


default search action
Wireless Networks, Volume 31
Volume 31, Number 1, January 2025
- Ruizhong Du, Shuai Li:
Type classification and identification of IoT devices by using traffic characteristics. 1-17 - K. A. Mohamed Junaid, D. Paulraj
, T. Sethukarasi
:
A comprehensive ensemble classification techniques detecting and managing concept drift in dynamic imbalanced data streams. 19-30 - G. Nirmala Priya, B. Kishore, R. Ganeshan, R. Cristin:
Video forgery detection using competitive swarm sun flower optimization algorithm based deep learning. 31-49 - Wei Hao, Chen Hou
:
An age of information based scheduling algorithm in a shared channel with energy and link capacity constraints. 51-67 - Pejman Abdollahzadeh Karegar
, Duaa Zuhair Al-Hamid, Peter Han Joo Chong:
UAV-enabled software defined data collection from an adaptive WSN. 69-90 - Khushboo Dadhich
, Devika Kataria
:
Multiple parameter decision for backoff counter optimization of medical body area network. 91-107 - Morteza Mozaffari, Sayyed Majid Mazinani
, Ali Akbar Khazaei:
An energy efficient grid-based clustering algorithm using type-3 fuzzy system in wireless sensor networks. 109-125 - Siddiq Iqbal
, B. R. Sujatha:
Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor network. 127-147 - Manoj Kumar Somesula
, Banalaxmi Brahma, Mekala Ratna Raju
, Sai Krishna Mothku:
An online approach for cooperative cache updating and forwarding in mobile edge network. 149-163 - Jasmine Mystica K
, J. Martin Leo Manickam:
Learning to allocate: a delay and temperature-aware slot allocation framework for WBAN with TDMA-MAC. 165-183 - Nguyen Van Vinh
:
Transmit antenna selection for millimeter-wave communications using multi-RIS with imperfect transceiver hardware. 185-199 - Namya Aankur Gupta, Mansi Bansal, Seema Sharma
, Deepti Mehrotra
, Misha Kakkar:
Detection of vulnerabilities in blockchain smart contracts using deep learning. 201-217 - F. Sangeetha Francelin Vinnarasi, S. P. Karuppiah, Anita Rose J. T, C. A. Subasini:
A novel model for optimal selection of relay bus with maximum link reliability in VANET using hybrid fuzzy niching grey wolf optimization. 219-234 - Shabih Ul Hassan
, Zhongfu Ye, Talha Mir, Usama Mir:
Machine learning-inspired hybrid precoding with low-resolution phase shifters for intelligent reflecting surface (IRS) massive MIMO systems with limited RF chains. 235-245 - A. Rijuvana Begum, M. S. Divya Rani, V. Venkateshwar Reddy, B. Siva Kumar Reddy
, Biroju Papachary:
Experimental testing and analysis of regression algorithms for spectrum sensing in cognitive radio networks. 247-260 - Xiaomin Jin
, Jingbo Wang, Zhongmin Wang, Gang Wang, Yanping Chen:
Joint multi-server cache sharing and delay-aware task scheduling for edge-cloud collaborative computing in intelligent manufacturing. 261-280 - Olumide Alamu
, Thomas O. Olwal, Karim Djouani
:
Sum-rate maximization for a distributed space-time block code-aided cooperative NOMA with energy harvesting. 281-298 - K. Paul Joshua
, Sini Anna Alex, M. Mageswari, R. Jothilakshmi:
Enhanced conditional self-attention generative adversarial network for detecting cotton plant disease in IoT-enabled crop management. 299-313 - Lei Gao, Zhixin Liu
, Jiawei Su, Kit Yan Chan, Yazhou Yuan:
Outage probability constrained resource allocation scheme in two-tier cooperative NOMA network with SWIPT. 315-325 - Ayman A. El-Saleh, Abdul Manan Sheikh
, Mahmoud A. M. Albreem, Mohamed Shaik Honnurvali:
The Internet of Medical Things (IoMT): opportunities and challenges. 327-344 - Juan Zhao, Haibo Dai, Xiaolong Xu, Hao Yan, Zheng Zhang:
Clustering and power allocation for secured access to simultaneous transmissions and sensing Internet of Things networks. 345-359 - Chandra Priya Jayabal
, G. Nanthakumar, Tanupriya Choudhury
, K. Karthika:
6G-DeFLI: enhanced quality-of-services using distributed hash table and blockchain-enabled federated learning approach in 6G IoT networks. 361-375 - Mojtaba Farmani, Saman Farnam, Razieh Mohammadi, Zahra Shirmohammadi:
D2PG: deep deterministic policy gradient based for maximizing network throughput in clustered EH-WSN. 377-390 - Uppuluri Lakshmi Soundharya, G. Vadivu, Gogineni Krishna Chaitanya:
Distributed file systembased optimization algorithm. 391-404 - Bo Huang, Huidong Yao, Qing Bin Wu:
Prediction and evaluation of wireless network data transmission security risk based on machine learning. 405-416 - V. Kiruthika, Arun Sekar Rajasekaran, Kambatty Bojan Gurumoorthy, Anand Nayyar
:
OR2M: a novel optimized resource rendering methodology for wireless networks based on virtual reality (VR) applications. 417-434 - Yao-Jen Liang
, Yu-Chan Tseng, Chi-Wen Hsieh:
A deep reinforcement learning-based D2D spectrum allocation underlaying a cellular network. 435-441 - Nasrin Amiri
, Keyvan Forooraghi, Ensiyeh Ghasemi Mizuji, Mohammad Reza Ghaderi
:
A novel design of non-bending narrow wall slotted waveguide array antenna for X-band wireless network applications. 443-455 - Long Cheng
, Fuyang Zhao
, Wenhao Zhao:
An INS/UWB joint indoor positioning algorithm based on hypothesis testing and yaw angle. 457-469 - Amartya Mukherjee
, Snehan Biswas, Nilanjan Dey, Debashis De:
6GIoDT: 6G-assisted intelligent resource utilization framework for the Internet of Drone Things. 471-490 - Prajna Paramita Pradhan
, Vantary Revanthkumar, Sanghita Bhattacharjee:
Energy aware forwarder selection in wireless body area networks to enhance stability and lifetime. 491-503 - M. K. Vidhyalakshmi, S. Thaiyalnayaki, D. Bhuvana Suganthi
, R. Porselvi, K. Kumuthapriya:
Automated micro aneurysm classification using deep convolutional spike neural networks. 505-515 - Hossein Ahmadi
, Ali Kuhestani
, Sina Ghasemi-Sami, Moslem Forouzesh:
Adaptive transmission for two-way relaying optical wireless communications. 517-528 - Jiachen Yan, Guang Yang, Weihong Li, Qunxiong Lin, Junjie Chen, Cheng Huang:
A credibility scoring algorithm to match surveillance video targets and UWB tags. 529-544 - R. Megiba Jasmine
, J. Jasper
, M. R. Geetha:
An efficient secure cryptosystem using improved identity based encryption with multimodal biometric authentication and authorization in cloud environments. 545-565 - Hanjia Li:
Multicultural data assistance mining analysis for ideological and political education in smart education platforms using artificial intelligence. 567-581 - Chenyi Liang, Yifeng Zhao
, Zhibin Gao
, Keyi Cheng, Bo Wang, Lianfen Huang:
EALSO: joint energy-aware and latency-sensitive task offloading for artificial Intelligence of Things in vehicular fog computing. 583-599 - Nejad Alagha, Obada Al-Khatib
:
Pursuit learning algorithm to minimize delay and energy consumption in vehicular-edge computing networks. 601-612 - Sneha Kamble
, B. R. Chandavarkar
:
EWRPL: entropy-based weighted RPL. 613-622 - Hongyuan Gao
, Lishuai Zhao, Lantu Guo, Yanan Du, Yanqi Di:
Intelligent reflecting surface aided secure MIMO wireless communication. 623-639 - Bo Quoc Bao, Kieu-Xuan Thuc, Nguyen Thu Phuong
:
Analysis performance of full duplex two-way systems using assistance of UAV with hardware impairments. 641-657 - Fulai Liu
, Xubin Li, Zhibo Su, Yubiao Liu, Aiyi Zhang:
Mc-music algorithm for fast DOA estimation. 659-667 - Satish Kumar
, Rajarshi Mahapatra, Anurag Singh:
A learning-based uplink massive-MIMO decoder. 669-678 - Messaoud Babaghayou, Noureddine Chaib, Leandros A. Maglaras
, Yagmur Yigit, Mohamed Amine Ferrag, Carol Marsh, Naghmeh Moradpoor:
APOLLO: a proximity-oriented, low-layer orchestration algorithm for resources optimization in mist computing. 679-694 - Xiaozhen Zhu, Haotong Cao, Longxiang Yang:
Active and passive beamforming in RIS-assisted cell-free massive MIMO systems: an edge computing perspective. 695-707 - Santosh Kumar Yadav, Rakesh Kumar:
Scalable energy optimization of resources for mobile cloud computing using sensor enabled cluster based system. 709-734 - Ranjita Joon, Parul Tomar, Gyanendra Kumar
, Balamurugan Balusamy, Anand Nayyar
:
Unequal Clustering Energy Hole Avoidance (UCEHA) algorithm in Cognitive Radio Wireless Sensor Networks (CRWSNs). 735-757 - Umber Saleem, Sobia Jangsher, Tong Li, Yong Li:
Profit optimized task scheduling for vehicular fog computing. 759-777 - Humairah Hamid
, Gh. Rasool Begh
:
IRS assisted UAV communications for 6G networks: a systematic literature review. 779-807 - S. Mary Joans, J. S. Leena Jasmine, P. Ponsudha:
Authentication of multiple transaction using enhanced Elman spike neural network optimized with glowworm swarm optimization. 809-824 - V. Rajaram, V. Pandimurugan
, Rajasoundaran Soundararajan, Paul Rodrigues, Sripathi Venkata Naga Santhosh Kumar
, Munuswamy Selvi, V. Loganathan:
Enriched energy optimized LEACH protocol for efficient data transmission in wireless sensor network. 825-840 - Arijeet Ghosh, Iti Saha Misra:
Enabling sustainable green communication in three-tier 5G ultra dense HetNet with sleep cycle modulated energy harvesting. 841-864 - Zhonglin Wang, Ping Zhao
:
Byzantine detection for federated learning under highly non-IID data and majority corruptions. 865-877 - Ankit Verma
, Gaurav Agarwal, Amit Kumar Gupta, Vipin Kumar
, Shweta Singh:
An adaptive secure internet of things and cloud based disease classification strategy for smart healthcare industry. 879-897 - Ludan Zhang, Xueyong Yu
, Jianing Song, Hongbo Zhu:
D2D communication assisted edge computing based resource pricing and scheduling research in blockchain. 899-913 - Zhixiang Lu:
Research on anti-interference performance of 5G multi band communication antenna supported by NFC technology. 915-927 - Sajad Poursajadi
, Mohammad Hossein Madani:
Investigating cooperative strategies for security-reliability trade-off in full-duplex relay wireless networks. 929-944 - Yellamma Pachipala
, Durga Bhavani Dasari, Veeranki Venkata Rama Maheswara Rao, Bethapudi Prakash
, Tumma Srinivasarao
:
Workload prioritization and optimal task scheduling in cloud: introduction to hybrid optimization algorithm. 945-964 - Zhiyang Zhang, Fengli Zhang, Minsheng Cao, Chaosheng Feng, Dajiang Chen:
Enhancing UAV-assisted vehicle edge computing networks through a digital twin-driven task offloading framework. 965-981
Volume 31, Number 2, February 2025
- Yang Yuman
, S. B. Goyal
, Anand Singh Rajawat
, Manoj Kumar, Achyut Shankar
, Fatimah Alhayan, Shakila Basheer:
A blockchain-based solution for enhancing the efficiency and security of healthcare knowledge management systems in the era of industry 4.0. 983-1004 - Wenjia Deng, Lin Zhu, Yang Shen, Chuan Zhou
, Jian Guo, Yong Cheng:
A novel multi-objective optimized DAG task scheduling strategy for fog computing based on container migration mechanism. 1005-1019 - Meng Yi, Peng Yang
, Jinhu Xie, Cheng Fang, Bing Li
:
Soca: secure offloading considering computational acceleration for multi-access edge computing. 1021-1035 - Mojtaba Shojaei, Ali Hosseini, Alireza Shafieinejad
:
Fairness-aware placement of multiple aerial base stations in wireless networks. 1037-1052 - S. Selvakumar, A. Ahilan, B. Ben Sujitha, N. Muthukumaran:
Crystals kyber cryptographic algorithm for efficient IoT D2d communication. 1053-1070 - Nan Hu:
English listening and speaking ability improvement strategy from Artificial Intelligence wireless network. 1071-1080 - Xintong Zhou, Zhimin Huang, Kun Xiao:
Remote radio frequency unit selection of self-sustaining distributed base-station system based on downlink physical layer secure transmission. 1081-1093 - B. Vijaya Nirmala, K. Selvaraj:
Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm. 1095-1116 - Guangyi Chen, Ruoyu Zhang, Chen Miao, Yue Ma, Wen Wu:
Adaptive connected hybrid beamforming for energy efficiency maximization in multi-user millimeter wave systems. 1117-1127 - T. Sethukarasi
, D. Hemavathi, S. Swetha
, S. Samundeswari:
RSO-MRSA: rat swarm optimization based modified Rivest-Shamir-Adleman for secure and efficient healthcare monitoring system. 1129-1143 - Prajakta Amol More, Zuber M. Patel:
Low power decentralized differentially private multi-armed bandit algorithm based performance improvement on long-range radio network. 1145-1162 - Saeed Jamshidiha
, Vahid Pourahmadi
, Abbas Mohammadi, Mehdi Bennis:
Power allocation using spatio-temporal graph neural networks and reinforcement learning. 1163-1176 - Mutala Mohammed
, Xinyong Peng, Zhi Chai, Mingye Li, Rahel Abayneh, Xuelin Yang:
Efficient feature extraction of radio-frequency fingerprint using continuous wavelet transform. 1177-1185 - A. Sandana Karuppan, N. Bhalaji:
Efficient load balancing strategy for cloud computing environment with African vultures algorithm. 1187-1203 - L. Madhuridevi, N. V. S. Sree Rathna Lakshmi
:
Metaheuristic assisted hybrid deep classifiers for intrusion detection: a bigdata perspective. 1205-1225 - Huidan Zhang, Li Feng:
Mobile computing power trading decision-making method for vehicle-mounted devices in multi-task edge federated learning. 1227-1239 - Jiale Zhao, Yunni Xia, Xiaoning Sun, Tingyan Long, Qinglan Peng, Shangzhi Guo, Fei Meng, Yumin Dong, Qing Xia:
Ets-ddpg: an energy-efficient and QoS-guaranteed edge task scheduling approach based on deep reinforcement learning. 1241-1254 - Yerra Readdy Alekya Rani, E. Sreenivasa Reddy:
Deep intrusion net: an efficient framework for network intrusion detection using hybrid deep TCN and GRU with integral features. 1255-1278 - Achilleas Spanos, Ioanna Kantzavelou:
EtherVote: a secure smart contract-based e-voting system. 1279-1299 - M. Mallikarjuna, Tarachand Amgoth
:
A hybrid charging scheme for efficient operation in wireless sensor network. 1301-1320 - Huailiang Peng, Yujun Zhang, Xu Bai, Qiong Dai:
Coarse-to-fine label propagation with hybrid representation for deep semi-supervised bot detection. 1321-1336 - Xin Yu
:
Exploiting data transmission for route discoveries in mobile ad hoc networks. 1337-1359 - Qichang Guo, Zhanyue Xu, Jiabin Yuan, Yifei Wei:
Cloud-edge collaboration-based task offloading strategy in railway IoT for intelligent detection. 1361-1376 - Borui Zhao, Qimei Cui, Wei Ni, Xueqi Li, Shengyuan Liang:
Multi-Layer Collaborative Federated Learning architecture for 6G Open RAN. 1377-1390 - Mingxu Sun, Lingfeng Xiao, Xiujin Zhu, Peng Zhang, Xianping Niu, Tao Shen, Bin Sun, Yuan Xu:
An EEG signal-based music treatment system for autistic children using edge computing devices. 1391-1404 - Lei Zhang, Yujing Deng, Jia Fu, Lei Li, Jinhua Hu, Kangjian Di:
A DV-Hop localization algorithm corrected based on multi-strategy sparrow algorithm in sea-surface wireless sensor networks. 1405-1420 - Jingwen Li, Meiling Dai, Yi Lu, Shaojie Yang:
Trusted reputation system for heterogeneous network resource sharing based on blockchain in IoT. 1421-1433 - M. Dhipa, Nithya Sampath, R. Seetha, D. Nageswari:
Secure cluster head selection in wireless sensor networks using fuzzy based generic algorithm. 1435-1448 - Avinash Nanasaheb Pawar
, Shankar B. Deosarkar:
A comprehensive review of different antennas for IoT applications. 1449-1461 - Tathababu Addepalli
:
Effective area reduction & surface waves suppression of a novel four-element MIMO antenna exclusively designed for dual band 5G sub 6 GHz (N77/N78 & N79) applications. 1463-1479 - G. Arulselvan, A. Rajaram:
Routing attacks detection in MANET using trust management enabled hybrid machine learning. 1481-1495 - Sanjay Kumar Biswal, Tushar Kanta Samal, Prabhudutta Mohanty, Ram Chandra Barik:
Design of a novel load balanced multi-sink based hierarchical data gathering protocol for wireless sensor networks. 1497-1514 - Ermias Kassahun
, Ayodeji Olalekan Salau
, Kehali A. Jember, Zelalem Hailu
, Habitamu Endalamaew Kassahun
:
Efficient resource allocation scheme for dually connected non-orthogonal multiple access based LIFI-RF networks. 1515-1528 - Md. Mehedi Hasan
, Sungoh Kwon:
Joint call admission control and load-balancing in ultra-dense cellular networks: a proactive approach. 1529-1540 - Mohamed Khadmaoui-Bichouna
, Antonio Matencio-Escolar, José M. Alcaraz Calero
, Qi Wang:
Design and implementation of an integrated OWC and RF network slicing-based architecture over hybrid LiFi and 5G networks. 1541-1559 - R. Baby Shalini, S. Lenty Stuwart
:
Improving cell edge user performance using cooperative cyclic interleaved non-orthogonal multiple access under rayleigh fading channel. 1561-1575 - Hafizur Rahman
, Md. Iftekhar Hussain:
Testbed analysis of multi-fog architecture for interoperable Internet of Things. 1577-1586 - Weiyi Zhang, Cuijing Jia, Zhixiang Liu, Pinfan He:
Strategies for enhancing the value of the sports tourism industry supported by multi-sensor network technology. 1587-1599 - Parminder Kaur, Shivani Malhotra, Manish Sharma:
Wearable and ultra-compact mm-wave four port MIMO antenna for dual band n261 and n260 (28/38) GHz 5G applications. 1601-1624 - Ankur Ratmele, Ritesh Dhanare, Smita Athanere Parte:
Octave convolutional multi-head capsule nutcracker network with oppositional Kepler algorithm based spam email detection. 1625-1644 - Dinglin Gu, Jian Zhang, Zhangguo Tang, Qizhen Li, Min Zhu, Hao Yan, Huanzhou Li:
IoT device identification based on network traffic. 1645-1661 - Weicheng Tang, Yubin Yang, Donghui Gao, Juan Chen, Suqun Huang, Ningjiang Chen:
An optimized task offloading strategy based on deep reinforcement learning combined with channel reliability prediction. 1663-1682 - Ragodaya Deepthi Kadiyala
, Anjaneyulu Lokam, Chayan Bhar:
A joint self-information and Markovian model-driven deep channel estimation and feedback model for millimeter-wave massive MIMO systems. 1683-1703 - Vignesh Saravanan K.
, S. Kavi Priya, K. Vijayalakshmi:
Enhanced mobile sink path optimization using RPP-RNN algorithm for energy efficient data acquisition in WSNs. 1705-1717 - T. Pandiselvi, G. M. Karthik, Vinodkumar Jacob
, B. Nancharaiah:
An intelligent framework for attack detection in the internet of things using coati optimization. 1719-1733 - Chuan-Wei Cho
, Meng-Shiuan Pan
:
Efficient downstream data dissemination in IAB networks with DAG-based topology. 1735-1746 - Ahmed M. Khedr
, Oruba Alfawaz, Marya Alseid, Ali El-Moursy:
MOTO-MASSA: multi-objective task offloading based on modified sparrow search algorithm for fog-assisted IoT applications. 1747-1762 - Yinjun Deng, Zhijun Tang
:
On-demand routing algorithm for multipath selection based on node load states in mobile ad hoc networks. 1763-1782 - Chakaravarthi Sivanandam, Bangaru Kamatchi Seethapathy, Divya Doss:
HBO-BiLSTM: hybrid bat optimizer-based bidirectional long short-term memory for secure web service recommendation. 1783-1800 - Yue Ma
, Weijun Long, Chen Miao, Qiaoyu Chen, Jin-Dong Zhang, Yingrui Yu, Wen Wu:
Enhanced dual lane detection in automotive radar systems using harmonic coordinated beamforming of time-modulated arrays. 1801-1812 - Chun Yang, Binyu Xie, Yanni Li, Jieshan Li, Chongyang Liu:
Energy-efficient edge intelligence for task-dependency MEC power grid networks. 1813-1823 - Di Tang, Peng Xiao, Tao Zheng, Xiang Li, Cuibo Yang:
Enhancing the security of edge-AI runtime environments: a fine-tuning method based on large language models. 1825-1838 - Jiuting Yang, Amin Mohajer:
Multi objective constellation optimization and dynamic link utilization for sustainable information delivery using PD-NOMA deep reinforcement learning. 1839-1859 - Arun Kumar, K. Anish Pon Yaminiand
, Kumaravel Kaliaperumal
, Rakan A. Alsowail, Nishant Gaur:
A systematic PAPR analysis of optical 5G waveforms using advanced and deep learning PAPR algorithms: estimation of PAPR, PSD, and BER. 1861-1883 - C. Umarani, Ramalingam Shanmugam, S. Dhanasekaran, K. Baskaran:
An hybrid machine learning and improved social spider optimization based clustering and routing protocol for wireless sensor network. 1885-1910 - Shlomi Dolev, Alexander Fok, Michael Segal
:
Swarming with (visual) secret (shared) mission. 1911-1929 - Tathababu Addepalli, Gollamudi Naveen Kumar, Ch Jyotsna Rani, Neelima Koppala, Jetti Chandrasekhar Rao, Ch. Manohar Kumar
, Rajyalakshmi Uppada, Bandi Kiran Kumar:
A defected substrate 4-element mimo antenna with higher diversity characteristics for 5G sub 6 GHz N77/N78 band applications. 1931-1947 - Mahdieh Ghaderi, Pejman Rezaei
:
Analytical design of low-profile wideband multi-layer transmitarray antenna for Ku band. 1949-1957 - D. Kalaiyarasi, R. Priscilla Joy, M. Victor Jose, P. Sridhar:
Fuzzy based trust model for cloud access control classification mechanism using ghost net architecture. 1959-1973 - Josip Milanovic
, Ana Katalinic Mucalo:
A comparison of measurement methodologies for the assessment of E-field level radiated by 5G NR base station. 1975-1986 - Nasrin Amiri
, Keyvan Forooraghi, Ensiyeh Ghasemi Mizuji, Mohammad Reza Ghaderi:
Correction: A novel design of non-bending narrow wall slotted waveguide array antenna for X-band wireless network applications. 1987
Volume 31, Number 3, March 2025
- Brijesh Kumar Chaurasia
, Bodhi Chakraborty, Debanjan Sadhya:
Trust computation in VNs using blockchain. 1989-2003 - N. Saravanan, Arunachalam Rajesh, A. Sahaya Anselin Nisha
, Karthikayen Arunachalam
:
An innovative energy efficient routing protocol in MANET with hybridized osprey-fire hawk optimization algorithm to attain optimal routing constraints. 2005-2026 - Kumari Nidhi Lal, Lekhraj:
Automatic multimedia classification based on mood recognition of drivers in Internet-of-vehicle using fog computing. 2027-2038 - Vaishali Kikan
, Ashwni Kumar:
A detailed review of 5G MIMO and array antenna design evolution with performance enhancement for mmWave applications. 2039-2090 - Yingjie Zhao, Kechao Cai
, Jinbei Zhang, Zhuoyue Chen, Ziqun Chen:
Online tile dispatching framework with guarantees for 360-degree video streaming in wireless networks. 2091-2111 - Suriya Murugan, M. G. Sumithra:
Efficient swarm intelligent optimization techniques using cooperative spectrum sensing for terrestrial handovers. 2113-2127 - Lifang He, Xinggen Wu, Yao Yang:
A new segment shift M-ary differential chaos shift keying aided by discrete sine transform. 2129-2142 - Fulai Liu
, Jiaqi Yue, Zhongyi Hu, Ruiyan Du:
Multiple classification algorithm based on ensemble learning for intrusion detection. 2143-2154 - Xuan Liu, Zheng Liu, Chaomurilige, Shan Jiang, Xiangyun Tang, Guixian Xu:
Context-adaptive and QoS-guaranteed flow scheduling optimization in multipath multimedia transmission over MPTCP. 2155-2165 - Hao Liu
, Renwen Chen, Shanshan Ding, Fei Liu, Zihao Jiang, Guoqiang Lu, Junyi Zhang:
An efficient data transmission scheme for WSNs assisted by multiple UAVs. 2167-2180 - Panimalar Kathiroli
, Kanmani Selvadurai:
Data aggregation by enhanced squirrel search optimization algorithm for in wireless sensor networks. 2181-2201 - Volodymyr Kharchenko
, Andrii Grekhov
, Vasyl Kondratiuk
:
Data traffic study in SAGIN with remotely piloted air systems. 2203-2214 - Fulai Liu
, Liwen Feng, Hao Qin, Long Li, Yajie Gao, Ruiyan Du:
RACNN algorithm for robust adaptive beamforming. 2215-2225 - V. Jaganraja
, R. Srinivasan:
An agile solution for enhancing cybersecurity attack detection using deep learning privacy-preservation in IoT-smart city. 2227-2242 - N. Premkumar, S. Sridharan, R. V. Viswanathan, N. Magendiran:
Enhanced subtraction-average-based optimizer and blockchain for security and load balancing in fog computing. 2243-2255 - Ishtiaque Ahmed, Gulzar Ahmad, Nasru Minallah, Jaroslav Frnda
, Amaad Khalil, Tariqullah Jan, Hameed Ullah Khan
:
Enhancing reliability with MIMO aided dual iterations for mobile video transmission system. 2257-2273 - Daniela Sousa, Susana Sargento, Miguel Luís:
On the optimal integration of legacy and SDWN communication nodes in emergency scenarios. 2275-2292 - Xiaoxian Yang, Li Kuang:
Edge intelligence in wireless networks. 2293-2294 - Muhammad Shahid Iqbal, Elif Dilek Salik, Yalcin Sadi, Sinem Coleri:
Resource allocation for discrete rate multi-cell energy constrained communication networks. 2295-2315 - Fulai Liu
, Guangyu Meng, Bo Zhang, Aiyi Zhang, Xinyue Lou, Ruiyan Du:
Doa estimation algorithm based on UV decomposition matrix completion. 2317-2326 - Subodh Mishra
, Vinod Kumar Jain, Koichi Gyoda, Samkit Jain:
A novel content eviction strategy to retain vital contents in NDN-IoT networks. 2327-2349 - Jiaqi Fan, Jiankui Yang, Xiangran Yu:
Activation and sleep control of the removable base station with setup time and delayed sleep period. 2351-2368 - Gyanendra Kumar
, Lal Pratap Verma, Varun Kumar Sharma, Dimitris Kanellopoulos
, Pragya, Sur Singh Rawat:
R-MPTCP: a rank-based data scheduler for wireless networks. 2369-2388 - N. S. Gowri Ganesh
, V. Balasubramanian
, D. Venkata Vara Prasad, S. Senthil Velan:
Deep learning-based user authentication with hybrid encryption for secured blockchain-aided data storage and optimal task offloading in mobile edge computing. 2389-2417 - Gudivada Lokesh
, K. K. Baseer:
A meta-heuristic approach-aided multi-objective strategy with optimal resource allocation via fault tolerant and priority-based scheduling for load balancing in cloud. 2419-2441 - S. V. Sandhya, S. M. Joshi:
A novel optimized framework for improving the quality of services in mobile wireless system. 2443-2456 - Shaoguo Xie, Xiaoxiao Huang:
Multi-cell cooperative transmission for MU-NOMA networks. 2457-2475 - C. P. Thamil Selvi, R. Lakshmana Kumar, P. Punitha:
Enhancing data security in the cloud using MECC-SIDH enhanced CL-HPAEKS scheme. 2477-2494 - P. K. Poonguzhali, P. Geetha, R. Vidhya:
Multi-objective cluster head based energy efficient routing using THDCNN with hybrid capuchin search and woodpecker mating algorithm in WSN. 2495-2511 - S. Anu Velavan, C. Sureshkumar:
Double fuzzy clustering-driven context neural network for intrusion detection in cloud computing. 2513-2524 - Lovish Matta, Bhanu Sharma, Manish Sharma:
Experimental analysis of four-port MIMO multi-band bandwidths antenna within two wide-bands (6.88-21.23 GHz & 27.95-44.66 GHz) with high isolation for future wearable applications. 2525-2553 - Mohammad Zamani, Masoumeh Safkhani
, Negin Daneshpour:
SCF-VPEKS: secure channel free verifiable public key encryption with keyword search. 2555-2572 - S. Ali Mousavi, Mehdi Monemi, Reza Mohseni:
Leveraging common user clustering for improved performance in cell-free NOMA networks. 2573-2589 - Zhuoran Huang, Haosong Gou, Pengfei Du, Ye Jiang:
Network design for 6 G massive connectivity with aerial networks. 2591-2602 - Ekta Dixit, Shalli Rani
:
E2R2D2: energy-efficient robust routing and data distribution protocol in wireless air pollution monitoring system. 2603-2617 - Hetal Shah, Dhaval K. Patel, Vinay Thumar, Zhiguo Ding, Sumei Sun:
Performance analysis of RIS-assisted 6G vehicular networks with NOMA under diverse channel conditions. 2619-2635 - Xuemei Yang
, Hong Luo, Yan Sun:
An online joint optimization approach for task offloading and caching in multi-access edge computing. 2637-2651 - Chenyu Hou, Kai Jiang, Tiantian Li, Meng Zhou, Jun Jiang:
Co-active: an efficient selective relabeling model for resource constrained edge AI. 2653-2666 - Nguyen Tan Cam
, Vo Quoc Vuong:
uitAnDiNeFed: android malware classification on distributed networks by using federated learning. 2667-2683 - Lopamudra Ghadei, Harish Kumar Sahoo
:
Symbol detection and BER analysis in wireless and free space optical networks using low complexity neural equalizer. 2685-2701 - Jia-Lei Ding, Yi-Chen Shen, Dao-Long Yuan, Ming-Yu An, Xiu-Juan Cao
:
Optimizing redeployment of communication base station. 2703-2713 - Xiangping Kong, Yu Wang, Lei Zhang, Yulong Shang, Jianjie Tian, Ziyan Jia:
Robust beamforming design for RIS-aided IoV with transceiver hardware impairments. 2715-2726 - Aravindhraj Natarajan, N. Shanthi:
Optimizing healthcare big data privacy with scalable subtree-based L-Anonymization in cloud environments. 2727-2742 - Narendrakumar Chauhan
, Sagar Kavaiya, Purvang Dalal:
Modified threshold-based spectrum sensing for CV2X communication. 2743-2753 - E. L. Dhivya Priya, K. Kavitha:
Twin-port transmission line model based antenna for wireless ITS V2X applications. 2755-2768 - Parminder Kaur
, Shivani Malhotra
, Manish Sharma
:
Inverted marquee shaped compact and conformal four-port configured mm-wave MIMO antenna for 5G applications at 28/38 GHz frequencies (n261 and n260). 2769-2795 - Si-Feng Zhu, Cheng-tai Liu
, Hai Zhu, Rui Qiao, Hao Chen, Hui Zhang:
Multi-objective optimization task offloading decision for intelligent transportation system in cloud edge collaborative computing scenario. 2797-2816 - Abhinaba Dey, Prabina Pattanayak
:
Efficient pilot contamination reduction in spatially correlated cell-free massive MIMO systems with hardware impairments. 2817-2826 - Sudha Muthusamy, Kanmani Ruby Erode Dhanapal, Arunachalam Rajesh, Kalamani Chinnappa:
An improved distance vector hop algorithm and A* algorithm with modified supernova optimizer for 3-dimensional localization in wireless sensor networks. 2827-2846 - Xiaoyi Jiang, Fanqin Zhou, Qiyang Zhang, Lei Wei, Yang Yang, Daohua Zhu, Lei Feng, Dayang Wang:
Energy-aware computing of access service for wireless edge via distributed deep learning. 2847-2861 - Aiyang Ren, Haibo Yang
, Zhengfeng Jia, Zhao Li:
Reliability evaluation of bidirectional linear wireless sensor networks: a comparative analysis. 2863-2873 - Xianfeng Li, Haoran Sun:
Prediction-based reactive-greedy routing protocol for flying ad hoc networks. 2893-2907 - Parisa Rezaei, Nahideh Derakhshanfard:
Reinforcement learning based routing in delay tolerant networks. 2909-2923 - G. Santhakumar
, R. Muthukumar
:
A novel compact flower shaped antenna array for sub-6 GHZ and UWB applications. 2925-2938 - Linghui Zhang, Changli Zhou, Jingliang Wen:
APSH-JWT: an authentication protocol based on JWT with scalability and heterogeneity in edge computing. 2939-2953 - Pengyu Dong
, Xiang Xin, Peng Wang, Yuan Liang:
A robust MMSE-DFE framework with joint time-frequency domain processing for UAV-to-ground SC-FDE communication systems. 2955-2974 - Tu-Trinh Thi Nguyen
, Ha Hoang Kha
, Xuan-Xinh Nguyen:
Secrecy performance analysis of IRS-aided secure NOMA systems over Nakagami-m fading channels. 2975-2991 - Sweta Mishra, Bhaskar Mondal, Rishi Kumar Jha:
A survey on isogeny-based cryptographic protocols. 2993-3024 - Abhilasha Sharma, Shweta Pandit, Salman Raju Talluri:
Throughput prediction of fifth-generation cellular system using hybrid feature selection and enhanced sequential decision tree machine learning algorithm. 3025-3042
Volume 31, Number 4, April 2025
- Toi Le-Thanh, Khuong Ho-Van, Thiem Do-Dac:
Performance analysis for IRS-enabled full-duplex energy harvesting NOMA under practical imperfections. 3043-3058 - S. Kalpana Devi, R. Thenmozhi:
A novel multi-objective-derived heuristic-assisted reliable routing path selection scheme in vehicular ad hoc networks. 3059-3077 - Haoran Du, Qi Zhang, Weiman Sun, Shunfu Jin
:
Performance study on task offloading strategy with cloud-edge-device collaboration based on hybrid access networks. 3079-3093 - Abhishek Kumar Verma, Vinay Kumar Singh, Mohammad Rafique Khan, Prabira Kumar Sethy
:
Q-learning based heterogeneous network selection decision algorithm for ultra reliable and low latency communication services. 3095-3110 - Chanchal Soni, Namit Gupta:
Enhancing the spectral efficiency of full duplex massive MIMO system using EHBM3SED Detection model. 3111-3126 - Nguyen Duy Tan, Van-Hau Nguyen:
Machine learning meets IoT: developing an energy-efficient WSN routing protocol for enhanced network longevity. 3127-3147 - Yusra Banday:
Empowering RIS-assisted NOMA networks with deep learning for user clustering and phase shifter optimization. 3149-3166 - Therkkumthala Prakash Rani, Ayyadurai Maruthu, Pavithra Guru Ramakrishnan, Cypto Jayakumar:
A secure authentication and optimization based device-to-device communication for 5G enabled IoT applications of smart cities. 3167-3186 - Aleena Nazir, Zafar Iqbal, Zia Muhammad:
ZTA: a novel zero trust framework for detection and prevention of malicious android applications. 3187-3203 - P. Prabhu:
An integrated independent antenna system for multiradio wireless communication applications. 3205-3222 - Priyanka Ghosh, Hritwika Sarkar, Shashibhushan Sharma, Sanjay Dhar Roy, Sumit Kundu:
Outage analysis of a two users NOMA with partial selection of an energy harvesting relay. 3223-3237 - Haythem Bany Salameh, Manar Shatara, Rami Halloush, Ahmed Musa, Mohannad Alhafnawi:
Adaptive RL-driven spectrum allocation in multi-cell cognitive B5G networks. 3239-3254 - Arash Heidari, Nima Jafari Navimipour, Mohammad Ali Jabraeil Jamali, Shahin Akbarpour:
Securing and optimizing IoT offloading with blockchain and deep reinforcement learning in multi-user environments. 3255-3276 - P. J. Beslin Pajila
, Y. Harold Robinson, Udayakumar Allimuthu, Eanoch Golden Julie, Lijetha. C. Jaffrin, B. Gracelin Sheena:
Enhanced autoencoder and deep neural network (AE&DNN) method for ddos attack recognition. 3277-3295 - Shashidhar Gurav, Leena Chakraborty, N. Raghava Rao, Philippe Funk, Kalyani Dasari:
Multi-objective optimal 4-phase RPl routing technique using chimp sine cosine algorithm for IoT system. 3297-3313 - Mayur Jagdish Patil, Krishnakant P. Adhiya:
Secured VANET: an improved COOT-algorithm-based optimal routing protocol with multiple authentication and fake message detection for secure data transmission. 3315-3342 - Shaoguo Xie, Liefu Ai, Yangxinzi Zhou:
System utility maximization scheme for wireless cellular networks. 3343-3363 - Antony Judice, Shivani Malhotra, Manish Sharma:
Micromachined octa-port high self isolation asymmetric tapered feed MIMO antenna with flexible capabilities and SAR analysis integrating 5G-sub 6 GHz, microwave, and millimeter-wave applications. 3365-3394 - Vidyapati Jha
, Priyanka Tripathi:
${\varvec{\pi}}$-tree based knowledge representation and recommendation system in cognitive IoT. 3395-3413 - Raju Gudla, Satyanarayana Vollala, K. G. Srinivasa, Ruhul Amin:
TCC: Time constrained classification of VPN and non-VPN traffic using machine learning algorithms. 3415-3429 - Shams Forruque Ahmed, Shanjana Shuravi Shawon, Afsana Bhuyian, Shaila Afrin, Aanushka Mehjabin, Sweety Angela Kuldeep, Md. Sakib Bin Alam, Amir H. Gandomi
:
Forensics and security issues in the Internet of Things. 3431-3466 - S. Ruba, A. M. Kalpana:
Advanced chunk-based data deduplication framework for secure data storage in cloud using hybrid heuristic assisted optimal key-based encryption. 3467-3489 - Xiaoli Jing
, Xianpeng Wang, Han Wang, Chenglong Shao, Xiang Lan:
Improved PSO based channel estimation algorithm for mmWave massive MIMO systems: hybridization technology and extreme perturbation. 3491-3502 - Xiao Jiang, Hui Geng, Peishun Yan:
Friendly jammer selection improves physical layer security in energy harvesting communications over Nakagami-m channels. 3503-3516 - M. Madhini, B. R. Tapas Bapu:
Hybrid artificial humming bird and coati optimization algorithm fostered power aware application mapping in 3D-NoC system. 3517-3531

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.