

Managing risks in main equipment projects for 5G construction: a case study based on techno-environment-economic-planning indicator framework. 6821-6832 - Hui-Hsin Chin

, Hao-Chu Lin, Yi-Chu Cheng, Chung-Yi Tsai:
Development status of 5G private networks in taiwan: law and practice. 6833-6850 - Hanwen Liu

, Nianzhe Li, Huaizhen Kou
, Shunmei Meng, Qianmu Li:
FDRP: federated deep relationship prediction with sequential information. 6851-6873 - Biqiang Han, Jie Zhang, Helen Huifen Cai, Mengyao Xia, Yan Tu, Jiao Wu:

5G wireless technology evolution: identifying evolution pathways of core technologies based on patent networks. 6875-6886 - Alaa Q. Raheema:

Challenges and vulnerability assessment of cybersecurity in IoT-enabled SC. 6887-6900 - Mohammed Alghanim, Hani H. Attar, Khosro Rezaee

, Ahmed A. A. Solyman:
Medical diagnosis decision-making framework on the internet of medical things platform using hybrid learning. 6901-6913 - Han Li

, Shunmei Meng, Jing Shang, Anqi Huang, Zhicheng Cai:
Value-based multi-agent deep reinforcement learning for collaborative computation offloading in internet of things networks. 6915-6928 - Sheng Wang, Jiyun Li, Hongxing Pei:

Efficient non-orthogonal multiple access for predicting arrival direction in multiple UAV-6G networks. 6929-6938 - Song Zhao, TaiWei Cai, Bao Peng, Teng Zhang

, XiaoBing Zhou:
GAM-YOLOv8n: enhanced feature extraction and difficult example learning for site distribution box door status detection. 6939-6950 - Jung-Chun Liu, Heru Susanto, Chi-Jan Huang, Kun-Lin Tsai, Fang-Yie Leu, Zhi-Qian Hong:

A Q-learning-based downlink scheduling in 5G systems. 6951-6972 - Aiqing Li, Wanli Huang:

A comprehensive survey of artificial intelligence and cloud computing applications in the sports industry. 6973-6984 - Aiqing Li, Wanli Huang:

Correction to: A comprehensive survey of artificial intelligence and cloud computing applications in the sports industry. 6985 - Yuzhou Gao, Bowen Ma, Yajing Leng, Zhuofeng Zhao, Jiwei Huang

:
A task allocation and pricing mechanism based on Stackelberg game for edge-assisted crowdsensing. 6987-7001 - Yuelei Qian, Guangchun Liu, Hongbin Shi:

Deep learning method to optimize the quality of services in UAV-aided 5G/6G networks. 7003-7013 - Hani Attar, Reza Khosravi, Jafar Ababneh

, Ayman Amer, Ahmed A. A. Solyman:
A modified grid search-based optimization for possibly repetitive global extremum with an application to edge intelligence in IIoT towards time-domain signals. 7015-7027 - Kuan Li:

Novel multi-agent reinforcement learning for maximizing throughput in UAV-Enabled 5G networks. 7029-7040 - B. T. Prasanna, D. Ramya, Nilesh Shelke, J. Bennilo Fernandes, Mohammad Gouse Galety

, M. Ashok:
Radial basis function neural network-based algorithm unfolding for energy-aware resource allocation in wireless networks. 7041-7058 - Mohamed Chaabane

, Abdellah Chehri
, Rachid Saadane
, Gwanggil Jeon
, Abdessamad El Rharras:
Classification of pathological ECG beats based on wireless body sensor networks and fractional Fourier transform and convolutional neural network. 7059-7073 - Jie Zhao, Sihan Chen, Chenghou Jin, Hua Xing, Ying Chen:

Data scheduling and resource allocation in LEO satellite networks for IoT task offloading. 7075-7085 - Laila Almutairi, Ahed Abugabah, Hesham Alhumyani, Ahmed A. Mohamed

:
Intelligent biomedical image classification in a big data architecture using metaheuristic optimization and gradient approximation. 7087-7108 - Chun-Hsien Sung, Ming-Chin Lu:

Protection of personal privacy under the development of the Internet of Things. 7109-7122 - Derong Tang, Qianbin Zhang:

UAV 5G: enabled wireless communications using enhanced deep learning for edge devices. 7123-7136 - Yixin Luo, Gui Fu:

UAV based device to device communication for 5G/6G networks using optimized deep learning models. 7137-7151 - V. Sowmiya, G. R. Kanagachidambaresan, M. Muralidhar:

Tiny ML-based reconfigurable IoT platform design for brackish water aquaculture monitoring. 7153-7165 - Mohamed E. L. Amine Ameur, Habiba Drias, Bouziane Brik

:
Cooperative parking search strategy through V2X communications: an agent-based decision. 7167-7188 - Xichen Ding, Rongju Yao, Edris Khezri

:
An efficient algorithm for optimal route node sensing in smart tourism Urban traffic based on priority constraints. 7189-7206 - Islam Zada

, Abdullah Alshammari
, Ahmad A. Mazhar, Abdullah Aldaeej
, Sultan Noman Qasem
, Kashif Amjad, Jawad Hasan Alkhateeb:
Enhancing IOT based software defect prediction in analytical data management using war strategy optimization and Kernel ELM. 7207-7225 - Quan Tang, Fang Nie:

Clustering routing algorithm of wireless sensor network based on swarm intelligence. 7227-7238 - Vandana Shakya

, Jaytrilok Choudhary, Dhirendra Pratap Singh
:
An advanced actor critic deep reinforcement learning technique for gamification of WiFi environment. 7239-7256 - Riyadh Rahef Nuiaa Al Ogaili

, Esraa Saleh Alomari
, Manar Bashar Mortatha Alkorani, Zaid Abdi Alkareem Alyasseri, Mazin Abed Mohammed
, Rajesh Kumar Dhanaraj
, Selvakumar Manickam, Seifedine Kadry, Mohammed Anbar, Shankar Karuppayah:
Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm. 7257-7273 - Nida Fatima

, Paresh Saxena, Giovanni Giambene:
Deep reinforcement learning based computation offloading for xURLLC services with UAV-assisted IoT-based multi-access edge computing system. 7275-7291 - Chi-Han Chen, Ching-Chun Huang, Yu-Liang Liu, Rung-Shiang Cheng

:
ImprovedRain removal network clarity and object detection performance in heavy rain images using complementary structure. 7293-7303 - Dejuan Li

, James A. Esquivel:
Accuracy-enhanced E-commerce recommendation based on deep learning and locality-sensitive hashing. 7305-7320 - Halim Fathoni, Chao-Tung Yang

, Chin-Yin Huang, Chien-Yi Chen:
Empowered edge intelligent aquaculture with lightweight Kubernetes and GPU-embedded. 7321-7333 - Youqing Wang

, Kun Zhao
, Zhengqi Zheng:
A positioning method based on map and single base station towards 6G networks. 7335-7346 - Faisal Binzagr

, Anton Satria Prabuwono, Mohammed Kbiri Alaoui, Nisreen Innab
:
Energy efficient multi-carrier NOMA and power controlled resource allocation for B5G/6G networks. 7347-7359 - Utku Köse, José Antonio Marmolejo-Saucedo

, Román Rodríguez-Aguilar, Liliana Marmolejo Saucedo, Miriam Rodriguez Aguilar:
Genetic electro-search optimization for optimum energy consumption in edge computing-based internet of healthcare things. 7361-7368 - Julia A. Bennell

, Igor S. Litvinchev
, Aleksandr V. Pankratov
, Tetyana Romanova
:
Packing stretched convex polygons in an optimized rectangle. 7369-7376 - Xabier Etxezarreta

, Iñaki Garitano
, Mikel Iturbe
, Urko Zurutuza
:
On the use of MiniCPS for conducting rigorous security experiments in Software-Defined Industrial Control Systems. 7377-7390 - Victoria Magdalena López Madejska

, Sergio López Bernal
, Gregorio Martínez Pérez, Alberto Huertas Celdrán
:
Impact of neural cyberattacks on a realistic neuronal topology from the primary visual cortex of mice. 7391-7405 - Enrique Tomás Martínez Beltrán

, Pedro Miguel Sánchez Sánchez
, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán
:
Mitigating communications threats in decentralized federated learning through moving target defense. 7407-7421 - David Escudero García

, Noemí DeCastro-García:
Transfer and online learning for IP maliciousness prediction in a concept drift scenario. 7423-7444 - V. Samuthira Pandi, E. Sivajothi, P. R. Therasa, R. Shalini Rajan:

Novel energy consumption and reduces number of transmission attempts (ECRTA) model for heterogeneous wireless muti-hop network. 7445-7455 - Román Rodríguez-Aguilar

, José Antonio Marmolejo-Saucedo, Eduardo Garcia-Llamas, Miriam Rodriguez Aguilar, Liliana Marmolejo Saucedo:
A machine learning-based analytical intelligence system for forecasting demand of new products based on chlorophyll: a hybrid approach. 7457-7468 - Pengyu Chen, Yuling Chen, Xuewei Wang

, Linlin Yuan, Chaoyue Tan, Yuxiang Yang:
A high-capacity slicing PBFT protocol based on reputation evaluation model. 7469-7482 - Fan Lu, Huaibin Qin, Quan Qi

:
Edge-enabled anomaly detection and information completion for social network knowledge graphs. 7483-7495 - Min Wang, Zixu Wang

, Shikai Tang:
MF-Informer for long-term QoS prediction in edge-cloud collaboration environments. 7497-7512 - Jinli Zhang, Fanqin Zhou

, Wenjing Li, Fei Qi:
Beam prediction and tracking mechanism with enhanced LSTM for mmWave aerial base station. 7513-7525 - Alejandro Buitrago López

, Javier Pastor-Galindo
, Félix Gómez Mármol:
Updated exploration of the Tor network: advertising, availability and protocols of onion services. 7527-7541 - Nuria Reyes-Dorta, Pino Caballero-Gil, Carlos B. Rosa-Remedios:

Detection of malicious URLs using machine learning. 7543-7560 - Wei Cheng

, Bing Lin, Liming Cheng
, Yong Cui:
Infrared and visible image fusion in a rolling guided filtering framework based on deep feature extraction. 7561-7568 - Ruitao Hou

, Anli Yan, Hongyang Yan, Teng Huang:
Bag of tricks for backdoor learning. 7569-7579 - Abdullah A. Al-Atawi:

Genetically optimized TD3 algorithm for efficient access control in the internet of vehicles. 7581-7601 - Yupeng Wang

, Yongli Wang, Can Xu, Xiaoli Wang, Yong Zhang:
Computer vision-driven forest wildfire and smoke recognition via IoT drone cameras. 7603-7616 - V. Suryanarayana Reddy, A. S. Kannan

:
Optimized fuzzy type 1 Mamdani controller to enhance transient stability of AC-power system. 7617-7632

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














