Optimum resource allocation for D2D-assisted wireless network in industrial internet of things: a hypergraph-based clique algorithm
Due to the fast development and evolution of technologies like the Internet of Things need for reliable and fast connectivity has also become more prevalent. The use of Device-to-Device communications is a promising technology that can help reduce ...
Hierarchical coded caching with heterogeneous cache sizes
In this paper, we delve into the intricacies of a network architecture enabled by two layers of caches, where users receive their requested content via intermediate helpers connected to a central server. While coded caching in a two-layer ...
Improved DV-Hop based on parallel compact Willow Catkin Optimization algorithm for 3D nodes localization in WSN
Wireless sensor networks (WSNs) play a critical role in environmental sensing and data transmission. However, their performances are often hindered by challenges like localization accuracy and storage capacity. Existing variants of DV-Hop ...
Joint design of hybrid beamforming and reflection coefficients for reconfigurable intelligent surface aided mmWave communication systems
This paper considers a reconfigurable intelligent surface (RIS) aided multi-user multiple-input single-output (MU-MISO) mmWave downlink communication system. The hybrid beamforming (HBF) and the programmable reflecting elements (PREs) are ...
SIoV-FTFSA-CAOA: a fuzzy trust-based approach for enhancing security and energy efficiency in social internet of vehicles
The Social Internet of Vehicles (SIoV) is an emerging network that interconnects vehicles and generates vast amounts of data concerning social relationships, chauffeurs, commuters, as well as surrounding conditions. However, security is a major ...
Quest: instant questionnaire collection from handshake messages using WLAN
A common approach for questionnaire collection is to set up a WLAN and respondents submit answers via specific apps or a web browser. However, much unnecessary background traffic is incurred once a device connects to Wi-Fi, consuming limited ...
Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures
To address the concerns about security and privacy in cloud-based data storage, this study proposes a unique approach to secure cloud-based data governance using hybrid machine learning architectures. With the increasing reliance on cloud ...
Density-based anti-clustering for scheduling D2D communications
Wireless link scheduling in device-to-device (D2D) networks is an NP-hard problem. As a solution, multiple supervised deep learning (DL) models have been recently proposed, which depend on the geographical information of D2D pairs. However, such ...
Full duplex reconfigurable intelligent surfaces system relying on NOMA and wireless power transfer
In this article, we analyze the downlink transmission of a wirelessly powered hybrid cooperative non-orthogonal multiple access (C-NOMA) system relying on reconfigurable intelligent surfaces (RIS), where self-interference related to full-duplex (...
Modulation recognition network compression based on a randomly perturbation convolutional kernel activation mapping method
Deep-learning-based automatic modulation recognition techniques have been extensively explored for wireless communication systems, because of their strong feature extraction and classification abilities of deep neural networks. Although the high ...
OMIBC: optimal modified identity-based cryptography for signcryption and private key extraction using fuzzy model
The technological breakthroughs of Internet of thing (IoT) applications in various sectors are nowadays contributing to the development of smart mobile IoT (SM-IoT). Lack of authentication and encryption schemes make SM-IoT more susceptible to ...
A new intrusion detection system based on SVM–GWO algorithms for Internet of Things
Internet of Things (IoT) as an emerging technology is widely used in various applications such as remote healthcare, smart environment, and intelligent transportation systems. It is necessary to address users’ concerns about cost, ease of use, ...
Multi-cluster MIMO non-orthogonal multiple access for multi-cell systems
In this paper, we present a multi-cluster multiple-input multiple-output non-orthogonal multiple access technique to improve spectral efficiency by simultaneously transmitting multiple data streams to multiple clusters in multi-cell systems. This ...
Enhanced passive optical network system-based VCSEL and PSK electrical modulator for 5th generation
The rapid evolution of passive optical network (PON) technologies has been driven by the necessity to accommodate 5th-generation system requirements. This research introduces a PON wavelength division multiplexing-based optical transmitter that is ...
Energy efficient optimal parent selection with Chameleon Swarm algorithm and non-overlapping backoff algorithm based dynamic slot allocation in wireless body area network
Wireless body area networks (WBANs) become prevalent in the realm of medical and non-medical fields with the development of networking, information, and communication technologies. Applications for real-time patient monitoring rapidly create the ...
High priority space protection (HPP): countdown space-based MAC protocol with enhanced lockdown effect
The countdown mechanism is a powerful concept for creating distributed wireless contention protocols and is the key component of the standard IEEE 802.11 Distributed Coordination Function (DCF). This paper defines and analyzes the countdown ...
Outage analysis of downlink communications in heterogeneous networks under backhaul constraint
Employing multi-layer networks represents a promising approach to address the increasing demand for high data rates and efficient congestion control in cellular communication networks. This study focuses on the downlink performance of a two-tier ...
An adaptive model of optimal traffic flow prediction using adaptive wildfire optimization and spatial pattern super learning
Real-time traffic prediction uses past data to anticipate traffic volume. The volume of traffic in the region may be estimated using interpolation and extrapolation from library data by the trend structure. It is based on a prediction model with a ...
Employing blockchain and IPFS in WSNs for malicious node detection and efficient data storage
The presence of the malicious internet of things (IoT) devices in wireless sensor networks (WSNs), in the underlying work, is identified using a private blockchain and interplanetary file system (IPFS) based system. In the proposed model, the ...
Modeling of a high gain two stage pHEMT LNA using ANN with Bayesian regularization algorithm
This paper presents novel way to achieve fast and accurate Artificial Neural Network (ANN) modeling of Radio Frequency (RF) front end Low Noise Amplifier (LNA). Multilayer perceptron neural network is implemented to model high gain, ultra-low ...
Asymmetric CPW-fed patch antenna with slits at terahertz applications for 6G wireless communications
This paper presents a compact portable patch antenna for 6G wireless communications at terahertz (THz) applications. The asymmetric co-planer waveguide (CPW) fed curved slits are proposed on rectangular microstrip patch antenna to resonate at THz ...
An improved path loss model for 5G wireless networks in an enclosed hallway
Given the disparity in signal transmission properties for both current bandwidths and millimeter wave radio frequencies, the present propagation models used for low frequency range up to few gigahertz are not suitable to be utilized for the path ...
Optimizing resource allocation for D2D communications with incomplete CSI
Device-to-device (D2D) communication is a new technology in cellular networks which enables direct communications between nearby devices. It could reuse the uplink spectrum of the cellular users (CUs) thus will introduce interference. Efficient ...
Performance evaluation of multiple relay SWIPT enabled cooperative NOMA network in the presence of interference
- Mahrukh Liaqat,
- Kamarul Ariffin Noordin,
- Tarik Abdul Latef,
- Kaharudin Dimyati,
- Talha Younas,
- Faizan Qamar,
- Zhiguo Ding
Simultaneous wireless information and power transmission (SWIPT) allows the use of RF signals for both information detection and energy harvesting. Integration of cooperation, NOMA and SWIPT can provide energy-efficient, reliable, and spectral-...
Link failure handling and controller memory overhead elimination in SDN through source path routing model technique
With the basic principle of separating control and data planes, software defined networking (SDN) has emerged as a promising paradigm. The separation generates a variety of scaling concerns (e.g., higher reaction time, overhead on the controller). ...
A weighted cooperative spectrum sensing strategy for NGSO–GSO downlink communication
In this paper, aiming at the spectrum coexistence scenario between non-geostationary satellite orbit (NGSO) and geostationary satellite orbit (GSO) satellite systems, the NGSO network, a secondary system, reuses the spectrum resources of the GSO ...
Heterogeneous Lifi–Wifi with multipath transmission protocol for effective access point selection and load balancing
In recent days, the emerging ideas of hybridized network are used, which isbased on light fidelity (LiFi) and wireless fidelity (WiFi). The merging concept of LiFi and WiFirequires huge coverage area and reduce traffic overload. The classical Load ...
Block chain espoused adaptive multi-scale dual attention network with quaternion fractional order meixner moments encryption for cyber security in wireless communication network
Autonomous driving like subsequent generation cyber-physical system (CPS) with present improvement of wireless communication network, here is a substantial necessity of big data analyzes along greater accurateness and lower delay. Nevertheless, ...